mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 04:43:37 +00:00
Merged PR 14319: 2/15 AM Publish
This commit is contained in:
@ -32,9 +32,9 @@ Booting from the network (PXE boot) is only supported when you use an Ethernet a
|
|||||||
|
|
||||||
The following Ethernet devices are supported for network boot with Surface devices:
|
The following Ethernet devices are supported for network boot with Surface devices:
|
||||||
|
|
||||||
- Surface USB to Ethernet adapter
|
- Surface USB-C to Ethernet and USB 3.0 Adapter
|
||||||
|
|
||||||
- Surface USB 3.0 Ethernet adapter
|
- Surface USB 3.0 to Gigabit Ethernet Adapter
|
||||||
|
|
||||||
- Surface Dock
|
- Surface Dock
|
||||||
|
|
||||||
|
@ -31,6 +31,7 @@ For more information on planning for, deploying, and managing Surface devices in
|
|||||||
| [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) | Find out how to enable support for PEAP, EAP-FAST, or Cisco LEAP protocols on your Surface device. |
|
| [Enable PEAP, EAP-FAST, and Cisco LEAP on Surface devices](enable-peap-eap-fast-and-cisco-leap-on-surface-devices.md) | Find out how to enable support for PEAP, EAP-FAST, or Cisco LEAP protocols on your Surface device. |
|
||||||
| [Manage Surface UEFI settings](manage-surface-uefi-settings.md) | Use Surface UEFI settings to enable or disable devices, configure security settings, and adjust Surface device boot settings. |
|
| [Manage Surface UEFI settings](manage-surface-uefi-settings.md) | Use Surface UEFI settings to enable or disable devices, configure security settings, and adjust Surface device boot settings. |
|
||||||
| [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | See how this feature of Surface devices with Surface UEFI allows you to secure and manage firmware settings within your organization. |
|
| [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) | See how this feature of Surface devices with Surface UEFI allows you to secure and manage firmware settings within your organization. |
|
||||||
|
| [Surface Diagnostic Toolkit for Business](surface-diagnostic-toolkit-business.md) | Learn how to investigate, troubleshoot, and resolve hardware, software, and firmware issues with Surface devices. |
|
||||||
| [Surface Data Eraser](microsoft-surface-data-eraser.md) | Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices. |
|
| [Surface Data Eraser](microsoft-surface-data-eraser.md) | Find out how the Microsoft Surface Data Eraser tool can help you securely wipe data from your Surface devices. |
|
||||||
| [Top support solutions for Surface devices](support-solutions-surface.md) | These are the top Microsoft Support solutions for common issues experienced using Surface devices in an enterprise. |
|
| [Top support solutions for Surface devices](support-solutions-surface.md) | These are the top Microsoft Support solutions for common issues experienced using Surface devices in an enterprise. |
|
||||||
| [Change history for Surface documentation](change-history-for-surface.md) | This topic lists new and updated topics in the Surface documentation library. |
|
| [Change history for Surface documentation](change-history-for-surface.md) | This topic lists new and updated topics in the Surface documentation library. |
|
||||||
|
@ -17,6 +17,13 @@ ms.date: 11/07/2018
|
|||||||
|
|
||||||
This topic lists new and updated topics in the [Configure Windows 10](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
This topic lists new and updated topics in the [Configure Windows 10](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
||||||
|
|
||||||
|
## February 2019
|
||||||
|
|
||||||
|
New or changed topic | Description
|
||||||
|
--- | ---
|
||||||
|
[Set up a single-app kiosk](kiosk-single-app.md) | Replaced instructions for Microsoft Intune with a link to the Intune documentation.
|
||||||
|
[Set up a multi-app kiosk](lock-down-windows-10-to-specific-apps.md) | Replaced instructions for Intune with a link to the Intune documentation.
|
||||||
|
|
||||||
## January 2019
|
## January 2019
|
||||||
|
|
||||||
New or changed topic | Description
|
New or changed topic | Description
|
||||||
|
@ -36,7 +36,7 @@ Using Shell Launcher, you can configure a kiosk device that runs a Windows deskt
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Requirements
|
## Requirements
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>- Windows 10 doesn’t support setting a custom shell prior to OOBE. If you do, you won’t be able to deploy the resulting image.
|
>- Windows 10 doesn’t support setting a custom shell prior to OOBE. If you do, you won’t be able to deploy the resulting image.
|
||||||
@ -50,7 +50,7 @@ Using Shell Launcher, you can configure a kiosk device that runs a Windows deskt
|
|||||||
[See the technical reference for the shell launcher component.](https://go.microsoft.com/fwlink/p/?LinkId=618603)
|
[See the technical reference for the shell launcher component.](https://go.microsoft.com/fwlink/p/?LinkId=618603)
|
||||||
|
|
||||||
|
|
||||||
### Configure Shell Launcher
|
## Configure Shell Launcher
|
||||||
|
|
||||||
To set a Windows desktop application as the shell, you first turn on the Shell Launcher feature, and then you can set your custom shell as the default using PowerShell.
|
To set a Windows desktop application as the shell, you first turn on the Shell Launcher feature, and then you can set your custom shell as the default using PowerShell.
|
||||||
|
|
||||||
|
@ -238,30 +238,14 @@ When you use the **Provision kiosk devices** wizard in Windows Configuration Des
|
|||||||
>
|
>
|
||||||
>Account type: Local standard user, Azure AD
|
>Account type: Local standard user, Azure AD
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Microsoft Intune and other MDM services enable kiosk configuration through the [AssignedAccess configuration service provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/assignedaccess-csp). Assigned Access has a `KioskModeApp` setting. In the `KioskModeApp` setting, you enter the user account name and the [AUMID](https://docs.microsoft.com/windows-hardware/customize/enterprise/find-the-application-user-model-id-of-an-installed-app) for the app to run in kiosk mode.
|
Microsoft Intune and other MDM services enable kiosk configuration through the [AssignedAccess configuration service provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/assignedaccess-csp). Assigned Access has a `KioskModeApp` setting. In the `KioskModeApp` setting, you enter the user account name and the [AUMID](https://docs.microsoft.com/windows-hardware/customize/enterprise/find-the-application-user-model-id-of-an-installed-app) for the app to run in kiosk mode.
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
>Starting in Windows 10, version 1803, a ShellLauncher node has been added to the [AssignedAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/assignedaccess-csp).
|
>Starting in Windows 10, version 1803, a ShellLauncher node has been added to the [AssignedAccess CSP](https://docs.microsoft.com/windows/client-management/mdm/assignedaccess-csp).
|
||||||
|
|
||||||
The following steps explain how to configure a kiosk in Microsoft Intune. For other MDM services, see the documentation for your provider.
|
To configure a kiosk in Microsoft Intune, see [Windows 10 and Windows Holographic for Business device settings to run as a dedicated kiosk using Intune](https://docs.microsoft.com/intune/kiosk-settings). For other MDM services, see the documentation for your provider.
|
||||||
|
|
||||||
**To configure kiosk in Microsoft Intune**
|
|
||||||
|
|
||||||
2. In the Microsoft Azure portal, search for **Intune** or go to **More services** > **Intune**.
|
|
||||||
3. Select **Device configuration**.
|
|
||||||
4. Select **Profiles**.
|
|
||||||
5. Select **Create profile**.
|
|
||||||
6. Enter a friendly name for the profile.
|
|
||||||
7. Select **Windows 10 and later** for the platform.
|
|
||||||
8. Select **Device restrictions** for the profile type.
|
|
||||||
9. Select **Kiosk**.
|
|
||||||
10. In **Kiosk Mode**, select **Single app kiosk**.
|
|
||||||
1. Enter the user account (Azure AD or a local standard user account).
|
|
||||||
11. Enter the Application User Model ID for an installed app.
|
|
||||||
14. Select **OK**, and then select **Create**.
|
|
||||||
18. Assign the profile to a device group to configure the devices in that group as kiosks.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -46,30 +46,7 @@ You can configure multi-app kiosks using [Microsoft Intune](#intune) or a [provi
|
|||||||
## Configure a kiosk in Microsoft Intune
|
## Configure a kiosk in Microsoft Intune
|
||||||
|
|
||||||
|
|
||||||
1. [Generate the Start layout for the kiosk device.](#startlayout)
|
To configure a kiosk in Microsoft Intune, see [Windows 10 and Windows Holographic for Business device settings to run as a dedicated kiosk using Intune](https://docs.microsoft.com/intune/kiosk-settings). For explanations of the specific settings, see [Windows 10 and later device settings to run as a kiosk in Intune](https://docs.microsoft.com/intune/kiosk-settings-windows).
|
||||||
2. In the Microsoft Azure portal, search for **Intune** or go to **More services** > **Intune**.
|
|
||||||
3. Select **Device configuration**.
|
|
||||||
4. Select **Profiles**.
|
|
||||||
5. Select **Create profile**.
|
|
||||||
6. Enter a friendly name for the profile.
|
|
||||||
7. Select **Windows 10 and later** for the platform.
|
|
||||||
8. Select **Kiosk (Preview)** for the profile type.
|
|
||||||
9. Select **Kiosk - 1 setting available**.
|
|
||||||
10. Select **Add** to define a configuration, which specifies the apps that will run and the layout for the Start menu.
|
|
||||||
12. Enter a friendly name for the configuration.
|
|
||||||
10. In **Kiosk Mode**, select **Multi app kiosk**.
|
|
||||||
13. Select an app type.
|
|
||||||
- For **Add Win32 app**, enter a friendly name for the app in **App Name**, and enter the path to the app executable in **Identifier**.
|
|
||||||
- For **Add managed apps**, select an app that you manage through Intune.
|
|
||||||
- For **Add app by AUMID**, enter the Application User Model ID (AUMID) for an installed UWP app.
|
|
||||||
14. Select whether to enable the taskbar.
|
|
||||||
15. Browse to and select the Start layout XML file that you generated in step 1.
|
|
||||||
16. Add one or more accounts. When the account signs in, only the apps defined in the configuration will be available.
|
|
||||||
17. Select **OK**. You can add additional configurations or finish.
|
|
||||||
18. Assign the profile to a device group to configure the devices in that group as kiosks.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Managed apps are apps that are in the Microsoft Store for Business that is synced with your Intune subscription.
|
|
||||||
|
|
||||||
|
|
||||||
## Configure a kiosk using a provisioning package
|
## Configure a kiosk using a provisioning package
|
||||||
@ -178,7 +155,7 @@ The profile **Id** is a GUID attribute to uniquely identify the profile. You can
|
|||||||
|
|
||||||
- For UWP apps, you need to provide the App User Model ID (AUMID). [Learn how to get the AUMID](https://go.microsoft.com/fwlink/p/?LinkId=614867), or [get the AUMID from the Start Layout XML](#startlayout).
|
- For UWP apps, you need to provide the App User Model ID (AUMID). [Learn how to get the AUMID](https://go.microsoft.com/fwlink/p/?LinkId=614867), or [get the AUMID from the Start Layout XML](#startlayout).
|
||||||
- For desktop apps, you need to specify the full path of the executable, which can contain one or more system environment variables in the form of %variableName% (i.e. %systemroot%, %windir%).
|
- For desktop apps, you need to specify the full path of the executable, which can contain one or more system environment variables in the form of %variableName% (i.e. %systemroot%, %windir%).
|
||||||
- To configure the app to launch automatically when the user signs in, include `rs5:AutoLaunch="true"` after the AUMID or path. You can also include arguments to be passed to the app. For an example, see [the AllowedApps sample XML](#apps-sample).
|
- To configure a single app to launch automatically when the user signs in, include `rs5:AutoLaunch="true"` after the AUMID or path. You can also include arguments to be passed to the app. For an example, see [the AllowedApps sample XML](#apps-sample).
|
||||||
|
|
||||||
When the mult-app kiosk configuration is applied to a device, AppLocker rules will be generated to allow the apps that are listed in the configuration. Here are the predefined assigned access AppLocker rules for **UWP apps**:
|
When the mult-app kiosk configuration is applied to a device, AppLocker rules will be generated to allow the apps that are listed in the configuration. Here are the predefined assigned access AppLocker rules for **UWP apps**:
|
||||||
|
|
||||||
@ -674,4 +651,4 @@ In Windows Configuration Designer, under **ProvisioningCommands** > **DeviceCont
|
|||||||
|
|
||||||
## Other methods
|
## Other methods
|
||||||
|
|
||||||
Environments that use WMI can use the [MDM Bridge WMI Provider to configure a kiosk](kiosk-mdm-bridge.md).
|
Environments that use WMI can use the [MDM Bridge WMI Provider to configure a kiosk](kiosk-mdm-bridge.md).
|
||||||
|
@ -24,6 +24,7 @@ Everyone wins when transparency is a top priority. We want you to know when upda
|
|||||||
|
|
||||||
The latest news:
|
The latest news:
|
||||||
<ul compact style="list-style: none">
|
<ul compact style="list-style: none">
|
||||||
|
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523">Windows Update for Business and the retirement of SAC-T</a> - February 14, 2019</li>
|
||||||
<li><a href="https://blogs.windows.com/windowsexperience/2019/01/15/application-compatibility-in-the-windows-ecosystem/#A8urpp1QEp6DHzmP.97">Application compatibility in the Windows ecosystem</a> - January 15, 2019</li>
|
<li><a href="https://blogs.windows.com/windowsexperience/2019/01/15/application-compatibility-in-the-windows-ecosystem/#A8urpp1QEp6DHzmP.97">Application compatibility in the Windows ecosystem</a> - January 15, 2019</li>
|
||||||
<li><a href="https://blogs.windows.com/windowsexperience/2018/12/10/windows-monthly-security-and-quality-updates-overview/#UJJpisSpvyLokbHm.97">Windows monthly security and quality updates overview</a> - January 10, 2019</li>
|
<li><a href="https://blogs.windows.com/windowsexperience/2018/12/10/windows-monthly-security-and-quality-updates-overview/#UJJpisSpvyLokbHm.97">Windows monthly security and quality updates overview</a> - January 10, 2019</li>
|
||||||
<li><a href="https://blogs.windows.com/windowsexperience/2018/12/19/driver-quality-in-the-windows-ecosystem/#ktuodfovWAMAkssM.97">Driver quality in the Windows ecosystem</a> - December 19, 2018</li>
|
<li><a href="https://blogs.windows.com/windowsexperience/2018/12/19/driver-quality-in-the-windows-ecosystem/#ktuodfovWAMAkssM.97">Driver quality in the Windows ecosystem</a> - December 19, 2018</li>
|
||||||
|
@ -39,7 +39,7 @@ For a CSP to register Windows Autopilot devices on behalf of a customer, the cus
|
|||||||

|

|
||||||
- Select the checkbox indicating whether or not you want delegated admin rights:
|
- Select the checkbox indicating whether or not you want delegated admin rights:
|
||||||

|

|
||||||
- NOTE: Depending on your partner, they might request Delegated Admin Permissions (DAP) when requesting this consent. You should ask them to use the newer DAP-free process (shown in tihs document) if possible. If not, you can easily remove their DAP status either from Microsoft Store for Business or the Office 365 admin portal: https://docs.microsoft.com/en-us/partner-center/customers_revoke_admin_privileges
|
- NOTE: Depending on your partner, they might request Delegated Admin Permissions (DAP) when requesting this consent. You should ask them to use the newer DAP-free process (shown in this document) if possible. If not, you can easily remove their DAP status either from Microsoft Store for Business or the Office 365 admin portal: https://docs.microsoft.com/en-us/partner-center/customers_revoke_admin_privileges
|
||||||
- Send the template above to the customer via email.
|
- Send the template above to the customer via email.
|
||||||
2. Customer with global administrator privileges in Microsoft Store for Business (MSfB) clicks the link in the body of the email once they receive it from the CSP, which takes them directly to the following MSfB page:
|
2. Customer with global administrator privileges in Microsoft Store for Business (MSfB) clicks the link in the body of the email once they receive it from the CSP, which takes them directly to the following MSfB page:
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@ ms.author: greg-lindsay
|
|||||||
|
|
||||||
Windows Autopilot self-deploying mode enables a device to be deployed with little to no user interaction. For devices with an Ethernet connection, no user interaction is required; for devices connected via Wi-fi, no interaction is required after making the Wi-fi connection (choosing the language, locale, and keyboard, then making a network connection).
|
Windows Autopilot self-deploying mode enables a device to be deployed with little to no user interaction. For devices with an Ethernet connection, no user interaction is required; for devices connected via Wi-fi, no interaction is required after making the Wi-fi connection (choosing the language, locale, and keyboard, then making a network connection).
|
||||||
|
|
||||||
Self-deploying mode joins the device into Azure Active Directory, enrolls the device in Intune (or another MDM service) leveraging Azure AD for automatic MDM enrollment, and ensures that all policies, applications, certificates, and networking profiles are provisioned on the device, levering the enrollment status page to prevent access to the desktop until the device is fully provisioned.
|
Self-deploying mode joins the device into Azure Active Directory, enrolls the device in Intune (or another MDM service) leveraging Azure AD for automatic MDM enrollment, and ensures that all policies, applications, certificates, and networking profiles are provisioned on the device, leveraging the enrollment status page to prevent access to the desktop until the device is fully provisioned.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Self-deploying mode does not support Active Directory Join or Hybrid Azure AD Join. All devices will be joined to Azure Active Directory.
|
>Self-deploying mode does not support Active Directory Join or Hybrid Azure AD Join. All devices will be joined to Azure Active Directory.
|
||||||
|
Reference in New Issue
Block a user