diff --git a/.openpublishing.redirection.windows-application-management.json b/.openpublishing.redirection.windows-application-management.json index b602d2f3f0..0b250f20b2 100644 --- a/.openpublishing.redirection.windows-application-management.json +++ b/.openpublishing.redirection.windows-application-management.json @@ -29,6 +29,11 @@ "source_path": "windows/application-management/sideload-apps-in-windows-10.md", "redirect_url": "/windows/application-management/sideload-apps-in-windows", "redirect_document_id": false + }, + { + "source_path": "windows/application-management/add-apps-and-features.md", + "redirect_url": "/windows/client-management/client-tools/add-remove-hide-features", + "redirect_document_id": false } ] } diff --git a/.openpublishing.redirection.windows-configuration.json b/.openpublishing.redirection.windows-configuration.json index 5de90b60ea..971d493152 100644 --- a/.openpublishing.redirection.windows-configuration.json +++ b/.openpublishing.redirection.windows-configuration.json @@ -167,7 +167,7 @@ }, { "source_path": "windows/configuration/stop-employees-from-using-the-windows-store.md", - "redirect_url": "/windows/configuration/stop-employees-from-using-microsoft-store", + "redirect_url": "/windows/configuration/store", "redirect_document_id": false }, { @@ -282,7 +282,7 @@ }, { "source_path": "windows/configuration/configure-windows-10-taskbar.md", - "redirect_url": "/windows/configuration/taskbar/configure-windows-10-taskbar", + "redirect_url": "/windows/configuration/taskbar/", "redirect_document_id": false }, { @@ -297,7 +297,7 @@ }, { "source_path": "windows/configuration/customize-taskbar-windows-11.md", - "redirect_url": "/windows/configuration/taskbar/customize-taskbar-windows-11", + "redirect_url": "/windows/configuration/taskbar", "redirect_document_id": false }, { @@ -347,7 +347,7 @@ }, { "source_path": "windows/configuration/kiosk-prepare.md", - "redirect_url": "/windows/configuration/kiosk/kiosk-prepare", + "redirect_url": "/windows/configuration/kiosk/recommendations", "redirect_document_id": false }, { @@ -372,7 +372,7 @@ }, { "source_path": "windows/configuration/lockdown-features-windows-10.md", - "redirect_url": "/windows/configuration/kiosk/lockdown-features-windows-10", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/configuration/kiosk/lockdown-features-windows-10", "redirect_document_id": false }, { @@ -392,7 +392,7 @@ }, { "source_path": "windows/configuration/manage-tips-and-suggestions.md", - "redirect_url": "/windows/configuration/tips/manage-tips-and-suggestions", + "redirect_url": "/windows/configuration/", "redirect_document_id": false }, { @@ -432,7 +432,12 @@ }, { "source_path": "windows/configuration/stop-employees-from-using-microsoft-store.md", - "redirect_url": "/windows/configuration/store/stop-employees-from-using-microsoft-store", + "redirect_url": "/windows/configuration/store", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/store/stop-employees-from-using-microsoft-store.md", + "redirect_url": "/windows/configuration/store", "redirect_document_id": false }, { @@ -442,7 +447,7 @@ }, { "source_path": "windows/configuration/supported-csp-taskbar-windows.md", - "redirect_url": "/windows/configuration/taskbar/supported-csp-taskbar-windows", + "redirect_url": "/windows/configuration/taskbar/policy-settings", "redirect_document_id": false }, { @@ -729,6 +734,136 @@ "source_path": "windows/configuration/cortana-at-work/testing-scenarios-using-cortana-in-business-org.md", "redirect_url": "/previous-versions/windows/it-pro/windows-10/configuration/cortana-at-work/testing-scenarios-using-cortana-in-business-org", "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/lockdown-features-windows-10.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/configuration/kiosk/lockdown-features-windows-10", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/find-the-application-user-model-id-of-an-installed-app.md", + "redirect_url": "/windows/configuration/store/find-aumid", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/lock-down-windows-10-applocker.md", + "redirect_url": "/windows/security/application-security/application-control/windows-defender-application-control/applocker/applocker-overview", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/lock-down-windows-10-to-specific-apps.md", + "redirect_url": "/windows/configuration/assigned-access/configuration-file", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/assigned-access/create-xml.md", + "redirect_url": "/windows/configuration/assigned-access/configuration-file", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/lock-down-windows-11-to-specific-apps.md", + "redirect_url": "/windows/configuration/assigned-access/configuration-file", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-additional-reference.md", + "redirect_url": "/windows/configuration/assigned-access", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-mdm-bridge.md", + "redirect_url": "/windows/configuration/assigned-access/quickstart-kiosk", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-policies.md", + "redirect_url": "/windows/configuration/assigned-access/policy-settings", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-shelllauncher.md", + "redirect_url": "/windows/configuration/assigned-access/shell-launcher", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-validate.md", + "redirect_url": "/windows/configuration/assigned-access/overview", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-xml.md", + "redirect_url": "/windows/configuration/assigned-access/configuration-file", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/setup-digital-signage.md", + "redirect_url": "/windows/configuration/assigned-access/overview", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-single-app.md", + "redirect_url": "/windows/configuration/assigned-access/overview", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-methods.md", + "redirect_url": "/windows/configuration/assigned-access", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/guidelines-for-assigned-access-app.md", + "redirect_url": "/windows/configuration/assigned-access/overview", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-prepare.md", + "redirect_url": "/windows/configuration/assigned-access/recommendations", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/start/customize-start-menu-layout-windows-11.md", + "redirect_url": "/windows/configuration/start/customize-and-export-start-layout", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/start/customize-windows-10-start-screens-by-using-group-policy.md", + "redirect_url": "/windows/configuration/start/customize-and-export-start-layout", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/start/customize-windows-10-start-screens-by-using-mobile-device-management.md", + "redirect_url": "/windows/configuration/start/customize-and-export-start-layout", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/start/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md", + "redirect_url": "/windows/configuration/start/customize-and-export-start-layout", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/taskbar/configure-windows-10-taskbar.md", + "redirect_url": "/windows/configuration/taskbar/", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/taskbar/customize-taskbar-windows-11.md", + "redirect_url": "/windows/configuration/taskbar/", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/tips/manage-tips-and-suggestions.md", + "redirect_url": "/windows/configuration", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/taskbar/configure.md", + "redirect_url": "/windows/configuration/taskbar/", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/taskbar/supported-csp-taskbar-windows.md", + "redirect_url": "/windows/configuration/taskbar/policy-settings", + "redirect_document_id": false } ] -} +} \ No newline at end of file diff --git a/.openpublishing.redirection.windows-deployment.json b/.openpublishing.redirection.windows-deployment.json index 813e7ce7fc..1295038b10 100644 --- a/.openpublishing.redirection.windows-deployment.json +++ b/.openpublishing.redirection.windows-deployment.json @@ -1124,6 +1124,11 @@ "source_path": "windows/deployment/Windows-AutoPilot-EULA-note.md", "redirect_url": "/legal/windows/windows-autopilot-eula-note", "redirect_document_id": false + }, + { + "source_path": "windows/deployment/windows-10-missing-fonts.md", + "redirect_url": "/windows/deployment/windows-missing-fonts", + "redirect_document_id": false } ] } diff --git a/.openpublishing.redirection.windows-security.json b/.openpublishing.redirection.windows-security.json index 9ddad9824f..9a07d9ac68 100644 --- a/.openpublishing.redirection.windows-security.json +++ b/.openpublishing.redirection.windows-security.json @@ -1452,12 +1452,12 @@ }, { "source_path": "windows/security/threat-protection/intelligence/av-tests.md", - "redirect_url": "/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests", + "redirect_url": "/microsoft-365/security/defender/top-scoring-industry-antivirus-tests.md", "redirect_document_id": false }, { "source_path": "windows/security/threat-protection/intelligence/coinminer-malware.md", - "redirect_url": "/microsoft-365/security/intelligence/coinminer-malware", + "redirect_url": "/microsoft-365/security/defender-endpoint/malware/coinminer-malware", "redirect_document_id": false }, { @@ -1467,12 +1467,12 @@ }, { "source_path": "windows/security/threat-protection/intelligence/criteria.md", - "redirect_url": "/microsoft-365/security/intelligence/criteria", + "redirect_url": "/microsoft-365/security/defender/criteria", "redirect_document_id": false }, { "source_path": "windows/security/threat-protection/intelligence/cybersecurity-industry-partners.md", - "redirect_url": "/microsoft-365/security/intelligence/cybersecurity-industry-partners", + "redirect_url": "/microsoft-365/security/defender/virus-initiative-criteria", "redirect_document_id": false }, { @@ -1487,17 +1487,17 @@ }, { "source_path": "windows/security/threat-protection/intelligence/exploits-malware.md", - "redirect_url": "/microsoft-365/security/intelligence/exploits-malware", + "redirect_url": "/microsoft-365/security/defender-endpoint/malware/exploits-malware", "redirect_document_id": false }, { "source_path": "windows/security/threat-protection/intelligence/fileless-threats.md", - "redirect_url": "/microsoft-365/security/intelligence/fileless-threats", + "redirect_url": "/microsoft-365/security/defender-endpoint/malware/fileless-threats", "redirect_document_id": false }, { "source_path": "windows/security/threat-protection/intelligence/macro-malware.md", - "redirect_url": "/microsoft-365/security/intelligence/macro-malware", + "redirect_url": "/microsoft-365/security/defender-endpoint/malware/macro-malware", "redirect_document_id": false }, { @@ -1507,12 +1507,12 @@ }, { "source_path": "windows/security/threat-protection/intelligence/phishing-trends.md", - "redirect_url": "/microsoft-365/security/intelligence/phishing-trends", + "redirect_url": "/microsoft-365/security/defender-endpoint/malware/phishing-trends", "redirect_document_id": false }, { "source_path": "windows/security/threat-protection/intelligence/phishing.md", - "redirect_url": "/microsoft-365/security/intelligence/phishing", + "redirect_url": "/microsoft-365/security/defender-endpoint/malware/phishing", "redirect_document_id": false }, { @@ -1522,7 +1522,7 @@ }, { "source_path": "windows/security/threat-protection/intelligence/prevent-malware-infection.md", - "redirect_url": "/microsoft-365/security/intelligence/prevent-malware-infection", + "redirect_url": "/microsoft-365/security/defender-endpoint/malware/prevent-malware-infection", "redirect_document_id": false }, { @@ -8172,7 +8172,7 @@ }, { "source_path": "windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust-provision.md", - "redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust-enroll", + "redirect_url": "/windows/security/identity-protection/hello-for-business/how-it-works#provisioning", "redirect_document_id": false }, { @@ -8334,6 +8334,841 @@ "source_path": "windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-pki.md", "redirect_url": "/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust", "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/access-this-computer-from-the-network", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/account-lockout-duration.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/account-lockout-duration", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/account-lockout-policy.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/account-lockout-policy", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/account-lockout-threshold", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/account-policies.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/account-policies", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/accounts-administrator-account-status", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/accounts-guest-account-status", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/accounts-rename-administrator-account", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/accounts-rename-guest-account", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/add-workstations-to-domain", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/administer-security-policy-settings", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/allow-log-on-locally", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/audit-policy.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/audit-policy", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/back-up-files-and-directories", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/bypass-traverse-checking", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/change-the-system-time.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/change-the-system-time", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/change-the-time-zone.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/change-the-time-zone", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/create-a-pagefile.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/create-a-pagefile", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/create-a-token-object.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/create-a-token-object", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/create-global-objects.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/create-global-objects", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/create-permanent-shared-objects", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/create-symbolic-links.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/create-symbolic-links", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/debug-programs.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/debug-programs", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/deny-log-on-as-a-service", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/deny-log-on-locally", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-channel-binding-token-requirements.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-controller-ldap-server-channel-binding-token-requirements", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/enforce-password-history.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/enforce-password-history", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/generate-security-audits.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/generate-security-audits", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/increase-a-process-working-set", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/increase-scheduling-priority", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/kerberos-policy.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/kerberos-policy", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/load-and-unload-device-drivers", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/lock-pages-in-memory", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/log-on-as-a-batch-job", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/log-on-as-a-service", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/manage-auditing-and-security-log", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/maximum-password-age.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-password-age", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/minimum-password-age.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/minimum-password-age", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/minimum-password-length.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/minimum-password-length", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/modify-an-object-label.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/modify-an-object-label", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/modify-firmware-environment-values", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-list-manager-policies", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/password-policy.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/password-policy", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/profile-single-process.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/profile-single-process", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/profile-system-performance.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/profile-system-performance", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/remove-computer-from-docking-station", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/replace-a-process-level-token", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/restore-files-and-directories", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/security-options.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/security-options", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/security-policy-settings.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/security-policy-settings", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/security-policy-settings-reference", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/shut-down-the-system.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/shut-down-the-system", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/synchronize-directory-service-data", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/system-settings-optional-subsystems", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations", + "redirect_document_id": false + }, + { + "source_path": "windows/security/threat-protection/security-policy-settings/user-rights-assignment.md", + "redirect_url": "/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/user-rights-assignment", + "redirect_document_id": false } ] -} \ No newline at end of file +} diff --git a/education/windows/edu-stickers.md b/education/windows/edu-stickers.md index 3ac82d2b7c..1097092176 100644 --- a/education/windows/edu-stickers.md +++ b/education/windows/edu-stickers.md @@ -36,7 +36,6 @@ Stickers aren't enabled by default. Follow the instructions below to configure y |
  • OMA-URI: **`./Vendor/MSFT/Policy/Config/Stickers/EnableStickers`**
  • Data type: **Integer**
  • Value: **1**
  • | [!INCLUDE [intune-custom-settings-2](../../includes/configure/intune-custom-settings-2.md)] -[!INCLUDE [intune-custom-settings-info](../../includes/configure/intune-custom-settings-info.md)] > [!TIP] > Use the following Graph call to automatically create the custom policy in your tenant without assignments nor scope tags. [1](#footnote1) @@ -52,14 +51,13 @@ Content-Type: application/json #### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) -To configure devices using a provisioning package, [create a provisioning package][WIN-1] using Windows Configuration Designer (WCD) with the following settings: +[!INCLUDE [provisioning-package-1](../../includes/configure/provisioning-package-1.md)] | Setting | |--------| |
  • Path: **`Education/AllowStickers`**
  • Value: **True**
  • | -Follow the steps in [Apply a provisioning package][WIN-2] to apply the package that you created. - +[!INCLUDE [provisioning-package-2](../../includes/configure/provisioning-package-2.md)] --- ## How to use Stickers @@ -76,8 +74,3 @@ Multiple stickers can be added from the picker by selecting them. The stickers c :::image type="content" source="./images/win-11-se-stickers-animation.gif" alt-text="animation showing Windows 11 SE desktop with 4 pirate stickers being resized and moved" border="true"::: Select the *X button* at the top of the screen to save your progress and close the sticker editor. - -[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 - -[WIN-1]: /windows/configuration/provisioning-packages/provisioning-create-package -[WIN-2]: /windows/configuration/provisioning-packages/provisioning-apply-package \ No newline at end of file diff --git a/education/windows/edu-take-a-test-kiosk-mode.md b/education/windows/edu-take-a-test-kiosk-mode.md index ba510327cf..21664c95bd 100644 --- a/education/windows/edu-take-a-test-kiosk-mode.md +++ b/education/windows/edu-take-a-test-kiosk-mode.md @@ -26,7 +26,7 @@ The other options allow you to configure Take a Test in kiosk mode using a local Follow the instructions below to configure your devices, selecting the option that best suits your needs. -#### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune) +# [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune) You can use Intune for Education or a custom profile in Microsoft Intune: @@ -68,9 +68,8 @@ To configure devices using Intune for Education, follow these steps: :::image type="content" source="./images/takeatest/intune-take-a-test-custom-profile.png" alt-text="Intune portal - creation of a custom policy to configure Take a Test." lightbox="./images/takeatest/intune-take-a-test-custom-profile.png" border="true"::: [!INCLUDE [intune-custom-settings-2](../../includes/configure/intune-custom-settings-2.md)] -[!INCLUDE [intune-custom-settings-info](../../includes/configure/intune-custom-settings-info.md)] -#### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) +# [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) To create a provisioning package, you can either use Set up School PCs or Windows Configuration Designer: @@ -85,7 +84,7 @@ Create a provisioning package using the Set up School PCs app, configuring the s ### Create a provisioning package using Windows Configuration Designer -[Create a provisioning package][WIN-1] using Windows Configuration Designer with the following settings: +[!INCLUDE [provisioning-package-1](../../includes/configure/provisioning-package-1.md)] | Setting | |--------| @@ -99,22 +98,11 @@ Create a provisioning package using the Set up School PCs app, configuring the s :::image type="content" source="./images/takeatest/wcd-take-a-test.png" alt-text="Windows Configuration Designer - configuration of policies to enable Take a Test to run in kiosk mode" lightbox="./images/takeatest/wcd-take-a-test.png" border="true"::: -Follow the steps in [Apply a provisioning package][WIN-2] to apply the package that you created. +[!INCLUDE [provisioning-package-2](../../includes/configure/provisioning-package-2.md)] -#### [:::image type="icon" source="images/icons/powershell.svg"::: **PowerShell**](#tab/powershell) +# [:::image type="icon" source="images/icons/powershell.svg"::: **PowerShell**](#tab/powershell) -Configure your devices using PowerShell scripts via the [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal). For more information, see [Using PowerShell scripting with the WMI Bridge Provider](/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider). - -> [!TIP] -> PowerShell scripts can be executed as scheduled tasks via Group Policy. - -> [!IMPORTANT] -> For all device settings, the WMI Bridge client must be executed as SYSTEM (LocalSystem) account. -> -> To test a PowerShell script, you can: -> 1. [Download the psexec tool](/sysinternals/downloads/psexec) -> 1. Open an elevated command prompt and run: `psexec.exe -i -s powershell.exe` -> 1. Run the script in the PowerShell session +[!INCLUDE [powershell-wmi-bridge-1](../../includes/configure/powershell-wmi-bridge-1.md)] Edit the following sample PowerShell script to: @@ -171,7 +159,9 @@ $cimObject.HideFastUserSwitching = 1 Set-CimInstance -CimInstance $cimObject ``` -#### [:::image type="icon" source="images/icons/settings.svg"::: **Settings app**](#tab/settings) +[!INCLUDE [powershell-wmi-bridge-2](../../includes/configure/powershell-wmi-bridge-2.md)] + +# [:::image type="icon" source="images/icons/settings.svg"::: **Settings app**](#tab/settings) To create a local account, and configure Take a Test in kiosk mode using the Settings app: diff --git a/education/windows/take-tests-in-windows.md b/education/windows/take-tests-in-windows.md index d9663d6d32..8c46ac4b93 100644 --- a/education/windows/take-tests-in-windows.md +++ b/education/windows/take-tests-in-windows.md @@ -1,7 +1,7 @@ --- title: Take tests and assessments in Windows description: Learn about the built-in Take a Test app for Windows and how to use it. -ms.date: 03/31/2023 +ms.date: 02/29/2024 ms.topic: how-to --- @@ -48,7 +48,7 @@ This is an ideal option for teachers who want to create a link to a specific ass For this option, you embed a URL with a specific prefix and specify parameters depending on what you want to allow during the test. The URL must be in the following format: -``` +```text ms-edu-secureassessment:#enforceLockdown ``` diff --git a/includes/configure/intune-custom-settings-1.md b/includes/configure/intune-custom-settings-1.md index 05f77b0843..d804757446 100644 --- a/includes/configure/intune-custom-settings-1.md +++ b/includes/configure/intune-custom-settings-1.md @@ -6,11 +6,4 @@ ms.topic: include ms.service: windows-client --- -To configure devices with Microsoft Intune, use a custom policy: - -1. Go to the Microsoft Intune admin center -2. Select **Devices > Configuration profiles > Create profile** -3. Select **Platform > Windows 10 and later** and **Profile type > Templates > Custom** -4. Select **Create** -5. Specify a **Name** and, optionally, a **Description > Next** -6. Add the following settings: \ No newline at end of file +To configure devices with Microsoft Intune, [create a custom policy](/mem/intune/configuration/custom-settings-windows-10) and use the following settings: \ No newline at end of file diff --git a/includes/configure/intune-custom-settings-2.md b/includes/configure/intune-custom-settings-2.md index 92dc4bf22d..66b5ceae1d 100644 --- a/includes/configure/intune-custom-settings-2.md +++ b/includes/configure/intune-custom-settings-2.md @@ -6,7 +6,4 @@ ms.topic: include ms.service: windows-client --- -7. Select **Next** -8. Assign the policy to a security group that contains as members the devices or users that you want to configure > **Next** -9. Under **Applicability Rules**, select **Next** -10. Review the policy configuration and select **Create** \ No newline at end of file +Assign the policy to a group that contains as members the devices or users that you want to configure. \ No newline at end of file diff --git a/includes/configure/intune-custom-settings-info.md b/includes/configure/intune-custom-settings-info.md deleted file mode 100644 index fc2277cecb..0000000000 --- a/includes/configure/intune-custom-settings-info.md +++ /dev/null @@ -1,9 +0,0 @@ ---- -author: paolomatarazzo -ms.author: paoloma -ms.date: 08/15/2023 -ms.topic: include -ms.service: windows-client ---- - -For more information about how to create custom settings using Intune, see [Use custom settings for Windows devices in Intune](/mem/intune/configuration/custom-settings-windows-10). \ No newline at end of file diff --git a/includes/configure/powershell-wmi-bridge-1.md b/includes/configure/powershell-wmi-bridge-1.md new file mode 100644 index 0000000000..84c8a0bb24 --- /dev/null +++ b/includes/configure/powershell-wmi-bridge-1.md @@ -0,0 +1,18 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 09/12/2023 +ms.topic: include +ms.prod: windows-client +--- + +Configure your devices using PowerShell scripts via the [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal). + +> [!IMPORTANT] +> For all device settings, the WMI Bridge client must be executed as SYSTEM (LocalSystem) account. + +To test the PowerShell script, you can: + +1. [Download the psexec tool](/sysinternals/downloads/psexec) +1. Open an elevated command prompt and run: `psexec.exe -i -s powershell.exe` +1. Run the script in the PowerShell session diff --git a/includes/configure/powershell-wmi-bridge-2.md b/includes/configure/powershell-wmi-bridge-2.md new file mode 100644 index 0000000000..55db82674d --- /dev/null +++ b/includes/configure/powershell-wmi-bridge-2.md @@ -0,0 +1,9 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 09/12/2023 +ms.topic: include +ms.prod: windows-client +--- + +For more information, see [Use PowerShell scripting with the WMI Bridge Provider](/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider). diff --git a/includes/licensing/assigned-access-kiosk-mode.md b/includes/licensing/assigned-access.md similarity index 84% rename from includes/licensing/assigned-access-kiosk-mode.md rename to includes/licensing/assigned-access.md index f14704f482..fa2d4f7d31 100644 --- a/includes/licensing/assigned-access-kiosk-mode.md +++ b/includes/licensing/assigned-access.md @@ -7,13 +7,13 @@ ms.topic: include ## Windows edition and licensing requirements -The following table lists the Windows editions that support Assigned Access (kiosk mode): +The following table lists the Windows editions that support Assigned Access: |Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| |:---:|:---:|:---:|:---:| |Yes|Yes|Yes|Yes| -Assigned Access (kiosk mode) license entitlements are granted by the following licenses: +Assigned Access license entitlements are granted by the following licenses: |Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| |:---:|:---:|:---:|:---:|:---:| diff --git a/includes/licensing/account-lockout-policy.md b/includes/licensing/shell-launcher.md similarity index 71% rename from includes/licensing/account-lockout-policy.md rename to includes/licensing/shell-launcher.md index 3ca26ae6ea..f53f3741e2 100644 --- a/includes/licensing/account-lockout-policy.md +++ b/includes/licensing/shell-launcher.md @@ -7,16 +7,16 @@ ms.topic: include ## Windows edition and licensing requirements -The following table lists the Windows editions that support Account Lockout Policy: +The following table lists the Windows editions that support Shell Launcher: |Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| |:---:|:---:|:---:|:---:| -|Yes|Yes|Yes|Yes| +|No|Yes|No|Yes| -Account Lockout Policy license entitlements are granted by the following licenses: +Shell Launcher license entitlements are granted by the following licenses: |Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| |:---:|:---:|:---:|:---:|:---:| -|Yes|Yes|Yes|Yes|Yes| +|No|Yes|Yes|Yes|Yes| For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/includes/licensing/windows-security-policy-settings-and-auditing.md b/includes/licensing/windows-security-policy-settings-and-auditing.md deleted file mode 100644 index 07f612b6ae..0000000000 --- a/includes/licensing/windows-security-policy-settings-and-auditing.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -author: paolomatarazzo -ms.author: paoloma -ms.date: 09/18/2023 -ms.topic: include ---- - -## Windows edition and licensing requirements - -The following table lists the Windows editions that support Windows security policy settings and auditing: - -|Windows Pro|Windows Enterprise|Windows Pro Education/SE|Windows Education| -|:---:|:---:|:---:|:---:| -|Yes|Yes|Yes|Yes| - -Windows security policy settings and auditing license entitlements are granted by the following licenses: - -|Windows Pro/Pro Education/SE|Windows Enterprise E3|Windows Enterprise E5|Windows Education A3|Windows Education A5| -|:---:|:---:|:---:|:---:|:---:| -|Yes|Yes|Yes|Yes|Yes| - -For more information about Windows licensing, see [Windows licensing overview](/windows/whats-new/windows-licensing). diff --git a/windows/application-management/add-apps-and-features.md b/windows/application-management/add-apps-and-features.md deleted file mode 100644 index 534e26d426..0000000000 --- a/windows/application-management/add-apps-and-features.md +++ /dev/null @@ -1,98 +0,0 @@ ---- -title: Add or hide Windows features -description: Learn how to add Windows optional features using the Apps & features page in the Settings app. Also see the group policy objects (GPO) and MDM policies that show or hide Apps and Windows Features in the Settings app. Use Windows PowerShell to show or hide specific features in Windows Features. -author: aczechowski -ms.author: aaroncz -manager: aaroncz -ms.date: 08/18/2023 -ms.topic: how-to -ms.service: windows-client -ms.subservice: itpro-apps -ms.localizationpriority: medium -ms.collection: tier2 -appliesto: - - ✅ Windows 11 - - ✅ Windows 10 ---- - -# Add or hide Windows features - -Windows includes optional features that aren't installed by default, but you can add later. These features are called [Features on Demand](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities), and can be installed at any time. Some of these features are language resources like language packs or handwriting support. On organization-owned devices, you can control access to these other features. You can use group policy or mobile device management (MDM) policies to hide the UI from users, or use Windows PowerShell to enable or disable specific features. - -## Use the Windows Settings app to add or uninstall features - -### Windows 11 - -1. Open the Start menu and search for **Settings**. - -1. In the Settings app, search for "optional" and select **Optional features**. - - > [!TIP] - > You can also use the following shortcut to open it directly: [`ms-settings:optionalfeatures`](ms-settings:optionalfeatures). - -1. To add a feature: - - 1. Select **View features** next to "Add an optional feature." - - 1. Find the feature you want to add, like **XPS Viewer**. Select the box to add it. You can select multiple features. - - 1. Select **Next**. Review the list of features you selected, and then select **Install** to add the selected features. - -1. To uninstall a feature: - - 1. Search for it in the list of **Installed features**. - - 1. Expand the section, and select **Uninstall**. - -### Windows 10 - -1. In the Search bar, search for "apps" and select **Apps and features**. - -1. Select **Optional features** > **Add a feature**. - -1. Select the feature you want to add, like **XPS Viewer**, and then select **Install.** - -When the installation completes, the feature is listed in **Apps & features**. In **Apps & features** > **Optional features** > **More Windows features**, there are more features that you and your users can install. - -To uninstall a feature, open the **Settings** app. Select the feature, and then select **Uninstall**. - -## Use group policy or MDM policies to hide Windows features - -By default, the OS might show Windows features and allow users to install and uninstall these optional apps and features. To hide Windows features on your user devices, you can use group policy or an MDM provider like Microsoft Intune. - -### Group policy - -If you use group policy, use the `User Configuration\Administrative Template\Control Panel\Programs\Hide "Windows Features"` policy. By default, this policy may be set to **Not configured**, which means users can add or remove features. When this setting is **Enabled**, the settings page to add optional features is hidden on the device. - -You can't use group policy to disable specific Windows features, such as XPS Viewer. If you want to disable specific features, use [Windows PowerShell](#use-windows-powershell-to-disable-specific-features). - -If you want to hide the entire **Apps** feature in the Settings app, use the `User Configuration\Administrative Template\Control Panel\Programs\Hide "Programs and Features" page` policy. - -### MDM - -Using Microsoft Intune, you can use [administrative templates](/mem/intune/configuration/administrative-templates-windows) or the [settings catalog](/mem/intune/configuration/settings-catalog) to hide Windows features. - -If you want to hide the entire **Apps** feature in the Settings app, you can use a configuration policy on Intune enrolled devices. For more information on the settings you can configure, see [Control Panel and Settings device restrictions in Microsoft Intune](/mem/intune/configuration/device-restrictions-windows-10#control-panel-and-settings). - -## Use Windows PowerShell to disable specific features - -To disable specific features, use the Windows PowerShell [Disable-WindowsOptionalFeature](/powershell/module/dism/disable-windowsoptionalfeature) cmdlet. - -> [!NOTE] -> There isn't a group policy that disables specific Windows features. - -To automate disabling specific features, create a scheduled task to run a PowerShell script. For more information about Windows task scheduler, see [Task Scheduler for developers](/windows/win32/taskschd/task-scheduler-start-page). - -Microsoft Intune can also run PowerShell scripts. For more information, see [Use PowerShell scripts on Windows client devices in Intune](/mem/intune/apps/intune-management-extension). - -To enable specific features, use the [Enable-WindowsOptionalFeature](/powershell/module/dism/enable-windowsoptionalfeature) cmdlet. - -Another useful PowerShell cmdlet is [Get-WindowsOptionalFeature](/powershell/module/dism/get-windowsoptionalfeature). Use this cmdlet to view information about optional features in the current OS or a mounted image. This cmdlet returns the current state of features, and whether a restart may be required when the state changes. - -## Related articles - -- [Features on Demand overview](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) - -- [Available Features on Demand](/windows-hardware/manufacture/desktop/features-on-demand-non-language-fod) - -- [Language and region Features on Demand (FOD)](/windows-hardware/manufacture/desktop/features-on-demand-language-fod) diff --git a/windows/application-management/docfx.json b/windows/application-management/docfx.json index 7b7f7eed47..128c0cfc00 100644 --- a/windows/application-management/docfx.json +++ b/windows/application-management/docfx.json @@ -39,6 +39,7 @@ "ms.collection": [ "tier2" ], + "zone_pivot_group_filename": "resources/zone-pivot-groups.json", "uhfHeaderId": "MSDocsHeader-Windows", "ms.service": "windows-client", "ms.subservice": "itpro-apps", @@ -53,9 +54,9 @@ "titleSuffix": "Windows Application Management", "contributors_to_exclude": [ "dstrome2", - "rjagiewich", + "rjagiewich", "American-Dipper", - "claydetels19", + "claydetels19", "jborsecnik", "v-stchambers", "shdyas", diff --git a/windows/application-management/toc.yml b/windows/application-management/toc.yml index 63f66e42cb..1308c9ba12 100644 --- a/windows/application-management/toc.yml +++ b/windows/application-management/toc.yml @@ -5,8 +5,6 @@ items: items: - name: Overview of apps in Windows href: overview-windows-apps.md - - name: Add or hide Windows features - href: add-apps-and-features.md - name: Sideload line of business (LOB) apps href: sideload-apps-in-windows.md - name: Private app repo on Windows 11 @@ -20,15 +18,15 @@ items: - name: Keep removed apps from returning during an update href: remove-provisioned-apps-during-update.md - name: Application Virtualization (App-V) - items: + items: - name: App-V for Windows overview href: app-v/appv-for-windows.md - name: Getting Started - items: + items: - name: Getting Started with App-V href: app-v/appv-getting-started.md - name: What's new - items: + items: - name: What's new in App-V for Windows 10, version 1703 and earlier href: app-v/appv-about-appv.md - name: Release Notes for App-V for Windows 10, version 1607 @@ -40,11 +38,11 @@ items: - name: High Level Architecture for App-V href: app-v/appv-high-level-architecture.md - name: Planning - items: + items: - name: Planning for App-V href: app-v/appv-planning-for-appv.md - name: Preparing your environment - items: + items: - name: Preparing your environment for App-V href: app-v/appv-preparing-your-environment.md - name: App-V Prerequisites @@ -52,7 +50,7 @@ items: - name: App-V security considerations href: app-v/appv-security-considerations.md - name: Planning to deploy - items: + items: - name: Planning to Deploy App-V href: app-v/appv-planning-to-deploy-appv.md - name: App-V Supported Configurations @@ -74,11 +72,11 @@ items: - name: App-V Planning Checklist href: app-v/appv-planning-checklist.md - name: Deploying - items: + items: - name: Deploying App-V href: app-v/appv-deploying-appv.md - name: App-V sequencer and client configuration - items: + items: - name: Deploying the App-V Sequencer and Configuring the Client href: app-v/appv-deploying-the-appv-sequencer-and-client.md - name: About Client Configuration Settings @@ -88,7 +86,7 @@ items: - name: How to Install the Sequencer href: app-v/appv-install-the-sequencer.md - name: App-V server deployment - items: + items: - name: Deploying the App-V Server href: app-v/appv-deploying-the-appv-server.md - name: How to Deploy the App-V Server @@ -116,11 +114,11 @@ items: - name: Deploying Microsoft Office 2010 by Using App-V href: app-v/appv-deploying-microsoft-office-2010-wth-appv.md - name: Operations - items: + items: - name: Operations for App-V href: app-v/appv-operations.md - name: Creating and managing virtualized applications - items: + items: - name: Creating and Managing App-V Virtualized Applications href: app-v/appv-creating-and-managing-virtualized-applications.md - name: Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer) @@ -140,7 +138,7 @@ items: - name: How to Create a Virtual Application Package Using an App-V Package Accelerator href: app-v/appv-create-a-virtual-application-package-package-accelerator.md - name: Administering App-V - items: + items: - name: Administering App-V Virtual Applications by Using the Management Console href: app-v/appv-administering-virtual-applications-with-the-management-console.md - name: About App-V Dynamic Configuration @@ -168,7 +166,7 @@ items: - name: How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console href: app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md - name: Connection groups - items: + items: - name: Managing Connection Groups href: app-v/appv-managing-connection-groups.md - name: About the Connection Group Virtual Environment @@ -188,7 +186,7 @@ items: - name: How to Allow Only Administrators to Enable Connection Groups href: app-v/appv-allow-administrators-to-enable-connection-groups.md - name: Deploying App-V packages with ESD - items: + items: - name: Deploying App-V Packages by Using Electronic Software Distribution (ESD) href: app-v/appv-deploying-packages-with-electronic-software-distribution-solutions.md - name: How to deploy App-V Packages Using Electronic Software Distribution @@ -196,25 +194,25 @@ items: - name: How to Enable Only Administrators to Publish Packages by Using an ESD href: app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md - name: Using the management console - items: + items: - name: Using the App-V client management console href: app-v/appv-using-the-client-management-console.md - name: Automatically clean up unpublished packages on the App-V client href: app-v/appv-auto-clean-unpublished-packages.md - name: Migrating - items: + items: - name: Migrating to App-V from a previous version href: app-v/appv-migrating-to-appv-from-a-previous-version.md - name: How to convert a package created in a previous version of App-V href: app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md - name: Maintenance - items: + items: - name: Maintaining App-V href: app-v/appv-maintaining-appv.md - name: How to Move the App-V Server to Another Computer href: app-v/appv-move-the-appv-server-to-another-computer.md - name: Administering App-V with Windows PowerShell - items: + items: - name: Administering App-V by using Windows PowerShell href: app-v/appv-administering-appv-with-powershell.md - name: How to Load the Windows PowerShell Cmdlets for App-V and Get Cmdlet Help @@ -242,7 +240,7 @@ items: - name: Troubleshooting App-V href: app-v/appv-troubleshooting.md - name: Technical Reference - items: + items: - name: Technical Reference for App-V href: app-v/appv-technical-reference.md - name: Available Mobile Device Management (MDM) settings for App-V diff --git a/windows/client-management/client-tools/add-remove-hide-features.md b/windows/client-management/client-tools/add-remove-hide-features.md new file mode 100644 index 0000000000..6bcc413598 --- /dev/null +++ b/windows/client-management/client-tools/add-remove-hide-features.md @@ -0,0 +1,170 @@ +--- +title: Add, remove, or hide Windows features +description: Learn how to add or remove Windows optional features using the Optional features page in the Settings app. Also see the group policy objects (GPO) and MDM policies that show or hide Windows Features in the Settings app. Use Windows PowerShell to show or hide specific features in Windows Features. +author: aczechowski +ms.author: aaroncz +manager: aaroncz +ms.date: 03/13/2024 +ms.topic: how-to +ms.service: windows-client +ms.subservice: itpro-apps +ms.localizationpriority: medium +ms.collection: tier2 +zone_pivot_groups: windows-versions-11-10 +appliesto: + - ✅ Windows 11 + - ✅ Windows 10 +--- + +# Add, remove, or hide Windows features + +Windows has optional features that aren't included by default, but you can add later. These features are called [Features on Demand](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities), and can be added at any time. Some of these features are language resources like language packs or handwriting support. On organization-owned devices, you can control access to these other features. You can use group policy or mobile device management (MDM) policies to hide the UI from users, or use Windows PowerShell to enable or disable specific features. + +## Use the Windows Settings app to add or remove features + + + +Open the **Optional features** pane in the **Settings** app by selecting the following link: + +> [!div class="nextstepaction"] +> [Optional features](ms-settings:optionalfeatures) + +or + +1. Right-click on the **Start** menu and select **Run**. + +1. In the **Run** window, next to **Open:**, enter: + + ```console + ms-settings:optionalfeatures + ``` + + and then select **OK**. + +or + +::: zone pivot="windows-11" + +1. Right-click on the **Start** menu and select **Settings**. + +1. In the left hand pane of the Settings app, select **System**. + +1. In the right hand **System** pane, select **Optional features**. + +> [!NOTE] +> +> The navigation steps, UI elements, and UI text in this section are based on the latest version of Windows 11 with the latest cumulative update installed. For other versions of Windows 11 that are currently supported or don't have the latest cumulative update, some of the navigation steps, UI elements, and UI text might be different. For example, the [**Optional features**](ms-settings:optionalfeatures) pane might be located under **Settings** > **Apps**. + +::: zone-end + +::: zone pivot="windows-10" + +1. Right-click on the **Start** menu and select **Settings**. + +1. In the Settings app, select **System**. + +1. In the left hand pane, select **Optional features**. + +> [!NOTE] +> +> The navigation steps, UI elements, and UI text in this section are based on Windows 10 22H2 with the latest cumulative update installed. For other versions of Windows 10 that are currently supported or don't have the latest cumulative update, some of the navigation steps, UI elements, and UI text might be different. For example, the [**Optional features**](ms-settings:optionalfeatures) pane might be located under **Settings** > **Apps** > **Apps & features**. + +::: zone-end + +### Add a feature + +::: zone pivot="windows-11" + +Once the **System > Optional features** pane is open, add a feature with the following steps: + +1. Select the **View features** button next to **Add an optional feature**. + +1. In the **Add an optional feature** window that opens: + + 1. Find the desired feature to add and then select the box next to the feature to add it. Multiple features can be selected. + + 1. Once all of the desired features are selected, select the **Next** button. + + 1. Review the selected list of features and then select the **Install** button to add the selected features. + +::: zone-end + +::: zone pivot="windows-10" + +Once the **Optional features** pane is open, add a feature with the following steps: + +1. Select the **+** button next to **Add a feature**. + +1. In the **Add an optional feature** window that opens: + + 1. Find the desired feature to add and then select the box next to the feature to add it. Multiple features can be selected. + + 1. Once all of the desired features are selected, select the **Install** button. + +::: zone-end + +> [!IMPORTANT] +> +> Windows Update is used to add the optional features. The device needs to be online so Windows Update can download the content that it needs to add. + +### Remove a feature + +::: zone pivot="windows-11" + +Once the **System > Optional features** pane is open, remove a feature with the following steps: + +1. Under **Installed features**, search for the feature that needs to be removed in the **Search installed features** search box, or scroll through the list of added features until the feature that needs to be removed is found. + +1. Once the feature that needs to be removed is found, select the feature to expand it, and then select the **Uninstall** button. + +::: zone-end + +::: zone pivot="windows-10" + +Once the **Optional features** pane is open, remove a feature with the following steps: + +1. Under **Installed features**, search for the feature that needs to be removed in the **Find an installed optional feature** search box, or scroll through the list of added features until the feature that needs to be removed is found. + +1. Once the feature that needs to be removed is found, select the feature to expand it, and then select the **Uninstall** button. + +::: zone-end + +## Use group policy or MDM policies to hide Windows features + +By default, the OS might show Windows features and allow users to add and remove these optional apps and features. To hide Windows features on your user devices, you can use group policy or an MDM provider like Microsoft Intune. + +### Group policy + +If you use group policy, use the `User Configuration\Administrative Template\Control Panel\Programs\Hide "Windows Features"` policy. By default, this policy might be set to **Not configured**, which means users can add or remove features. When this setting is **Enabled**, the settings page to add optional features is hidden on the device. + +You can't use group policy to disable specific Windows features. If you want to disable specific features, use [Windows PowerShell](#use-windows-powershell-to-disable-specific-features). + +If you want to hide the entire **Apps** feature in the Settings app, use the `User Configuration\Administrative Template\Control Panel\Programs\Hide "Programs and Features" page` policy. + +### MDM + +Using Microsoft Intune, you can use [administrative templates](/mem/intune/configuration/administrative-templates-windows) or the [settings catalog](/mem/intune/configuration/settings-catalog) to hide Windows features. + +If you want to hide the entire **Apps** feature in the Settings app, you can use a configuration policy on Intune enrolled devices. For more information on the settings you can configure, see [Control Panel and Settings device restrictions in Microsoft Intune](/mem/intune/configuration/device-restrictions-windows-10#control-panel-and-settings). + +## Use Windows PowerShell to disable specific features + +To disable specific features, use the Windows PowerShell [Disable-WindowsOptionalFeature](/powershell/module/dism/disable-windowsoptionalfeature) cmdlet. + +> [!NOTE] +> +> There isn't a group policy that disables specific Windows features. + +To automate disabling specific features, create a scheduled task to run a PowerShell script. For more information about Windows task scheduler, see [Task Scheduler for developers](/windows/win32/taskschd/task-scheduler-start-page). + +Microsoft Intune can also run PowerShell scripts. For more information, see [Use PowerShell scripts on Windows client devices in Intune](/mem/intune/apps/intune-management-extension). + +To enable specific features, use the [Enable-WindowsOptionalFeature](/powershell/module/dism/enable-windowsoptionalfeature) cmdlet. + +Another useful PowerShell cmdlet is [Get-WindowsOptionalFeature](/powershell/module/dism/get-windowsoptionalfeature). Use this cmdlet to view information about optional features in the current OS or a mounted image. This cmdlet returns the current state of features, and whether a restart might be required when the state changes. + +## Related content + +- [Features on Demand overview](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). +- [Available Features on Demand](/windows-hardware/manufacture/desktop/features-on-demand-non-language-fod). +- [Language and region Features on Demand (FOD)](/windows-hardware/manufacture/desktop/features-on-demand-language-fod). diff --git a/windows/client-management/client-tools/toc.yml b/windows/client-management/client-tools/toc.yml index 115ff9afd8..17b21a7926 100644 --- a/windows/client-management/client-tools/toc.yml +++ b/windows/client-management/client-tools/toc.yml @@ -1,4 +1,6 @@ items: + - name: Add, remove, or hide Windows features + href: add-remove-hide-features.md - name: Windows Tools/Administrative Tools href: administrative-tools-in-windows.md - name: Use Quick Assist to help users diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md index 85fa624e4a..df25725c5a 100644 --- a/windows/client-management/mdm/assignedaccess-csp.md +++ b/windows/client-management/mdm/assignedaccess-csp.md @@ -1,7 +1,7 @@ --- title: AssignedAccess CSP description: Learn more about the AssignedAccess CSP. -ms.date: 01/18/2024 +ms.date: 02/29/2024 --- @@ -11,19 +11,10 @@ ms.date: 01/18/2024 -The AssignedAccess configuration service provider (CSP) is used to set the device to run in kiosk mode. Once the CSP has been executed, the next user login that is associated with the kiosk mode puts the device into the kiosk mode running the application specified in the CSP configuration. +The AssignedAccess configuration service provider (CSP) is used to configure a kiosk or restricted user experience. Once the CSP is executed, the next user login that is associated with the Assigned Access profile puts the device into the kiosk mode specified in the CSP configuration. -- For a step-by-step guide for setting up devices to run in kiosk mode, see [Set up a single-app kiosk on Windows 10/11](/windows/configuration/kiosk-single-app). -- For a step-by-step guide for configuring multi-app kiosks, see [Create a Windows 10 kiosk that runs multiple apps](/windows/configuration/lock-down-windows-10-to-specific-apps). +To learn more about how to configure Assigned Access, see [Configure kiosks and restricted user experiences](/windows/configuration/assigned-access). -> [!IMPORTANT] -> The AssignedAccess CSP is supported in Windows 10 Enterprise and Windows 10 Education. Starting from Windows 10, version 1709, it is supported in Windows 10 Pro and Windows 10 S. Starting from Windows 10, version 1803, it is also supported in Windows Holographic for Business edition. - -> [!WARNING] -> You can only assign one single app kiosk profile to an individual user account on a device. The single app profile does not support domain groups. - -> [!NOTE] -> If the application calls `KeyCredentialManager.IsSupportedAsync` when it is running in assigned access mode and it returns false on the first run, invoke the settings screen and select an appropriate PIN to use with Windows Hello. This is the settings screen that is hidden by the application running in assigned access mode. You can only use Windows Hello if you first leave assigned access mode, select your convenience pin, and then go back into assigned access mode again. @@ -59,20 +50,8 @@ This node accepts an AssignedAccessConfiguration xml as input. -The input XML specifies the settings that you can configure in the kiosk or device. +To learn how to configure xml file, see [Create an Assigned Access configuration XML file](/windows/configuration/assigned-access/configuration-file) -In **Windows 10, version 1803** the Configuration node introduces single app kiosk profile to replace KioskModeApp CSP node. KioskModeApp node will be deprecated soon, so you should use the single app kiosk profile in config xml for Configuration node to configure public-facing single app Kiosk. - -In **Windows 10, version 1909**, Microsoft Edge kiosk mode support was added. This allows Microsoft Edge to be the specified kiosk application. For details about configuring Microsoft Edge kiosk mode, see [Configure a Windows 10 kiosk that runs Microsoft Edge](/DeployEdge/microsoft-edge-configure-kiosk-mode). Windows 10, version 1909 also allows for configuration of the breakout sequence. The breakout sequence specifies the keyboard shortcut that returns a kiosk session to the lock screen. The breakout sequence is defined with the format modifiers + keys. An example breakout sequence would look something like `shift+alt+a`, where `shift` and `alt` are the modifiers and `a` is the key. - -In **Windows 11, version 22H2 with [KB5026446](https://support.microsoft.com/kb/5026446)**, AssignedAccessConfiguration schema was updated to add StartPins and TaskbarLayout nodes to support pinning apps to the Start Menu and Taskbar respectively. - -- For more information about setting up a multi-app kiosk, see [Create a Windows 10 kiosk that runs multiple apps](/windows/configuration/lock-down-windows-10-to-specific-apps). -- For more information on the schema, see [AssignedAccessConfiguration XSD](#assignedaccessconfiguration-xsd). -- For examples, see [AssignedAccessConfiguration examples](#assignedaccessconfiguration-examples). - -> [!NOTE] -> Deleting the multi-app configuration will remove the assigned access lockdown profiles associated with the users, but it can't revert all the enforced policies (for example, Start Layout). @@ -88,8 +67,6 @@ In **Windows 11, version 22H2 with [KB5026446](https://support.microsoft.com/kb/ **Examples**: -For more examples, see [AssignedAccessConfiguration examples](#assignedaccessconfiguration-examples). - - Get Configuration ```xml @@ -165,8 +142,7 @@ This node supports Add, Delete, Replace and Get methods. When there's no configu > > This applies to both `domain\user`, `AzureAD\someone@contoso.onmicrosoft.com`, as long as a `\` is used in JSON string. -- For more information about how to get the AUMID, see [Find the Application User Model ID of an installed app](/windows/configuration/find-the-application-user-model-id-of-an-installed-app). -- For more information about single-app kiosk, see [Set up a single-app kiosk on Windows 10/11.](/windows/configuration/kiosk-single-app) +For more information about how to get the AUMID, see [Find the Application User Model ID of an installed app](/windows/configuration/store/find-aumid). > [!IMPORTANT] > @@ -293,9 +269,8 @@ This node accepts a ShellLauncherConfiguration xml as input. -In **Windows 10, version 1903**, Shell Launcher V2 was introduced to support both UWP and Win32 apps as the custom shell. -For more information, see [Shell Launcher](/windows/configuration/kiosk-shelllauncher). +To learn about Shell Launcher, see [What is Shell Launcher?](/windows/configuration/assigned-access/shell-launcher). > [!IMPORTANT] > You can't set both ShellLauncher and KioskModeApp at the same time on the device. @@ -317,193 +292,8 @@ For more information, see [Shell Launcher](/windows/configuration/kiosk-shelllau -**ShellLauncherConfiguration XSD**: -> [!NOTE] -> Shell Launcher V2 uses a separate XSD and namespace for backward compatibility. The original V1 XSD has a reference to the V2 XSD. - -- Shell Launcher V1 XSD - - ```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ``` - -- Shell Launcher V2 XSD - - ```xml - - - - - - - - - - - - - - - - ``` +Here's the Shell Launcher XSD reference article: [Shell Launcher XML Schema Definition (XSD)](/windows/configuration/assigned-access/shell-launcher/xsd). **Examples**: @@ -523,160 +313,7 @@ For more information, see [Shell Launcher](/windows/configuration/kiosk-shelllau - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - ``` - -- Add AutoLogon - - This function creates an auto-logon account on your behalf. It's a standard user with no password. The auto-logon account is managed by AssignedAccessCSP, so the account name isn't exposed. - - > [!NOTE] - > The auto-logon function is designed to be used after OOBE with provisioning packages. - - ```xml - - - - 2 - - - ./Device/Vendor/MSFT/AssignedAccess/ShellLauncher - - - chr - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - ``` - -- V2 Add - - ```xml - - - - 2 - - - ./Device/Vendor/MSFT/AssignedAccess/ShellLauncher - - - chr - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + ]]> @@ -1026,594 +663,15 @@ By default, the StatusConfiguration node doesn't exist, and it implies this feat ## AssignedAccessConfiguration XSD -- Schema for AssignedAccessConfiguration. +Here's the Assigned Access XSD reference article: [Assigned Access XML Schema Definition (XSD)](/windows/configuration/assigned-access/xsd). - ```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ); - ``` - -- Schema for features introduced in Windows 10, version 1809 which added support for Microsoft Edge kiosk mode and breakout key sequence customization. - - ```xml - - - - - - - - - - - - - - ``` - -- Schema for new features introduced in Windows 10 1809 release. - - ```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ``` - -- Schema for Windows 10 prerelease. - - ```xml - - - - - - - - - - - - - - - - - - - ``` - -## AssignedAccessConfiguration examples - -> [!NOTE] -> To authorize a compatible configuration XML that includes 1809 or prerelease elements and attributes, always include the namespace of these add-on schemas, and decorate the attributes and elements accordingly with the namespace alias. For example, to configure the auto-launch feature that was added in the 1809 release, use the below sample. Notice an alias `r1809` is given to the 201810 namespace for the 1809 release, and the alias is tagged on AutoLaunch and AutoLaunchArguments inline. -> -> ```xml -> xmlns="http://schemas.microsoft.com/AssignedAccess/2017/config" -> xmlns:r1809="http://schemas.microsoft.com/AssignedAccess/201810/config" -> > -> -> -> -> -> -> ... -> -> ``` - -- Example XML configuration for a multi-app kiosk for Windows 11, version 22H2 with [KB5026446](https://support.microsoft.com/kb/5026446). - - > [!NOTE] - > This example demonstrates the use of StartPins and TaskbarLayout elements. For more information, see [Set up a multi-app kiosk on Windows 11 devices](/windows/configuration/lock-down-windows-11-to-specific-apps). - > - > - StartPins element is used to pin apps to the Start menu and uses the [pinnedList JSON](/windows/configuration/customize-start-menu-layout-windows-11#get-the-pinnedlist-json) format. - > - TaskbarLayout element is used to pin apps to the taskbar and uses the [TaskbarLayoutModification XML](/windows/configuration/customize-taskbar-windows-11#create-the-xml-file) format. - - ```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - - - - - - - - ]]> - - - - - - MultiAppKioskUser - - - - - ``` - -- Example XML configuration for a multi-app kiosk for Windows 10. - - ```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - MultiAppKioskUser - - - - - ``` - -- Example XML configuration for a Microsoft Edge kiosk. This Microsoft Edge kiosk is configured to launch www.bing.com on startup in a public browsing mode. - - ```xml - - - - - - - - - - EdgeKioskUser - - - - - ``` - -- Example XML configuration for setting a breakout sequence to be Ctrl+A on a Microsoft Edge kiosk. - - > [!NOTE] - > **BreakoutSequence** can be applied to any kiosk type, not just an Edge kiosk. - - ```xml - - - - - - - - - - - EdgeKioskUser - - - - - ``` - - - -## Windows Holographic for Business edition example - -This example configures the following apps: Skype, Learning, Feedback Hub, and Calibration, for first line workers. Use this XML in a provisioning package using Windows Configuration Designer. For instructions, see [Configure HoloLens using a provisioning package](/hololens/hololens-provisioning). - -```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - AzureAD\multiusertest@analogfre.onmicrosoft.com - - - - -``` +For practical examples of Assigned Access configuration files, see [Assigned Access examples](/windows/configuration/assigned-access/examples). ## Handling XML in Configuration XML encoding (escaped) and CDATA of the XML in the Data node will both ensure that DM client can properly interpret the SyncML and send the configuration xml as string (in original format, unescaped) to AssignedAccess CSP to handle. -Similarly, the StartLayout xml inside the configuration xml is using the same format, xml inside xml as string. In the sample Configuration xml provided above, CDATA is used to embed the StartLayout xml. If you use CDATA to embed configuration xml in SyncML as well, you'll have nested CDATA, so pay attention to how CDATA is used in the provided CDATA sample. With that being said, when the Configuration xml is being constructed, MDM server can either escape start layout xml or put startlayout xml inside CDATA, when MDM server puts configuration xml inside SyncML, MDM server can also either escape it or wrap with CDATA. +Similarly, the StartLayout xml inside the configuration xml is using the same format, xml inside xml as string. In the sample Configuration xml provided above, CDATA is used to embed the StartLayout xml. If you use CDATA to embed configuration xml in SyncML as well, you have nested CDATA, so pay attention to how CDATA is used in the provided CDATA sample. With that being said, when the Configuration xml is being constructed, MDM server can either escape start layout xml or put startlayout xml inside CDATA, when MDM server puts configuration xml inside SyncML, MDM server can also either escape it or wrap with CDATA. Escape and CDATA are mechanisms used when handling xml in xml. Consider that it's a transportation channel to send the configuration xml as payload from server to client. It's transparent to both, the end user who configures the CSP and to our CSP. Both the customer on the server side and our CSP must only see the original configuration XML. @@ -1638,12 +696,6 @@ Escape and CDATA are mechanisms used when handling xml in xml. Consider that it' <Profile Id="{9A2A490F-10F6-4764-974A-43B19E722C23}"> <AllAppsList> <AllowedApps> - <App AppUserModelId="Microsoft.ZuneMusic_8wekyb3d8bbwe!Microsoft.ZuneMusic" /> - <App AppUserModelId="Microsoft.ZuneVideo_8wekyb3d8bbwe!Microsoft.ZuneVideo" /> - <App AppUserModelId="Microsoft.Windows.Photos_8wekyb3d8bbwe!App" /> - <App AppUserModelId="Microsoft.BingWeather_8wekyb3d8bbwe!App" /> - <App AppUserModelId="Microsoft.WindowsCalculator_8wekyb3d8bbwe!App" /> - <App DesktopAppPath="%windir%\system32\mspaint.exe" /> <App DesktopAppPath="C:\Windows\System32\notepad.exe" /> </AllowedApps> </AllAppsList> @@ -1655,14 +707,6 @@ Escape and CDATA are mechanisms used when handling xml in xml. Consider that it' <defaultlayout:StartLayout GroupCellWidth="6"> <start:Group Name="Group1"> <start:Tile Size="4x4" Column="0" Row="0" AppUserModelID="Microsoft.ZuneMusic_8wekyb3d8bbwe!Microsoft.ZuneMusic" /> - <start:Tile Size="2x2" Column="4" Row="2" AppUserModelID="Microsoft.ZuneVideo_8wekyb3d8bbwe!Microsoft.ZuneVideo" /> - <start:Tile Size="2x2" Column="4" Row="0" AppUserModelID="Microsoft.Windows.Photos_8wekyb3d8bbwe!App" /> - <start:Tile Size="2x2" Column="4" Row="4" AppUserModelID="Microsoft.BingWeather_8wekyb3d8bbwe!App" /> - <start:Tile Size="4x2" Column="0" Row="4" AppUserModelID="Microsoft.WindowsCalculator_8wekyb3d8bbwe!App" /> - </start:Group> - <start:Group Name="Group2"> - <start:DesktopApplicationTile Size="2x2" Column="2" Row="0" DesktopApplicationID="{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}\mspaint.exe" /> - <start:DesktopApplicationTile Size="2x2" Column="0" Row="0" DesktopApplicationID="{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}\notepad.exe" /> </start:Group> </defaultlayout:StartLayout> </StartLayoutCollection> @@ -1712,12 +756,6 @@ Escape and CDATA are mechanisms used when handling xml in xml. Consider that it' - - - - - - @@ -1729,10 +767,6 @@ Escape and CDATA are mechanisms used when handling xml in xml. Consider that it' - - - - diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index d9cf189c9a..647b90ac50 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -16,13 +16,19 @@ ms.date: 01/18/2024 The BitLocker configuration service provider (CSP) is used by the enterprise to manage encryption of PCs and devices. This CSP was added in Windows 10, version 1703. Starting in Windows 10, version 1809, it's also supported in Windows 10 Pro. > [!NOTE] +> To manage BitLocker through CSP except to enable and disable it using the `RequireDeviceEncryption` policy, one of the following licenses must be assigned to your users regardless of your management platform: > -> - Settings are enforced only at the time encryption is started. Encryption isn't restarted with settings changes. -> - You must send all the settings together in a single SyncML to be effective. +> - Windows 10/11 Enterprise E3 or E5 (included in Microsoft 365 F3, E3, and E5). +> - Windows 10/11 Enterprise A3 or A5 (included in Microsoft 365 A3 and A5). A `Get` operation on any of the settings, except for `RequireDeviceEncryption` and `RequireStorageCardEncryption`, returns the setting configured by the admin. For RequireDeviceEncryption and RequireStorageCardEncryption, the Get operation returns the actual status of enforcement to the admin, such as if Trusted Platform Module (TPM) protection is required and if encryption is required. And if the device has BitLocker enabled but with password protector, the status reported is 0. A Get operation on RequireDeviceEncryption doesn't verify that a minimum PIN length is enforced (SystemDrivesMinimumPINLength). + +> [!NOTE] +> +> - Settings are enforced only at the time encryption is started. Encryption isn't restarted with settings changes. +> - You must send all the settings together in a single SyncML to be effective. @@ -654,7 +660,7 @@ Sample value for this node to enable this policy is: `` **Example**: -To disable this policy, use hte following SyncML: +To disable this policy, use the following SyncML: ```xml diff --git a/windows/client-management/mdm/clouddesktop-csp.md b/windows/client-management/mdm/clouddesktop-csp.md index 8e70090f67..e249d20ca8 100644 --- a/windows/client-management/mdm/clouddesktop-csp.md +++ b/windows/client-management/mdm/clouddesktop-csp.md @@ -1,7 +1,7 @@ --- title: CloudDesktop CSP description: Learn more about the CloudDesktop CSP. -ms.date: 01/18/2024 +ms.date: 03/05/2024 --- @@ -29,7 +29,7 @@ The following list shows the CloudDesktop configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE
    ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ❌ Windows SE
    ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621.3235] and later | diff --git a/windows/client-management/mdm/clouddesktop-ddf-file.md b/windows/client-management/mdm/clouddesktop-ddf-file.md index 60be060ee6..98427f9e32 100644 --- a/windows/client-management/mdm/clouddesktop-ddf-file.md +++ b/windows/client-management/mdm/clouddesktop-ddf-file.md @@ -1,7 +1,7 @@ --- title: CloudDesktop DDF file description: View the XML file containing the device description framework (DDF) for the CloudDesktop configuration service provider. -ms.date: 01/31/2024 +ms.date: 03/05/2024 --- @@ -38,9 +38,9 @@ The following XML file contains the device description framework (DDF) for the C - 99.9.99999 - 9.9 - 0x4;0x30;0x31;0x7E;0x88;0xA1;0xA2;0xA4;0xA5;0xBC;0xBF;0xCD;0xD2; + 10.0.22621.3235 + 1.0 + 0x4;0x30;0x31;0x7E;0x87;0x88;0x88*;0xA1;0xA2;0xA4;0xA5;0xB4;0xBC;0xBD;0xBF; @@ -68,8 +68,8 @@ The following XML file contains the device description framework (DDF) for the C - 99.9.99999 - 9.9 + 10.0.22621.3235 + 1.0 diff --git a/windows/client-management/mdm/personalization-csp.md b/windows/client-management/mdm/personalization-csp.md index 70775b2f69..614e47b8a9 100644 --- a/windows/client-management/mdm/personalization-csp.md +++ b/windows/client-management/mdm/personalization-csp.md @@ -1,7 +1,7 @@ --- title: Personalization CSP description: Learn more about the Personalization CSP. -ms.date: 01/31/2024 +ms.date: 03/05/2024 --- @@ -9,8 +9,6 @@ ms.date: 01/31/2024 # Personalization CSP -[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] - The Personalization CSP can set the lock screen, desktop background images and company branding on sign-in screen ([BootToCloud mode](policy-csp-clouddesktop.md#boottocloudmode) only). Setting these policies also prevents the user from changing the image. You can also use the Personalization settings in a provisioning package. @@ -38,7 +36,7 @@ The following list shows the Personalization configuration service provider node | Scope | Editions | Applicable OS | |:--|:--|:--| -| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE
    ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE
    ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621.3235] and later | @@ -77,7 +75,7 @@ This represents the status of the Company Logo. 1 - Successfully downloaded or c | Scope | Editions | Applicable OS | |:--|:--|:--| -| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE
    ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE
    ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621.3235] and later | @@ -116,7 +114,7 @@ An http or https Url to a jpg, jpeg or png image that needs to be downloaded and | Scope | Editions | Applicable OS | |:--|:--|:--| -| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE
    ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview | +| ✅ Device
    ❌ User | ✅ Pro
    ✅ Enterprise
    ✅ Education
    ✅ Windows SE
    ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621.3235] and later | @@ -127,7 +125,7 @@ An http or https Url to a jpg, jpeg or png image that needs to be downloaded and -This represents the name of the company. It can be at most 30 characters long. This setting is currently available only for boot to cloud shared pc mode to display the company name on sign-in screen. +The name of the company to be displayed on the sign-in screen. This setting is currently available for boot to cloud shared pc mode only. diff --git a/windows/client-management/mdm/personalization-ddf.md b/windows/client-management/mdm/personalization-ddf.md index 07040a6851..87ccb6cf93 100644 --- a/windows/client-management/mdm/personalization-ddf.md +++ b/windows/client-management/mdm/personalization-ddf.md @@ -1,7 +1,7 @@ --- title: Personalization DDF file description: View the XML file containing the device description framework (DDF) for the Personalization configuration service provider. -ms.date: 01/31/2024 +ms.date: 03/05/2024 --- @@ -42,7 +42,7 @@ The following XML file contains the device description framework (DDF) for the P 10.0.16299 1.0 - 0x4;0x1B;0x30;0x31;0x48;0x54;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2; + 0x4;0x1B;0x30;0x31;0x48;0x54;0x77;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x87;0x88;0x88*;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xB4;0xBC;0xBD;0xBF;0xCA;0xCB; @@ -101,7 +101,7 @@ The following XML file contains the device description framework (DDF) for the P - A http or https Url to a jpg, jpeg or png image that neeeds to be downloaded and used as the Lock Screen Image or a file Url to a local image on the file system that needs to be used as the Lock Screen Image. + A http or https Url to a jpg, jpeg or png image that needs to be downloaded and used as the Lock Screen Image or a file Url to a local image on the file system that needs to be used as the Lock Screen Image. @@ -148,7 +148,7 @@ The following XML file contains the device description framework (DDF) for the P - A http or https Url to a jpg, jpeg or png image that neeeds to be downloaded and used as the Company Logo or a file Url to a local image on the file system that needs to be used as the Company Logo. This setting is currently available for boot to cloud shared pc mode only. + A http or https Url to a jpg, jpeg or png image that needs to be downloaded and used as the Company Logo or a file Url to a local image on the file system that needs to be used as the Company Logo. This setting is currently available for boot to cloud shared pc mode only. @@ -162,7 +162,7 @@ The following XML file contains the device description framework (DDF) for the P - 99.9.99999 + 10.0.22621.3235 2.0 @@ -189,7 +189,7 @@ The following XML file contains the device description framework (DDF) for the P - 99.9.99999 + 10.0.22621.3235 2.0 @@ -203,7 +203,7 @@ The following XML file contains the device description framework (DDF) for the P - This represents the name of the company. It can be at most 30 characters long. This setting is currently available only for boot to cloud shared pc mode to display the company name on sign-in screen. + The name of the company to be displayed on the sign-in screen. This setting is currently available for boot to cloud shared pc mode only. @@ -217,7 +217,7 @@ The following XML file contains the device description framework (DDF) for the P - 99.9.99999 + 10.0.22621.3235 2.0 diff --git a/windows/configuration/assigned-access/configuration-file.md b/windows/configuration/assigned-access/configuration-file.md new file mode 100644 index 0000000000..5a96fcc4a4 --- /dev/null +++ b/windows/configuration/assigned-access/configuration-file.md @@ -0,0 +1,522 @@ +--- +title: Create an Assigned Access configuration file +description: Learn how to create an XML file to configure Assigned Access. +ms.topic: how-to +zone_pivot_groups: windows-versions-11-10 +ms.date: 03/04/2024 +appliesto: +--- + +# Create an Assigned Access configuration XML file + +To configure Assigned Access, you must create and apply a configuration XML file to your devices. The configuration file must conform to a *schema*, as defined in [Assigned Access XML Schema Definition (XSD)](xsd.md). + +This article describes how to configure an Assigned Access configuration file, including practical examples. + +Let's start by looking at the basic structure of the XML file. An Assigned Access configuration file contains: + +- One or multiple `profiles`. Each `profile` defines a set of applications that are allowed to run +- One or multiple `configs`. Each `config` associates a user account or a group to a `profile` + +Here's a basic example of an Assigned Access configuration file, with one profile and one config: + +```xml + + + + + + + + + + + + + +``` + +## Versioning + +The Assigned Access configuration XML is versioned. The version is defined in the XML root element, and it's used to determine which schema to use to validate the XML file. The version is also used to determine which features are available for the configuration. Here's a table of the versions, aliases used in the documentation examples, and namespaces: + +| Version | Alias | Namespace | +|-|-|-| +|Windows 11, version 22H2|`v5`|`http://schemas.microsoft.com/AssignedAccess/2022/config`| +|Windows 11, version 21H2|`v4`|`http://schemas.microsoft.com/AssignedAccess/2021/config`| +|Windows 10|`v5`|`http://schemas.microsoft.com/AssignedAccess/202010/config`| +|Windows 10|`v3`|`http://schemas.microsoft.com/AssignedAccess/2020/config`| +|Windows 10|`rs5`|`http://schemas.microsoft.com/AssignedAccess/201810/config`| +|Windows 10|default|`http://schemas.microsoft.com/AssignedAccess/2017/config`| + +To authorize a compatible configuration XML that includes version-specific elements and attributes, always include the namespace of the add-on schemas, and decorate the attributes and elements accordingly with the namespace alias. For example, to configure the `StartPins` feature that was added in Windows 11, version 22H2, use the below example. Note the alias `v5` associated to the `http://schemas.microsoft.com/AssignedAccess/2022/config` namespace for 22H2 release, and the alias is tagged on `StartPins` inline. + +```xml + + + + + + + + + + + + + + + + +``` + +Here you can find the Assigned Access XML schema definitions: [Assigned Access XML Schema Definition (XSD)](xsd.md). + +## Profiles + +A configuration file can contain one or more profiles. Each profile is identified by a unique identifier `Profile Id` and, optionally, a `Name`. For example: + +```xml + + + + + +``` + +> [!TIP] +> The `Profile Id` must be unique within the XML file. You can generate a GUID with the PowerShell cmdlet `New-Guid`. + +A profile can be one of two types: + +- `KioskModeApp`: is used to configure a kiosk experience. Users assigned this profile don't access the desktop, but only the Universal Windows Platform (UWP) application or Microsoft Edge running in full-screen above the Lock screen +- `AllAppList` is used to configure a restricted user experience. Users assigned this profile, access the desktop with the specific apps on the Start menu + +> [!IMPORTANT] +> +> - You can't set both `KioskModeApp` and `ShellLauncher` at the same time on the device +> - A configuration file can contain only one `KioskModeApp` profile, but it can contain multiple `AllAppList` profiles. + +### KioskModeApp + +The properties of a `KioskModeApp` profile are: + +| Property| Description | Details | +|-|-|-| +|`AppUserModelId`|The Application User Model ID (AUMID) of the UWP app.|Learn how to [Find the Application User Model ID of an installed app](../store/find-aumid.md).| +|`v4:ClassicAppPath`|The full path to a desktop app executable.|This is the path to the desktop app used in kiosk mode. The path can contain system environment variables in the form of `%variableName%`.| +|`v4:ClassicAppArguments`|The arguments to be passed to the desktop app.|This property is optional.| + +By default, you can use the CTRL+ALT+DEL sequence to exit kiosk mode. You can define a `BreakoutSequence` element to change the default sequence. The `Key` attribute is a string that represents the key combination. + +Example of two profiles, a desktop app and a UWP app: + +```xml + + + + + + + +``` + +> [!NOTE] +> You can only assign a `KioskModeApp` profile to users, not to groups. + +### AllAppList + +Based on the purpose of the kiosk device, define the list of applications that are allowed to run. This list can contain both UWP apps and desktop apps. When the mult-app kiosk configuration is applied to a device, AppLocker rules are generated to allow the apps that are listed in the configuration. + +> [!NOTE] +> If an app has a dependency on another app, both must be included in the allowed apps list. + +Within the `AllAppList` node, define a list of applications that are allowed execute. Each `App` element has the following properties: + +| Property| Description | Details | +|-|-|-| +|`AppUserModelId`|The Application User Model ID (AUMID) of the UWP app.|Learn how to [Find the Application User Model ID of an installed app](../store/find-aumid.md).| +|`DesktopAppPath`|The full path to a desktop app executable.|This is the path to the desktop app that used in kiosk mode. The path can contain system environment variables in the form of `%variableName%`.| +|`rs5:AutoLaunch`|A Boolean attribute to indicate whether to launch the app (either desktop or UWP app) automatically when the user signs in.|This property is optional. Only one application can autolaunch.| +|`rs5:AutoLaunchArguments`|The arguments to be passed to the app that is configured with `AutoLaunch`.|AutoLaunchArguments are passed to the apps as is and the app needs to handle the arguments explicitly. This property is optional.| + +Example: + +```xml + + + + + + + + + +``` + +::: zone pivot="windows-10" + +### File Explorer restrictions + +In a restricted user experience (`AllAppList`), folder browsing is locked down by default. You can explicitly allow access to known folders by including the `FileExplorerNamespaceRestrictions` node. + +You can specify user access to Downloads folder, Removable drives, or no restrictions at all. Downloads and Removable Drives can be allowed at the same time. + +```xml + + + + + + + + + + + + + +``` + +Here are some practical examples. + +#### Block everything + +Either don't use the node or leave it empty. + +```xml + + +``` + +#### Only allow downloads + +```xml + + + +``` + +#### Only allow removable drives + +```xml + + + +``` + +#### Allow both Downloads, and removable drives + +```xml + + + + +``` + +#### No restrictions, all locations are allowed + +```xml + + + +``` + +> [!TIP] +> To grant access to File Explorer in a restricted user experience, add `Explorer.exe` to the list of allowed apps, and pin a shortcut to the Start menu. + +::: zone-end + +### Start menu customizations + +For a restricted user experience profile (`AllAppList`), you must define the Start layout. The Start layout contains a list of applications that are pinned to the Start menu. You can choose to pin all the allowed applications to the Start menu, or a subset. The easiest way to create a customized Start layout is to configure the Start menu on a test device and then export the layout. + +::: zone pivot="windows-10" + +To learn how to customize and export a Start menu configuration, see [Customize the Start menu](../start/customize-and-export-start-layout.md). + +With the exported Start menu configuration, use the `StartLayout` element and add the content of the XML file. For example: + +```xml + + + ]]> + +``` + +Example with some apps pinned: + +```xml + + + + + + + + + + + + + + + + + + + ]]> + +``` + +::: zone-end + +::: zone pivot="windows-11" + +To learn how to customize and export a Start menu configuration, see [Customize the Start menu](../start/customize-and-export-start-layout.md). + +With the exported Start menu configuration, use the `v5:StartPins` element and add the content of the exported JSON file. For example: + +```xml + + + ]]> + +``` + +Example with some apps pinned: + + + + + +::: zone-end + +> [!NOTE] +> If an app isn't installed for the user, but is included in the Start layout XML, the app isn't shown on the Start screen. + +### Taskbar customizations + +::: zone pivot="windows-10" + +You can't pin apps on the taskbar in a restricted user experience. It's not supported to configure a Taskbar layout using the `` tag in a layout modification XML, as part of the Assigned Access configuration. + +The only Taskbar customization available is the option to show or hide it, using the `ShowTaskbar` boolean attribute. + +The following example exposes the taskbar: + +```xml + +``` + +The following example hides the taskbar: + +```xml + +``` + +> [!NOTE] +> This is different from the **Automatically hide the taskbar** option in tablet mode, which shows the taskbar when swiping up from or moving the mouse pointer down to the bottom of the screen. Setting `ShowTaskbar` as `false` hides the taskbar permanently. + +::: zone-end + +::: zone pivot="windows-11" + +You can customize the Taskbar by creating a custom layout and adding it to your XML file. To learn how to customize and export the Taskbar configuration, see [Customize the Taskbar](../taskbar/configure.md). + +> [!NOTE] +> In Windows 11, the `ShowTaskbar` attribute is no-op. Configure it with a value of `true`. + +With the exported Taskbar configuration, use the `v5:TaskbarLayout` element and add the content of the XML file. For example: + +```xml + + + ]]> + +``` + +Here's an example of a custom Taskbar with a few apps pinned: + +```xml + + + + + + + + + + + + + + ]]> + +``` + +::: zone-end + + + +## Configs + +Under `Configs`, define one or more user accounts, or groups, and their association with a profile. + +When the user account signs in, the associated Assigned Access profile is enforced along with policy settings that are part of the restricted user experience. + +You can assign: + +- A standard user account, which can be local, domain, or Microsoft Entra ID +- A group account, which can be local, Active Directory (domain), or Microsoft Entra ID + +Limitations: + +- Configs that specify group accounts can't use a kiosk profile, only a restricted user experience profile +- Apply the restricted user experience to standard users only. It's not supported to associate an admin user with an Assigned Access profile +- Don't apply the profile to users or groups that are targeted by conditional access policies that require user interaction. For example, multi-factor authentication (MFA), or Terms of Use (TOU). For more information, see [Users can't log on to Windows if a multi-app kiosk profile is assigned](/troubleshoot/mem/intune/device-configuration/users-cannot-logon-windows-multi-app-kiosk) + +>[!NOTE] +> On Microsoft Entra joined and domain joined devices, local user accounts aren't displayed on the sign-in screen by default. To display the local accounts on the sign-in screen, enable the policy setting: +> +>- GPO: **Computer Configuration** > **Administrative Templates** > **System** > **Logon** > **Enumerate local users on domain-joined computers** +>- CSP: `./Device/Vendor/MSFT/Policy/Config/WindowsLogon/`[EnumerateLocalUsersOnDomainJoinedComputers](/windows/client-management/mdm/policy-csp-windowslogon#enumeratelocalusersondomainjoinedcomputers) + +### AutoLogon account + +With ``, Assigned Access creates and manages a user account to automatically sign in after a device restarts. The account is a local standard user. + +The following example shows how to specify an account to sign in automatically, and the optional display name for the account on the sign-in screen: + +```xml + + + + + + +``` + +>[!IMPORTANT] +>When Exchange Active Sync (EAS) password restrictions are active on the device, the autologon feature doesn't work. This behavior is by design. For more informations, see [How to turn on automatic logon in Windows](/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon). + +### Global profile + +With `GlobalProfile`, you can define an Assigned Access profile that is applied to every non-admin account that signs in. `GlobalProfile` is useful in scenarios like frontline workers or student devices, where you want to ensure that every user has a consistent experience. + +```xml + + + +``` + +> [!NOTE] +> You can combine a global profile with other profiles. If you assign a user a non-global profile, the global profile won't be applied to that user. + +### User accounts + +Individual accounts are specified using ``. + +> [!IMPORTANT] +> Before applying the Assigned Access configuration, make sure the specified user account is available on the device, otherwise it fails. +> +> For both domain and Microsoft Entra accounts, as long as the device is Active Directory joined or Microsoft Entra joined, the account can be discovered in the domain forest or tenant that the device is joined to. For local accounts, it is required that the account exist before you configure the account for assigned access. + +#### Local user + +Local account can be entered as `devicename\user`, `.\user`, or just `user`. + +```xml + + user + + +``` + +#### Active Directory user + +Domain accounts must be entered using the format `domain\samAccountName`. + +```xml + + contoso\user + + +``` + +#### Microsoft Entra user + +Microsoft Entra accounts must be specified with the format: `AzureAD\{UPN}`. `AzureAD` must be provided *as is*, then follow with the Microsoft Entra user principal name (UPN). + +```xml + + AzureAD\user@contoso.onmicrosoft.com + + +``` + +### Group accounts + +Group accounts are specified using ``. Nested groups aren't supported. For example, if *User A* is member of *Group A*, *Group A* is member of *Group B*, and *Group B* is used in ``, *User A* doesn't have the kiosk experience. + +#### Local group + +Specify the group type as `LocalGroup` and add the group name in the `Name` attribute. + +```xml + + + + +``` + +#### Active Directory group + +Both security and distribution groups are supported. Specify the group type as `ActiveDirectoryGroup`. Use the domain name as the prefix in the name attribute. + +```xml + + + + +``` + +#### Microsoft Entra group + +Use the object ID of the Microsoft Entra group. You can find the object ID on the overview page for the group by signing in to the Microsoft Entra admin center and browsing to **Identity** > **Groups** > **All groups**. Specify the group type as `AzureActiveDirectoryGroup`. The kiosk device must have internet connectivity when users that belong to the group sign-in. + +```xml + + + + +``` + +## Next steps + +> [!div class="nextstepaction"] +> Review some practical examples of Assigned Access XML configurations: +> +> [Assigned Access examples](examples.md) diff --git a/windows/configuration/assigned-access/examples.md b/windows/configuration/assigned-access/examples.md new file mode 100644 index 0000000000..3c0c865d64 --- /dev/null +++ b/windows/configuration/assigned-access/examples.md @@ -0,0 +1,49 @@ +--- +title: Assigned Access examples +description: Practical examples of XML files to configure Assigned Access. +ms.date: 03/04/2024 +ms.topic: reference +zone_pivot_groups: windows-versions-11-10 +appliesto: +--- + +# Assigned Access examples + +This article contains examples of XML files to configure a device with Assigned Access. The files can be easily modified to fit your specific needs. + +To learn more: + +- [Create an Assigned Access configuration XML file](configuration-file.md). +- [Assigned Access XML Schema Definition (XSD)](xsd.md). + +## Kiosk experience with Microsoft Edge + +[!INCLUDE [example-kiosk-edge](includes/example-kiosk-edge.md)] + +## Kiosk experience with Universal Windows Platform (UWP) app + +[!INCLUDE [example-kiosk-uwp](includes/example-kiosk-uwp.md)] + +::: zone pivot="windows-10" + +## File Explorer restrictions + +[!INCLUDE [example-file-explorer-restrictions](includes/example-file-explorer-restrictions.md)] + +::: zone-end + +## Global Profile + +The following configuration demonstrates that only a global profile is used, with no user configured. + +[!INCLUDE [example-global-profile](includes/example-global-profile.md)] + +## User Group + +The following configuration demonstrates how to assign profiles to different users and groups, including a user configured to automatically sign in. + +[!INCLUDE [example-usergroup](includes/example-usergroup.md)] + +## Restricted user experience + +[!INCLUDE [example-restricted-experience](includes/example-restricted-experience.md)] diff --git a/windows/configuration/assigned-access/images/kiosk.png b/windows/configuration/assigned-access/images/kiosk.png new file mode 100644 index 0000000000..bea0e381b6 Binary files /dev/null and b/windows/configuration/assigned-access/images/kiosk.png differ diff --git a/windows/configuration/assigned-access/images/restricted-user-experience-windows-10.png b/windows/configuration/assigned-access/images/restricted-user-experience-windows-10.png new file mode 100644 index 0000000000..81f6ded25e Binary files /dev/null and b/windows/configuration/assigned-access/images/restricted-user-experience-windows-10.png differ diff --git a/windows/configuration/assigned-access/images/restricted-user-experience-windows-11.png b/windows/configuration/assigned-access/images/restricted-user-experience-windows-11.png new file mode 100644 index 0000000000..6105c7bdd7 Binary files /dev/null and b/windows/configuration/assigned-access/images/restricted-user-experience-windows-11.png differ diff --git a/windows/configuration/assigned-access/images/restricted-user-experience.png b/windows/configuration/assigned-access/images/restricted-user-experience.png new file mode 100644 index 0000000000..566b4bd902 Binary files /dev/null and b/windows/configuration/assigned-access/images/restricted-user-experience.png differ diff --git a/windows/configuration/assigned-access/includes/example-file-explorer-restrictions.md b/windows/configuration/assigned-access/includes/example-file-explorer-restrictions.md new file mode 100644 index 0000000000..ff855baa88 --- /dev/null +++ b/windows/configuration/assigned-access/includes/example-file-explorer-restrictions.md @@ -0,0 +1,30 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 03/01/2024 +ms.topic: include +--- + + + +```xml + + + + + + + + + + + + + + + + + + + +``` diff --git a/windows/configuration/assigned-access/includes/example-global-profile.md b/windows/configuration/assigned-access/includes/example-global-profile.md new file mode 100644 index 0000000000..a818640cbd --- /dev/null +++ b/windows/configuration/assigned-access/includes/example-global-profile.md @@ -0,0 +1,22 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + + + +```xml + + + + + + + + + + + +``` diff --git a/windows/configuration/assigned-access/includes/example-kiosk-edge.md b/windows/configuration/assigned-access/includes/example-kiosk-edge.md new file mode 100644 index 0000000000..91059e7434 --- /dev/null +++ b/windows/configuration/assigned-access/includes/example-kiosk-edge.md @@ -0,0 +1,26 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 03/01/2024 +ms.topic: include +--- + + + +```xml + + + + + + + + + + + Edge kiosk + + + + +``` diff --git a/windows/configuration/assigned-access/includes/example-kiosk-uwp.md b/windows/configuration/assigned-access/includes/example-kiosk-uwp.md new file mode 100644 index 0000000000..69e5a1ac70 --- /dev/null +++ b/windows/configuration/assigned-access/includes/example-kiosk-uwp.md @@ -0,0 +1,25 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + + + +```xml + + + + + + + + + + Weather app + + + + +``` diff --git a/windows/configuration/assigned-access/includes/example-restricted-experience.md b/windows/configuration/assigned-access/includes/example-restricted-experience.md new file mode 100644 index 0000000000..7ee28b6761 --- /dev/null +++ b/windows/configuration/assigned-access/includes/example-restricted-experience.md @@ -0,0 +1,115 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + + + +::: zone pivot="windows-10" + +```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + ]]> + + + + + + + + + + +``` + +::: zone-end + +::: zone pivot="windows-11" + +```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +``` + +::: zone-end diff --git a/windows/configuration/assigned-access/includes/example-two-profiles.md b/windows/configuration/assigned-access/includes/example-two-profiles.md new file mode 100644 index 0000000000..42bad92801 --- /dev/null +++ b/windows/configuration/assigned-access/includes/example-two-profiles.md @@ -0,0 +1,37 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + + + +```xml + + + + + + + + + + + + + + + + + + Weather app + + + + Library Kiosk + + + + +``` diff --git a/windows/configuration/assigned-access/includes/example-usergroup.md b/windows/configuration/assigned-access/includes/example-usergroup.md new file mode 100644 index 0000000000..7d69b07f0b --- /dev/null +++ b/windows/configuration/assigned-access/includes/example-usergroup.md @@ -0,0 +1,47 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + + + +```xml + + + + + + + + contoso\user + + + + AzureAD\user@contoso.onmicrosoft.com + + + + user + + + + + + + + + + + + + + + + + + + + +``` diff --git a/windows/configuration/assigned-access/includes/quickstart-kiosk-intune.md b/windows/configuration/assigned-access/includes/quickstart-kiosk-intune.md new file mode 100644 index 0000000000..8fb14f8ac6 --- /dev/null +++ b/windows/configuration/assigned-access/includes/quickstart-kiosk-intune.md @@ -0,0 +1,13 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/deviceConfigurations +Content-Type: application/json + +{ "id": "00000000-0000-0000-0000-000000000000", "displayName": "_MSLearn_Example_Kiosk - Assigned Access", "description": "This is a sample policy created from an article on learn.microsoft.com.", "roleScopeTagIds": [ "0" ], "@odata.type": "#microsoft.graph.windows10CustomConfiguration", "omaSettings": [ { "omaUri": "./Vendor/MSFT/AssignedAccess/Configuration", "displayName": "Configuration", "@odata.type": "#microsoft.graph.omaSettingString", "value": "\n\n \n \n \n \n \n \n \n \n \n \n \n \n" } ] } +``` \ No newline at end of file diff --git a/windows/configuration/assigned-access/includes/quickstart-kiosk-ps.md b/windows/configuration/assigned-access/includes/quickstart-kiosk-ps.md new file mode 100644 index 0000000000..4f5ce43c2e --- /dev/null +++ b/windows/configuration/assigned-access/includes/quickstart-kiosk-ps.md @@ -0,0 +1,32 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + +```powershell +$assignedAccessConfiguration = @" + + + + + + + + + + + + + + + +"@ + +$namespaceName="root\cimv2\mdm\dmmap" +$className="MDM_AssignedAccess" +$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className +$obj.Configuration = [System.Net.WebUtility]::HtmlEncode($assignedAccessConfiguration) +Set-CimInstance -CimInstance $obj +``` diff --git a/windows/configuration/assigned-access/includes/quickstart-kiosk-xml.md b/windows/configuration/assigned-access/includes/quickstart-kiosk-xml.md new file mode 100644 index 0000000000..93a0607346 --- /dev/null +++ b/windows/configuration/assigned-access/includes/quickstart-kiosk-xml.md @@ -0,0 +1,24 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + +```xml + + + + + + + + + + + + + + + +``` diff --git a/windows/configuration/assigned-access/includes/quickstart-restricted-experience-intune.md b/windows/configuration/assigned-access/includes/quickstart-restricted-experience-intune.md new file mode 100644 index 0000000000..7267d16e53 --- /dev/null +++ b/windows/configuration/assigned-access/includes/quickstart-restricted-experience-intune.md @@ -0,0 +1,28 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + +::: zone pivot="windows-10" + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/deviceConfigurations +Content-Type: application/json + +{ "id": "00-0000-0000-0000-000000000000", "displayName": "_MSLearn_Example_Restricted_User_Experience - Assigned Access - Windows 10", "description": "This is a sample policy created from an article on learn.microsoft.com.", "roleScopeTagIds": [ "0" ], "@odata.type": "#microsoft.graph.windows10CustomConfiguration", "omaSettings": [ { "@odata.type": "#microsoft.graph.omaSettingString", "displayName": "AssignedAccess_Configuration", "description": null, "omaUri": "./Vendor/MSFT/AssignedAccess/Configuration", "secretReferenceValueId": null, "isEncrypted": true, "value": "\n\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n ]]>\n \n \n \n \n \n \n \n \n \n \n" } ] } +``` + +::: zone-end + +::: zone pivot="windows-11" + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/deviceConfigurations +Content-Type: application/json + +{ "id": "00-0000-0000-0000-000000000000", "displayName": "_MSLearn_Example_Restricted_User_Experience - Assigned Access - Windows 11", "description": "This is a sample policy created from an article on learn.microsoft.com.", "roleScopeTagIds": [ "0" ], "@odata.type": "#microsoft.graph.windows10CustomConfiguration", "omaSettings": [ { "@odata.type": "#microsoft.graph.omaSettingString", "displayName": "AssignedAccess_Configuration", "description": null, "omaUri": "./Vendor/MSFT/AssignedAccess/Configuration", "secretReferenceValueId": null, "isEncrypted": true, "value": "\n\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n" } ] } +``` + +::: zone-end \ No newline at end of file diff --git a/windows/configuration/assigned-access/includes/quickstart-restricted-experience-ps.md b/windows/configuration/assigned-access/includes/quickstart-restricted-experience-ps.md new file mode 100644 index 0000000000..35a15c446f --- /dev/null +++ b/windows/configuration/assigned-access/includes/quickstart-restricted-experience-ps.md @@ -0,0 +1,129 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + +::: zone pivot="windows-10" + +```powershell +$assignedAccessConfiguration = @" + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + ]]> + + + + + + + + + + +"@ + +$namespaceName="root\cimv2\mdm\dmmap" +$className="MDM_AssignedAccess" +$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className +$obj.Configuration = [System.Net.WebUtility]::HtmlEncode($assignedAccessConfiguration) +Set-CimInstance -CimInstance $obj +``` + +::: zone-end + +::: zone pivot="windows-11" + +```powershell +$assignedAccessConfiguration = @" + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +"@ + +$namespaceName="root\cimv2\mdm\dmmap" +$className="MDM_AssignedAccess" +$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className +$obj.Configuration = [System.Net.WebUtility]::HtmlEncode($assignedAccessConfiguration) +Set-CimInstance -CimInstance $obj +``` + +::: zone-end diff --git a/windows/configuration/assigned-access/includes/quickstart-restricted-experience-xml.md b/windows/configuration/assigned-access/includes/quickstart-restricted-experience-xml.md new file mode 100644 index 0000000000..514c6ab44c --- /dev/null +++ b/windows/configuration/assigned-access/includes/quickstart-restricted-experience-xml.md @@ -0,0 +1,113 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + +::: zone pivot="windows-10" + +```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + ]]> + + + + + + + + + + +``` + +::: zone-end + +::: zone pivot="windows-11" + +```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +``` + +::: zone-end diff --git a/windows/configuration/assigned-access/index.md b/windows/configuration/assigned-access/index.md new file mode 100644 index 0000000000..e8f3ecf20b --- /dev/null +++ b/windows/configuration/assigned-access/index.md @@ -0,0 +1,72 @@ +--- +title: Windows kiosks and restricted user experiences +description: Learn about the options available in Windows to configure kiosks and restricted user experiences. +ms.topic: overview +ms.date: 03/04/2024 +--- + +# Windows kiosks and restricted user experiences + +Organizations are constantly seeking ways to streamline operations, improve customer service, and enhance productivity. One effective solution is the deployment of kiosk devices. These specialized devices offer a range of benefits that can significantly impact an organization's efficiency and success. For example: + +- Cost-effective customer service: kiosks allow organizations to provide essential services without the need for dedicated staff. Whether it's checking in at a hotel, ordering food at a restaurant, or printing boarding passes at an airport, kiosks reduce labor costs while maintaining service quality. Customers appreciate the convenience of self-service options, leading to higher satisfaction levels +- Reduced wait times: long queues and wait times frustrate customers and staff members. Kiosks expedite processes by allowing users to complete tasks independently. Whether it's paying bills, renewing memberships, or accessing information, kiosks empower users to get things done swiftly +- Consistent brand experience: kiosks ensure a uniform brand experience across different locations. Whether in retail stores, schools, airports, or healthcare facilities, the interface remains consistent. Brand consistency builds trust and reinforces the organization's image +- Customization and flexibility: kiosks can be tailored to specific needs. From touchscreens to barcode scanners, organizations choose features that align with their goals. Whether it's self-checkout, wayfinding, or interactive product catalogs, kiosks adapt to diverse requirements + +Windows offers two different options for public or specialized use: + +:::row::: + :::column span="1"::: + :::image type="content" source="images/kiosk.png" alt-text="Icon representing a kiosk." border="false"::: + :::column-end::: + :::column span="3"::: + #### Kiosk experience + :::column-end::: +:::row-end::: + +This option runs a single application in full screen, and people using the device can only use that app. When the designated kiosk account signs in, the kiosk app launches automatically. This option is sometimes referred to as *single-app kiosk*. + +Windows offers two different features to configure a kiosk experience: + +- **Assigned Access**: used to execute a single Universal Windows Platform (UWP) app or Microsoft Edge in full screen above the lock screen. When the kiosk account signs in, the kiosk app launches automatically. If the UWP app is closed, it automatically restarts +- **Shell Launcher**: used to configure a device to execute a Windows desktop application as the user interface. The application that you specify replaces the default Windows shell (`Explorer.exe`) that usually runs when a user signs in. This type of single-app kiosk doesn't run above the lock screen + +:::row::: + :::column span="1"::: + :::image type="content" source="images/restricted-user-experience.png" alt-text="Icon representing a restricted user experience." border="false"::: + :::column-end::: + :::column span="3"::: + #### Restricted user experience + :::column-end::: +:::row-end::: + +This option loads the Windows desktop, but it only allows to run a defined set of applications. When the designated user signs in, the user can only run the apps that are allowed. The Start menu is customized to show only the apps that are allowed to execute. With this approach, you can configure a locked-down experience for different account types. This option is sometimes referred to as *multi-app kiosk*. + +To configure a restricted user experience, you use the **Assigned Access** feature. + +## Choose the right experience + +When you're considering a kiosk or restricted user experience, you need to choose the right experience for your needs. A good approach is to ask yourself the following set of questions: + +| | Question | +|--|--| +| **🔲** | *How many apps?*
    The number of apps determines the experience to build: **kiosk** or **restricted user experience**.| +| **🔲** | *Desktop experience or custom?*
    If your users require access to the desktop with a custom Start menu, then you can build a **restricted user experience** with **Assigned Access**. If your users require access to multiple applications but with a custom user interface, then you should use **Shell Launcher**.| +| **🔲** | *In single-app scenario, which type of app will your kiosk run?*
    If the kiosk requires a Universal Windows Platform (UWP) app or Microsoft Edge, you can build a **kiosk experience** with **Assigned Access**. If the kiosk requires a desktop app, you can build a **kiosk experience** with **Shell Launcher**.| +| **🔲** | *Which edition of Windows client will the kiosk run?"*
    **Assigned Access** is supported on Windows Pro and Enterprise/Education. **Shell Launcher** is only supported on Windows Enterprise and Education editions.| + +## Next steps + +In the next sections, you can learn more about the options available to configure kiosks and restricted user experiences: + +- [Assigned Access](overview.md) +- [Shell Launcher](shell-launcher/index.md) + +### :::image type="icon" source="../images/icons/rocket.svg" border="false"::: Quickstarts + +If you're ready to try out the options available to configure kiosks and restricted user experiences, check out the following quickstarts: + +- [Quickstart: configure a kiosk with Assigned Access](quickstart-kiosk.md) +- [Quickstart: configure a kiosk experience with Shell Launcher](shell-launcher/quickstart-kiosk.md) +- [Quickstart: configure a restricted user experience with Assigned Access](quickstart-restricted-user-experience.md) \ No newline at end of file diff --git a/windows/configuration/assigned-access/overview.md b/windows/configuration/assigned-access/overview.md new file mode 100644 index 0000000000..aaac72ceeb --- /dev/null +++ b/windows/configuration/assigned-access/overview.md @@ -0,0 +1,342 @@ +--- +title: What is Assigned Access? +description: Learn about Assigned Access and how you can use it to configure a Windows device as a kiosk or restricted user experience. +ms.date: 03/04/2024 +ms.topic: overview +--- + +# What is Assigned Access? + +Assigned Access is a Windows feature that you can use to configure a device as a kiosk or with a restricted user experience. + +When you configure a **kiosk experience**, a single Universal Windows Platform (UWP) application or Microsoft Edge is executed in full screen, above the lock screen. Users can only use that application. If the kiosk app is closed, it automatically restarts. Practical examples include: + +- Public browsing +- Interactive digital signage + +When you configure a **restricted user experience**, users can only execute a defined list of applications, with a tailored Start menu and Taskbar. Different policy settings and AppLocker rules are enforced, creating a locked down experience. The users can access a familiar Windows desktop, while limiting their access, reducing distractions, and potential for inadvertent uses. Ideal for shared devices, you can create different configurations for different users. Practical examples include: + +- Frontline worker devices +- Student devices +- Lab devices + +> [!NOTE] +> When you configure a restricted user experience, different policy settings are applied to the device. Some policy settings apply to standard users only, and some to administrator accounts too. For more information, see [Assigned Access policy settings](policy-settings.md). + +## Requirements + +Here are the requirements for Assigned Access: + +- To use a kiosk experience, [User account control (UAC)](/windows/security/identity-protection/user-account-control/user-account-control-overview) must be enabled +- To use a kiosk experience, you must sign in from the console. The kiosk experience isn't supported over a remote desktop connection + +[!INCLUDE [assigned-access](../../../includes/licensing/assigned-access.md)] + +## Configure a kiosk experience + +There are several options to configure a kiosk experience. If you need to configure a single device with a local account, you can use: + +- PowerShell: you can use the `Set-AssignedAccess` PowerShell cmdlet to configure a kiosk experience using a local standard account +- Settings: use this option when you need a simple method to configure a single device with a local standard user account + +For advanced customizations, you can use the [Assigned Access CSP](/windows/client-management/mdm/assignedaccess-csp) to configure the kiosk experience. The CSP allows you to configure the kiosk app, the user account, and the kiosk app's behavior. When you use the CSP, you must create an XML configuration file that specifies the kiosk app and the user account. The XML file is applied to the device using one of the following options: + +- A Mobile Device Management (MDM) solution, like Microsoft Intune +- Provisioning packages +- PowerShell, with the MDM Bridge WMI Provider + +To learn how to configure the Shell Launcher XML file, see [Create an Assigned Access configuration file](configuration-file.md). + +[!INCLUDE [tab-intro](../../../includes/configure/tab-intro.md)] + +#### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune) + +You can configure devices using a [custom policy][MEM-1] with the [AssignedAccess CSP][WIN-3]. + +- **Setting:** `./Vendor/MSFT/AssignedAccess/Configuration` +- **Value:** content of the XML configuration file + +Assign the policy to a group that contains as members the devices that you want to configure. + +#### [:::image type="icon" source="../images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) + +[!INCLUDE [provisioning-package-1](../../../includes/configure/provisioning-package-1.md)] + +- **Path:** `AssignedAccess/AssignedAccessSettings` +- **Value:** Enter the account and the application you want to use for Assigned access, using the AUMID of the app. Example: + - `{"Account":"domain\user", "AUMID":"Microsoft.WindowsCalculator_8wekyb3d8bbwe!App"}` + +[!INCLUDE [provisioning-package-2](../../../includes/configure/provisioning-package-2.md)] + +#### [:::image type="icon" source="../images/icons/powershell.svg"::: **PowerShell**](#tab/ps) + +To configure a device using Windows PowerShell: + +1. Sign in as administrator +1. [Create the user account](https://support.microsoft.com/help/4026923/windows-create-a-local-user-or-administrator-account-in-windows-10) for Assigned Access +1. Sign in as the Assigned Access user account +1. Install the required UWP app +1. Sign out as the Assigned Access user account +1. Sign in as administrator and from an elevated PowerShell prompt use one of the following commands: + + ```PowerShell + #Configure Assigned Access by AppUserModelID and user name + Set-AssignedAccess -AppUserModelId -UserName + + #Configure Assigned Access by AppUserModelID and user SID + Set-AssignedAccess -AppUserModelId -UserSID + + #Configure Assigned Access by app name and user name + Set-AssignedAccess -AppName -UserName + + #Configure Assigned Access by app name and user SID**: + Set-AssignedAccess -AppName -UserSID + +> [!NOTE] +> To set up Assigned Access using `-AppName`, the user account that you enter for Assigned Access must have signed in at least once. + +For more information: + +- [Find the Application User Model ID of an installed app](../store/find-aumid.md) +- [Set-AssignedAccess](/powershell/module/assignedaccess/set-assignedaccess) + +To remove assigned access, using PowerShell, run the following cmdlet: + +```powershell +Clear-AssignedAccess +``` + +For advanced customizations that use the XML configuration file, you can use PowerShell scripts via the [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal). + +> [!IMPORTANT] +> For all device settings, the WMI Bridge client must be executed as SYSTEM (LocalSystem) account. + +To test the PowerShell script, you can: + +1. [Download the psexec tool](/sysinternals/downloads/psexec) +1. Open an elevated command prompt and run: `psexec.exe -i -s powershell.exe` +1. Run the script in the PowerShell session + +```PowerShell +$shellLauncherConfiguration = @" + +# content of the XML configuration file + +"@ + +$namespaceName="root\cimv2\mdm\dmmap" +$className="MDM_AssignedAccess" +$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className +$obj.ShellLauncher = [System.Net.WebUtility]::HtmlEncode($shellLauncherConfiguration) +$obj = Set-CimInstance -CimInstance $obj -ErrorVariable cimSetError -ErrorAction SilentlyContinue +if($cimSetError) { + Write-Output "An ERROR occurred. Displaying error record and attempting to retrieve error logs...`n" + Write-Error -ErrorRecord $cimSetError[0] + + $timeout = New-TimeSpan -Seconds 30 + $stopwatch = [System.Diagnostics.Stopwatch]::StartNew() + do{ + $events = Get-WinEvent -FilterHashtable $eventLogFilterHashTable -ErrorAction Ignore + } until ($events.Count -or $stopwatch.Elapsed -gt $timeout) # wait for the log to be available + + if($events.Count) { + $events | ForEach-Object { + Write-Output "$($_.TimeCreated) [$($_.LevelDisplayName.ToUpper())] $($_.Message -replace "`n|`r")" + } + } else { + Write-Warning "Timed-out attempting to retrieve event logs..." + } + + Exit 1 +} + +Write-Output "Successfully applied Shell Launcher configuration" +``` + +[!INCLUDE [powershell-wmi-bridge-2](../../../includes/configure/powershell-wmi-bridge-2.md)] + +#### [:::image type="icon" source="../images/icons/settings.svg"::: **Settings**](#tab/settings) + +Here are the steps to configure a kiosk using the Settings app: + +1. Open the Settings app to view and configure a device as a kiosk. Go to **Settings > Accounts > Other Users**, or use the following shortcut: + + > [!div class="nextstepaction"] + > + > [Other Users](ms-settings:otherusers) + +1. Under **Set up a kiosk**, select **Get Started** +1. In the **Create an account** dialog, enter the account name, and select **Next** + >[!NOTE] + >If there are any local standard user accounts already, the **Create an account** dialog offers the option to **Choose an existing account** + +1. Choose the application to run when the kiosk account signs in. Only apps that can run above the lock screen are available in the list of apps to choose from. If you select **Microsoft Edge** as the kiosk app, you configure the following options: + + - Whether Microsoft Edge should display your website full-screen (digital sign) or with some browser controls available (public browser) + - Which URL should be open when the kiosk accounts signs in + - When Microsoft Edge should restart after a period of inactivity (if you select to run as a public browser) + +1. Select **Close** + +When the device isn't joined to an Active Directory domain or Microsoft Entra ID, automatic sign-in of the kiosk account is configured automatically: + +- If you want the kiosk account to sign in automatically, and the kiosk app launched when the device restarts, then you don't need to do anything +- If you don't want the kiosk account to sign in automatically when the device restarts, then you must change the default setting before you configure the device as a kiosk. Sign in with the account that you want to use as the kiosk account. Open **Settings** > **Accounts** > **Sign-in options**. Set the **Use my sign-in info to automatically finish setting up my device after an update or restart** setting to **Off**. After you change the setting, you can apply the kiosk configuration to the device + +--- + +> [!TIP] +> For practical examples, see the [Quickstart: Configure a kiosk with Assigned Access](quickstart-kiosk.md). + +## Configure a restricted user experience + +To configure a restricted user experience with Assigned Access, you must create an XML configuration file with the settings for the desired experience. The XML file is applied to the device via the [Assigned Access CSP](/windows/client-management/mdm/assignedaccess-csp#shelllauncher), using one of the following options: + +- A Mobile Device Management (MDM) solution, like Microsoft Intune +- Provisioning packages +- PowerShell, with the MDM Bridge WMI Provider + +To learn how to configure the Assigned Access XML file, see [Create an Assigned Access configuration file](configuration-file.md). + +[!INCLUDE [tab-intro](../../../includes/configure/tab-intro.md)] + +#### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune) + +You can configure devices using a [custom policy][MEM-1] with the [AssignedAccess CSP][WIN-3]. + +- **Setting:** `./Vendor/MSFT/AssignedAccess/ShellLauncher` +- **Value:** content of the XML configuration file + +Assign the policy to a group that contains as members the devices that you want to configure. + +#### [:::image type="icon" source="../images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) + +[!INCLUDE [provisioning-package-1](../../../includes/configure/provisioning-package-1.md)] + +- **Path:** `AssignedAccess/MultiAppAssignedAccessSettings` +- **Value:** content of the XML configuration file + +[!INCLUDE [provisioning-package-2](../../../includes/configure/provisioning-package-2.md)] + +#### [:::image type="icon" source="../images/icons/powershell.svg"::: **PowerShell**](#tab/ps) + +[!INCLUDE [powershell-wmi-bridge-1](../../../includes/configure/powershell-wmi-bridge-1.md)] + +```PowerShell +$assignedAccessConfiguration = @" + +# content of the XML configuration file + +"@ + +$namespaceName="root\cimv2\mdm\dmmap" +$className="MDM_AssignedAccess" +$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className +$obj.Configuration = [System.Net.WebUtility]::HtmlEncode($assignedAccessConfiguration) +$obj = Set-CimInstance -CimInstance $obj -ErrorVariable cimSetError -ErrorAction SilentlyContinue +if($cimSetError) { + Write-Output "An ERROR occurred. Displaying error record and attempting to retrieve error logs...`n" + Write-Error -ErrorRecord $cimSetError[0] + + $timeout = New-TimeSpan -Seconds 30 + $stopwatch = [System.Diagnostics.Stopwatch]::StartNew() + do{ + $events = Get-WinEvent -FilterHashtable $eventLogFilterHashTable -ErrorAction Ignore + } until ($events.Count -or $stopwatch.Elapsed -gt $timeout) # wait for the log to be available + + if($events.Count) { + $events | ForEach-Object { + Write-Output "$($_.TimeCreated) [$($_.LevelDisplayName.ToUpper())] $($_.Message -replace "`n|`r")" + } + } else { + Write-Warning "Timed-out attempting to retrieve event logs..." + } + + Exit 1 +} + +Write-Output "Successfully applied Assigned Access configuration" +``` + +[!INCLUDE [powershell-wmi-bridge-2](../../../includes/configure/powershell-wmi-bridge-2.md)] + +#### [:::image type="icon" source="../images/icons/settings.svg"::: **Settings**](#tab/settings) + +This option isn't available using Settings. + +--- + +> [!TIP] +> For practical examples, see the [Quickstart: Configure a restricted user experience with Assigned Access](quickstart-restricted-user-experience.md) + +## User experience + +To validate the kiosk or restricted user experience, sign in with the user account you specified in the configuration file. + +The Assigned Access configuration takes effect the next time the targeted user signs in. If that user account is signed in when you apply the configuration, sign out and sign back in to validate the experience. + +> [!NOTE] +> Starting in Windows 11, a restricted user experience supports the use of multiple monitors. + +### Autotrigger touch keyboard + +The touch keyboard is automatically triggered when there's an input needed and no physical keyboard is attached on touch-enabled devices. You don't need to configure any other setting to enforce this behavior. + +> [!TIP] +> The touch keyboard is triggered only when tapping a textbox. Mouse clicks don't trigger the touch keyboard. If you're testing this feature, use a physical device instead of a virtual machine (VM), as the touch keyboard is not triggered on VMs. + +### Sign out of assigned access + +By default, to exit the kiosk experience, press Ctrl + Alt + Del. The kiosk app exits automatically. If you sign in again as the Assigned Access account, or wait for the sign in screen timeout, the kiosk app relaunches. The default timeout is 30 seconds, but you can change the timeout with the registry key: + +`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI` + +To change the default time for Assigned Access to resume, add *IdleTimeOut* (DWORD) and enter the value data as milliseconds in hexadecimal. + +> [!NOTE] +> `IdleTimeOut` doesn't apply to the Microsoft Edge kiosk mode. + +The Breakout Sequence of Ctrl + Alt + Del is the default, but this sequence can be configured to be a different sequence of keys. The breakout sequence uses the format **modifiers + keys**. An example breakout sequence is CTRL + ALT + A, where CTRL + ALT are the modifiers, and A is the key value. To learn more, see [Create an Assigned Access configuration XML file](configuration-file.md). + +### Keyboard shortcuts + +The following keyboard shortcuts are blocked for the user accounts with Assigned Access: + +| Keyboard shortcut | Action | +|------------------------------------------------------|-----------------------------------------------------------------------------------------------| +| Ctrl + Shift + Esc | Open Task Manager | +| WIN + , (comma) | Temporarily peek at the desktop | +| WIN + A | Open Action center | +| WIN + Alt + D | Display and hide the date and time on the desktop | +| WIN + Ctrl + F | Find computer objects in Active Directory | +| WIN + D | Display and hide the desktop | +| WIN + E | Open File Explorer | +| WIN + F | Open Feedback Hub | +| WIN + G | Open Game bar when a game is open | +| WIN + I | Open Settings | +| WIN + J | Set focus to a Windows tip when one is available | +| WIN + O | Lock device orientation | +| WIN + Q | Open search | +| WIN + R | Open the Run dialog box | +| WIN + S | Open search | +| WIN + Shift + C | Open Cortana in listening mode | +| WIN + X | Open the Quick Link menu | +| LaunchApp1 | Open the app that is assigned to this key | +| LaunchApp2 | Open the app that is assigned to this key. On many Microsoft keyboards, the app is Calculator | +| LaunchMail | Open the default mail client | + +## Remove Assigned Access + +Deleting the restricted user experience removes the policy settings associated with the users, but it can't revert all the configurations. For example, the Start menu configuration is maintained. + +## Next steps + +> [!div class="nextstepaction"] +> Review the recommendations before you deploy Assigned Access: +> +> [Assigned Access recommendations](recommendations.md) + + + +[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 +[WIN-3]: /windows/client-management/mdm/assignedaccess-csp diff --git a/windows/configuration/assigned-access/policy-settings.md b/windows/configuration/assigned-access/policy-settings.md new file mode 100644 index 0000000000..0bf8a93e30 --- /dev/null +++ b/windows/configuration/assigned-access/policy-settings.md @@ -0,0 +1,114 @@ +--- +title: Assigned Access policy settings +description: Learn about the policy settings enforced on a device configured with Assigned Access. +ms.topic: reference +ms.date: 03/04/2024 +--- + +# Assigned Access policy settings + +When the Assigned Access configuration is applied on a device, certain policy settings and AppLocker rules are enforced, impacting the users accessing the device. The policy settings use a combination of configuration service provider (CSP) and group policy (GPO) settings. + +This reference article lists the policy settings and AppLocker rules applied by Assigned Access. + +>[!NOTE] +>It's not recommended to configure policy settings enforced by Assigned Access to different values using other channels. Assigned Access is optimized to provide a locked-down experience. + +## Device policy settings + +The following policy settings are applied at the device level when you deploy a restricted user experience. Any user accessing the device is subject to the policy settings, including administrator accounts: + +| Type | Path | Name/Description | +|---------|----------------------------------------------------------------------------|---------------------------------------------------------------------------| +| **CSP** | `./Vendor/MSFT/Policy/Config/Experience/AllowCortana` | Disable Cortana | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderDocuments` | Disable Start documents icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderDownloads` | Disable Start downloads icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderFileExplorer` | Disable Start file explorer icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderHomeGroup` | Disable Start home group icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderMusic` | Disable Start music icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderNetwork` | Disable Start network icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderPersonalFolder` | Disable Start personal folder icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderPictures` | Disable Start pictures icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderSettings` | Disable Start settings icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/AllowPinnedFolderVideos` | Disable Start videos icon | +| **CSP** | `./Vendor/MSFT/Policy/Config/Start/HideChangeAccountSettings` | Hide *Change account settings* from appearing in the user tile | +| **CSP** | `./Vendor/MSFT/Policy/Config/Update/SetAutoRestartNotificationDisable` | Hides all update notifications | +| **CSP** | `./Vendor/MSFT/Policy/Config/Update/UpdateNotificationLevel` | Disables auto restart notifications for updates | +| **CSP** | `./Vendor/MSFT/Policy/Config/WindowsInkWorkspace/AllowWindowsInkWorkspace` | Access to ink workspace is disabled | +| **CSP** | `./Vendor/MSFT/Policy/Config/WindowsLogon/DontDisplayNetworkSelectionUI` | Hide networks UI on the logon screen, as well as on "security options" UI | + +## User policy settings + +The following policy settings are applied to any nonadministrator account when you deploy a restricted user experience: + +| Type | Path | Name/Description | +|---------|----------------------------------------------------------------------------------|-------------------------------------------------------------------| +| **CSP** | `./User/Vendor/MSFT/Policy/Config/Start/DisableContextMenus` | Disable Context Menu for Start menu apps | +| **CSP** | `./User/Vendor/MSFT/Policy/Config/Start/HidePeopleBar` | Hide People Bar from appearing on taskbar | +| **CSP** | `./User/Vendor/MSFT/Policy/Config/Start/HideRecentlyAddedApps` | Hide recently added apps from appearing on the Start menu | +| **CSP** | `./User/Vendor/MSFT/Policy/Config/Start/HideRecentJumplists` | Hide recent jumplists from appearing on the Start menu/taskbar | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Clear history of recently opened documents on exit | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Disable showing balloon notifications as toast | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Do not allow pinning items in Jump Lists | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Do not allow pinning programs to the Taskbar | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Do not display or track items in Jump Lists from remote locations | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Hide and disable all items on the desktop | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Hide the Task View button | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Lock all taskbar settings | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Lock the Taskbar | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Prevent users from adding or removing toolbars | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Prevent users from customizing their Start Screen | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Prevent users from moving taskbar to another screen dock location | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Prevent users from rearranging toolbars | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Prevent users from resizing the taskbar | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Prevent users from uninstalling applications from Start | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Remove access to the context menus for the task bar | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Remove All Programs list from the Start menu | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Remove Control Center | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Remove frequent programs list from the Start Menu | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Remove Notification and Action Center | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Remove Quick Settings | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Remove Run menu from Start Menu | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Remove the Security and Maintenance icon | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Turn off all balloon notifications | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar | Turn off feature advertisement balloon notifications | +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar\Notifications | Turn off toast notifications | +| **GPO** | User Configuration\Administrative Templates\System\Ctrl+Alt+Del Options | Remove Change Password | +| **GPO** | User Configuration\Administrative Templates\System\Ctrl+Alt+Del Options | Remove Logoff | +| **GPO** | User Configuration\Administrative Templates\System\Ctrl+Alt+Del Options | Remove Task Manager | +| **GPO** | User Configuration\Administrative Templates\Windows Components\File Explorer | Remove *Map network drive* and *Disconnect Network Drive* | +| **GPO** | User Configuration\Administrative Templates\Windows Components\File Explorer | Remove File Explorer's default context menu | + +The following policy settings are applied to the kiosk account when you configure a kiosk experience with Microsoft Edge: + +| Type | Path | Name/Description | +|---------|-----------------------------------------------------------------------------------|--------------------------------------------------------| +| **GPO** | User Configuration\Administrative Templates\Start Menu and Taskbar\Notifications | Run only specified Windows applications > `msedge.exe` | +| **GPO** | User Configuration\Administrative Templates\System | Turn off toast notifications | +| **GPO** | User Configuration\Administrative Templates\Windows Components\Attachment Manager | Default risk level for file attachments > High risk | +| **GPO** | User Configuration\Administrative Templates\Windows Components\Attachment Manager | Inclusion list for low file types > `.pdf;.epub` | +| **GPO** | User Configuration\Administrative Templates\Windows Components\File Explorer | Remove File Explorer's default context menu | + +## AppLocker rules + +When you deploy an Assigned Access restricted user experience, AppLocker rules are generated to allow the apps that are listed in the configuration. Here are the predefined Assigned Access AppLocker rules: + +### Universal Windows Platform (UWP) app rules + +1. The default rule is to allow all users to launch the signed *packaged apps* +1. The packaged app *deny list* is generated at runtime when the Assigned Access user signs in: + 1. Based on the installed apps available for the user account, Assigned Access generates the deny list. The list excludes the default allowed inbox packaged apps, which are critical for the system to function, and then exclude the allowed packages that are defined in the Assigned Access configuration + 1. If there are multiple apps within the same package, all the apps are excluded + +The deny list is used to prevent the user from accessing the apps, which are currently available for the user but not in the allowed list + +> [!NOTE] +> You can't manage AppLocker rules that are generated by the restricted user experience in MMC snap-ins. Avoid creating AppLocker rules that conflict with AppLocker rules generated by Assigned Access. +> +> Assigned access doesn't prevent the organization or users from installing UWP apps. When a new UWP app is installed during an Assigned Access session, the app isn't in the deny list. When the user signs out and signs in again, the installed app is included in the deny list. For apps deployed centrally that you want to allow, like line-of-biness apps, update the Assigned Access configuration and include the apps in the *allow app list*. + +### Desktop app rules + +1. The default rule is to allow all users to launch the desktop programs signed with *Microsoft Certificate* for the system to boot and function. The rule also allows the admin user group to launch all desktop programs. +1. There's a predefined inbox desktop app deny list for the Assigned Access user account, which is updated based on the *desktop app allow list* that you defined in the Assigned Access configuration +1. Enterprise-defined allowed desktop apps are added in the AppLocker allow list diff --git a/windows/configuration/assigned-access/quickstart-kiosk.md b/windows/configuration/assigned-access/quickstart-kiosk.md new file mode 100644 index 0000000000..60839e646e --- /dev/null +++ b/windows/configuration/assigned-access/quickstart-kiosk.md @@ -0,0 +1,104 @@ +--- +title: "Quickstart: configure a kiosk experience with Assigned Access" +description: Learn how to configure a kiosk experience with Assigned Access using the Assigned Access configuration service provider (CSP), Microsoft Intune, PowerShell, or group policy (GPO). +ms.topic: quickstart +ms.date: 03/04/2024 +--- + +# Quickstart: configure a kiosk with Assigned Access + +This quickstart provides practical examples of how to configure a *kiosk experience* on Windows with Assigned Access. The examples describe the steps using the Settings app, a mobile device management solution (MDM) like Microsoft Intune, provisioning packages (PPKG), and PowerShell. While different solutions are used, the configuration settings and results are the same. + +The examples can be modified to fit your specific requirements. For example, you can change the app used, the URL specified when opening Microsoft Edge, or change the name of the user that automatically signs in to Windows. + +## Prerequisites + +>[!div class="checklist"] +>Here's a list of requirements to complete this quickstart: +> +>- A Windows device +>- Microsoft Intune, or a non-Microsoft MDM solution, if you want to configure the settings using MDM +>- Windows Configuration Designer, if you want to configure the settings using a provisioning package +>- Access to the [psexec tool](/sysinternals/downloads/psexec), if you want to test the configuration using Windows PowerShell + +## Configure a kiosk + +[!INCLUDE [tab-intro](../../../includes/configure/tab-intro.md)] + +#### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune) + +> [!TIP] +> Use the following Graph call to automatically create a custom policy in your Microsoft Intune tenant without assignments nor scope tags. +> +> When using this call, authenticate to your tenant in the Graph Explorer window. If it's the first time using Graph Explorer, you may need to authorize the application to access your tenant or to modify the existing permissions. This graph call requires *DeviceManagementConfiguration.ReadWrite.All* permissions. + +[!INCLUDE [quickstart-kiosk-intune](includes/quickstart-kiosk-intune.md)] + +Alternatively, you can configure devices using a [custom policy][MEM-1] with the [AssignedAccess CSP][WIN-3]. + +- **Setting:** `./Vendor/MSFT/AssignedAccess/Configuration` +- **Value:** + +[!INCLUDE [quickstart-kiosk-xml](includes/quickstart-kiosk-xml.md)] + +Assign the policy to a group that contains as members the devices that you want to configure. + +#### [:::image type="icon" source="../images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) + +[!INCLUDE [provisioning-package-1](../../../includes/configure/provisioning-package-1.md)] + +- **Path:** `AssignedAccess/MultiAppAssignedAccessSettings` +- **Value:** + +[!INCLUDE [quickstart-kiosk-xml](includes/quickstart-kiosk-xml.md)] + +[!INCLUDE [provisioning-package-2](../../../includes/configure/provisioning-package-2.md)] + +#### [:::image type="icon" source="../images/icons/powershell.svg"::: **PowerShell**](#tab/ps) + +[!INCLUDE [powershell-wmi-bridge-1](../../../includes/configure/powershell-wmi-bridge-1.md)] + +[!INCLUDE [quickstart-kiosk-ps](includes/quickstart-kiosk-ps.md)] + +[!INCLUDE [powershell-wmi-bridge-2](../../../includes/configure/powershell-wmi-bridge-2.md)] + + + +#### [:::image type="icon" source="../images/icons/settings.svg"::: **Settings**](#tab/settings) + +Here are the steps to configure a kiosk using the Settings app: + +1. Open the Settings app to view and configure a device as a kiosk. Go to **Settings > Accounts > Other Users**, or use the following shortcut: + + > [!div class="nextstepaction"] + > + > [Other Users](ms-settings:otherusers) + +1. Under **Set up a kiosk**, select **Get Started** +1. In the **Create an account** dialog, enter the account name, and select **Next** + >[!NOTE] + >If there are any local standard user accounts already, the **Create an account** dialog offers the option to **Choose an existing account** + +1. Choose the application to run when the kiosk account signs in. Only apps that can run above the lock screen are available in the list of apps to choose from. If you select **Microsoft Edge** as the kiosk app, you configure the following options: + + - Whether Microsoft Edge should display your website full-screen (digital sign) or with some browser controls available (public browser) + - Which URL should be open when the kiosk accounts signs in + - When Microsoft Edge should restart after a period of inactivity (if you select to run as a public browser) + +1. Select **Close** + +--- + +## User experience + +After the settings are applied, reboot the device. A local user account is automatically signed in, opening Microsoft Edge. + +## Next steps + +> [!div class="nextstepaction"] +> Learn more about Assigned Access and how to configure it: +> +> [Assigned Access overview](overview.md) + +[WIN-3]: /windows/client-management/mdm/assignedaccess-csp +[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 diff --git a/windows/configuration/assigned-access/quickstart-restricted-user-experience.md b/windows/configuration/assigned-access/quickstart-restricted-user-experience.md new file mode 100644 index 0000000000..de5573c281 --- /dev/null +++ b/windows/configuration/assigned-access/quickstart-restricted-user-experience.md @@ -0,0 +1,93 @@ +--- +title: "Quickstart: configure a restricted user experience with Assigned Access" +description: Learn how to configure a restricted user experience with Assigned Access using the Assigned Access configuration service provider (CSP), Microsoft Intune, PowerShell, or group policy (GPO). +ms.topic: quickstart +ms.date: 03/04/2024 +appliesto: +zone_pivot_groups: windows-versions-11-10 +--- + +# Quickstart: configure a restricted user experience with Assigned Access + +This quickstart provides practical examples of how to configure a *restricted user experience* on Windows. The examples describe the steps using a mobile device management solution (MDM) like Microsoft Intune, provisioning packages (PPKG), and PowerShell. While different solutions are used, the configuration settings and results are the same. + +The examples can be modified to fit your specific requirements. For example, you can add or remove applications from the list of allowed apps, or change the name of the user that automatically signs in to Windows. + +## Prerequisites + +>[!div class="checklist"] +>Here's a list of requirements to complete this quickstart: +> +>- A Windows device +>- Microsoft Intune, or a non-Microsoft MDM solution, if you want to configure the settings using MDM +>- Windows Configuration Designer, if you want to configure the settings using a provisioning package +>- Access to the [psexec tool](/sysinternals/downloads/psexec), if you want to test the configuration using Windows PowerShell + +## Configure a restricted user experience + +[!INCLUDE [tab-intro](../../../includes/configure/tab-intro.md)] + +#### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune) + +> [!TIP] +> Use the following Graph call to automatically create a custom policy in your Microsoft Intune tenant without assignments nor scope tags. +> +> When using this call, authenticate to your tenant in the Graph Explorer window. If it's the first time using Graph Explorer, you may need to authorize the application to access your tenant or to modify the existing permissions. This graph call requires *DeviceManagementConfiguration.ReadWrite.All* permissions. + +[!INCLUDE [quickstart-restricted-experience-intune.md](includes/quickstart-restricted-experience-intune.md)] + +[!INCLUDE [intune-custom-settings-2](../../../includes/configure/intune-custom-settings-2.md)] + +Alternatively, you can configure devices using a [custom policy][MEM-1] with the [AssignedAccess CSP][WIN-3]. + +- **Setting:** `./Vendor/MSFT/AssignedAccess/Configuration` +- **Value:** + +[!INCLUDE [quickstart-restricted-experience-xml.md](includes/quickstart-restricted-experience-xml.md)] + +#### [:::image type="icon" source="../images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) + +[!INCLUDE [provisioning-package-1](../../../includes/configure/provisioning-package-1.md)] + +- **Path:** `AssignedAccess/MultiAppAssignedAccessSettings` +- **Value:** + +[!INCLUDE [quickstart-restricted-experience-xml.md](includes/quickstart-restricted-experience-xml.md)] + +[!INCLUDE [provisioning-package-2](../../../includes/configure/provisioning-package-2.md)] + +#### [:::image type="icon" source="../images/icons/powershell.svg"::: **PowerShell**](#tab/ps) + +[!INCLUDE [powershell-wmi-bridge-1](../../../includes/configure/powershell-wmi-bridge-1.md)] + +[!INCLUDE [quickstart-restricted-experience-ps.md](includes/quickstart-restricted-experience-ps.md)] + +[!INCLUDE [powershell-wmi-bridge-2](../../../includes/configure/powershell-wmi-bridge-2.md)] + +--- + +## User experience + +After the settings are applied, reboot the device. A local user account is automatically signed in, with access to a limited set of applications, which are pinned to the Start menu. + +::: zone pivot="windows-11" +:::image type="content" source="images/restricted-user-experience-windows-11.png" alt-text="Screenshot of the Windows 11 desktop used for the quickstart." border="false"::: + +::: zone-end + +::: zone pivot="windows-10" +:::image type="content" source="images/restricted-user-experience-windows-10.png" alt-text="Screenshot of the Windows 10 desktop used for the quickstart." border="false"::: + +::: zone-end + +## Next steps + +> [!div class="nextstepaction"] +> Learn more about Assigned Access and how to configure it: +> +> [Assigned Access overview](overview.md) + + + +[WIN-3]: /windows/client-management/mdm/assignedaccess-csp +[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 diff --git a/windows/configuration/assigned-access/recommendations.md b/windows/configuration/assigned-access/recommendations.md new file mode 100644 index 0000000000..a497237d15 --- /dev/null +++ b/windows/configuration/assigned-access/recommendations.md @@ -0,0 +1,169 @@ +--- +title: Assigned Access recommendations +description: Learn about the recommended kiosk and restricted user experience configuration options. +ms.topic: best-practice +ms.date: 03/11/2024 +--- + +# Assigned Access recommendations + +This article contains recommendations for devices configured with Assigned Access and Shell Launcher. Most of the recommendations include both group policy (GPO) and configuration service provider (CSP) settings to help you configure your kiosk devices. + +## Kiosk user account + +For kiosks devices located in public-facing environments, configure as a kiosk account a user account with the least privileges, such as a local, standard user account. Using an Active Directory user or Microsoft Entra user might allow an attacker to gain access to domain resources that are accessible to any domain accounts. When using domain accounts with assigned access, proceed with caution. Consider the domain resources potentially exposed by using a domain account. + +### Automatic sign-in + +Consider enabling *automatic sign-in* for your kiosk device. When the device restarts, from an update or power outage, you can configure the device to sign in with the Assigned Access account automatically. Ensure that policy settings applied to the device don't prevent automatic sign in from working as expected. For example, the policy settings [PreferredAadTenantDomainName](/windows/client-management/mdm/policy-csp-authentication#preferredaadtenantdomainname) prevents automatic sign-in from working. + +You can configure the Assigned Access and Shell Launcher XML files with an account to sign-in automatically. For more information, review the articles: + +- [Create an Assigned Access configuration XML file](configuration-file.md) +- [Create a Shell Launcher configuration file](shell-launcher/configuration-file.md) + +Alternatively, you can edit the Registry to have an account sign in automatically: + +| Path | Name | Type | Value | +|--|--|--|--| +| `HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon` | `AutoAdminLogon` | REG_DWORD | 1 | +| `HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon` | `DefaultUserName` | String | Set value as the account that you want signed in. | +| `HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon` | `DefaultPassword` | String | Set value as the password for the account. | +| `HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon` | `DefaultDomainName` | String | Set value for domain, only for domain accounts. For local accounts, don't add this key. | + +Once automatic sign-in is configured, reboot the device. The account will sign in automatically. + +> [!NOTE] +> If you are using [Custom Logon](/windows-hardware/customize/enterprise/custom-logon) with `HideAutoLogonUI` enabled, you might experience a black screen when the user account password expires. Consider [setting the password to never expire](/windows-hardware/customize/enterprise/troubleshooting-custom-logon#the-device-displays-a-black-screen-when-a-password-expiration-screen-is-displayed). + +## Windows Update + +Configure your kiosk devices so that they're always up to date, without disrupting the user experience. Here are some policy settings to consider, to configure Windows Update for your kiosk devices: + +| Type | Path | Name/Description | +|--|--|--| +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/Update/`[ActiveHoursEnd](/windows/client-management/mdm/policy-csp-update#activehoursend) | Integer value that represents the end of active hours. For example, `22` represents 10PM | +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/Update/`[ActiveHoursStart](/windows/client-management/mdm/policy-csp-update#activehoursstart) | Integer value that represents the start of active hours. For example, `7` represents 7AM | +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/Update/`[AllowAutoUpdate](/windows/client-management/mdm/policy-csp-update#allowautoupdate) | Integer value. Set to `3` - Auto download and schedule the install | +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/Update/`[ScheduledInstallTime](/windows/client-management/mdm/policy-csp-update#scheduledinstalltime) | Integer value. Specify the time for the device to install updates. For example, `23` represents 11PM | +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/Update/`[UpdateNotificationLevel](/windows/client-management/mdm/policy-csp-update#update-updatenotificationlevel) | Integer value. Set to `2`: turn off all notifications, including restart warnings | +| **GPO** | Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience | Display options for update notifications > Set the value to **2 - Turn off all notifications, including restart warnings** | +| **GPO** | Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience\Configure Automatic Updates | **4 - Auto download and schedule the install** > specify an install time that is outside the active hours | +| **GPO** | Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience\Turn off autorestart for updates during active hours | Configure the start and end active hours, during which the kiosk device can't restart due to Windows Update | + +## Power settings + +You might want to prevent the kiosk device from going to sleep, or prevent users to shut down or restart the kiosk. Here are some options to consider: + +| Type | Path | Name/Description | +|--|--|--| +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/ADMX_StartMenu/`[HidePowerOptions](/windows/client-management/mdm/policy-csp-admx-startmenu#hidepoweroptions) | String. Set to `` | +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/`
    [Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn](/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions#shutdown_allowsystemtobeshutdownwithouthavingtologon) | Integer value. Set to `0` | +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/Power/`[DisplayOffTimeoutPluggedIn](/windows/client-management/mdm/policy-csp-power#displayofftimeoutpluggedin) | String. Set to `` | +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/Power/`[SelectPowerButtonActionPluggedIn](/windows/client-management/mdm/policy-csp-power#selectpowerbuttonactionpluggedin) | Integer. Set to `0` | +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/Power/`[SelectSleepButtonActionPluggedIn](/windows/client-management/mdm/policy-csp-power#SelectSleepButtonActionPluggedIn) | Integer. Set to `0` | +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/Power/`[StandbyTimeoutPluggedIn](/windows/client-management/mdm/policy-csp-power#standbytimeoutpluggedin) | String. Set to `` | +| **GPO** | Computer Configuration\Administrative Templates\Start Menu and Taskbar\Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commands | **Enable** | +| **GPO** | Computer Configuration\Administrative Templates\System\Power Management\Button Settings\Select the Power button action | Select the action: **Take no action** | +| **GPO** | Computer Configuration\Administrative Templates\System\Power Management\Button Settings\Select the Sleep button action | Select the action: **Take no action** | +| **GPO** | Computer Configuration\Administrative Templates\System\Power Management\Specify the system sleep timeout | Set the value to **0** seconds. | +| **GPO** | Computer Configuration\Administrative Templates\System\Power Management\Video and Display Settings\Turn off the display | Set the value to **0** seconds. | +| **GPO** | Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Shutdown: Allow system to be shut down without having to log on | **Disabled** | +| **GPO** | Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Shut down the system | Remove the users or groups from this policy. To prevent this policy from affecting a member of the Administrators group, be sure to keep the Administrators group. | + +> [!NOTE] +> You can also disable the power button from the security options screen using a feature called *Custom Logon*. For more information on removing the power button or disabling the physical power button, see [Custom Logon][WHW-1]. + +## Keyboard shortcuts + +The following keyboard shortcuts aren't blocked for any user account that is configured with a restricted user experience: + +- Alt + F4 +- Alt + Tab +- Alt + Shift + Tab +- Ctrl + Alt + Delete + +You can use [Keyboard Filter](/windows-hardware/customize/enterprise/keyboardfilter) to block the key combinations. Keyboard Filter settings apply to other standard accounts. + +### Accessibility shortcuts + +Assigned access doesn't change accessibility settings. Use *Keyboard Filter* to block the following key combinations that open accessibility features: + + | Key combination | Blocked behavior | + | --- | --- | + | Left Alt + Left Shift + Print Screen | Open High Contrast dialog box | + | Left Alt + Left Shift + Num Lock | Open Mouse Keys dialog box | + | WIN + U | Open the Settings app accessibility panel | + +> [!NOTE] +> If Keyboard Filter is turned ON, then some key combinations are blocked automatically without you having to explicitly block them. For more information, see [Keyboard Filter](/windows-hardware/customize/enterprise/keyboardfilter). + +You can also disable the accessibility features and other options on the lock screen with [Custom Logon][WHW-1]. For example, to remove the Accessibility option, use the following registry key: + +| Path | Name | Type | Value | +|--|--|--|--| +| `HKLM\Software\Microsoft\Windows Embedded\EmbeddedLogon\BrandingNeutral` | `BrandingNeutral` | REG_DWORD | 8 | + +## Choose an app for a kiosk experience + +To create a kiosk experience with Assigned Access, you can choose UWP apps or Microsoft Edge. However, some applications might not provide a good user experience when used as a kiosk. + +The following guidelines help you choose an appropriate Windows app for a kiosk experience: + +- Windows apps must be provisioned or installed for the Assigned Access account before they can be selected as the Assigned Access app. [Learn how to provision and install apps](/windows/client-management/mdm/enterprise-app-management#install_your_apps) +- UWP app updates can sometimes change the Application User Model ID (AUMID) of the app. In such scenario, you must update the Assigned Access settings to execute the updated app, because Assigned Access uses the AUMID to determine the app to launch +- The app must be able to run above the lock screen. If the app can't run above the lock screen, it can't be used as a kiosk app +- Some apps can launch other apps. Assigned Access in kiosk mode prevents Windows apps from launching other apps. Avoid selecting Windows apps that are designed to launch other apps as part of their core functionality +- Microsoft Edge includes support for kiosk mode. To learn more, see [Microsoft Edge kiosk mode](/microsoft-edge/deploy/microsoft-edge-kiosk-mode-deploy) +- Don't select Windows apps that might expose information you don't want to show in your kiosk, since kiosk usually means anonymous access and locates in a public setting. For example, an app that has a file picker allows the user to gain access to files and folders on the user's system, avoid selecting these types of apps if they provide unnecessary data access +- Some apps might require more configurations before they can be used appropriately in Assigned Access. For example, Microsoft OneNote requires you to set up a Microsoft account for the Assigned Access user account before OneNote opens +- The kiosk profile is designed for public-facing kiosk devices. Use a local, nonadministrator account. If the device is connected to your organization network, using a domain or Microsoft Entra account could compromise confidential information + +When planning to deploy a kiosk or a restricted user experience, consider the following recommendations: + +- Evaluate all applications that users should use. If applications require user authentication, don't use a local or generic user account. Rather, target the group of users within the Assigned Access configuration file +- A multi-app kiosk is appropriate for devices that are shared by multiple people. When you configure a multi-app kiosk, certain policy settings that affect all nonadministrator users on the device. For a list of these policies, see [Assigned Access policy settings](policy-settings.md) + +### Develop your kiosk app + +Assigned Access uses the *Lock framework*. When an Assigned Access user signs in, the selected kiosk app is launched above the lock screen. The kiosk app is running as an *above lock* screen app. To learn more, see [best practices guidance for developing a kiosk app for assigned access](/windows-hardware/drivers/partnerapps/create-a-kiosk-app-for-assigned-access). + +## Stop errors and recovery options + +When a stop error occurs, Windows displays a blue screen with a stop error code. You can replace the standard screen with a blank screen for OS errors. For more information, see [Configure system failure and recovery options](/troubleshoot/windows-client/performance/configure-system-failure-and-recovery-options). + +## Lock screen notifications + +Consider removing notifications from the lock screen to prevent users from seeing notifications when the device is locked. Here are some options to consider: + +| Type | Path | Name/Description | +|--|--|--| +| **CSP** | `./Device/Vendor/MSFT/Policy/Config/AboveLock/`[AllowToasts](/windows/client-management/mdm/policy-csp-abovelock#abovelock-allowtoasts)| Integer. Set to `0` | +| **GPO** | Computer Configuration\Administrative Templates\System\Logon\Turn off app notifications on the lock screen | **Enabled**| + +## Troubleshooting and logs + +When testing Assigned Access, it can be useful to enable logging to help you troubleshoot issues. Logs can help you identify configuration and runtime issues. You can enable the following log: **Applications and Services Logs** > **Microsoft** > **Windows** > **AssignedAccess** > **Operational**. + +The following registry keys contain the Assigned Access configurations: + +- `HKLM\Software\Microsoft\Windows\AssignedAccessConfiguration` +- `HKLM\Software\Microsoft\Windows\AssignedAccessCsp` + +The following registry key contains the configuration for each user with an Assigned Access policy: + +- `HKCU\SOFTWARE\Microsoft\Windows\AssignedAccessConfiguration` + +For more information about troubleshooting kiosk issues, see [Troubleshoot kiosk mode issues](/troubleshoot/windows-client/shell-experience/kiosk-mode-issues-troubleshooting). + +## Next steps + +> [!div class="nextstepaction"] +> Learn how to create an XML file to configure Assigned Access: +> +> [Create an Assigned Access configuration file](configuration-file.md) + + + +[WHW-1]: /windows-hardware/customize/enterprise/custom-logon +[WHW-2]: /windows-hardware/customize/enterprise/unified-write-filter diff --git a/windows/configuration/assigned-access/shell-launcher/configuration-file.md b/windows/configuration/assigned-access/shell-launcher/configuration-file.md new file mode 100644 index 0000000000..2dba54c2c4 --- /dev/null +++ b/windows/configuration/assigned-access/shell-launcher/configuration-file.md @@ -0,0 +1,291 @@ +--- +title: Create a Shell Launcher configuration file +description: Learn how to create an XML file to configure a device with Shell Launcher. +ms.date: 02/12/2024 +ms.topic: how-to +--- + +# Create a Shell Launcher configuration file + +To configure Shell Launcher, you must create and apply a configuration XML file to your devices. The configuration file must conform to a *schema*, as defined in [Shell Launcher XML Schema Definition (XSD)](xsd.md). + +This article describes how to configure a Shell Launcher configuration file, including practical examples. + +Let's start by looking at the basic structure of the XML file. A Shell Launcher configuration file contains: + +- One or multiple `profiles`. Each `profile` defines: + - the application that replaces the standard Windows shell (`Explorer.exe`), which is executed when a user signs in + - the default action to take when the application exits, and actions when the application exits with a specific return code +- One or multiple `configs`. Each `config` associates a user account to a `profile` + +> [!NOTE] +> A profile has no effect if it's not associated to a user account. + +Here's a basic example of a Shell Launcher configuration file, with one profile and one config: + +```xml + + + + + + + + + + + + + +``` + +## Versioning + +The Shell Launcher configuration XML is versioned. The version is defined in the XML root element, and it's used to determine which schema to use to validate the XML file. The version is also used to determine which features are available for the configuration. Here's a table of the versions, aliases used in the documentation examples, and namespaces: + +| Version | Alias | Namespace | +|-|-|-| +|Windows 10|`V2`|http://schemas.microsoft.com/ShellLauncher/2019/Configuration| +|Windows 10|default|http://schemas.microsoft.com/ShellLauncher/2018/Configuration| + +To authorize a compatible configuration XML that includes version-specific elements and attributes, always include the namespace of the add-on schemas, and decorate the attributes and elements accordingly with the namespace alias. For example, to configure the kiosk application to execute in full screen, use the below example. Note the alias `V2` associated to `http://schemas.microsoft.com/ShellLauncher/2019/Configuration` namespace, and the alias is tagged on the `AppType` and `AllAppsFullScreen` properties inline. + +```xml + + + + + + + + + + + + + + +``` + +Here you can find the [Shell Launcher XML Schema Definitions (XSDs)](xsd.md). + +## Profiles + +A configuration file can contain one or more profiles. Each profile has a unique identifier `Profile Id` and, optionally, a `Name`. For example: + +```xml + + + + + +``` + +> [!TIP] +> The `Profile Id` must be unique within the XML file. You can generate a GUID with the PowerShell cmdlet `New-Guid`. + +You can define a `Defaultprofile` that is used when no other profile is associated to a user account. This ensures that every user using the device uses the same application. Example: + +```xml + + + + + +``` + +### Shell + +Each profile defines a `Shell` element, which contains details about the application to execute. The `Shell` element has the following properties: + +| Property| Description | Details | +|-|-|-| +|`Shell`| Application that is used as a Windows shell. |- For Universal Windows Platform (UWP) apps, you must provide the App User Model ID (AUMID). Learn how to [Find the Application User Model ID of an installed app](../../store/find-aumid.md).
    - For desktop apps, specify the full path of the executable, which can contain system environment variables in the form of `%variableName%`. You can also specify any parameters that the app might require. | +|`V2:AppType`| Defines the type of application. |Allowed values are `Desktop` and `UWP`.| +|`V2:AllAppsFullScreen` | Boolean value that defines if all applications are executed in full screen. |- When set to `True`, Shell Launcher runs every app in full screen, or maximized for desktop apps.
    - When set to `False` or not set, only the custom shell app runs in full screen; other apps launched by the user run in windowed mode.| + +Example: + +```xml + + + + + +``` + +In the next example, the Weather app is executed in full screen. + +```xml + + + + + + + + + + + +``` + +In the next example, Microsoft Edge is executed in full screen, opening a website. The website is reloaded after 2 minutes of inactivity. + +```xml + + + + + +``` + +#### ReturnCodeActions + +Shell Launcher defines four actions to handle app exits. You can customize Shell Launcher and use the actions based on different exit code. Here are the `ReturnCodeActions` enums: + +- `RestartShell` +- `RestartDevice` +- `ShutdownDevice` +- `DoNothing` + +The actions can be used as default action, or mapped to a specific exit code. Refer to [Shell Launcher](/windows-hardware/customize/enterprise/wesl-usersettingsetcustomshell) to learn how to use exit codes with Shell Launcher WMI. + +You can specify at most four custom actions mapping to four exit codes, and one default action for all other exit codes. When an app exits, and if the exit code isn't found in the custom action mapping, or there's no default action defined, nothing happens. For this reason, you should at least define `DefaultAction`. + +Example: + +```xml + + + + + + + + + + + +``` + +## Configs + +Under `Configs`, define one or more user accounts and their association with a profile. + +Individual accounts are specified using ``. + +> [!IMPORTANT] +> Before applying the Shell Launcher configuration, make sure the specified user account is available on the device, otherwise it fails. +> +> For both domain and Microsoft Entra accounts, as long as the device is Active Directory joined or Microsoft Entra joined, the account can be discovered in the domain forest or tenant that the device is joined to. For local accounts, it is required that the account exist before you configure the account for Shell Launcher. + +### Local user + +Local account can be entered as `devicename\user`, `.\user`, or just `user`. + +```xml + + + + +``` + +### Active Directory user + +Domain accounts must be entered using the format `domain\samAccountName`. + +```xml + + + + +``` + +### Microsoft Entra user + +Microsoft Entra accounts must be specified with the format: `AzureAD\{UPN}`. `AzureAD` must be provided *as is*, then follow with the Microsoft Entra user principal name (UPN). + +```xml + + + + +``` + +When the user account signs in, the associated Shell Launcher profile is applied, loading the application specified in the profile. + +### Autologon account + +With ``, Shell Launcher creates and manages a user account to automatically sign in after a device restarts. The account is a local standard user named `Kiosk`. + +Example: + +```xml + + + + + + + + + + + + + + + + + +``` + +## Example + +Here's a complete example of a Shell Launcher configuration file, with two profiles and three configs: + +```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +``` diff --git a/windows/configuration/assigned-access/shell-launcher/includes/quickstart-intune.md b/windows/configuration/assigned-access/shell-launcher/includes/quickstart-intune.md new file mode 100644 index 0000000000..eb3b1a1b04 --- /dev/null +++ b/windows/configuration/assigned-access/shell-launcher/includes/quickstart-intune.md @@ -0,0 +1,13 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + +```msgraph-interactive +POST https://graph.microsoft.com/beta/deviceManagement/deviceConfigurations +Content-Type: application/json + +{ "id": "00-0000-0000-0000-000000000000", "displayName": "_MSLearn_Example_Kiosk - Shell Launcher", "description": "This is a sample policy created from an article on learn.microsoft.com.", "roleScopeTagIds": [ "0" ], "@odata.type": "#microsoft.graph.windows10CustomConfiguration", "omaSettings": [ { "@odata.type": "#microsoft.graph.omaSettingString", "displayName": "ShellLauncher", "description": null, "omaUri": "./Vendor/MSFT/AssignedAccess/ShellLauncher", "secretReferenceValueId": null, "isEncrypted": true, "value": "\n\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n" } ], } +``` diff --git a/windows/configuration/assigned-access/shell-launcher/includes/quickstart-ps.md b/windows/configuration/assigned-access/shell-launcher/includes/quickstart-ps.md new file mode 100644 index 0000000000..c783de00f6 --- /dev/null +++ b/windows/configuration/assigned-access/shell-launcher/includes/quickstart-ps.md @@ -0,0 +1,43 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + +```PowerShell +$shellLauncherConfiguration = @" + + + + + + + + + + + + + + + + + + + + + + + + +"@ + +$namespaceName="root\cimv2\mdm\dmmap" +$className="MDM_AssignedAccess" +$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className +$obj.ShellLauncher = [System.Net.WebUtility]::HtmlEncode($shellLauncherConfiguration) +$obj = Set-CimInstance -CimInstance $obj +``` diff --git a/windows/configuration/assigned-access/shell-launcher/includes/quickstart-xml.md b/windows/configuration/assigned-access/shell-launcher/includes/quickstart-xml.md new file mode 100644 index 0000000000..80e9dd0bb8 --- /dev/null +++ b/windows/configuration/assigned-access/shell-launcher/includes/quickstart-xml.md @@ -0,0 +1,35 @@ +--- +author: paolomatarazzo +ms.author: paoloma +ms.date: 02/05/2024 +ms.topic: include +--- + +```xml + + + + + + + + + + + + + + + + + + + + + + + + +``` \ No newline at end of file diff --git a/windows/configuration/assigned-access/shell-launcher/index.md b/windows/configuration/assigned-access/shell-launcher/index.md new file mode 100644 index 0000000000..d15947fe60 --- /dev/null +++ b/windows/configuration/assigned-access/shell-launcher/index.md @@ -0,0 +1,129 @@ +--- +title: What is Shell Launcher? +description: Learn how to configure devices with Shell Launcher. +ms.date: 02/29/2024 +ms.topic: overview +--- + +# What is Shell Launcher? + +Shell Launcher is a Windows feature that you can use to replace the default Windows Explorer shell (`Explorer.exe`) with a Windows desktop application or a Universal Windows Platform (UWP) app. + +Practical examples include: + +- Public browsing +- Interactive digital signage +- ATMs + +Shell Launcher controls which application the user sees as the shell after sign-in. It doesn't prevent the user from accessing other desktop applications and system components. From a custom shell, you can launch secondary views displayed on multiple monitors, or launch other apps in full screen on user's demand. + +With Shell Launcher, you can use features and methods to control access to other applications or system components. These methods include, but aren't limited to: + +- Configuration Service Provider (CSP): you can use a Mobile Device Management (MDM) solution like Microsoft Intune +- Group policy (GPO) +- [AppLocker](/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview) + +Shell Launcher is part of the [Assigned Access](../overview.md) feature, which allows you to configure kiosks or restricted user experiences. To learn about the differences between Shell Launcher and the other options offered by Assigned Access, see [Windows kiosks and restricted user experiences](../index.md). + +[!INCLUDE [shell-launcher](../../../../includes/licensing/shell-launcher.md)] + +## Limitations + +Here are some limitations to consider when using Shell Launcher: + +- Windows doesn't support setting a custom shell before the out-of-box experience (OOBE). If you do, you can't deploy the resulting image +- Shell Launcher doesn't support a custom shell with an application that launches a different process and exits. For example, you can't specify `write.exe` in Shell Launcher. Shell Launcher launches a custom shell and monitors the process to identify when the custom shell exits. `Write.exe` creates a 32-bit `wordpad.exe` process and exits. Since Shell Launcher isn't aware of the newly created `wordpad.exe` process, Shell Launcher takes action based on the exit code of `Write.exe`, such as restarting the custom shell + +## Configure a device with Shell Launcher + +The configuration of Shell Launcher is done using an XML file. The XML file is applied to the device via the [Assigned Access CSP](/windows/client-management/mdm/assignedaccess-csp#shelllauncher), using one of the following options: + +- A Mobile Device Management (MDM) solution, like Microsoft Intune +- Provisioning packages +- The MDM Bridge WMI Provider + +To learn how to configure the Shell Launcher XML file, see [Create a Shell Launcher configuration file](configuration-file.md). + +[!INCLUDE [tab-intro](../../../../includes/configure/tab-intro.md)] + +#### [:::image type="icon" source="../../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune) + +You can configure devices using a [custom policy][MEM-1] with the [AssignedAccess CSP][WIN-3]. + +- **Setting:** `./Vendor/MSFT/AssignedAccess/ShellLauncher` +- **Value:** content of the XML configuration file + +Assign the policy to a group that contains as members the devices that you want to configure. + +#### [:::image type="icon" source="../../images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) + +[!INCLUDE [provisioning-package-1](../../../../includes/configure/provisioning-package-1.md)] + +- **Path:** `SMISettings/ShellLauncher` +- **Value:** depends on specific settings + +[!INCLUDE [provisioning-package-2](../../../../includes/configure/provisioning-package-2.md)] + +#### [:::image type="icon" source="../../images/icons/powershell.svg"::: **PowerShell**](#tab/ps) + +[!INCLUDE [powershell-wmi-bridge-1](../../../../includes/configure/powershell-wmi-bridge-1.md)] + +```PowerShell +$shellLauncherConfiguration = @" + +# content of the XML configuration file + +"@ + +$namespaceName="root\cimv2\mdm\dmmap" +$className="MDM_AssignedAccess" +$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className +$obj.Configuration = [System.Net.WebUtility]::HtmlEncode($shellLauncherConfiguration) +$obj = Set-CimInstance -CimInstance $obj -ErrorVariable cimSetError -ErrorAction SilentlyContinue +if($cimSetError) { + Write-Output "An ERROR occurred. Displaying error record and attempting to retrieve error logs...`n" + Write-Error -ErrorRecord $cimSetError[0] + + $timeout = New-TimeSpan -Seconds 30 + $stopwatch = [System.Diagnostics.Stopwatch]::StartNew() + do{ + $events = Get-WinEvent -FilterHashtable $eventLogFilterHashTable -ErrorAction Ignore + } until ($events.Count -or $stopwatch.Elapsed -gt $timeout) # wait for the log to be available + + if($events.Count) { + $events | ForEach-Object { + Write-Output "$($_.TimeCreated) [$($_.LevelDisplayName.ToUpper())] $($_.Message -replace "`n|`r")" + } + } else { + Write-Warning "Timed-out attempting to retrieve event logs..." + } + + Exit 1 +} + +Write-Output "Successfully applied Shell Launcher configuration" +``` + +[!INCLUDE [powershell-wmi-bridge-2](../../../../includes/configure/powershell-wmi-bridge-2.md)] + +--- + +> [!TIP] +> For practical examples, see the [Quickstart: configure a kiosk experience with Shell Launcher](quickstart-kiosk.md). + +## User experience + +After the settings are applied, the users that are configured to use Shell Launcher will execute the custom shell after sign-in. + +Depending on your configuration, you can have a user to automatically sign in to the device. + +## Next steps + +> [!div class="nextstepaction"] +> Learn how to configure the Shell Launcher XML file: +> +> [Create a Shell Launcher configuration file](configuration-file.md) + + + +[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 \ No newline at end of file diff --git a/windows/configuration/assigned-access/shell-launcher/quickstart-kiosk.md b/windows/configuration/assigned-access/shell-launcher/quickstart-kiosk.md new file mode 100644 index 0000000000..f217d88363 --- /dev/null +++ b/windows/configuration/assigned-access/shell-launcher/quickstart-kiosk.md @@ -0,0 +1,69 @@ +--- +title: "Quickstart: configure a kiosk experience with Shell Launcher" +description: Learn how to configure a kiosk experience with Shell Launcher, using the Assigned Access configuration service provider (CSP), Microsoft Intune, PowerShell, or group policy (GPO). +ms.topic: quickstart +ms.date: 02/05/2024 +--- + +# Quickstart: configure a kiosk experience with Shell Launcher + +This quickstart provides practical examples of how to configure a *kiosk experience* on Windows with Shell Launcher. The examples describe the steps using a mobile device management solution (MDM) like Microsoft Intune, and PowerShell. While different solutions are used, the configuration settings and results are the same. + +The examples can be modified to fit your specific requirements. For example, you can change the app used, the URL specified when opening Microsoft Edge, or change the name of the user that automatically signs in to Windows. + +## Prerequisites + +>[!div class="checklist"] +>Here's a list of requirements to complete this quickstart: +> +>- A Windows Enterprise or Education device +>- Microsoft Intune, or a non-Microsoft MDM solution, if you want to configure the settings using MDM +>- Access to the [psexec tool](/sysinternals/downloads/psexec), if you want to test the configuration using Windows PowerShell + +## Configure a kiosk device + +[!INCLUDE [tab-intro](../../../../includes/configure/tab-intro.md)] + +#### [:::image type="icon" source="../../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune) + +> [!TIP] +> Use the following Graph call to automatically create a custom policy in your Microsoft Intune tenant without assignments nor scope tags. +> +> When using this call, authenticate to your tenant in the Graph Explorer window. If it's the first time using Graph Explorer, you may need to authorize the application to access your tenant or to modify the existing permissions. This graph call requires *DeviceManagementConfiguration.ReadWrite.All* permissions. + +[!INCLUDE [quickstart-intune](includes/quickstart-intune.md)] + +Assign the policy to a group that contains as members the devices that you want to configure. + +Alternatively, you can configure devices using a [custom policy][MEM-1] with the [AssignedAccess CSP][WIN-3]. + +- **Setting:** `./Vendor/MSFT/AssignedAccess/ShellLauncher` +- **Value:** + +[!INCLUDE [quickstart-xml](includes/quickstart-xml.md)] + +#### [:::image type="icon" source="../../images/icons/powershell.svg"::: **PowerShell**](#tab/ps) + +[!INCLUDE [powershell-wmi-bridge-1](../../../../includes/configure/powershell-wmi-bridge-1.md)] + +[!INCLUDE [quickstart-ps](includes/quickstart-ps.md)] + +[!INCLUDE [powershell-wmi-bridge-2](../../../../includes/configure/powershell-wmi-bridge-2.md)] + +--- + +## User experience + +After the settings are applied, reboot the device. A local user account is automatically signed in, opening Microsoft Edge. + +## Next steps + +> [!div class="nextstepaction"] +> Learn more how to create a Shell Launcher configuration file: +> +> [Create a Shell Launcher configuration file](configuration-file.md) + + + +[WIN-3]: /windows/client-management/mdm/assignedaccess-csp +[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 diff --git a/windows/configuration/assigned-access/shell-launcher/toc.yml b/windows/configuration/assigned-access/shell-launcher/toc.yml new file mode 100644 index 0000000000..047a8acdb9 --- /dev/null +++ b/windows/configuration/assigned-access/shell-launcher/toc.yml @@ -0,0 +1,9 @@ +items: +- name: What is Shell Launcher? + href: index.md +- name: "Quickstart: Configure a kiosk with Shell Launcher" + href: quickstart-kiosk.md +- name: Create a Shell Launcher configuration file + href: configuration-file.md +- name: Shell Launcher XSD + href: xsd.md diff --git a/windows/configuration/assigned-access/shell-launcher/xsd.md b/windows/configuration/assigned-access/shell-launcher/xsd.md new file mode 100644 index 0000000000..ef624ae434 --- /dev/null +++ b/windows/configuration/assigned-access/shell-launcher/xsd.md @@ -0,0 +1,193 @@ +--- +title: Shell Launcher XML Schema Definition (XSD) +description: Shell Launcher XSD reference article. +ms.topic: reference +ms.date: 02/15/2024 +--- + +# Shell Launcher XML Schema Definition (XSD) + +This reference article contains the latest Shell Launcher XML schema definition (XSD) and the XSD additions for each version of Windows. + +## Shell Launcher XSD + +Here's the latest Shell Launcher XSD, introduced in Windows 11: + +```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +``` + +## Windows 10, version 1903 additions + +In Windows 10, version 1903, Shell Launcher introduced the support of both UWP and desktop apps as the custom shell. + +Here's the Shell Launcher XSD for the features added in Windows 10, version 1903: + +```xml + + + + + + + + + + + + + + +``` diff --git a/windows/configuration/assigned-access/toc.yml b/windows/configuration/assigned-access/toc.yml new file mode 100644 index 0000000000..a80a14dd6a --- /dev/null +++ b/windows/configuration/assigned-access/toc.yml @@ -0,0 +1,33 @@ +items: +- name: Overview + href: index.md +- name: Assigned Access + items: + - name: What is Assigned Access? + href: overview.md + - name: Quickstarts + items: + - name: Configure a kiosk with Assigned Access + href: quickstart-kiosk.md + - name: Configure a restricted user experience with Assigned Access + href: quickstart-restricted-user-experience.md + - name: Create an Assigned Access configuration file + href: configuration-file.md + - name: Reference + items: + - name: Assigned Access XSD + href: xsd.md + - name: Assigned Access XML examples + href: examples.md + - name: Assigned Access policy settings + href: policy-settings.md +- name: Shell Launcher + href: shell-launcher/toc.yml +- name: Recommendations + href: recommendations.md +- name: Assigned Access CSP 🔗 + href: /windows/client-management/mdm/assignedaccess-csp +- name: Troubleshoot 🔗 + href: /troubleshoot/windows-client/shell-experience/kiosk-mode-issues-troubleshooting +- name: Configure Microsoft Edge kiosk mode 🔗 + href: /deployedge/microsoft-edge-configure-kiosk-mode \ No newline at end of file diff --git a/windows/configuration/assigned-access/xsd.md b/windows/configuration/assigned-access/xsd.md new file mode 100644 index 0000000000..89519a3862 --- /dev/null +++ b/windows/configuration/assigned-access/xsd.md @@ -0,0 +1,334 @@ +--- +title: Assigned Access XML Schema Definition (XSD) +description: Assigned Access XSD reference article. +ms.topic: reference +ms.date: 02/15/2024 +--- + +# Assigned Access XML Schema Definition (XSD) + +This reference article contains the latest Assigned Access XML schema definition (XSD) and the XSD additions for each version of Windows. + +## Assigned Access XSD + +Here's the latest Assigned Access XSD, introduced in Windows 11: + +```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +``` + +## Windows 11, version 22H2 additions + +Here's the Assigned Access XSD for the features added in Windows 11: + +```xml + + + + + +``` + +## Windows 11, version 21H2 additions + +Here's the Assigned Access XSD for the features added in Windows 10, version 21H2: + +```xml + + + + + + + + + + + + +``` + +## Windows 10, version 1909 additions + +Here's the Assigned Access XSD for the features added in Windows 10, version 1909: + +```xml + + + + + + + + + + + + + + + + + + + + + + +``` + +## Windows 10, version 1809 additions + +Here's the Assigned Access XSD for the features added in Windows 10, version 1809: + +```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +``` \ No newline at end of file diff --git a/windows/configuration/docfx.json b/windows/configuration/docfx.json index 6bb76e2b5c..9cd7b554d8 100644 --- a/windows/configuration/docfx.json +++ b/windows/configuration/docfx.json @@ -43,8 +43,6 @@ "uhfHeaderId": "MSDocsHeader-Windows", "ms.subservice": "itpro-configure", "ms.service": "windows-client", - "ms.author": "paoloma", - "author": "paolomatarazzo", "manager": "aaroncz", "feedback_system": "Standard", "feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332", @@ -77,17 +75,57 @@ "feedback_system": { "ue-v/**/*.*": "None" }, - "author": { - "wcd//**/*.md": "aczechowski", - "wcd//**/*.yml": "aczechowski", + "author":{ + "accessibility//**/*.md": "paolomatarazzo", + "accessibility//**/*.yml": "paolomatarazzo", + "assigned-access//**/*.md": "paolomatarazzo", + "assigned-access//**/*.yml": "paolomatarazzo", + "cellular//**/*.md": "paolomatarazzo", + "cellular//**/*.yml": "paolomatarazzo", + "lock-screen//**/*.md": "paolomatarazzo", + "lock-screen//**/*.yml": "paolomatarazzo", + "provisioning-packages//**/*.md": "vinaypamnani-msft", + "provisioning-packages//**/*.yml": "vinaypamnani-msft", + "shared-pc//**/*.md": "paolomatarazzo", + "shared-pc//**/*.yml": "paolomatarazzo", + "start//**/*.md": "paolomatarazzo", + "start//**/*.yml": "paolomatarazzo", + "store//**/*.md": "paolomatarazzo", + "store//**/*.yml": "paolomatarazzo", + "taskbar//**/*.md": "paolomatarazzo", + "taskbar//**/*.yml": "paolomatarazzo", + "tips//**/*.md": "paolomatarazzo", + "tips//**/*.yml": "paolomatarazzo", "ue-v//**/*.md": "aczechowski", - "ue-v//**/*.yml": "aczechowski" + "ue-v//**/*.yml": "aczechowski", + "wcd//**/*.md": "vinaypamnani-msft", + "wcd//**/*.yml": "vinaypamnani-msft" }, - "ms.author": { - "wcd//**/*.md": "aaroncz", - "wcd//**/*.yml": "aaroncz", + "ms.author":{ + "accessibility//**/*.md": "paoloma", + "accessibility//**/*.yml": "paoloma", + "assigned-access//**/*.md": "paoloma", + "assigned-access//**/*.yml": "paoloma", + "cellular//**/*.md": "paoloma", + "cellular//**/*.yml": "paoloma", + "lock-screen//**/*.md": "paoloma", + "lock-screen//**/*.yml": "paoloma", + "provisioning-packages//**/*.md": "vinpa", + "provisioning-packages//**/*.yml": "vinpa", + "shared-pc//**/*.md": "paoloma", + "shared-pc//**/*.yml": "paoloma", + "start//**/*.md": "paoloma", + "start//**/*.yml": "paoloma", + "store//**/*.md": "paoloma", + "store//**/*.yml": "paoloma", + "taskbar//**/*.md": "paoloma", + "taskbar//**/*.yml": "paoloma", + "tips//**/*.md": "paoloma", + "tips//**/*.yml": "paoloma", "ue-v//**/*.md": "aaroncz", - "ue-v//**/*.yml": "aaroncz" + "ue-v//**/*.yml": "aaroncz", + "wcd//**/*.md": "vinpa", + "wcd//**/*.yml": "vinpa" }, "ms.reviewer": { "kiosk//**/*.md": "sybruckm", diff --git a/windows/configuration/images/icons/explorer.svg b/windows/configuration/images/icons/explorer.svg new file mode 100644 index 0000000000..070605d32b --- /dev/null +++ b/windows/configuration/images/icons/explorer.svg @@ -0,0 +1,88 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/configuration/images/icons/group-policy.svg b/windows/configuration/images/icons/group-policy.svg new file mode 100644 index 0000000000..c9cb511415 --- /dev/null +++ b/windows/configuration/images/icons/group-policy.svg @@ -0,0 +1,9 @@ + + + + + + + + + diff --git a/windows/configuration/images/icons/registry.svg b/windows/configuration/images/icons/registry.svg new file mode 100644 index 0000000000..bc4aa2f534 --- /dev/null +++ b/windows/configuration/images/icons/registry.svg @@ -0,0 +1,9 @@ + + + + + + + + + diff --git a/windows/configuration/images/icons/rocket.svg b/windows/configuration/images/icons/rocket.svg new file mode 100644 index 0000000000..133e0c7daf --- /dev/null +++ b/windows/configuration/images/icons/rocket.svg @@ -0,0 +1,19 @@ + + + + + + + + + + + + + + + + + + + diff --git a/windows/configuration/index.yml b/windows/configuration/index.yml index cf169d04cb..c71df35e46 100644 --- a/windows/configuration/index.yml +++ b/windows/configuration/index.yml @@ -11,7 +11,7 @@ metadata: author: paolomatarazzo ms.author: paoloma manager: aaroncz - ms.date: 02/06/2024 + ms.date: 03/04/2024 # linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new @@ -22,9 +22,9 @@ landingContent: - linkListType: how-to-guide links: - text: Customize the Windows Start menu layout - url: start/customize-start-menu-layout-windows-11.md + url: start/customize-and-export-start-layout.md - text: Customize the Windows taskbar - url: taskbar/customize-taskbar-windows-11.md + url: taskbar/index.md - text: Configure Windows Spotlight on the lock screen url: lock-screen/windows-spotlight.md - text: Accessibility information for IT pros @@ -32,29 +32,51 @@ landingContent: - title: Configure a Windows kiosk linkLists: + - linkListType: concept + links: + - text: What is Assigned Access? + url: assigned-access/overview.md + - text: What is Shell Launcher? + url: assigned-access/shell-launcher/index.md - linkListType: how-to-guide links: - - text: Configure kiosks and digital signs - url: kiosk/kiosk-methods.md - - text: Set up a single-app kiosk - url: kiosk/kiosk-single-app.md - - text: Set up a multi-app kiosk for Windows 11 - url: kiosk/lock-down-windows-11-to-specific-apps.md - - text: Manage multi-user and guest devices - url: shared-devices-concepts.md + - text: Configure kiosks and restricted user experiences + url: assigned-access/index.md + - linkListType: quickstart + links: + - text: Configure a kiosk with Assigned Access + url: assigned-access/quickstart-kiosk.md + - text: Configure a kiosk with Shell Launcher + url: assigned-access/shell-launcher/quickstart-kiosk.md + - text: Configure a restricted user experience with Assigned Access + url: assigned-access/quickstart-restricted-user-experience.md + - linkListType: reference + links: + - text: Assigned Access XML Schema Definition (XSD) + url: assigned-access/xsd.md + - text: Shell Launcher XML Schema Definition (XSD) + url: assigned-access/shell-launcher/xsd.md - title: Configure shared devices linkLists: + - linkListType: concept + links: + - text: Shared devices concepts + url: /windows/configuration/shared-pc/shared-devices-concepts - linkListType: how-to-guide links: - - text: Manage multi-user and guest devices - url: shared-devices-concepts.md + - text: Configure a shared or guest Windows device + url: /windows/configuration/shared-pc/set-up-shared-or-guest-pc + - linkListType: reference + links: + - text: Shared PC technical reference + url: /windows/configuration/shared-pc/shared-pc-technical - title: Use provisioning packages linkLists: - linkListType: how-to-guide links: - - text: Provisioning packages for Windows + - text: Provisioning packages overview url: provisioning-packages/provisioning-packages.md - text: Install Windows Configuration Designer url: provisioning-packages/provisioning-install-icd.md diff --git a/windows/configuration/kiosk/find-the-application-user-model-id-of-an-installed-app.md b/windows/configuration/kiosk/find-the-application-user-model-id-of-an-installed-app.md deleted file mode 100644 index 862316c47b..0000000000 --- a/windows/configuration/kiosk/find-the-application-user-model-id-of-an-installed-app.md +++ /dev/null @@ -1,143 +0,0 @@ ---- -title: Find the Application User Model ID of an installed app -description: To configure assigned access (kiosk mode), you need the Application User Model ID (AUMID) of apps installed on a device. -ms.topic: article -ms.date: 12/31/2017 ---- - -# Find the Application User Model ID of an installed app - -To configure assigned access (kiosk mode), you need the Application User Model ID (AUMID) of apps installed on a device. You can find the AUMID by using Windows PowerShell, File Explorer, or the registry. - -## To find the AUMID by using Windows PowerShell - -To get the names and AUMIDs for all apps installed for the current user, open a Windows PowerShell command prompt and enter the following command: - -```powershell -Get-StartApps -``` - -To get the names and AUMIDs for Windows Store apps installed for another user, open a Windows PowerShell command prompt and enter the following commands: - -```powershell -$installedapps = Get-AppxPackage - -$aumidList = @() -foreach ($app in $installedapps) -{ - foreach ($id in (Get-AppxPackageManifest $app).package.applications.application.id) - { - $aumidList += $app.packagefamilyname + "!" + $id - } -} - -$aumidList -``` - -You can add the `-user ` or the `-allusers` parameters to the **Get-AppxPackage** cmdlet to list AUMIDs for other users. You must use an elevated Windows PowerShell prompt to use the `-user` or -`allusers` parameters. - -## To find the AUMID by using File Explorer - -To get the names and AUMIDs for all apps installed for the current user, perform the following steps: - -1. Open **Run**, enter **shell:Appsfolder**, and select **OK**. -1. A File Explorer window opens. Press **Alt** > **View** > **Choose details**. -1. In the **Choose Details** window, select **AppUserModelId**, and then select **OK**. (You might need to change the **View** setting from **Tiles** to **Details**.) - -![Image of the Choose Details options.](images/aumid-file-explorer.png) - -## To find the AUMID of an installed app for the current user by using the registry - -Querying the registry can only return information about Microsoft Store apps that are installed for the current user, while the Windows PowerShell query can find information for any account on the device. - -At a command prompt, type the following command: - -```cmd -reg query HKEY_CURRENT_USER\Software\Classes\ActivatableClasses\Package /s /f AppUserModelID | find "REG_SZ" -``` - -### Example to get AUMIDs of the installed apps for the specified user - -The following code sample creates a function in Windows PowerShell that returns an array of AUMIDs of the installed apps for the specified user. - -```powershell -function listAumids( $userAccount ) { - - if ($userAccount -eq "allusers") - { - # Find installed packages for all accounts. Must be run as an administrator in order to use this option. - $installedapps = Get-AppxPackage -allusers - } - elseif ($userAccount) - { - # Find installed packages for the specified account. Must be run as an administrator in order to use this option. - $installedapps = Get-AppxPackage -user $userAccount - } - else - { - # Find installed packages for the current account. - $installedapps = Get-AppxPackage - } - - $aumidList = @() - foreach ($app in $installedapps) - { - foreach ($id in (Get-AppxPackageManifest $app).package.applications.application.id) - { - $aumidList += $app.packagefamilyname + "!" + $id - } - } - - return $aumidList -} -``` - -The following Windows PowerShell commands demonstrate how you can call the listAumids function after you've created it. - -```powershell -# Get a list of AUMIDs for the current account: -listAumids - -# Get a list of AUMIDs for an account named "CustomerAccount": -listAumids("CustomerAccount") - -# Get a list of AUMIDs for all accounts on the device: -listAumids("allusers") -``` - -### Example to get the AUMID of any application in the Start menu - -The following code sample creates a function in Windows PowerShell that returns the AUMID of any application currently listed in the Start menu. - -```powershell -function Get-AppAUMID { -param ( -[string]$AppName -) -$Apps = (New-Object -ComObject Shell.Application).NameSpace('shell:::{4234d49b-0245-4df3-b780-3893943456e1}').Items() -if ($AppName){ - $Result = $Apps | Where-Object { $_.name -like "*$AppName*" } | Select-Object name,@{n="AUMID";e={$_.path}} - if ($Result){ - Return $Result - } - else {"Unable to locate {0}" -f $AppName} -} -else { - $Result = $Apps | Select-Object name,@{n="AUMID";e={$_.path}} - Return $Result -} -} -``` - -The following Windows PowerShell commands demonstrate how you can call the Get-AppAUMID function after you've created it. - -```powershell -# Get the AUMID for OneDrive -Get-AppAUMID -AppName OneDrive - -# Get the AUMID for Microsoft Word -Get-AppAUMID -AppName Word - -# List all apps and their AUMID in the Start menu -Get-AppAUMID -``` diff --git a/windows/configuration/kiosk/guidelines-for-assigned-access-app.md b/windows/configuration/kiosk/guidelines-for-assigned-access-app.md deleted file mode 100644 index 4ed078e5e1..0000000000 --- a/windows/configuration/kiosk/guidelines-for-assigned-access-app.md +++ /dev/null @@ -1,146 +0,0 @@ ---- -title: Guidelines for choosing an app for assigned access -description: The following guidelines may help you choose an appropriate Windows app for your assigned access experience. -ms.topic: article -ms.date: 12/31/2017 ---- - -# Guidelines for choosing an app for assigned access (kiosk mode) - -Use assigned access to restrict users to use only one application, so that the device acts like a kiosk. Administrators can use assigned access to restrict a selected user account to access a single Windows app. You can choose almost any Windows app for assigned access; however, some apps may not provide a good user experience. - -The following guidelines may help you choose an appropriate Windows app for your assigned access experience. - -## General guidelines - -- Windows apps must be provisioned or installed for the assigned access account before they can be selected as the assigned access app. [Learn how to provision and install apps](/windows/client-management/mdm/enterprise-app-management#install_your_apps). -- Updating a Windows app can sometimes change the Application User Model ID (AUMID) of the app. If this change happens, you must update the assigned access settings to launch the updated app, because assigned access uses the AUMID to determine which app to launch. -- Apps that are generated using the [Desktop App Converter (Desktop Bridge)](/windows/uwp/porting/desktop-to-uwp-run-desktop-app-converter) can't be used as kiosk apps. - -## Guidelines for Windows apps that launch other apps - -Some apps can launch other apps. Assigned access prevents Windows apps from launching other apps. - -Avoid selecting Windows apps that are designed to launch other apps as part of their core functionality. - -## Guidelines for web browsers - -Microsoft Edge includes support for kiosk mode. [Learn how to deploy Microsoft Edge kiosk mode.](/microsoft-edge/deploy/microsoft-edge-kiosk-mode-deploy) - -In Windows client, you can install the **Kiosk Browser** app from Microsoft to use as your kiosk app. For digital signage scenarios, you can configure **Kiosk Browser** to navigate to a URL and show only that content -- no navigation buttons, no address bar, etc. For kiosk scenarios, you can configure more settings, such as allowed and blocked URLs, navigation buttons, and end session buttons. For example, you could configure your kiosk to show the online catalog for your store, where customers can navigate between departments and items, but aren't allowed to go to a competitor's website. - ->[!NOTE] ->Kiosk Browser supports a single tab. If a website has links that open a new tab, those links will not work with Kiosk Browser. Kiosk Browser does not support .pdfs. -> ->Kiosk Browser can't access intranet websites. - -**Kiosk Browser** must be downloaded for offline licensing using Microsoft Store For Business. You can deploy **Kiosk Browser** to devices running Windows 10, version 1803 (Pro, Business, Enterprise, and Education) and Windows 11. - -1. [Get **Kiosk Browser** in Microsoft Store for Business with offline license type.](/microsoft-store/acquire-apps-microsoft-store-for-business#acquire-apps) -1. [Deploy **Kiosk Browser** to kiosk devices.](/microsoft-store/distribute-offline-apps) -1. Configure policies using settings from the Policy Configuration Service Provider (CSP) for [KioskBrowser](/windows/client-management/mdm/policy-csp-kioskbrowser). These settings can be configured using your MDM service provider, or [in a provisioning package](../provisioning-packages/provisioning-create-package.md). In Windows Configuration Designer, the settings are located in **Policies > KioskBrowser** when you select advanced provisioning for Windows desktop editions. - ->[!NOTE] ->If you configure the kiosk using a provisioning package, you must apply the provisioning package after the device completes the out-of-box experience (OOBE). - -### Kiosk Browser settings - -| Kiosk Browser settings | Use this setting to | -|--|--| -| Blocked URL Exceptions | Specify URLs that people can navigate to, even though the URL is in your blocked URL list. You can use wildcards.

    For example, if you want people to be limited to `http://contoso.com` only, you would add `.contoso.com` to blocked URL exception list and then block all other URLs. | -| Blocked URLs | Specify URLs that people can't navigate to. You can use wildcards.

    If you want to limit people to a specific site, add `https://*` to the blocked URL list, and then specify the site to be allowed in the blocked URL exceptions list. | -| Default URL | Specify the URL that Kiosk Browser will open with. **Tip!** Make sure your blocked URLs don't include your default URL. | -| Enable End Session Button | Show a button in Kiosk Browser that people can use to reset the browser. End Session will clear all browsing data and navigate back to the default URL. | -| Enable Home Button | Show a Home button in Kiosk Browser. Home will return the browser to the default URL. | -| Enable Navigation Buttons | Show forward and back buttons in Kiosk Browser. | -| Restart on Idle Time | Specify when Kiosk Browser should restart in a fresh state after an amount of idle time since the last user interaction. | - -To configure multiple URLs for **Blocked URL Exceptions** or **Blocked URLs** in Windows Configuration Designer: - -1. Create the provisioning package. When ready to export, close the project in Windows Configuration Designer -1. Open the customizations.xml file in the project folder (e.g C:\Users\name\Documents\Windows Imaging and Configuration Designer (WICD)\Project_18) -1. Insert the null character string in between each URL (e.g www.bing.com``www.contoso.com) -1. Save the XML file -1. Open the project again in Windows Configuration Designer -1. Export the package. Ensure you do not revisit the created policies under Kiosk Browser or else the null character will be removed - -> [!TIP] -> -> To enable the **End Session** button for Kiosk Browser in Intune, you must [create a custom OMA-URI policy](/intune/custom-settings-windows-10) with the following information: -> -> - OMA-URI: ./Vendor/MSFT/Policy/Config/KioskBrowser/EnableEndSessionButton -> - Data type: Integer -> - Value: 1 - -#### Rules for URLs in Kiosk Browser settings - -Kiosk Browser filtering rules are based on the [Chromium Project](https://www.chromium.org/Home). - -URLs can include: - -- A valid port value from 1 to 65,535. -- The path to the resource. -- Query parameters. - -More guidelines for URLs: - -- If a period precedes the host, the policy filters exact host matches only -- You can't use user:pass fields -- When both blocked URL and blocked URL exceptions apply with the same path length, the exception takes precedence -- The policy searches wildcards (*) last -- The optional query is a set of key-value and key-only tokens delimited by '&' -- Key-value tokens are separated by '=' -- A query token can optionally end with a '*' to indicate prefix match. Token order is ignored during matching - -### Examples of blocked URLs and exceptions - -The following table describes the results for different combinations of blocked URLs and blocked URL exceptions. - -| Blocked URL rule | Block URL exception rule | Result | -|--|--|--| -| `*` | `contoso.com`
    `fabrikam.com` | All requests are blocked unless it's to contoso.com, fabrikam.com, or any of their subdomains. | -| `contoso.com` | `mail.contoso.com`
    `.contoso.com`
    `.www.contoso.com` | Block all requests to contoso.com, except for the main page and its mail subdomain. | -| `youtube.com` | `youtube.com/watch?v=v1`
    `youtube.com/watch?v=v2` | Blocks all access to youtube.com except for the specified videos (v1 and v2). | - -The following table gives examples for blocked URLs. - -| Entry | Result | -|--|--| -| `contoso.com` | Blocks all requests to contoso.com, www.contoso.com, and sub.www.contoso.com | -| `https://*` | Blocks all HTTPS requests to any domain. | -| `mail.contoso.com` | Blocks requests to mail.contoso.com but not to www.contoso.com or contoso.com | -| `.contoso.com` | Blocks contoso.com but not its subdomains, like subdomain.contoso.com. | -| `.www.contoso.com` | Blocks www.contoso.com but not its subdomains. | -| `*` | Blocks all requests except for URLs in the Blocked URL Exceptions list. | -| `*:8080` | Blocks all requests to port 8080. | -| `contoso.com/stuff` | Blocks all requests to contoso.com/stuff and its subdomains. | -| `192.168.1.2` | Blocks requests to 192.168.1.1. | -| `youtube.com/watch?v=V1` | Blocks YouTube video with id V1. | - -### Other browsers - -You can create your own web browser Windows app by using the WebView class. Learn more about developing your own web browser app: - -- [Creating your own browser with HTML and JavaScript](https://blogs.windows.com/msedgedev/2015/08/27/creating-your-own-browser-with-html-and-javascript/) -- [WebView class](/uwp/api/Windows.UI.Xaml.Controls.WebView) -- [A web browser built with JavaScript as a Windows app](https://github.com/MicrosoftEdge/JSBrowser/tree/v1.0) - -## Secure your information - -Avoid selecting Windows apps that may expose the information you don't want to show in your kiosk, since kiosk usually means anonymous access and locates in a public setting like a shopping mall. For example, an app that has a file picker allows the user to gain access to files and folders on the user's system, avoid selecting these types of apps if they provide unnecessary data access. - -## App configuration - -Some apps may require more configurations before they can be used appropriately in assigned access. For example, Microsoft OneNote requires you to set up a Microsoft account for the assigned access user account before OneNote will open in assigned access. - -Check the guidelines published by your selected app and set up accordingly. - -## Develop your kiosk app - -Assigned access in Windows client uses the new lock framework. When an assigned access user signs in, the selected kiosk app is launched above the lock screen. The kiosk app is running as an above lock screen app. - -Follow the [best practices guidance for developing a kiosk app for assigned access](/windows-hardware/drivers/partnerapps/create-a-kiosk-app-for-assigned-access). - -## Test your assigned access experience - -The above guidelines may help you select or develop an appropriate Windows app for your assigned access experience. Once you've selected your app, we recommend that you thoroughly test the assigned access experience to ensure that your device provides a good customer experience. diff --git a/windows/configuration/kiosk/images/account-management-details.PNG b/windows/configuration/kiosk/images/account-management-details.PNG deleted file mode 100644 index e4307d8f7b..0000000000 Binary files a/windows/configuration/kiosk/images/account-management-details.PNG and /dev/null differ diff --git a/windows/configuration/kiosk/images/add-applications-details.PNG b/windows/configuration/kiosk/images/add-applications-details.PNG deleted file mode 100644 index 2efd3483ae..0000000000 Binary files a/windows/configuration/kiosk/images/add-applications-details.PNG and /dev/null differ diff --git a/windows/configuration/kiosk/images/add-certificates-details.PNG b/windows/configuration/kiosk/images/add-certificates-details.PNG deleted file mode 100644 index 78cd783282..0000000000 Binary files a/windows/configuration/kiosk/images/add-certificates-details.PNG and /dev/null differ diff --git a/windows/configuration/kiosk/images/apprule.png b/windows/configuration/kiosk/images/apprule.png deleted file mode 100644 index ec5417849a..0000000000 Binary files a/windows/configuration/kiosk/images/apprule.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/appwarning.png b/windows/configuration/kiosk/images/appwarning.png deleted file mode 100644 index 877d8afebd..0000000000 Binary files a/windows/configuration/kiosk/images/appwarning.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/aumid-file-explorer.png b/windows/configuration/kiosk/images/aumid-file-explorer.png deleted file mode 100644 index 87bc7166a3..0000000000 Binary files a/windows/configuration/kiosk/images/aumid-file-explorer.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/auto-signin.png b/windows/configuration/kiosk/images/auto-signin.png deleted file mode 100644 index 260376199e..0000000000 Binary files a/windows/configuration/kiosk/images/auto-signin.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/enable-assigned-access-log.png b/windows/configuration/kiosk/images/enable-assigned-access-log.png deleted file mode 100644 index d16f04c43a..0000000000 Binary files a/windows/configuration/kiosk/images/enable-assigned-access-log.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/finish-details.png b/windows/configuration/kiosk/images/finish-details.png deleted file mode 100644 index 727efac696..0000000000 Binary files a/windows/configuration/kiosk/images/finish-details.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/genrule.png b/windows/configuration/kiosk/images/genrule.png deleted file mode 100644 index 1d68f1ad0b..0000000000 Binary files a/windows/configuration/kiosk/images/genrule.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/kiosk-account-details.PNG b/windows/configuration/kiosk/images/kiosk-account-details.PNG deleted file mode 100644 index 53c31880ea..0000000000 Binary files a/windows/configuration/kiosk/images/kiosk-account-details.PNG and /dev/null differ diff --git a/windows/configuration/kiosk/images/kiosk-common-details.PNG b/windows/configuration/kiosk/images/kiosk-common-details.PNG deleted file mode 100644 index 5eda9b293e..0000000000 Binary files a/windows/configuration/kiosk/images/kiosk-common-details.PNG and /dev/null differ diff --git a/windows/configuration/kiosk/images/kiosk-fullscreen-sm.png b/windows/configuration/kiosk/images/kiosk-fullscreen-sm.png deleted file mode 100644 index b096d6837d..0000000000 Binary files a/windows/configuration/kiosk/images/kiosk-fullscreen-sm.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/kiosk-settings.PNG b/windows/configuration/kiosk/images/kiosk-settings.PNG deleted file mode 100644 index 51a4338371..0000000000 Binary files a/windows/configuration/kiosk/images/kiosk-settings.PNG and /dev/null differ diff --git a/windows/configuration/kiosk/images/kiosk-wizard.png b/windows/configuration/kiosk/images/kiosk-wizard.png deleted file mode 100644 index 160e170e5c..0000000000 Binary files a/windows/configuration/kiosk/images/kiosk-wizard.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/lockdownapps.png b/windows/configuration/kiosk/images/lockdownapps.png deleted file mode 100644 index beb73e5370..0000000000 Binary files a/windows/configuration/kiosk/images/lockdownapps.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/multiappassignedaccesssettings.png b/windows/configuration/kiosk/images/multiappassignedaccesssettings.png deleted file mode 100644 index 86e2e0a451..0000000000 Binary files a/windows/configuration/kiosk/images/multiappassignedaccesssettings.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/profile-config.png b/windows/configuration/kiosk/images/profile-config.png deleted file mode 100644 index 24a4dad4ab..0000000000 Binary files a/windows/configuration/kiosk/images/profile-config.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/sample-start.png b/windows/configuration/kiosk/images/sample-start.png deleted file mode 100644 index 8ef9cc928c..0000000000 Binary files a/windows/configuration/kiosk/images/sample-start.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/set-assignedaccess.png b/windows/configuration/kiosk/images/set-assignedaccess.png deleted file mode 100644 index c2899361eb..0000000000 Binary files a/windows/configuration/kiosk/images/set-assignedaccess.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/set-up-device-details.PNG b/windows/configuration/kiosk/images/set-up-device-details.PNG deleted file mode 100644 index 031dac6fe6..0000000000 Binary files a/windows/configuration/kiosk/images/set-up-device-details.PNG and /dev/null differ diff --git a/windows/configuration/kiosk/images/set-up-network-details.PNG b/windows/configuration/kiosk/images/set-up-network-details.PNG deleted file mode 100644 index 778b8497c4..0000000000 Binary files a/windows/configuration/kiosk/images/set-up-network-details.PNG and /dev/null differ diff --git a/windows/configuration/kiosk/images/slv2-oma-uri.png b/windows/configuration/kiosk/images/slv2-oma-uri.png deleted file mode 100644 index 98ee252b63..0000000000 Binary files a/windows/configuration/kiosk/images/slv2-oma-uri.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/vm-kiosk-connect.png b/windows/configuration/kiosk/images/vm-kiosk-connect.png deleted file mode 100644 index 2febd9d573..0000000000 Binary files a/windows/configuration/kiosk/images/vm-kiosk-connect.png and /dev/null differ diff --git a/windows/configuration/kiosk/images/vm-kiosk.png b/windows/configuration/kiosk/images/vm-kiosk.png deleted file mode 100644 index 59f01c1348..0000000000 Binary files a/windows/configuration/kiosk/images/vm-kiosk.png and /dev/null differ diff --git a/windows/configuration/kiosk/kiosk-additional-reference.md b/windows/configuration/kiosk/kiosk-additional-reference.md deleted file mode 100644 index d652bf9874..0000000000 --- a/windows/configuration/kiosk/kiosk-additional-reference.md +++ /dev/null @@ -1,22 +0,0 @@ ---- -title: More kiosk methods and reference information -description: Find more information for configuring, validating, and troubleshooting kiosk configuration. -ms.topic: reference -ms.date: 12/31/2017 ---- - -# More kiosk methods and reference information - -## In this section - -| Topic | Description | -|--|--| -| [Find the Application User Model ID of an installed app](find-the-application-user-model-id-of-an-installed-app.md) | This topic explains how to get the AUMID for an app. | -| [Validate your kiosk configuration](kiosk-validate.md) | This topic explains what to expect on a multi-app kiosk. | -| [Guidelines for choosing an app for assigned access (kiosk mode)](guidelines-for-assigned-access-app.md) | These guidelines will help you choose an appropriate Windows app for your assigned access experience. | -| [Policies enforced on kiosk devices](kiosk-policies.md) | Learn about the policies enforced on a device when you configure it as a kiosk. | -| [Assigned access XML reference](kiosk-xml.md) | The XML and XSD for kiosk device configuration. | -| [Use AppLocker to create a Windows client kiosk](lock-down-windows-10-applocker.md) | Learn how to use AppLocker to configure a Windows client kiosk device running Enterprise or Education so that users can only run a few specific apps. | -| [Use Shell Launcher to create a Windows client kiosk](kiosk-shelllauncher.md) | Using Shell Launcher, you can configure a kiosk device that runs a Windows application as the user interface. | -| [Use MDM Bridge WMI Provider to create a Windows client kiosk](kiosk-mdm-bridge.md) | Environments that use Windows Management Instrumentation (WMI) can use the MDM Bridge WMI Provider to configure the MDM_AssignedAccess class. | -| [Troubleshoot kiosk mode issues](/troubleshoot/windows-client/shell-experience/kiosk-mode-issues-troubleshooting) | Tips for troubleshooting multi-app kiosk configuration. | diff --git a/windows/configuration/kiosk/kiosk-mdm-bridge.md b/windows/configuration/kiosk/kiosk-mdm-bridge.md deleted file mode 100644 index 7725923709..0000000000 --- a/windows/configuration/kiosk/kiosk-mdm-bridge.md +++ /dev/null @@ -1,143 +0,0 @@ ---- -title: Use MDM Bridge WMI Provider to create a Windows kiosk -description: Environments that use Windows Management Instrumentation (WMI) can use the MDM Bridge WMI Provider to configure the MDM_AssignedAccess class. -ms.topic: article -ms.date: 1/26/2024 -zone_pivot_groups: windows-versions-11-10 -appliesto: ---- - -# Use MDM Bridge WMI Provider to create a Windows client kiosk - -Environments that use [Windows Management Instrumentation (WMI)](/windows/win32/wmisdk/wmi-start-page) can use the [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal) to configure the MDM_AssignedAccess class. For more information about using a PowerShell script to configure AssignedAccess, see [PowerShell Scripting with WMI Bridge Provider](/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider). - -Here's an example to set AssignedAccess configuration: - -1. [Download PsTools][PSTools] -1. Open an elevated command prompt and run: `psexec.exe -i -s powershell.exe` -1. In the PowerShell session launched by `psexec.exe`, execute the following script: - -::: zone pivot="windows-10" - -```PowerShell -$nameSpaceName="root\cimv2\mdm\dmmap" -$className="MDM_AssignedAccess" -$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className -Add-Type -AssemblyName System.Web - -$obj.Configuration = [System.Web.HttpUtility]::HtmlEncode(@" - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - MultiAppKioskUser - - - - -"@) - -Set-CimInstance -CimInstance $obj -``` - -::: zone-end - -::: zone pivot="windows-11" - - ```PowerShell -$nameSpaceName="root\cimv2\mdm\dmmap" -$className="MDM_AssignedAccess" -$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className -Add-Type -AssemblyName System.Web - -$obj.Configuration = [System.Web.HttpUtility]::HtmlEncode(@" - - - - - - - - - - - - - - - - - - - - - - - MultiAppKioskUser - - - - -"@) - -Set-CimInstance -CimInstance $obj -``` - -::: zone-end - -For more information, see [Using PowerShell scripting with the WMI Bridge Provider][WIN-1]. - - - -[WIN-1]: /windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider -[PsTools]: https://download.sysinternals.com/files/PSTools.zip diff --git a/windows/configuration/kiosk/kiosk-methods.md b/windows/configuration/kiosk/kiosk-methods.md deleted file mode 100644 index 6db61a28ec..0000000000 --- a/windows/configuration/kiosk/kiosk-methods.md +++ /dev/null @@ -1,76 +0,0 @@ ---- -title: Configure kiosks and digital signs on Windows 10/11 desktop editions -description: In this article, learn about the methods for configuring kiosks and digital signs on Windows 10 or Windows 11 desktop editions. -ms.topic: article -ms.date: 12/31/2017 ---- - -# Configure kiosks and digital signs on Windows desktop editions - -Organization may want to set up special purpose devices, such as a device in the lobby that customers can use to view product catalogs, or a device displaying visual content as a digital sign. Windows client offers two different locked-down experiences for public or specialized use: - -- Single-app kiosk: runs a single Universal Windows Platform (UWP) application in full screen above the lock screen. People using the kiosk can see only that app. When the kiosk account (a local standard user account) signs in, the kiosk app launches automatically. If the kiosk app is closed, it will automatically restart -- Multi-app kiosk: runs one or more applications from the desktop. People using the kiosk see a customized Start menu that shows only the apps that are allowed to execute. With this approach, you can configure a locked-down experience for different account types - -A single-app kiosk is ideal for public use. Using [Shell Launcher](kiosk-shelllauncher.md), you can configure a kiosk device that runs a Windows desktop application as the user interface. The application that you specify replaces the default shell (explorer.exe) that usually runs when a user signs in. This type of single-app kiosk doesn't run above the lock screen. - -A multi-app kiosk is appropriate for devices that are shared by multiple people. When you configure a multi-app kiosk, [specific policies are enforced](kiosk-policies.md) that affects **all** non-administrator users on the device. - -Kiosk configurations are based on **Assigned Access**, a feature in Windows client that allows an administrator to manage the user's experience by limiting the application entry points exposed to the user. - -There are several kiosk configuration methods that you can choose from, depending on your answers to the following questions. - -- **Which type of app will your kiosk run?** - Your kiosk can run a Universal Windows Platform (UWP) app or a Windows desktop application. For [digital signage](setup-digital-signage.md), select a digital sign player as your kiosk app. [Check out the guidelines for kiosk apps.](guidelines-for-assigned-access-app.md) -- **Which type of kiosk do you need?** - If you want your kiosk to run a single app for anyone to see or use, consider a single-app kiosk that runs either a [Universal Windows Platform (UWP) app](#methods-for-a-single-app-kiosk-running-a-uwp-app) or a Windows desktop application. For a kiosk that people can sign in to with their accounts or that runs more than one app, choose a multi-app kiosk -- **Which edition of Windows client will the kiosk run?** - All of the configuration methods work for Windows client Enterprise and Education; some of the methods work for Windows Pro. Kiosk mode isn't available on Windows Home -- **Which type of user account will be the kiosk account?** - The kiosk account can be a local standard user account, a local administrator account, a domain account, or a Microsoft Entra account, depending on the method that you use to configure the kiosk. If you want people to sign in and authenticate on the device, you should use a multi-app kiosk configuration. The single-app kiosk configuration doesn't require people to sign in to the device, although they can sign in to the kiosk app if you select an app that has a sign-in method - ->[!IMPORTANT] ->Single-app kiosk mode isn't supported over a remote desktop connection. Your kiosk users must sign in on the physical device that is set up as a kiosk. - -[!INCLUDE [assigned-access-kiosk-mode](../../../includes/licensing/assigned-access-kiosk-mode.md)] - -## Methods for a single-app kiosk running a UWP app - -| You can use this method | For this edition | For this kiosk account type | -|--|--|--| -| [Assigned access in Settings](kiosk-single-app.md) | Pro, Ent, Edu | Local standard user | -| [Assigned access cmdlets](kiosk-single-app.md) | Pro, Ent, Edu | Local standard user | -| [The kiosk wizard in Windows Configuration Designer](kiosk-single-app.md) | Pro (version 1709), Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID | -| [Microsoft Intune or other mobile device management (MDM)](kiosk-single-app.md) | Pro (version 1709), Ent, Edu | Local standard user, Microsoft Entra ID | -| [Shell Launcher](kiosk-shelllauncher.md) v2 | Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID | - -## Methods for a single-app kiosk running a Windows desktop application - -| You can use this method | For this edition | For this kiosk account type | -|--|--|--| -| [The kiosk wizard in Windows Configuration Designer](kiosk-single-app.md) | Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID | -| [Microsoft Intune or other mobile device management (MDM)](kiosk-single-app.md) | Pro (version 1709), Ent, Edu | Local standard user, Microsoft Entra ID | -| [Shell Launcher](kiosk-shelllauncher.md) v1 and v2 | Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID | - -## Methods for a multi-app kiosk - -| You can use this method | For this edition | For this kiosk account type | -|--|--|--| -| [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) | Pro, Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID | -| [Microsoft Intune or other MDM](lock-down-windows-10-to-specific-apps.md) | Pro, Ent, Edu | Local standard user, Microsoft Entra ID | -| [MDM WMI Bridge Provider](kiosk-mdm-bridge.md) | Pro, Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID | - -## Summary of kiosk configuration methods - -| Method | App type | Account type | Single-app kiosk | Multi-app kiosk | -|--|--|--|:-:|:-:| -| [Assigned access in Settings](kiosk-single-app.md) | UWP | Local account | ✅ | -| [Assigned access cmdlets](kiosk-single-app.md) | UWP | Local account | ✅ | -| [The kiosk wizard in Windows Configuration Designer](kiosk-single-app.md) | UWP, Windows desktop app | Local standard user, Active Directory, Microsoft Entra ID | ✅ | -| [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) | UWP, Windows desktop app | Local standard user, Active Directory, Microsoft Entra ID | ✅ | ✅ | -| Microsoft Intune or other MDM [for full-screen single-app kiosk](kiosk-single-app.md) or [for multi-app kiosk with desktop](lock-down-windows-10-to-specific-apps.md) | UWP, Windows desktop app | Local standard user, Microsoft Entra ID | ✅ | ✅ | -| [Shell Launcher](kiosk-shelllauncher.md) | Windows desktop app | Local standard user, Active Directory, Microsoft Entra ID | ✅ | -| [MDM Bridge WMI Provider](kiosk-mdm-bridge.md) | UWP, Windows desktop app | Local standard user, Active Directory, Microsoft Entra ID | | ✅ | - ->[!NOTE] ->For devices running Windows client Enterprise and Education, you can also use [Windows Defender Application Control](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control) or [AppLocker](lock-down-windows-10-applocker.md) to lock down a device to specific apps. diff --git a/windows/configuration/kiosk/kiosk-policies.md b/windows/configuration/kiosk/kiosk-policies.md deleted file mode 100644 index 3ab125b892..0000000000 --- a/windows/configuration/kiosk/kiosk-policies.md +++ /dev/null @@ -1,98 +0,0 @@ ---- -title: Policies enforced on kiosk devices -description: Learn about the policies enforced on a device when you configure it as a kiosk. -ms.topic: article -ms.date: 12/31/2017 ---- - -# Policies enforced on kiosk devices - -It isn't recommended to set policies enforced in assigned access kiosk mode to different values using other channels, as the kiosk mode has been optimized to provide a locked-down experience. - -When the assigned access kiosk configuration is applied on the device, certain policies are enforced system-wide, and will impact other users on the device. - -## Group Policy - -The following local policies affect all **non-administrator** users on the system, regardless whether the user is configured as an assigned access user or not. These users include local users, domain users, and Microsoft Entra users. - -| Setting | Value | -|--|--| -| Remove access to the context menus for the task bar | Enabled | -| Clear history of recently opened documents on exit | Enabled | -| Prevent users from customizing their Start Screen | Enabled | -| Prevent users from uninstalling applications from Start | Enabled | -| Remove Run menu from Start Menu | Enabled | -| Disable showing balloon notifications as toast | Enabled | -| Do not allow pinning items in Jump Lists | Enabled | -| Do not allow pinning programs to the Taskbar | Enabled | -| Do not display or track items in Jump Lists from remote locations | Enabled | -| Remove Notifications and Action Center | Enabled | -| Lock all taskbar settings | Enabled | -| Lock the Taskbar | Enabled | -| Prevent users from adding or removing toolbars | Enabled | -| Prevent users from resizing the taskbar | Enabled | -| Remove frequent programs list from the Start Menu | Enabled | -| Remove Pinned programs from the taskbar | Enabled | -| Remove the Security and Maintenance icon | Enabled | -| Turn off all balloon notifications | Enabled | -| Turn off feature advertisement balloon notifications | Enabled | -| Turn off toast notifications | Enabled | -| Remove Task Manager | Enabled | -| Remove Change Password option in Security Options UI | Enabled | -| Remove Sign Out option in Security Options UI | Enabled | -| Remove All Programs list from the Start Menu | Enabled - Remove and disable setting | -| Prevent access to drives from My Computer | Enabled - Restrict all drives | - ->[!NOTE] ->When **Prevent access to drives from My Computer** is enabled, users can browse the directory structure in File Explorer, but they cannot open folders and access the contents. Also, they cannot use the **Run** dialog box or the **Map Network Drive** dialog box to view the directories on these drives. The icons representing the specified drives still appear in File Explorer, but if users double-click the icons, a message appears explaining that a setting prevents the action. This setting does not prevent users from using programs to access local and network drives. It does not prevent users from using the Disk Management snap-in to view and change drive characteristics. - -## MDM policy - -Some of the MDM policies based on the [Policy configuration service provider (CSP)](/windows/client-management/mdm/policy-configuration-service-provider) affect all users on the system (that is, system-wide impact). - -| Setting | Value | System-wide | -|--|--|--| -| [Experience/AllowCortana](/windows/client-management/mdm/policy-csp-experience#experience-allowcortana) | 0 - Not allowed | Yes | -| [Start/AllowPinnedFolderSettings](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfoldersettings) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes | -| Start/HidePeopleBar | 1 - True (hide) | No | -| [Start/HideChangeAccountSettings](/windows/client-management/mdm/policy-csp-start#start-hidechangeaccountsettings) | 1 - True (hide) | Yes | -| [WindowsInkWorkspace/AllowWindowsInkWorkspace](/windows/client-management/mdm/policy-csp-windowsinkworkspace#windowsinkworkspace-allowwindowsinkworkspace) | 0 - Access to ink workspace is disabled and the feature is turned off | Yes | -| [Start/StartLayout](/windows/client-management/mdm/policy-csp-start#start-startlayout) | Configuration dependent | No | -| [WindowsLogon/DontDisplayNetworkSelectionUI](/windows/client-management/mdm/policy-csp-windowslogon#windowslogon-dontdisplaynetworkselectionui) | <Enabled/> | Yes | - - - diff --git a/windows/configuration/kiosk/kiosk-prepare.md b/windows/configuration/kiosk/kiosk-prepare.md deleted file mode 100644 index cf393573ad..0000000000 --- a/windows/configuration/kiosk/kiosk-prepare.md +++ /dev/null @@ -1,286 +0,0 @@ ---- -title: Prepare a device for kiosk configuration on Windows 10/11 | Microsoft Docs -description: Learn how to prepare a device for kiosk configuration. Also, learn about the recommended kiosk configuration changes. -ms.topic: article -ms.date: 12/31/2017 ---- - -# Prepare a device for kiosk configuration - -## Before you begin - -- [User account control (UAC)](/windows/security/identity-protection/user-account-control/user-account-control-overview) must be turned on to enable kiosk mode. -- Kiosk mode isn't supported over a remote desktop connection. Your kiosk users must sign in on the physical device that's set up as a kiosk. -- For kiosks in public-facing environments with auto sign-in enabled, you should use a user account with the least privileges, such as a local standard user account. - - Assigned access can be configured using Windows Management Instrumentation (WMI) or configuration service provider (CSP). Assigned access runs an application using a domain user or service account, not a local account. Using a domain user or service accounts has risks, and might allow an attacker to gain access to domain resources that are accessible to any domain account. When using domain accounts with assigned access, proceed with caution. Consider the domain resources potentially exposed by using a domain account. - -- MDM providers, such as [Microsoft Intune](/mem/intune/fundamentals/what-is-intune), use the configuration service providers (CSP) exposed by the Windows OS to manage settings on devices. In this article, we mention these services. If you're not managing your devices using an MDM provider, the following resources may help you get started: - - - [Endpoint Management at Microsoft](/mem/endpoint-manager-getting-started) - - [What is Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Intune planning guide](/mem/intune/fundamentals/intune-planning-guide) - - [What is Configuration Manager?](/mem/configmgr/core/understand/introduction) - -## Configuration recommendations - -For a more secure kiosk experience, we recommend that you make the following configuration changes to the device before you configure it as a kiosk: - -- **Hide update notifications**. Starting with Windows 10 version 1809, you can hide notifications from showing on the devices. To enable this feature, you have the following options: - - - **Use Group policy**: `Computer Configuration\Administrative Templates\Windows Components\Windows Update\Display options for update notifications` - - **Use an MDM provider**: This feature uses the [Update/UpdateNotificationLevel CSP](/windows/client-management/mdm/policy-csp-update#update-updatenotificationlevel). In Intune, you can use the [Windows update settings](/mem/intune/protect/windows-update-settings) to manage this feature. - - - **Use the registry**: - - 1. Open Registry Editor (regedit). - 1. Go to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate`. - 1. Create a **New** > **DWORD (32-bit) Value**. Enter `SetUpdateNotificationLevel`, and set its value to `1`. - 1. Create a **New** > **DWORD (32-bit) Value**. Enter `UpdateNotificationLevel`. For value, you can enter: - - `1`: Hides all notifications except restart warnings. - - `2`: Hides all notifications, including restart warnings. - -- **Enable and schedule automatic updates**. To enable this feature, you have the following options: - - - **Use Group policy**: `Computer Configuration\Administrative Templates\Windows Components\Windows Update\Configure Automatic Updates`. Select `4 - Auto download and schedule the install`. - - **Use an MDM provider**: This feature uses the [Update/AllowAutoUpdate CSP](/windows/client-management/mdm/policy-csp-update#update-allowautoupdate). Select `3 - Auto install and restart at a specified time`. In Intune, you can use the [Windows update settings](/mem/intune/protect/windows-update-settings) to manage this feature. - - You can also schedule automatic updates, including **Schedule Install Day**, **Schedule Install Time**, and **Schedule Install Week**. Installations can take between 30 minutes and 2 hours, depending on the device. Schedule updates to occur when a block of 3-4 hours is available. - -- **Enable automatic restart at the scheduled time**. To enable this feature, you have the following options: - - - **Use Group policy**: `Computer Configuration\Administrative Templates\Windows Components\Windows Update\Always automatically restart at the scheduled time`. Select `4 - Auto download and schedule the install`. - - - **Use an MDM provider**: This feature uses the [Update/ActiveHoursStart](/windows/client-management/mdm/policy-csp-update#update-activehoursstart) and [Update/ActiveHoursEnd](/windows/client-management/mdm/policy-csp-update#update-activehoursend) CSPs. In Intune, you can use the [Windows update settings](/mem/intune/protect/windows-update-settings) to manage this feature. - -- **Replace "blue screen" with blank screen for OS errors**. To enable this feature, use the Registry Editor: - - 1. Open Registry Editor (regedit). - 1. Go to `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl`. - 1. Create a **New** > **DWORD (32-bit) Value**. Enter `DisplayDisabled`, and set its value to `1`. - -- **Put device in "Tablet mode"**. If you want users to use the touch screen, without using a keyboard or mouse, then turn on tablet mode using the Settings app. If users won't interact with the kiosk, such as for a digital sign, then don't turn on this setting. - - Applies to Windows 10 only. Currently, Tablet mode isn't supported on Windows 11. - - Your options: - - - Use the **Settings** app: - 1. Open the **Settings** app. - 1. Go to **System** > **Tablet mode**. - 1. Configure the settings you want. - - - Use the **Action Center**: - 1. On your device, swipe in from the left. - 1. Select **Tablet mode**. - -- **Hide "Ease of access" feature on the sign-in screen**: To enable this feature, you have the following options: - - - **Use an MDM provider**: In Intune, you can use the [Control Panel and Settings](/mem/intune/configuration/device-restrictions-windows-10#control-panel-and-settings) to manage this feature. - - **Use the registry**: For more information, see [how to disable the Ease of Access button in the registry](/windows-hardware/customize/enterprise/complementary-features-to-custom-logon#welcome-screen). - -- **Disable the hardware power button**: To enable this feature, you have the following options: - - - **Use the Settings app**: - 1. Open the **Settings** app. - 1. Go to **System** > **Power & Sleep** > **Additional power settings** > **Choose what the power button does**. - 1. Select **Do nothing**. - 1. **Save changes**. - - - **Use Group Policy**: Your options: - - - `Computer Configuration\Administrative Templates\System\Power Management\Button Settings`: Set `Select Power Button Action on Battery` and `Select Power Button Action on Plugged In` to **Take no action**. - - `User Configuration\Administrative Templates\Start Menu and Taskbar\Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commands`: This policy hides the buttons, but doesn't disable them. - - `Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Shut down the system`: Remove the users or groups from this policy. - - To prevent this policy from affecting a member of the Administrators group, be sure to keep the Administrators group. - - - **Use an MDM provider**: In Intune, you have some options: - - - [Settings Catalog](/mem/intune/configuration/settings-catalog): This option lists all the settings you can configure, including the administrative templates used in on-premises Group Policy. Configure the following settings: - - - `Power\Select Power Button Action on Battery`: Set to **Take no action**. - - `Power\Select Power Button Action on Plugged In`: Set to **Take no action**. - - `Start\Hide Power Button`: Set to **Enabled**. This policy hides the button, but doesn't disable it. - - - [Administrative templates](/mem/intune/configuration/administrative-templates-windows): These templates are the administrative templates used in on-premises Group Policy. Configure the following setting: - - - `\Start menu and Taskbar\Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commands`: This policy hides the buttons, but doesn't disable them. - - When looking at settings, check the supported OS for each setting to make sure it applies. - - - [Start settings in a device configuration profile](/mem/intune/configuration/device-restrictions-windows-10#start): This option shows this setting, and all the Start menu settings you can manage. - -- **Remove the power button from the sign-in screen**. To enable this feature, you have the following options: - - - **Use Group Policy**: `Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Shutdown: Allow system to be shut down without having to log on`. Select **Disabled**. - - - **Use MDM**: In Intune, you have the following option: - - - [Settings Catalog](/mem/intune/configuration/settings-catalog): This option lists all the settings you can configure, including the administrative templates used in on-premises Group Policy. Configure the following setting: - - - `Local Policies Security Options\Shutdown Allow System To Be Shut Down Without Having To Log On`: Set to **Disabled**. - -- **Disable the camera**: To enable this feature, you have the following options: - - - **Use the Settings app**: - - 1. Open the **Settings** app. - 1. Go to **Privacy** > **Camera**. - 1. Select **Allow apps use my camera** > **Off**. - - - **Use Group Policy**: `Computer Configuration\Administrative Templates\Windows Components\Camera: Allow use of camera`: Select **Disabled**. - - - **Use an MDM provider**: This feature uses the [Policy CSP - Camera](/windows/client-management/mdm/policy-csp-camera). In Intune, you have the following options: - - - [General settings in a device configuration profile](/mem/intune/configuration/device-restrictions-windows-10#general): This option shows this setting, and more settings you can manage. - - [Settings Catalog](/mem/intune/configuration/settings-catalog): This option lists all the settings you can configure, including the administrative templates used in on-premises Group Policy. Configure the following setting: - - - `Camera\Allow camera`: Set to **Not allowed**. - -- **Turn off app notifications on the lock screen**: To enable this feature, you have the following options: - - - **Use the Settings app**: - - 1. Open the **Settings** app. - 1. Go to **System** > **Notifications & actions**. - 1. In **Show notifications on the lock screen**, select **Off**. - - - **Use Group policy**: - - `Computer Configuration\Administrative Templates\System\Logon\Turn off app notifications on the lock screen`: Select **Enabled**. - - `User Configuration\Administrative Templates\Start Menu and Taskbar\Notifications\Turn off toast notifications on the lock screen`: Select **Enabled**. - - - **Use an MDM provider**: This feature uses the [AboveLock/AllowToasts CSP](/windows/client-management/mdm/policy-csp-abovelock#abovelock-allowtoasts). In Intune, you have the following options: - - - [Locked screen experience device configuration profile](/mem/intune/configuration/device-restrictions-windows-10#locked-screen-experience): See this setting, and more settings you can manage. - - - [Administrative templates](/mem/intune/configuration/administrative-templates-windows): These templates are the administrative templates used in on-premises Group Policy. Configure the following settings: - - - `\Start Menu and Taskbar\Notifications\Turn off toast notifications on the lock screen`: Select **Enabled**. - - `\System\Logon\Turn off app notifications on the lock screen`: Select **Enabled**. - - When looking at settings, check the supported OS for each setting to make sure it applies. - - - [Settings Catalog](/mem/intune/configuration/settings-catalog): This option lists all the settings you can configure, including the administrative templates used in on-premises Group Policy. Configure the following settings: - - - `\Start Menu and Taskbar\Notifications\Turn off toast notifications on the lock screen`: Select **Enabled**. - - `\System\Logon\Turn off app notifications on the lock screen`: Select **Enabled**. - -- **Disable removable media**: To enable this feature, you have the following options: - - **Use Group policy**: `Computer Configuration\Administrative Templates\System\Device Installation\Device Installation Restrictions`. Review the available settings that apply to your situation. - To prevent this policy from affecting a member of the Administrators group, select `Allow administrators to override Device Installation Restriction policies` > **Enabled**. - - **Use an MDM provider**: In Intune, you have the following options: - - [General settings in a device configuration profile](/mem/intune/configuration/device-restrictions-windows-10#general): See the **Removable storage** setting, and more settings you can manage. - - [Administrative templates](/mem/intune/configuration/administrative-templates-windows): These templates are the administrative templates used in on-premises Group Policy. Configure the following settings: - - `\System\Device Installation`: There are several policies you can manage, including restrictions in `\System\Device Installation\Device Installation Restrictions`. - To prevent this policy from affecting a member of the Administrators group, select `Allow administrators to override Device Installation Restriction policies` > **Enabled**. - When looking at settings, check the supported OS for each setting to make sure it applies. - - [Settings Catalog](/mem/intune/configuration/settings-catalog): This option lists all the settings you can configure, including the administrative templates used in on-premises Group Policy. Configure the following settings: - - `\Administrative Templates\System\Device Installation`: There are several policies you can manage, including restrictions in `\System\Device Installation\Device Installation Restrictions`. - To prevent this policy from affecting a member of the Administrators group, select `Allow administrators to override Device Installation Restriction policies` > **Enabled**. - -## Enable logging - -Logs can help you [troubleshoot issues](/troubleshoot/windows-client/shell-experience/kiosk-mode-issues-troubleshooting) kiosk issues. Logs about configuration and runtime issues can be obtained by enabling the **Applications and Services Logs\Microsoft\Windows\AssignedAccess\Operational** channel, which is disabled by default. - -:::image type="content" source="images/enable-assigned-access-log.png" alt-text="On Windows client, open Event Viewer, right-click Operational, select enable log to turn on logging to help troubleshoot."::: - -## Automatic logon - -You may also want to set up **automatic logon** for your kiosk device. When your kiosk device restarts, from an update or power outage, you can sign in the assigned access account manually. Or, you can configure the device to sign in to the assigned access account automatically. Make sure that Group Policy settings applied to the device don't prevent automatic sign in. - -> [!NOTE] -> If you are using a Windows client device restriction CSP to set "Preferred Microsoft Entra tenant domain", this will break the "User logon type" auto-login feature of the Kiosk profile. - -> [!TIP] -> If you use the [kiosk wizard in Windows Configuration Designer](kiosk-single-app.md) or [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) to configure your kiosk, you can set an account to sign in automatically in the wizard or XML. - -How to edit the registry to have an account sign in automatically: - -1. Open Registry Editor (regedit.exe). - - > [!NOTE] - > If you are not familiar with Registry Editor, [learn how to modify the Windows registry](/troubleshoot/windows-server/performance/windows-registry-advanced-users). - -1. Go to - - **HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon** - -1. Set the values for the following keys. - - - *AutoAdminLogon*: set value as **1**. - - *DefaultUserName*: set value as the account that you want signed in. - - *DefaultPassword*: set value as the password for the account. - - > [!NOTE] - > If *DefaultUserName* and *DefaultPassword* aren't there, add them as **New** > **String Value**. - - - *DefaultDomainName*: set value for domain, only for domain accounts. For local accounts, don't add this key. - -1. Close Registry Editor. The next time the computer restarts, the account will sign in automatically. - -> [!TIP] -> You can also configure automatic sign-in [using the Autologon tool from Sysinternals](/sysinternals/downloads/autologon). - -> [!NOTE] -> If you are also using [Custom Logon](/windows-hardware/customize/enterprise/custom-logon) with **HideAutoLogonUI** enabled, you might experience a black screen after a password expires. We recommend that you consider [setting the password to never expire](/windows-hardware/customize/enterprise/troubleshooting-custom-logon#the-device-displays-a-black-screen-when-a-password-expiration-screen-is-displayed). - -## Interactions and interoperability - -The following table describes some features that have interoperability issues we recommend that you consider when running assigned access. - -- **Accessibility**: Assigned access doesn't change Ease of Access settings. We recommend that you use [Keyboard Filter](/windows-hardware/customize/enterprise/keyboardfilter) to block the following key combinations that bring up accessibility features: - - | Key combination | Blocked behavior | - | --- | --- | - | Left Alt + Left Shift + Print Screen | Open High Contrast dialog box. | - | Left Alt + Left Shift + Num Lock | Open Mouse Keys dialog box. | - | Windows logo key + U | Open Ease of Access Center. | - -- **Assigned access Windows PowerShell cmdlets**: In addition to using the Windows UI, you can use the Windows PowerShell cmdlets to set or clear assigned access. For more information, see [Assigned access Windows PowerShell reference](/powershell/module/assignedaccess/) - -- **Key sequences blocked by assigned access**: When in assigned access, some key combinations are blocked for assigned access users. - - Alt + F4, Alt + Shift + Tab, Alt + Tab aren't blocked by Assigned Access, it's recommended you use [Keyboard Filter](/windows-hardware/customize/enterprise/keyboardfilter) to block these key combinations. - - Ctrl + Alt + Delete is the key to break out of Assigned Access. If needed, you can use Keyboard Filter to configure a different key combination to break out of assigned access by setting BreakoutKeyScanCode as described in [WEKF_Settings](/windows-hardware/customize/enterprise/wekf-settings). - - | Key combination | Blocked behavior for assigned access users | - | --- | --- | - | Alt + Esc | Cycle through items in the reverse order from which they were opened. | - | Ctrl + Alt + Esc | Cycle through items in the reverse order from which they were opened. | - | Ctrl + Esc | Open the Start screen. | - | Ctrl + F4 | Close the window. | - | Ctrl + ShiftEsc | Open Task Manager. | - | Ctrl + Tab | Switch windows within the application currently open. | - | LaunchApp1 | Open the app that is assigned to this key. | - | LaunchApp2 | Open the app that is assigned to this key. On many Microsoft keyboards, the app is Calculator. | - | LaunchMail | Open the default mail client. | - | Windows logo key | Open the Start screen. | - - Keyboard Filter settings apply to other standard accounts. - -- **Key sequences blocked by [Keyboard Filter](/windows-hardware/customize/enterprise/keyboardfilter)**: If Keyboard Filter is turned ON, then some key combinations are blocked automatically without you having to explicitly block them. For more information, see the [Keyboard Filter](/windows-hardware/customize/enterprise/keyboardfilter). - [Keyboard Filter](/windows-hardware/customize/enterprise/keyboardfilter) is only available on Windows client Enterprise or Education. -- **Power button**: Customizations for the Power button complement assigned access, letting you implement features such as removing the power button from the Welcome screen. Removing the power button ensures the user can't turn off the device when it's in assigned access. - For more information on removing the power button or disabling the physical power button, see [Custom Logon](/windows-hardware/customize/enterprise/custom-logon). -- **Unified Write Filter (UWF)**: UWFsettings apply to all users, including users with assigned access. - For more information, see [Unified Write Filter](/windows-hardware/customize/enterprise/unified-write-filter). -- **WEDL_AssignedAccess class**: You can use this class to configure and manage basic lockdown features for assigned access. It's recommended to you use the Windows PowerShell cmdlets instead. - If you need to use assigned access API, see [WEDL_AssignedAccess](/windows-hardware/customize/enterprise/wedl-assignedaccess). -- **Welcome Screen**: Customizations for the Welcome screen let you personalize not only how the Welcome screen looks, but for how it functions. You can disable the power or language button, or remove all user interface elements. There are many options to make the Welcome screen your own. - -For more information, see [Custom Logon](/windows-hardware/customize/enterprise/custom-logon). - -## Testing your kiosk in a virtual machine (VM) - -Customers sometimes use virtual machines (VMs) to test configurations before deploying those configurations to physical devices. If you use a VM to test your single-app kiosk configuration, you need to know how to connect to the VM properly. - -A single-app kiosk configuration runs an app above the lock screen. It doesn't work when it's accessed remotely, which includes *enhanced* sessions in Hyper-V. - -When you connect to a VM configured as a single-app kiosk, you need a *basic* session rather than an enhanced session. In the following image, notice that **Enhanced session** isn't selected in the **View** menu; that means it's a basic session. - -:::image type="content" source="images/vm-kiosk.png" alt-text="Use a basic session to connect a virtual machine. In the View menu, Extended session isn't selected, which means basic is used."::: - -To connect to a VM in a basic session, don't select **Connect** in the connection dialog, as shown in the following image, but instead, select the **X** button in the upper-right corner to cancel the dialog: - -:::image type="content" source="images/vm-kiosk-connect.png" alt-text="Don't select the connect button. Use the close X in the top corner to connect to a VM in basic session."::: diff --git a/windows/configuration/kiosk/kiosk-shelllauncher.md b/windows/configuration/kiosk/kiosk-shelllauncher.md deleted file mode 100644 index 0b6209673e..0000000000 --- a/windows/configuration/kiosk/kiosk-shelllauncher.md +++ /dev/null @@ -1,273 +0,0 @@ ---- -title: Use Shell Launcher to create a kiosk experience -description: Learn how to configure Shell Launcher to change the default Windows shell when a user signs in to a device. -ms.topic: how-to -ms.date: 12/31/2017 ---- - -# Use Shell Launcher to create a Windows client kiosk - -Shell Launcher is a Windows feature that executes an application as the user interface, replacing the default Windows Explorer (`explorer.exe`). - ->[!NOTE] ->Shell Launcher controls which application the user sees as the shell after sign-in. It doesn't prevent the user from accessing other desktop applications and system components. -> ->Methods of controlling access to other desktop applications and system components can be used in addition to using the Shell Launcher. These methods include, but are not limited to: ->- [Group Policy](https://www.microsoft.com/download/details.aspx?id=25250) - example: Prevent access to registry editing tools ->- [AppLocker](/windows/security/threat-protection/windows-defender-application-control/applocker/applocker-overview) - Application control policies ->- [Mobile Device Management](/windows/client-management/mdm) - Enterprise management of device security policies - -You can apply a custom shell through Shell Launcher [by using PowerShell](#configure-a-custom-shell-using-powershell). Starting with Windows 10 version 1803+, you can also [use mobile device management (MDM)](#configure-a-custom-shell-in-mdm) to apply a custom shell through Shell Launcher. - -Shell Launcher replaces `explorer.exe` with `customshellhost.exe`. This executable file can launch a Windows desktop application or a UWP app. - -In addition to allowing you to use a UWP app for your replacement shell, Shell Launcher v2 offers additional enhancements: - -- You can use a custom Windows desktop application that can then launch UWP apps, such as **Settings** and **Touch Keyboard**. -- From a custom UWP shell, you can launch secondary views and run on multiple monitors. -- The custom shell app runs in full screen, and can run other apps in full screen on user's demand. - -For sample XML configurations for the different app combinations, see [Samples for Shell Launcher v2](https://github.com/Microsoft/Windows-iotcore-samples/tree/develop/Samples/ShellLauncherV2). - -## Requirements - ->[!WARNING] -> ->- Windows 10 doesn't support setting a custom shell prior to OOBE. If you do, you won't be able to deploy the resulting image. ->- Shell Launcher doesn't support a custom shell with an application that launches a different process and exits. For example, you cannot specify **write.exe** in Shell Launcher. Shell Launcher launches a custom shell and monitors the process to identify when the custom shell exits. **Write.exe** creates a 32-bit wordpad.exe process and exits. Because Shell Launcher is not aware of the newly created wordpad.exe process, Shell Launcher will take action based on the exit code of **Write.exe**, such as restarting the custom shell. - -- A domain, Microsoft Entra ID, or local user account. -- A Windows application that is installed for that account. The app can be your own company application or a common app like Internet Explorer. - -[See the technical reference for the shell launcher component.](/windows-hardware/customize/enterprise/shell-launcher) - -## Enable Shell Launcher feature - -To set a custom shell, you first turn on the Shell Launcher feature, and then you can set your custom shell as the default using PowerShell or MDM. - -**To turn on Shell Launcher in Windows features** - -1. Go to Control Panel > **Programs and features** > **Turn Windows features on or off**. -1. Expand **Device Lockdown**. -1. Select **Shell Launcher** and **OK**. - -Alternatively, you can turn on Shell Launcher using Windows Configuration Designer in a provisioning package, using `SMISettings > ShellLauncher`, or you can use the Deployment Image Servicing and Management (DISM.exe) tool. - -**To turn on Shell Launcher using DISM** - -1. Open a command prompt as an administrator. -1. Enter the following command. - - ``` - Dism /online /Enable-Feature /all /FeatureName:Client-EmbeddedShellLauncher - ``` - -## Configure a custom shell in MDM - -You can use XML and a [custom OMA-URI setting](#custom-oma-uri-setting) to configure Shell Launcher in MDM. - -### XML for Shell Launcher configuration - -The following XML sample works for **Shell Launcher v1**: - -```xml - - - - - - - - - - - - - -``` - -For **Shell Launcher v2**, you can use UWP app type for `Shell` by specifying the v2 namespace, and use `v2:AppType` to specify the type, as shown in the following example. If `v2:AppType` isn't specified, it implies the shell is Win32 app. - -```xml - - - - - - - - - - - -``` - ->[!TIP] ->In the XML for Shell Launcher v2, note the **AllAppsFullScreen** attribute. When set to **True**, Shell Launcher will run every app in full screen, or maximized for desktop apps. When this attribute is set to **False** or not set, only the custom shell app runs in full screen; other apps launched by the user will run in windowed mode. - -[Get XML examples for different Shell Launcher v2 configurations.](https://github.com/Microsoft/Windows-iotcore-samples/tree/develop/Samples/ShellLauncherV2) - -### Custom OMA-URI setting - -In your MDM service, you can create a [custom OMA-URI setting](/intune/custom-settings-windows-10) to configure Shell Launcher v1 or v1. (The [XML](#xml-for-shell-launcher-configuration) that you use for your setting determines whether you apply Shell Launcher v1 or v2.) - -The OMA-URI path is `./Device/Vendor/MSFT/AssignedAccess/ShellLauncher`. - -For the value, you can select data type `String` and paste the desired configuration file content into the value box. If you wish to upload the xml instead of pasting the content, choose data type `String (XML file)`. - -![Screenshot of custom OMA-URI settings.](images/slv2-oma-uri.png) - -After you configure the profile containing the custom Shell Launcher setting, select **All Devices** or selected groups of devices to apply the profile to. Don't assign the profile to users or user groups. - -## Configure a custom shell using PowerShell - -For scripts for Shell Launcher v2, see [Shell Launcher v2 Bridge WMI sample scripts](https://github.com/Microsoft/Windows-iotcore-samples/blob/develop/Samples/ShellLauncherV2/SampleBridgeWmiScripts/README.md). - -For Shell Launcher v1, modify the following PowerShell script as appropriate. The comments in the sample script explain the purpose of each section and tell you where you'll want to change the script for your purposes. Save your script with the extension.ps1, open Windows PowerShell as administrator, and run the script on the kiosk device. - -```powershell -# Check if shell launcher license is enabled -function Check-ShellLauncherLicenseEnabled -{ - [string]$source = @" -using System; -using System.Runtime.InteropServices; - -static class CheckShellLauncherLicense -{ - const int S_OK = 0; - public static bool IsShellLauncherLicenseEnabled() - { - int enabled = 0; - if (NativeMethods.SLGetWindowsInformationDWORD("EmbeddedFeature-ShellLauncher-Enabled", out enabled) != S_OK) { - enabled = 0; - } - return (enabled != 0); - } - static class NativeMethods - { - [DllImport("Slc.dll")] - internal static extern int SLGetWindowsInformationDWORD([MarshalAs(UnmanagedType.LPWStr)]string valueName, out int value); - } -} -"@ - $type = Add-Type -TypeDefinition $source -PassThru - return $type[0]::IsShellLauncherLicenseEnabled() -} - -[bool]$result = $false - -$result = Check-ShellLauncherLicenseEnabled -"`nShell Launcher license enabled is set to " + $result -if (-not($result)) -{ - "`nThis device doesn't have required license to use Shell Launcher" - exit -} - -$COMPUTER = "localhost" -$NAMESPACE = "root\standardcimv2\embedded" - -# Create a handle to the class instance so we can call the static methods. -try { - $ShellLauncherClass = [wmiclass]"\\$COMPUTER\${NAMESPACE}:WESL_UserSetting" - } catch [Exception] { - write-host $_.Exception.Message; - - write-host "Make sure Shell Launcher feature is enabled" - exit - } - -# This well-known security identifier (SID) corresponds to the BUILTIN\Administrators group. - -$Admins_SID = "S-1-5-32-544" - -# Create a function to retrieve the SID for a user account on a machine. - -function Get-UsernameSID($AccountName) { - - $NTUserObject = New-Object System.Security.Principal.NTAccount($AccountName) - $NTUserSID = $NTUserObject.Translate([System.Security.Principal.SecurityIdentifier]) - - return $NTUserSID.Value - -} - -# Get the SID for a user account named "Cashier". Rename "Cashier" to an existing account on your system to test this script. - -$Cashier_SID = Get-UsernameSID("Cashier") - -# Define actions to take when the shell program exits. - -$restart_shell = 0 -$restart_device = 1 -$shutdown_device = 2 - -# Examples. You can change these examples to use the program that you want to use as the shell. -# This example sets the command prompt as the default shell, and restarts the device if the command prompt is closed. - -$ShellLauncherClass.SetDefaultShell("cmd.exe", $restart_device) - -# Display the default shell to verify that it was added correctly. - -$DefaultShellObject = $ShellLauncherClass.GetDefaultShell() - -"`nDefault Shell is set to " + $DefaultShellObject.Shell + " and the default action is set to " + $DefaultShellObject.defaultaction - -# Set Internet Explorer as the shell for "Cashier", and restart the machine if Internet Explorer is closed. - -$ShellLauncherClass.SetCustomShell($Cashier_SID, "c:\program files\internet explorer\iexplore.exe www.microsoft.com", ($null), ($null), $restart_shell) - -# Set Explorer as the shell for administrators. - -$ShellLauncherClass.SetCustomShell($Admins_SID, "explorer.exe") - -# View all the custom shells defined. - -"`nCurrent settings for custom shells:" -Get-WmiObject -namespace $NAMESPACE -computer $COMPUTER -class WESL_UserSetting | Select Sid, Shell, DefaultAction - -# Enable Shell Launcher - -$ShellLauncherClass.SetEnabled($TRUE) -$IsShellLauncherEnabled = $ShellLauncherClass.IsEnabled() -"`nEnabled is set to " + $IsShellLauncherEnabled.Enabled - -# Remove the new custom shells. - -$ShellLauncherClass.RemoveCustomShell($Admins_SID) -$ShellLauncherClass.RemoveCustomShell($Cashier_SID) - -# Disable Shell Launcher - -$ShellLauncherClass.SetEnabled($FALSE) -$IsShellLauncherEnabled = $ShellLauncherClass.IsEnabled() -"`nEnabled is set to " + $IsShellLauncherEnabled.Enabled -``` - -## default action, custom action, exit code - -Shell launcher defines four actions to handle app exits, you can customize shell launcher and use these actions based on different exit code. - -| Value | Description | -|--|--| -| 0 | Restart the shell | -| 1 | Restart the device | -| 2 | Shut down the device | -| 3 | Do nothing | - -These actions can be used as default action, or can be mapped to a specific exit code. Refer to [Shell Launcher](/windows-hardware/customize/enterprise/wesl-usersettingsetcustomshell) to see how these codes with Shell Launcher WMI. - -To configure these actions with Shell Launcher CSP, use below syntax in the shell launcher configuration xml. You can specify at most four custom actions mapping to four exit codes, and one default action for all other exit codes. When app exits and if the exit code is not found in the custom action mapping, or there is no default action defined, it will be no-op, i.e. nothing happens. So it's recommended to at least define DefaultAction. [Get XML examples for different Shell Launcher v2 configurations.](https://github.com/Microsoft/Windows-iotcore-samples/tree/develop/Samples/ShellLauncherV2) - -``` xml - - - - - - - - -``` diff --git a/windows/configuration/kiosk/kiosk-single-app.md b/windows/configuration/kiosk/kiosk-single-app.md deleted file mode 100644 index 688758b856..0000000000 --- a/windows/configuration/kiosk/kiosk-single-app.md +++ /dev/null @@ -1,330 +0,0 @@ ---- -title: Set up a single-app kiosk on Windows -description: A single-use device is easy to set up in Windows Pro, Enterprise, and Education editions. -ms.topic: article -ms.collection: - - tier1 -ms.date: 07/12/2023 ---- - - -# Set up a single-app kiosk - -A single-app kiosk uses the Assigned Access feature to run a single app above the lock screen. When the kiosk account signs in, the app is launched automatically. The person using the kiosk cannot do anything on the device outside of the kiosk app. - -![Illustration of a single-app kiosk experience.](images/kiosk-fullscreen-sm.png) - ->[!IMPORTANT] ->[User account control (UAC)](/windows/security/identity-protection/user-account-control/user-account-control-overview) must be turned on to enable kiosk mode. -> ->Kiosk mode is not supported over a remote desktop connection. Your kiosk users must sign in on the physical device that is set up as a kiosk. Apps that run in kiosk mode cannot use copy and paste. - -You have several options for configuring your single-app kiosk. - -- Locally, in Settings: The **Set up a kiosk** (previously named **Set up assigned access**) option in **Settings** is a quick and easy method to set up a single device as a kiosk for a local standard user account. - - This option supports: - - - Windows 10 Pro, Enterprise, and Education - - Windows 11 - -- PowerShell: You can use Windows PowerShell cmdlets to set up a single-app kiosk. First, you need to [create the user account](https://support.microsoft.com/help/4026923/windows-create-a-local-user-or-administrator-account-in-windows-10) on the device and install the kiosk app for that account. - - This option supports: - - - Windows 10 Pro, Enterprise, and Education - - Windows 11 - -- The kiosk wizard in Windows Configuration Designer: Windows Configuration Designer is a tool that produces a *provisioning package*. A provisioning package includes configuration settings that can be applied to one or more devices during the first-run experience (OOBE), or after OOBE is done (runtime). Using the kiosk wizard, you can also create the kiosk user account, install the kiosk app, and configure more useful settings. - - This option supports: - - - Windows 10 Pro version 1709+, Enterprise, and Education - - Windows 11 - -- Microsoft Intune or other mobile device management (MDM) provider: For devices managed by your organization, you can use MDM to set up a kiosk configuration. - - This option supports: - - - Windows 10 Pro version 1709+, Enterprise, and Education - - Windows 11 - -> [!TIP] -> You can also configure a kiosk account and app for single-app kiosk within [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) by using a [kiosk profile](lock-down-windows-10-to-specific-apps.md#profile). - -> -> Be sure to check the [configuration recommendations](kiosk-prepare.md) before you set up your kiosk. - -## Set up a kiosk in local Settings - -App type: - -- UWP - -OS: - -- Windows 10 Pro, Ent, Edu -- Windows 11 - -Account type: - -- Local standard user - -You can use **Settings** to quickly configure one or a few devices as a kiosk. - -When your kiosk is a local device that isn't managed by Active Directory or Microsoft Entra ID, there is a default setting that enables automatic sign-in after a restart. That means that when the device restarts, the last signed-in user will be signed in automatically. If the last signed-in user is the kiosk account, the kiosk app will be launched automatically after the device restarts. - -- If you want the kiosk account to sign in automatically, and the kiosk app launched when the device restarts, then you don't need to do anything. - -- If you don't want the kiosk account to sign in automatically when the device restarts, then you must change the default setting before you configure the device as a kiosk. Sign in with the account that you will assign as the kiosk account. Open the **Settings** app > **Accounts** > **Sign-in options**. Set the **Use my sign-in info to automatically finish setting up my device after an update or restart** setting to **Off**. After you change the setting, you can apply the kiosk configuration to the device. - - ![Screenshot of automatic sign-in setting.](images/auto-signin.png) - -### Windows 10 version 1809+ / Windows 11 - -When you set up a kiosk (also known as *assigned access*) in **Settings** for Windows client, you create the kiosk user account at the same time. To set up assigned access in PC settings: - -Open the **Settings** app > **Accounts**. Select **Other users** or **Family and other users**. - -1. Select **Set up a kiosk > Assigned access**, and then select **Get started**. - -1. Enter a name for the new account. - - >[!NOTE] - >If there are any local standard user accounts on the device already, the **Create an account** page will offer the option to **Choose an existing account**. - -1. Choose the app that will run when the kiosk account signs in. Only apps that can run above the lock screen will be available in the list of apps to choose from. For more information, see [Guidelines for choosing an app for assigned access](guidelines-for-assigned-access-app.md). If you select **Microsoft Edge** as the kiosk app, you configure the following options: - - - Whether Microsoft Edge should display your website full-screen (digital sign) or with some browser controls available (public browser) - - Which URL should be displayed when the kiosk accounts signs in - - When Microsoft Edge should restart after a period of inactivity (if you select to run as a public browser) - -1. Select **Close**. - -To remove assigned access, select the account tile on the **Set up a kiosk** page, and then select **Remove kiosk**. - -### Windows 10 version 1803 and earlier - -When you set up a kiosk (also known as *assigned access*) in **Settings** for Windows 10 version 1803 and earlier, you must select an existing local standard user account. [Learn how to create a local standard user account.](https://support.microsoft.com/help/4026923/windows-create-a-local-user-or-administrator-account-in-windows-10) - -![The Set up assigned access page in Settings.](images/kiosk-settings.png) - -To set up assigned access in PC settings: - -1. Go to **Start** > **Settings** > **Accounts** > **Other people**. -1. Select **Set up assigned access**. -1. Choose an account. -1. Choose an app. Only apps that can run above the lock screen will be available in the list of apps to choose from. For more information, see [Guidelines for choosing an app for assigned access](guidelines-for-assigned-access-app.md). -1. Close **Settings** - your choices are saved automatically, and will be applied the next time that user account signs in. -To remove assigned access, choose **Turn off assigned access and sign out of the selected account**. - -## Set up a kiosk using Windows PowerShell - -App type: - -- UWP - -OS: - -- Windows 10 Pro, Ent, Edu -- Windows 11 - -Account type: - -- Local standard user - -![PowerShell windows displaying Set-AssignedAccess cmdlet.](images/set-assignedaccess.png) - -You can use any of the following PowerShell cmdlets to set up assigned access on multiple devices. - -Before you run the cmdlet: - -1. Sign in as administrator. -1. [Create the user account](https://support.microsoft.com/help/4026923/windows-create-a-local-user-or-administrator-account-in-windows-10) for Assigned Access. -1. Sign in as the Assigned Access user account. -1. Install the Universal Windows app that follows the assigned access/above the lock guidelines. -1. Sign out as the Assigned Access user account. -1. Sign in as administrator. - -To open PowerShell on Windows client, search for PowerShell, and find **Windows PowerShell Desktop app** in the results. Run PowerShell as administrator. - -- **Configure assigned access by AppUserModelID and user name**: `Set-AssignedAccess -AppUserModelId -UserName ` -- **Configure assigned access by AppUserModelID and user SID**: `Set-AssignedAccess -AppUserModelId -UserSID ` -- **Configure assigned access by app name and user name**: `Set-AssignedAccess -AppName -UserName ` -- **Configure assigned access by app name and user SID**: `Set-AssignedAccess -AppName -UserSID ` - -> [!NOTE] -> To set up assigned access using `-AppName`, the user account that you enter for assigned access must have signed in at least once. - -[Learn how to get the AUMID](./find-the-application-user-model-id-of-an-installed-app.md). - -[Learn how to get the AppName](/powershell/module/assignedaccess/set-assignedaccess) (see **Parameters**). - -To remove assigned access, using PowerShell, run the following cmdlet: - -```powershell -Clear-AssignedAccess -``` - -## Set up a kiosk using the kiosk wizard in Windows Configuration Designer - -App type: - -- UWP -- Windows desktop application - -OS: - -- Windows 10 Pro version 1709+ for UWP only -- Windows 10 Ent, Edu for UWP and Windows desktop applications -- Windows 11 - -Account type: - -- Local standard user -- Active Directory - -![Kiosk wizard option in Windows Configuration Designer.](images/kiosk-wizard.png) - ->[!IMPORTANT] ->When Exchange Active Sync (EAS) password restrictions are active on the device, the autologon feature does not work. This behavior is by design. For more informations, see [How to turn on automatic logon in Windows](/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon). - -When you use the **Provision kiosk devices** wizard in Windows Configuration Designer, you can configure the kiosk to run either a Universal Windows app or a Windows desktop application. - -[Install Windows Configuration Designer](../provisioning-packages/provisioning-install-icd.md), then open Windows Configuration Designer and select **Provision kiosk devices**. After you name your project, and select **Next**, configure the following settings: - -1. Enable device setup: - - :::image type="content" source="images/set-up-device-details.png" alt-text="In Windows Configuration Designer, enable device setup, enter the device name, the product key to upgrade, turn off shared use, and remove preinstalled software."::: - - If you want to enable device setup, select **Set up device**, and configure the following settings: - - - **Device name**: Required. Enter a unique 15-character name for the device. You can use variables to add unique characters to the name, such as `Contoso-%SERIAL%` and `Contoso-%RAND:5%`. - - **Enter product key**: Optional. Select a license file to upgrade Windows client to a different edition. For more information, see [the permitted upgrades](/windows/deployment/upgrade/windows-10-edition-upgrades). - - **Configure devices for shared use**: This setting optimizes Windows client for shared use scenarios, and isn't necessary for a kiosk scenario. Set this value to **No**, which may be the default. - - **Remove pre-installed software**: Optional. Select **Yes** if you want to remove preinstalled software. - -1. Set up the network: - - :::image type="content" source="images/set-up-network-details.png" alt-text="In Windows Configuration Designer, turn on wireless connectivity, enter the network SSID, and network type."::: - - If you want to enable network setup, select **Set up network**, and configure the following settings: - - - **Set up network**: To enable wireless connectivity, select **On**. - - **Network SSID**: Enter the Service Set Identifier (SSID) of the network. - - **Network type**: Select **Open** or **WPA2-Personal**. If you select **WPA2-Personal**, enter the password for the wireless network. - -1. Enable account management: - - :::image type="content" source="images/account-management-details.png" alt-text="In Windows Configuration Designer, join Active Directory, Microsoft Entra ID, or create a local admin account."::: - - If you want to enable account management, select **Account Management**, and configure the following settings: - - - **Manage organization/school accounts**: Choose how devices are enrolled. Your options: - - **Active Directory**: Enter the credentials for a least-privileged user account to join the device to the domain. - - **Microsoft Entra ID**: Before you use a Windows Configuration Designer wizard to configure bulk Microsoft Entra enrollment, [set up Microsoft Entra join in your organization](/azure/active-directory/active-directory-azureadjoin-setup). In your Microsoft Entra tenant, the **maximum number of devices per user** setting determines how many times the bulk token in the wizard can be used. - - If you select this option, enter a friendly name for the bulk token you get using the wizard. Set an expiration date for the token. The maximum is 180 days from the date you get the token. Select **Get bulk token**. In **Let's get you signed in**, enter an account that has permissions to join a device to Microsoft Entra ID, and then the password. Select **Accept** to give Windows Configuration Designer the necessary permissions. - - You must run Windows Configuration Designer on Windows client to configure Microsoft Entra enrollment using any of the wizards. - - - **Local administrator**: If you select this option, enter a user name and password. If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password isn't changed during that period, the account might be locked out, and unable to sign in. - -1. Add applications: - - :::image type="content" source="images/add-applications-details.png" alt-text="In Windows Configuration Designer, add an application that will run in kiosk mode."::: - - To add applications to the devices, select **Add applications**. You can install multiple applications in a provisioning package, including Windows desktop applications (Win32) and Universal Windows Platform (UWP) apps. The settings in this step vary depending on the application you select. For help with the settings, see [Provision PCs with apps](../provisioning-packages/provision-pcs-with-apps.md). - - > [!WARNING] - > If you select the plus button to add an application, you must enter an application for the provisioning package to validate. If you select the plus button by mistake, then: - > - > 1. In **Installer Path**, select any executable file. - > 1. When the **Cancel** button shows, select it. - > - > These steps let you complete the provisioning package without adding an application. - -1. Add certificates: - - :::image type="content" source="images/add-certificates-details.png" alt-text="In Windows Configuration Designer, add a certificate."::: - - To add a certificate to the devices, select **Add certificates**, and configure the following settings: - - - **Certificate name**: Enter a name for the certificate. - - **Certificate path**: Browse and select the certificate you want to add. - -1. Configure the kiosk account, and the kiosk mode app: - - :::image type="content" source="images/kiosk-account-details.png" alt-text="In Windows Configuration Designer, the Configure kiosk common settings button is shown when provisioning a kiosk device."::: - - To add the account that runs the app and choose the app type, select **Configure kiosk account and app**, and configure the following settings: - - - **Create a local standard user account to run the kiosk mode app**: Select **Yes** to create a local standard user account, and enter the **User name** and **Password**. This user account runs the app. If you select **No**, make sure you have an existing user account to run the kiosk app. - - **Auto sign-in**: Select **Yes** to automatically sign in the account when the device starts. **No** doesn't automatically sign in the account. If there are issues with auto sign-in after you apply the provisioning package, then check the Event Viewer logs for auto logon issues (`Applications and Services Logs\Microsoft\Windows\Authentication User Interface\Operational`). - - **Configure the kiosk mode app**: Enter the **User name** of the account that will run the kiosk mode app. In **App type**, select the type of app to run. Your options: - - **Windows desktop application**: Enter the path or filename. If the file path is in the PATH environment variable, then you can use the filename. Otherwise, the full path is required. - - **Universal Windows app**: Enter the AUMID. - -1. Configure kiosk common settings: - - :::image type="content" source="images/kiosk-common-details.png" alt-text="In Windows Configuration Designer, set tablet mode, configure the welcome and shutdown screens, and turn off the power timeout settings."::: - - To configure the tablet mode, configure welcome and shutdown screens, and set the power settings, select **Configure kiosk common settings**, and configure the following settings: - - - **Set tablet mode** - - **Customize user experience** - - **Configure power settings** - -1. Finish: - - :::image type="content" source="images/finish-details.png" alt-text="In Windows Configuration Designer, protect your package with a password."::: - - To complete the wizard, select **Finish**, and configure the following setting: - - - **Protect your package**: Select **Yes** to password protect your provisioning package. When you apply the provisioning package to a device, you must enter this password. - ->[!NOTE] ->If you want to use [the advanced editor in Windows Configuration Designer](../provisioning-packages/provisioning-create-package.md#configure-settings), specify the user account and app (by AUMID) in **Runtime settings** > **AssignedAccess** > **AssignedAccessSettings** - ->[!IMPORTANT] ->When you build a provisioning package, you may include sensitive information in the project files and in the provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when they are no longer needed. - -[Learn how to apply a provisioning package.](../provisioning-packages/provisioning-apply-package.md) - -## Set up a kiosk or digital sign using Microsoft Intune or other MDM service - -App type: - -- UWP - -OS: - -- Windows 10 Pro version 1709+, Ent, Edu -- Windows 11 - -Account type: - -- Local standard user -- Microsoft Entra ID - -Microsoft Intune and other MDM services enable kiosk configuration through the [AssignedAccess configuration service provider (CSP)](/windows/client-management/mdm/assignedaccess-csp). Assigned Access has a `KioskModeApp` setting. In the `KioskModeApp` setting, you enter the user account name and the [AUMID](/windows-hardware/customize/enterprise/find-the-application-user-model-id-of-an-installed-app) for the app to run in kiosk mode. - ->[!TIP] ->A ShellLauncher node has been added to the [AssignedAccess CSP](/windows/client-management/mdm/assignedaccess-csp). - -To configure a kiosk in Microsoft Intune, see [Windows client and Windows Holographic for Business device settings to run as a dedicated kiosk using Intune](/intune/kiosk-settings). For other MDM services, see the documentation for your provider. - -## Sign out of assigned access - -To exit the assigned access (kiosk) app, press **Ctrl + Alt + Del**, and then sign in using another account. When you press **Ctrl + Alt + Del** to sign out of assigned access, the kiosk app will exit automatically. If you sign in again as the assigned access account or wait for the sign in screen timeout, the kiosk app relaunches. The assigned access user will remain signed in until an admin account opens **Task Manager** > **Users** and signs out the user account. - -If you press **Ctrl + Alt + Del** and do not sign in to another account, after a set time, assigned access will resume. The default time is 30 seconds, but you can change that in the following registry key: - -`HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI` - -To change the default time for assigned access to resume, add *IdleTimeOut* (DWORD) and enter the value data as milliseconds in hexadecimal. - -> [!NOTE] -> **IdleTimeOut** doesn't apply to the new Microsoft Edge kiosk mode. - -The Breakout Sequence of **Ctrl + Alt + Del** is the default, but this sequence can be configured to be a different sequence of keys. The breakout sequence uses the format **modifiers + keys**. An example breakout sequence would look something like **Shift + Alt + a**, where **Shift** and **Alt** are the modifiers and **a** is the key value. For more information, see [Microsoft Edge kiosk XML sample](/windows/configuration/kiosk-xml#microsoft-edge-kiosk-xml-sample). diff --git a/windows/configuration/kiosk/kiosk-validate.md b/windows/configuration/kiosk/kiosk-validate.md deleted file mode 100644 index eb3259d185..0000000000 --- a/windows/configuration/kiosk/kiosk-validate.md +++ /dev/null @@ -1,83 +0,0 @@ ---- -title: Validate kiosk configuration -description: In this article, learn what to expect on a multi-app kiosk in Windows 10/11 Pro, Enterprise, and Education. - -ms.topic: article -ms.date: 12/31/2017 ---- - -# Validate kiosk configuration - -To identify the provisioning packages applied to a device, go to **Settings** > **Accounts** > **Access work or school**, and then click **Add or remove a provisioning package**. You should see a list of packages that were applied to the device. - -Optionally, run Event Viewer (eventvwr.exe) and look through logs under **Applications and Services Logs** > **Microsoft** > **Windows** > **Provisioning-Diagnostics-Provider** > **Admin**. - -To test the kiosk, sign in with the assigned access user account you specified in the configuration to check out the multi-app experience. - ->[!NOTE] ->The kiosk configuration setting will take effect the next time the assigned access user signs in. If that user account is signed in when you apply the configuration, make sure the user signs out and signs back in to validate the experience. - -The following sections explain what to expect on a multi-app kiosk. - -### App launching and switching experience - -In the multi-app mode, to maximize the user productivity and streamline the experience, an app will be always launched in full screen when the users click the tile on the Start. The users can minimize and close the app, but cannot resize the app window. - -The users can switch apps just as they do today in Windows. They can use the Task View button, Alt + Tab hotkey, and the swipe in from the left gesture to view all the open apps in task view. They can click the Windows button to show Start, from which they can open apps, and they can switch to an opened app by clicking it on the taskbar. - -### Start changes - -When the assigned access user signs in, you should see a restricted Start experience: -- Start gets launched in full screen and prevents the end user from accessing the desktop. - -- Start shows the layout aligned with what you defined in the multi-app configuration XML. - -- Start prevents the end user from changing the tile layout. - - The user cannot resize, reposition, and unpin the tiles. - - The user cannot pin additional tiles on the start. -- Start hides **All Apps** list. -- Start hides all the folders on Start (including File Explorer, Settings, Documents, Downloads, Music, Pictures, Videos, HomeGroup, Network, and Personal folders). -- Only **User** and **Power** buttons are available. (You can control whether to show the **User/Power** buttons using [existing policies](/windows/client-management/mdm/policy-csp-start).) -- Start hides **Change account settings** option under **User** button. - -### Taskbar changes - -If the applied multi-app configuration enables taskbar, when the assigned access user signs in, you should see a restricted Taskbar experience: - -- Disables context menu of Start button (Quick Link) -- Disables context menu of taskbar -- Prevents the end user from changing the taskbar -- Disables Cortana and Search Windows -- Hides notification icons and system icons, e.g. Action Center, People, Windows Ink Workspace -- Allows the end user to view the status of the network connection and power state, but disables the flyout of **Network/Power** to prevent end user from changing the settings - -### Blocked hotkeys - -The multi-app mode blocks the following hotkeys, which are not relevant for the lockdown experience. - -| Hotkey | Action | -| --- | --- | -| Windows logo key + A | Open Action center | -| Windows logo key + Shift + C | Open Cortana in listening mode | -| Windows logo key + D | Display and hide the desktop | -| Windows logo key + Alt + D | Display and hide the date and time on the desktop | -| Windows logo key + E | Open File Explorer | -| Windows logo key + F | Open Feedback Hub | -| Windows logo key + G | Open Game bar when a game is open | -| Windows logo key + I | Open Settings | -| Windows logo key + J | Set focus to a Windows tip when one is available. | -| Windows logo key + O | Lock device orientation | -| Windows logo key + Q | Open search | -| Windows logo key + R | Open the Run dialog box | -| Windows logo key + S | Open search | -| Windows logo key + X | Open the Quick Link menu | -| Windows logo key + comma (,) | Temporarily peek at the desktop | -| Windows logo key + Ctrl + F | Search for PCs (if you're on a network) | - -### Locked-down Ctrl+Alt+Del screen - -The multi-app mode removes options (e.g. **Change a password**, **Task Manager**, **Network**) in the Ctrl+Alt+Del screen to ensure the users cannot access the functionalities that are not allowed in the lockdown experience. - -### Auto-trigger touch keyboard - -In the multi-app mode, the touch keyboard will be automatically triggered when there is an input needed and no physical keyboard is attached on touch-enabled devices. You don't need to configure any other setting to enforce this behavior. diff --git a/windows/configuration/kiosk/kiosk-xml.md b/windows/configuration/kiosk/kiosk-xml.md deleted file mode 100644 index dc2c2a62b2..0000000000 --- a/windows/configuration/kiosk/kiosk-xml.md +++ /dev/null @@ -1,952 +0,0 @@ ---- -title: Assigned Access configuration kiosk XML reference -description: Learn about the assigned access configuration (kiosk) for XML and XSD for kiosk device configuration in Windows 10/11. - -ms.topic: article -ms.date: 12/31/2017 ---- - -# Assigned Access configuration (kiosk) XML reference - -## Full XML sample - ->[!NOTE] ->Updated for Windows 10, version 1903, 1909, and 2004. - -```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - domain\account - - - - AzureAD\john@contoso.onmicrosoft.com - - - - localaccount - - - - - - - - - - - - - - - - - - - - -``` - -## Kiosk only sample XML - -```xml - - - - - - - - - - singleappuser - - - - -``` - -## Auto Launch Sample XML - -This sample demonstrates that both UWP and Win32 apps can be configured to automatically launch, when assigned access account logs in. One profile can have at most one app configured for auto launch. AutoLaunchArguments are passed to the apps as is and the app needs to handle the arguments explicitly. - -```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - aauser1 - - - - aauser2 - - - - - -``` - -## Microsoft Edge Kiosk XML Sample - -```xml - - - - - - - - - - - - EdgeKioskUser - - - - -``` - -## Global Profile Sample XML - -Global Profile is supported on: - -- Windows 11 -- Windows 10, version 2004 and later - -Global Profile is designed for scenarios where a user doesn't have a designated profile, yet you still want the user to run in lockdown mode. It's also used as mitigation when a profile can't be determined for a user. - -This sample demonstrates that only a global profile is used, with no active user configured. Global Profile will be applied when every non-admin account signs in. - -```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - -``` - -Below sample shows dedicated profile and global profile mixed usage, a user would use one profile, everyone else that's non-admin will use another profile. - -```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - aauser - - - - - -``` - -## Folder Access sample xml - -Starting with Windows 10 version 1809 +, folder access is locked down so that when common file dialog is opened, IT Admin can specify if the user has access to the Downloads folder, or no access to any folder at all. This restriction has been redesigned for finer granularity and easier use, and is available in Windows 10 version 2009+. - -IT Admin now can specify user access to Downloads folder, Removable drives, or no restrictions at all. Downloads and Removable Drives can be allowed at the same time. - -```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - multi1 - - - - multi2 - - - - multi3 - - - - multi4 - - - - multi5 - - - - multi6 - - - - - -``` - -## XSD for AssignedAccess configuration XML - -> [!NOTE] -> Updated for Windows 10, version 1903 and later. - -The following XML schema is for AssignedAccess Configuration up to Windows 10, version 1803 release: - -```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -``` - -The following XML is the schema for new features introduced in Windows 10 1809 release: - -```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -``` - -The following XML is the schema for Windows 10 version 1909+: - -```xml - - - - - - - - - - - - - - - - - - -``` - -To authorize a compatible configuration XML that includes elements and attributes from Windows 10 version 1809 or newer / Windows 11, always include the namespace of these add-on schemas, and decorate the attributes and elements accordingly with the namespace alias. - -For example, to configure the autolaunch feature that was added in Windows 10 version 1809 / Windows 11, use the following sample. Notice an alias r1809 is given to the 201810 namespace for Windows 10 version 1809 / Windows 11, and the alias is tagged on AutoLaunch and AutoLaunchArguments inline. - -```xml - - - - - - -``` diff --git a/windows/configuration/kiosk/lock-down-windows-10-applocker.md b/windows/configuration/kiosk/lock-down-windows-10-applocker.md deleted file mode 100644 index 2781e1b640..0000000000 --- a/windows/configuration/kiosk/lock-down-windows-10-applocker.md +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: Use AppLocker to create a Windows 10 kiosk that runs multiple apps -description: Learn how to use AppLocker to configure a kiosk device running Windows 10 Enterprise or Windows 10 Education so that users can only run a few specific apps. -appliesto: -- ✅ Windows 10 -ms.date: 07/30/2018 -ms.topic: article ---- - -# Use AppLocker to create a Windows 10 kiosk that runs multiple apps - -Learn how to configure a device running Windows 10 Enterprise or Windows 10 Education, version 1703 and earlier, so that users can only run a few specific apps. The result is similar to [a kiosk device](./kiosk-methods.md), but with multiple apps available. For example, you might set up a library computer so that users can search the catalog and browse the Internet, but can't run any other apps or change computer settings. - ->[!NOTE] ->For devices running Windows 10, version 1709, we recommend the [multi-app kiosk method](lock-down-windows-10-to-specific-apps.md). - -You can restrict users to a specific set of apps on a device running Windows 10 Enterprise or Windows 10 Education by using [AppLocker](/windows/device-security/applocker/applocker-overview). AppLocker rules specify which apps are allowed to run on the device. - -AppLocker rules are organized into collections based on file format. If no AppLocker rules for a specific rule collection exist, all files with that file format are allowed to run. However, when an AppLocker rule for a specific rule collection is created, only the files explicitly allowed in a rule are permitted to run. For more information, see [How AppLocker works](/windows/device-security/applocker/how-applocker-works-techref). - -This topic describes how to lock down apps on a local device. You can also use AppLocker to set rules for applications in a domain by using Group Policy. - -![install create lockdown customize.](images/lockdownapps.png) - -## Install apps - -First, install the desired apps on the device for the target user account(s). This works for both Unified Windows Platform (UWP) apps and Windows desktop apps. For UWP apps, you must log on as that user for the app to install. For desktop apps, you can install an app for all users without logging on to the particular account. - -## Use AppLocker to set rules for apps - -After you install the desired apps, set up AppLocker rules to only allow specific apps, and block everything else. - -1. Run Local Security Policy (secpol.msc) as an administrator. -1. Go to **Security Settings** > **Application Control Policies** > **AppLocker**, and select **Configure rule enforcement**. - - ![configure rule enforcement.](images/apprule.png) - -1. Check **Configured** under **Executable rules**, and then click **OK**. -1. Right-click **Executable Rules** and then click **Automatically generate rules**. - - ![automatically generate rules.](images/genrule.png) - -1. Select the folder that contains the apps that you want to permit, or select C:\\ to analyze all apps. -1. Type a name to identify this set of rules, and then click **Next**. -1. On the **Rule Preferences** page, click **Next**. Be patient, it might take awhile to generate the rules. -1. On the **Review Rules** page, click **Create**. The wizard will now create a set of rules allowing the installed set of apps. -1. Read the message and click **Yes**. - - ![default rules warning.](images/appwarning.png) - -1. (optional) If you want a rule to apply to a specific set of users, right-click on the rule and select **Properties**. Then use the dialog to choose a different user or group of users. -1. (optional) If rules were generated for apps that should not be run, you can delete them by right-clicking on the rule and selecting **Delete**. -1. Before AppLocker will enforce rules, the **Application Identity** service must be turned on. To force the Application Identity service to automatically start on reset, open a command prompt and run: - - ``` syntax - sc config appidsvc start=auto - ``` - -1. Restart the device. - -## Other settings to lock down - -In addition to specifying the apps that users can run, you should also restrict some settings and functions on the device. For a more secure experience, we recommend that you make the following configuration changes to the device: - -- Remove **All apps**. - - Go to **Group Policy Editor** > **User Configuration** > **Administrative Templates\\Start Menu and Taskbar\\Remove All Programs list from the Start menu**. - -- Hide **Ease of access** feature on the logon screen. - - Go to **Control Panel** > **Ease of Access** > **Ease of Access Center**, and turn off all accessibility tools. - -- Disable the hardware power button. - - Go to **Power Options** > **Choose what the power button does**, change the setting to **Do nothing**, and then **Save changes**. - -- Disable the camera. - - Go to **Settings** > **Privacy** > **Camera**, and turn off **Let apps use my camera**. - -- Turn off app notifications on the lock screen. - - Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\System\\Logon\\Turn off app notifications on the lock screen**. - -- Disable removable media. - - Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\System\\Device Installation\\Device Installation Restrictions**. Review the policy settings available in **Device Installation Restrictions** for the settings applicable to your situation. - - **Note** - - To prevent this policy from affecting a member of the Administrators group, in **Device Installation Restrictions**, enable **Allow administrators to override Device Installation Restriction policies**. - -To learn more about locking down features, see [Customizations for Windows 10 Enterprise](/windows-hardware/customize/enterprise/enterprise-custom-portal). - -## Customize Start screen layout for the device (recommended) - -Configure the Start menu on the device to only show tiles for the permitted apps. You will make the changes manually, export the layout to an .xml file, and then apply that file to devices to prevent users from making changes. For instructions, see [Manage Windows 10 Start layout options](../start/windows-10-start-layout-options-and-policies.md). diff --git a/windows/configuration/kiosk/lock-down-windows-10-to-specific-apps.md b/windows/configuration/kiosk/lock-down-windows-10-to-specific-apps.md deleted file mode 100644 index 43646ca390..0000000000 --- a/windows/configuration/kiosk/lock-down-windows-10-to-specific-apps.md +++ /dev/null @@ -1,660 +0,0 @@ ---- -title: Set up a multi-app kiosk on Windows 10 -description: Learn how to configure a kiosk device running Windows 10 so that users can only run a few specific apps. -ms.topic: how-to -ms.date: 11/08/2023 ---- - -# Set up a multi-app kiosk on Windows 10 devices - -> [!NOTE] -> The use of multiple monitors isn't supported for multi-app kiosk mode in Windows 10. - -A [kiosk device](./kiosk-single-app.md) typically runs a single app, and users are prevented from accessing any features or functions on the device outside of the kiosk app. In Windows 10, version 1709, the [AssignedAccess configuration service provider (CSP)](/windows/client-management/mdm/assignedaccess-csp) was expanded to make it easy for administrators to create kiosks that run more than one app. The benefit of a kiosk that runs only one or more specified apps is to provide an easy-to-understand experience for individuals by putting in front of them only the things they need to use, and removing from their view the things they don't need to access. - -The following table lists changes to multi-app kiosk in recent updates. - -| New features and improvements | In update | -| --- | ---| -| - Configure [a single-app kiosk profile](#profile) in your XML file

    - Assign [group accounts to a config profile](#config-for-group-accounts)

    - Configure [an account to sign in automatically](#config-for-autologon-account) | Windows 10, version 1803 | -| - Explicitly allow [some known folders when user opens file dialog box](#fileexplorernamespacerestrictions)

    - [Automatically launch an app](#allowedapps) when the user signs in

    - Configure a [display name for the autologon account](#config-for-autologon-account) | Windows 10, version 1809

    **Important:** To use features released in Windows 10, version 1809, make sure that [your XML file](#create-xml-file) references `https://schemas.microsoft.com/AssignedAccess/201810/config`. | - -> [!WARNING] -> The assigned access feature is intended for corporate-owned fixed-purpose devices, like kiosks. When the multi-app assigned access configuration is applied on the device, [certain policies](kiosk-policies.md) are enforced system-wide, and will impact other users on the device. Deleting the kiosk configuration will remove the assigned access lockdown profiles associated with the users, but it cannot revert all the enforced policies (such as Start layout). A factory reset is needed to clear all the policies enforced via assigned access. - -You can configure multi-app kiosks using [Microsoft Intune](#intune) or a [provisioning package](#provision). - -> [!TIP] -> Be sure to check the [configuration recommendations](kiosk-prepare.md) before you set up your kiosk. - - - -## Configure a kiosk in Microsoft Intune - -To configure a kiosk in Microsoft Intune, see: - -- [Windows client and Windows Holographic for Business device settings to run as a dedicated kiosk using Intune](/intune/kiosk-settings) -- [Windows client device settings to run as a kiosk in Intune](/intune/kiosk-settings-windows) - - - -## Configure a kiosk using a provisioning package - -Process: - -1. [Create XML file](#create-xml-file) -1. [Add XML file to provisioning package](#add-xml) -1. [Apply provisioning package to device](#apply-ppkg) - -Watch how to use a provisioning package to configure a multi-app kiosk. - -> [!VIDEO https://www.microsoft.com/videoplayer/embed/fa125d0f-77e4-4f64-b03e-d634a4926884?autoplay=false] - -If you don't want to use a provisioning package, you can deploy the configuration XML file using [mobile device management (MDM)](#use-mdm-to-deploy-the-multi-app-configuration), or you can configure assigned access using the [MDM Bridge WMI Provider](kiosk-mdm-bridge.md). - -### Prerequisites - -- Windows Configuration Designer (Windows 10, version 1709 or later) -- The kiosk device must be running Windows 10 (S, Pro, Enterprise, or Education), version 1709 or later - -> [!NOTE] -> For devices running versions of Windows 10 earlier than version 1709, you can [create AppLocker rules](lock-down-windows-10-applocker.md) to configure a multi-app kiosk. - -### Create XML file - -Let's start by looking at the basic structure of the XML file. - -- A configuration xml can define multiple *profiles*. Each profile has a unique **Id** and defines a set of applications that are allowed to run, whether the taskbar is visible, and can include a custom Start layout. - -- A configuration xml can have multiple *config* sections. Each config section associates a non-admin user account to a default profile **Id**. - -- Multiple config sections can be associated to the same profile. - -- A profile has no effect if it's not associated to a config section. - - ![profile = app and config = account.](images/profile-config.png) - -You can start your file by pasting the following XML into an XML editor, and saving the file as *filename*.xml. Each section of this XML is explained in this article. You can see a full sample version in the [Assigned access XML reference.](kiosk-xml.md) - -```xml - - - - - - - - - - - - - - - - - - -``` - -#### Profile - -There are two types of profiles that you can specify in the XML: - -- **Lockdown profile**: Users assigned a lockdown profile will see the desktop in tablet mode with the specific apps on the Start screen. -- **Kiosk profile**: Starting with Windows 10 version 1803, this profile replaces the KioskModeApp node of the [AssignedAccess CSP](/windows/client-management/mdm/assignedaccess-csp). Users assigned a kiosk profile won't see the desktop, but only the kiosk app running in full-screen mode. - -A lockdown profile section in the XML has the following entries: - -- [**Id**](#id) - -- [**AllowedApps**](#allowedapps) - -- [**FileExplorerNamespaceRestrictions**](#fileexplorernamespacerestrictions) - -- [**StartLayout**](#startlayout) - -- [**Taskbar**](#taskbar) - -A kiosk profile in the XML has the following entries: - -- [**Id**](#id) - -- [**KioskModeApp**](#kioskmodeapp) - -##### Id - -The profile **Id** is a GUID attribute to uniquely identify the profile. You can create a GUID using a GUID generator. The GUID just needs to be unique within this XML file. - -```xml - - - -``` - -##### AllowedApps - -**AllowedApps** is a list of applications that are allowed to run. Apps can be Universal Windows Platform (UWP) apps or Windows desktop applications. Starting with Windows 10 version 1809, you can configure a single app in the **AllowedApps** list to run automatically when the assigned access user account signs in. - -- For UWP apps, you need to provide the App User Model ID (AUMID). [Learn how to get the AUMID](./find-the-application-user-model-id-of-an-installed-app.md), or [get the AUMID from the Start Layout XML](#startlayout). -- For desktop apps, you need to specify the full path of the executable, which can contain one or more system environment variables in the form of `%variableName%`. For example, `%systemroot%` or `%windir%`. -- If an app has a dependency on another app, both must be included in the allowed apps list. For example, Internet Explorer 64-bit has a dependency on Internet Explorer 32-bit, so you must allow both `"C:\Program Files\internet explorer\iexplore.exe"` and `"C:\Program Files (x86)\Internet Explorer\iexplore.exe"`. -- To configure a single app to launch automatically when the user signs in, include `rs5:AutoLaunch="true"` after the AUMID or path. You can also include arguments to be passed to the app. For an example, see [the AllowedApps sample XML](#apps-sample). - -When the multi-app kiosk configuration is applied to a device, AppLocker rules will be generated to allow the apps that are listed in the configuration. Here are the predefined assigned access AppLocker rules for **UWP apps**: - -1. Default rule is to allow all users to launch the signed package apps. -1. The package app blocklist is generated at runtime when the assigned access user signs in. Based on the installed/provisioned package apps available for the user account, assigned access generates the blocklist. This list will exclude the default allowed inbox package apps, which are critical for the system to function. It then excludes the allowed packages that enterprises defined in the assigned access configuration. If there are multiple apps within the same package, all these apps will be excluded. This blocklist will be used to prevent the user from accessing the apps that are currently available for the user but not in the allowed list. - - > [!NOTE] - > You can't manage AppLocker rules that are generated by the multi-app kiosk configuration in [MMC snap-ins](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh994629(v=ws.11)#BKMK_Using_Snapins). Avoid creating AppLocker rules that conflict with AppLocker rules that are generated by the multi-app kiosk configuration. - > - > Multi-app kiosk mode doesn't block the enterprise or the users from installing UWP apps. When a new UWP app is installed during the current assigned access user session, this app will not be in the deny list. When the user signs out and signs in again, the app will be included in the blocklist. If this is an enterprise-deployed line-of-business app and you want to allow it to run, update the assigned access configuration to include it in the allowed app list. - -Here are the predefined assigned access AppLocker rules for **desktop apps**: - -1. Default rule is to allow all users to launch the desktop programs signed with Microsoft Certificate in order for the system to boot and function. The rule also allows the admin user group to launch all desktop programs. -1. There's a predefined inbox desktop app blocklist for the assigned access user account, and this blocklist is adjusted based on the desktop app allowlist that you defined in the multi-app configuration. -1. Enterprise-defined allowed desktop apps are added in the AppLocker allowlist. - -The following example allows Groove Music, Movies & TV, Photos, Weather, Calculator, Paint, and Notepad apps to run on the device, with Notepad configured to automatically launch and create a file called `123.text` when the user signs in. - - - -```xml - - - - - - - - - - - -``` - -##### FileExplorerNamespaceRestrictions - -Starting in Windows 10 version 1809, you can explicitly allow some known folders to be accessed when the user tries to open the file dialog box in multi-app assigned access by including **FileExplorerNamespaceRestrictions** in your XML file. Currently, **Downloads** is the only folder supported. This behavior can also be set using Microsoft Intune. - -The following example shows how to allow user access to the Downloads folder in the common file dialog box. - -> [!TIP] -> To grant access to the Downloads folder through File Explorer, add "Explorer.exe" to the list of allowed apps, and pin a file explorer shortcut to the kiosk start menu. - -```xml - - - - - - ... - - - - - - - ... - - - - - -``` - -`FileExplorerNamespaceRestriction` has been extended in current Windows 10 Prerelease for finer granularity and easier use. For more information and full samples, see [Assigned access XML reference](kiosk-xml.md). By using new elements, you can configure whether a user can access the Downloads folder or removable drives, or have no restrictions at all. - -> [!NOTE] -> - `FileExplorerNamespaceRestrictions` and `AllowedNamespace:Downloads` are available in namespace `https://schemas.microsoft.com/AssignedAccess/201810/config`. -> - `AllowRemovableDrives` and `NoRestriction` are defined in a new namespace `https://schemas.microsoft.com/AssignedAccess/2020/config`. - -- When `FileExplorerNamespaceRestrictions` node isn't used, or used but left empty, the user won't be able to access any folder in a common dialog. For example, **Save As** in the Microsoft Edge browser. -- When Downloads is mentioned in allowed namespace, user will be able to access Downloads folder. -- When `AllowRemovableDrives` is used, user will be to access removable drives. -- When `NoRestriction` is used, no restriction will be applied to the dialog. -- `AllowRemovableDrives` and `AllowedNamespace:Downloads` can be used at the same time. - -##### StartLayout - -After you define the list of allowed applications, you can customize the Start layout for your kiosk experience. You can choose to pin all the allowed apps on the Start screen or just a subset, depending on whether you want the end user to directly access them on the Start screen. - -The easiest way to create a customized Start layout to apply to other Windows client devices is to set up the Start screen on a test device and then export the layout. For detailed steps, see [Customize and export Start layout](../start/customize-and-export-start-layout.md). - -A few things to note here: - -- The test device on which you customize the Start layout should have the same OS version that is installed on the device where you plan to deploy the multi-app assigned access configuration. -- Since the multi-app assigned access experience is intended for fixed-purpose devices, to ensure the device experiences are consistent and predictable, use the *full* Start layout option instead of the *partial* Start layout. -- There are no apps pinned on the taskbar in the multi-app mode, and it's not supported to configure Taskbar layout using the `` tag in a layout modification XML as part of the assigned access configuration. -- The following example uses `DesktopApplicationLinkPath` to pin the desktop app to start. When the desktop app doesn't have a shortcut link on the target device, [learn how to provision .lnk files using Windows Configuration Designer](#lnk-files). - -The following example pins Groove Music, Movies & TV, Photos, Weather, Calculator, Paint, and Notepad apps on Start: - -```xml - - - - - - - - - - - - - - - - - - - - - - ]]> - -``` - -> [!NOTE] -> If an app isn't installed for the user, but is included in the Start layout XML, the app isn't shown on the Start screen. - -![What the Start screen looks like when the XML sample is applied.](images/sample-start.png) - -##### Taskbar - -Define whether you want to have the taskbar present in the kiosk device. For tablet-based or touch-enabled all-in-one kiosks, when you don't attach a keyboard and mouse, you can hide the taskbar as part of the multi-app experience if you want. - -The following example exposes the taskbar to the end user: - -```xml - -``` - -The following example hides the taskbar: - -```xml - -``` - -> [!NOTE] -> This is different from the **Automatically hide the taskbar** option in tablet mode, which shows the taskbar when swiping up from or moving the mouse pointer down to the bottom of the screen. Setting **ShowTaskbar** as **false** will always keep the taskbar hidden. - -##### KioskModeApp - -**KioskModeApp** is used for a [kiosk profile](#profile) only. Enter the AUMID for a single app. You can only specify one kiosk profile in the XML. - -```xml - -``` - -> [!IMPORTANT] -> The kiosk profile is designed for public-facing kiosk devices. We recommend that you use a local, non-administrator account. If the device is connected to your company network, using a domain or Microsoft Entra account could potentially compromise confidential information. - -#### Configs - -Under **Configs**, define which user account will be associated with the profile. When this user account signs in on the device, the associated assigned access profile will be enforced. This behavior includes the allowed apps, Start layout, taskbar configuration, and other local group policies or mobile device management (MDM) policies set as part of the multi-app experience. - -The full multi-app assigned access experience can only work for non-admin users. It's not supported to associate an admin user with the assigned access profile. Making this configuration in the XML file will result in unexpected or unsupported experiences when this admin user signs in. - -You can assign: - -- [A local standard user account that signs in automatically](#config-for-autologon-account) (Applies to Windows 10, version 1803 only) -- [An individual account, which can be local, domain, or Microsoft Entra ID](#config-for-individual-accounts) -- [A group account, which can be local, Active Directory (domain), or Microsoft Entra ID](#config-for-group-accounts) (Applies to Windows 10, version 1803 only). - -> [!NOTE] -> Configs that specify group accounts cannot use a kiosk profile, only a lockdown profile. If a group is configured to a kiosk profile, the CSP will reject the request. - -##### Config for AutoLogon Account - -When you use `` and the configuration is applied to a device, the specified account (managed by Assigned Access) is created on the device as a local standard user account. The specified account is signed in automatically after restart. - -The following example shows how to specify an account to sign in automatically. - -```xml - - - - - - -``` - -Starting with Windows 10 version 1809, you can configure the display name that will be shown when the user signs in. The following example shows how to create an AutoLogon Account that shows the name "Hello World". - -```xml - - - - - - -``` - -On domain-joined devices, local user accounts aren't shown on the sign-in screen by default. To show the **AutoLogonAccount** on the sign-in screen, enable the following Group Policy setting: **Computer Configuration > Administrative Templates > System > Logon > Enumerate local users on domain-joined computers**. (The corresponding MDM policy setting is [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers in the Policy CSP](/windows/client-management/mdm/policy-csp-windowslogon#windowslogon-enumeratelocalusersondomainjoinedcomputers).) - -> [!IMPORTANT] -> When Exchange Active Sync (EAS) password restrictions are active on the device, the autologon feature does not work. This behavior is by design. For more informations, see [How to turn on automatic logon in Windows](/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon). - -##### Config for individual accounts - -Individual accounts are specified using ``. - -- Local account can be entered as `machinename\account` or `.\account` or just `account`. -- Domain account should be entered as `domain\account`. -- Microsoft Entra account must be specified in this format: `AzureAD\{email address}`. **AzureAD** must be provided _as is_, and consider it's a fixed domain name. Then follow with the Microsoft Entra ID email address. For example, `AzureAD\someone@contoso.onmicrosoft.com` - -> [!WARNING] -> Assigned access can be configured via WMI or CSP to run its applications under a domain user or service account, rather than a local account. However, use of domain user or service accounts introduces risks that an attacker subverting the assigned access application might gain access to sensitive domain resources that have been inadvertently left accessible to any domain account. We recommend that customers proceed with caution when using domain accounts with assigned access, and consider the domain resources potentially exposed by the decision to do so. - -Before applying the multi-app configuration, make sure the specified user account is available on the device, otherwise it will fail. - -> [!NOTE] -> For both domain and Microsoft Entra accounts, it's not required that target account is explicitly added to the device. As long as the device is AD-joined or Microsoft Entra joined, the account can be discovered in the domain forest or tenant that the device is joined to. For local accounts, it is required that the account exist before you configure the account for assigned access. - -```xml - - - MultiAppKioskUser - - - -``` - -##### Config for group accounts - -Group accounts are specified using ``. Nested groups aren't supported. For example, if user A is member of Group 1, Group 1 is member of Group 2, and Group 2 is used in ``, user A won't have the kiosk experience. - -- Local group: Specify the group type as **LocalGroup** and put the group name in Name attribute. Any Microsoft Entra accounts that are added to the local group won't have the kiosk settings applied. - - ```xml - - - - - ``` - -- Domain group: Both security and distribution groups are supported. Specify the group type as ActiveDirectoryGroup. Use the domain name as the prefix in the name attribute. - - ```xml - - - - - ``` - -- Microsoft Entra group: Use the group object ID from the Azure portal to uniquely identify the group in the Name attribute. You can find the object ID on the overview page for the group in **Users and groups** > **All groups**. Specify the group type as **AzureActiveDirectoryGroup**. The kiosk device must have internet connectivity when users that belong to the group sign-in. - - ```xml - - - - - ``` - - > [!NOTE] - > If a Microsoft Entra group is configured with a lockdown profile on a device, a user in the Microsoft Entra group must change their password (after the account has been created with default password on the portal) before they can sign in to this device. If the user uses the default password to sign in to the device, the user will be immediately signed out. - - - -#### [Preview] Global profile - -Global profile is available in Windows 1. If you want everyone who signs into a specific device to be assigned as an access user, even if there's no dedicated profile for that user. Alternatively, perhaps Assigned Access couldn't identify a profile for the user and you want to have a fallback profile. Global profile is designed for these scenarios. - -Usage is demonstrated below, by using the new XML namespace and specifying `GlobalProfile` from that namespace. When you configure `GlobalProfile`, a non-admin account logs in, if this user doesn't have a designated profile in Assigned Access, or Assigned Access fails to determine a profile for current user, a global profile is applied for the user. - -> [!NOTE] -> 1. `GlobalProfile` can only be a multi-app profile. -> 1. Only one `GlobalProfile` can be used in one `AssignedAccess` configuration XML. -> 1. `GlobalProfile` can be used as the only config, or it can be used along with regular user or group config. - -```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ]]> - - - - - - - - -``` - -### Add XML file to provisioning package - -Before you add the XML file to a provisioning package, you can [validate your configuration XML against the XSD](kiosk-xml.md#xsd-for-assignedaccess-configuration-xml). - -Use the Windows Configuration Designer tool to create a provisioning package. [Learn how to install Windows Configuration Designer.](../provisioning-packages/provisioning-install-icd.md). - -> [!IMPORTANT] -> When you build a provisioning package, you may include sensitive information in the project files and in the provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when they are no longer needed. - -1. Open Windows Configuration Designer. By default: `%systemdrive%\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Imaging and Configuration Designer\x86\ICD.exe`. - -1. Choose **Advanced provisioning**. - -1. Name your project, and select **Next**. - -1. Choose **All Windows desktop editions** and select **Next**. - -1. On **New project**, select **Finish**. The workspace for your package opens. - -1. Expand **Runtime settings** > **AssignedAccess** > **MultiAppAssignedAccessSettings**. - -1. In the center pane, select **Browse**. Locate and select the assigned access configuration XML file that you created. - - ![Screenshot of the MultiAppAssignedAccessSettings field in Windows Configuration Designer.](images/multiappassignedaccesssettings.png) - -1. _Optional: If you want to apply the provisioning package after device initial setup and there's an admin user already available on the kiosk device, skip this step._ Create an admin user account in **Runtime settings** > **Accounts** > **Users**. Provide a **UserName** and **Password**, and select **UserGroup** as **Administrators**. With this account, you can view the provisioning status and logs if needed. - -1. _Optional: If you already have a non-admin account on the kiosk device, skip this step._ Create a local standard user account in **Runtime settings** > **Accounts** > **Users**. Make sure the **UserName** is the same as the account that you specify in the configuration XML. Select **UserGroup** as **Standard Users**. - -1. On the **File** menu, select **Save.** - -1. On the **Export** menu, select **Provisioning package**. - -1. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** - -1. Optional. In the **Provisioning package security** window, you can choose to encrypt the package and enable package signing. - - - **Enable package encryption** - If you select this option, an auto-generated password will be shown on the screen. - - - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Browse** and choosing the certificate you want to use to sign the package. - -1. Select **Next** to specify the output location where you want the provisioning package to go when it's built. By default, Windows Imaging and Configuration Designer (ICD) uses the project folder as the output location. - - Optionally, you can select **Browse** to change the default output location. - -1. Select **Next**. - -1. Select **Build** to start building the package. The provisioning package doesn't take long to build. The project information is displayed in the build page and the progress bar indicates the build status. - - If you need to cancel the build, select **Cancel**. This action cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. - -1. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again. - - If your build is successful, the name of the provisioning package, output directory, and project directory will be shown. - - - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this action, select **Back** to change the output package name and path, and then select **Next** to start another build. - - If you're done, select **Finish** to close the wizard and go back to the **Customizations Page**. - -1. Copy the provisioning package to the root directory of a USB drive. - - - -### Apply provisioning package to device - -Provisioning packages can be applied to a device during initial setup (out-of-box experience or "OOBE") and after ("runtime"). For more information, see [Apply a provisioning package](../provisioning-packages/provisioning-apply-package.md). - -> [!NOTE] -> If your provisioning package doesn't include the assigned access user account creation, make sure the account you specified in the multi-app configuration XML exists on the device. - -### Use MDM to deploy the multi-app configuration - -Multi-app kiosk mode is enabled by the [AssignedAccess configuration service provider (CSP)](/windows/client-management/mdm/assignedaccess-csp). Your MDM policy can contain the assigned access configuration XML. - -If your device is enrolled with an MDM service that supports applying the assigned access configuration, you can use it to apply the setting remotely. - -The OMA-URI for multi-app policy is `./Device/Vendor/MSFT/AssignedAccess/Configuration`. - -## Considerations for Windows Mixed Reality immersive headsets - -With the advent of [mixed reality devices (video link)](https://www.youtube.com/watch?v=u0jqNioU2Lo), you might want to create a kiosk that can run mixed reality apps. - -To create a multi-app kiosk that can run mixed reality apps, you must include the following apps in the [AllowedApps list](#allowedapps): - -```xml - - - - -``` - -These apps are in addition to any mixed reality apps that you allow. - -**Before your kiosk user signs in:** An admin user must sign in to the PC, connect a mixed reality device, and complete the guided setup for the Mixed Reality Portal. The first time that the Mixed Reality Portal is set up, some files and content are downloaded. A kiosk user wouldn't have permissions to download and so their setup of the Mixed Reality Portal would fail. - -After the admin has completed setup, the kiosk account can sign in and repeat the setup. The admin user may want to complete the kiosk user setup before providing the PC to employees or customers. - -There's a difference between the mixed reality experiences for a kiosk user and other users. Typically, when a user connects a mixed reality device, they begin in the [Mixed Reality home](/windows/mixed-reality/discover/navigating-the-windows-mixed-reality-home). The Mixed Reality home is a shell that runs in "silent" mode when the PC is configured as a kiosk. When a kiosk user connects a mixed reality device, they'll see only a blank display in the device, and won't have access to the features and functionality available in the home. To run a mixed reality app, the kiosk user must launch the app from the PC Start screen. - -## Policies set by multi-app kiosk configuration - -It's not recommended to set policies enforced in assigned access multi-app mode to different values using other channels, as the multi-app mode has been optimized to provide a locked-down experience. - -When the multi-app assigned access configuration is applied on the device, certain policies are enforced system-wide, and will affect other users on the device. - -### Group policy - -The following local policies affect all **non-administrator** users on the system, regardless whether the user is configured as an assigned access user or not. This list includes local users, domain users, and Microsoft Entra users. - -| Setting | Value | -| --- | --- | -Remove access to the context menus for the task bar | Enabled -Clear history of recently opened documents on exit | Enabled -Prevent users from customizing their Start Screen | Enabled -Prevent users from uninstalling applications from Start | Enabled -Remove All Programs list from the Start menu | Enabled -Remove Run menu from Start Menu | Enabled -Disable showing balloon notifications as toast | Enabled -Do not allow pinning items in Jump Lists | Enabled -Do not allow pinning programs to the Taskbar | Enabled -Do not display or track items in Jump Lists from remote locations | Enabled -Remove Notifications and Action Center | Enabled -Lock all taskbar settings | Enabled -Lock the Taskbar | Enabled -Prevent users from adding or removing toolbars | Enabled -Prevent users from resizing the taskbar | Enabled -Remove frequent programs list from the Start Menu | Enabled -Remove 'Map Network Drive' and 'Disconnect Network Drive' | Enabled -Remove the Security and Maintenance icon | Enabled -Turn off all balloon notifications | Enabled -Turn off feature advertisement balloon notifications | Enabled -Turn off toast notifications | Enabled -Remove Task Manager | Enabled -Remove Change Password option in Security Options UI | Enabled -Remove Sign Out option in Security Options UI | Enabled -Remove All Programs list from the Start Menu | Enabled - Remove and disable setting -Prevent access to drives from My Computer | Enabled - Restrict all drivers - -> [!NOTE] -> When **Prevent access to drives from My Computer** is enabled, users can browse the directory structure in File Explorer, but they cannot open folders and access the contents. Also, they cannot use the **Run** dialog box or the **Map Network Drive** dialog box to view the directories on these drives. The icons representing the specified drives still appear in File Explorer, but if users double-click the icons, a message appears explaining that a setting prevents the action. This setting does not prevent users from using programs to access local and network drives. It does not prevent users from using the Disk Management snap-in to view and change drive characteristics. - -### MDM policy - -Some of the MDM policies based on the [Policy configuration service provider (CSP)](/windows/client-management/mdm/policy-configuration-service-provider) affect all users on the system. - -Setting | Value | System-wide - --- | --- | --- -[Experience/AllowCortana](/windows/client-management/mdm/policy-csp-experience#experience-allowcortana) | 0 - Not allowed | Yes -[Start/AllowPinnedFolderDocuments](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderdocuments) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -[Start/AllowPinnedFolderDownloads](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderdownloads) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -[Start/AllowPinnedFolderFileExplorer](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderfileexplorer) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -[Start/AllowPinnedFolderHomeGroup](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderhomegroup) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -[Start/AllowPinnedFolderMusic](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfoldermusic) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -[Start/AllowPinnedFolderNetwork](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfoldernetwork) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -[Start/AllowPinnedFolderPersonalFolder](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderpersonalfolder) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -[Start/AllowPinnedFolderPictures](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderpictures) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -[Start/AllowPinnedFolderSettings](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfoldersettings) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -[Start/AllowPinnedFolderVideos](/windows/client-management/mdm/policy-csp-start#start-allowpinnedfoldervideos) | 0 - Shortcut is hidden and disables the setting in the Settings app | Yes -Start/DisableContextMenus | 1 - Context menus are hidden for Start apps | No -[Start/HidePeopleBar](/windows/client-management/mdm/policy-csp-start#start-hidepeoplebar) | 1 - True (hide) | No -[Start/HideChangeAccountSettings](/windows/client-management/mdm/policy-csp-start#start-hidechangeaccountsettings) | 1 - True (hide) | Yes -[WindowsInkWorkspace/AllowWindowsInkWorkspace](/windows/client-management/mdm/policy-csp-windowsinkworkspace#windowsinkworkspace-allowwindowsinkworkspace) | 0 - Access to ink workspace is disabled and the feature is turned off | Yes -[Start/StartLayout](/windows/client-management/mdm/policy-csp-start#start-startlayout) | Configuration dependent | No -[WindowsLogon/DontDisplayNetworkSelectionUI](/windows/client-management/mdm/policy-csp-windowslogon#windowslogon-dontdisplaynetworkselectionui) | <Enabled/> | Yes - - - -## Provision .lnk files using Windows Configuration Designer - -First, create your desktop app's shortcut file by installing the app on a test device, using the default installation location. Right-click the installed application, and choose **Send to** > **Desktop (create shortcut)**. Rename the shortcut to `.lnk` - -Next, create a batch file with two commands. If the desktop app is already installed on the target device, skip the first command for MSI install. - -```PowerShell -msiexec /I ".msi" /qn /norestart -copy .lnk "%AllUsersProfile%\Microsoft\Windows\Start Menu\Programs\.lnk" -``` - -In Windows Configuration Designer, under **ProvisioningCommands** > **DeviceContext**: - -- Under **CommandFiles**, upload your batch file, your .lnk file, and your desktop app installation file. - - > [!IMPORTANT] - > Paste the full file path to the .lnk file in the **CommandFiles** field. If you browse to and select the .lnk file, the file path will be changed to the path of the target of the .lnk. - -- Under **CommandLine**, enter `cmd /c *FileName*.bat`. - -## Other methods - -Environments that use WMI can use the [MDM Bridge WMI Provider to configure a kiosk](kiosk-mdm-bridge.md). diff --git a/windows/configuration/kiosk/lock-down-windows-11-to-specific-apps.md b/windows/configuration/kiosk/lock-down-windows-11-to-specific-apps.md deleted file mode 100644 index 705b8f1517..0000000000 --- a/windows/configuration/kiosk/lock-down-windows-11-to-specific-apps.md +++ /dev/null @@ -1,404 +0,0 @@ ---- -title: Set up a multi-app kiosk on Windows 11 -description: Learn how to configure a kiosk device running Windows 11 so that users can only run a few specific apps. -ms.date: 05/12/2023 - -ms.topic: how-to ---- -# Set up a multi-app kiosk on Windows 11 devices - -> [!NOTE] -> The use of multiple monitors is supported for multi-app kiosk mode in Windows 11. - -An assigned access multi-app kiosk runs one or more apps from the desktop. People using the kiosk see a customized Start that shows only the apps that are allowed. With this approach, you can configure a locked-down experience for different account types. A multi-app kiosk is appropriate for devices that are shared by multiple people. Here's a guide on how to set up a multi-app kiosk. - -> [!WARNING] -> The assigned access feature is intended for corporate-owned fixed-purpose devices, like kiosks. When the multi-app assigned access configuration is applied on the device, [certain policies](kiosk-policies.md) are enforced system-wide, and will impact other users on the device. Deleting the kiosk configuration will remove the assigned access lockdown profiles associated with the users, but it cannot revert all the enforced policies (such as Start layout). A factory reset is needed to clear all the policies enforced via assigned access. - -> [!TIP] -> Be sure to check the [configuration recommendations](kiosk-prepare.md) before you set up your kiosk. - -## Configure a Multi-App Kiosk - -See the table below for the different methods to configure a multi-app kiosk in Windows 11. - -|Configuration Method|Availability| -|--------------------|------------| -|[MDM WMI Bridge Provider](#configure-a-kiosk-using-wmi-bridge) | Available May 2023| - - - -> [!NOTE] -> For WMI Bridge/PowerShell and Provisioning package methods, you will need to create your own multi-app kiosk XML file as specified below. - -## Create the XML file - -Let's start by looking at the basic structure of the XML file. - -- A configuration xml can define multiple *profiles*. Each profile has a unique **Id** and defines a set of applications that are allowed to run, whether the taskbar is visible, and can include a custom Start layout. - -- A configuration xml can have multiple *config* sections. Each config section associates a non-admin user account to a default profile **Id**. - -- Multiple config sections can be associated to the same profile. - -- A profile has no effect if it's not associated to a config section. - -You can start your file by pasting the following XML into an XML editor, and saving the file as *filename*.xml. Each section of this XML is explained in this article. - -> [!NOTE] -> If you want to write a configuration file to be applied to both Windows 10 and Windows 11 devices, follow the [Windows 10 instructions](lock-down-windows-10-to-specific-apps.md) to add the StartLayout tag to your XML file, just above the StartPins tag. Windows will automatically ignore the sections that don't apply to the version running. - -```xml - - - - - - - - - - - - - - - - - - -``` -#### Profile - -There are two types of profiles that you can specify in the XML: - -- **Lockdown profile**: Users assigned a lockdown profile will see the desktop in tablet mode with the specific apps on the Start screen. -- **Kiosk profile**: Starting with Windows 10 version 1803, this profile replaces the KioskModeApp node of the [AssignedAccess CSP](/windows/client-management/mdm/assignedaccess-csp). Users assigned a kiosk profile won't see the desktop, but only the kiosk app running in full-screen mode. - -A lockdown profile section in the XML has the following entries: - -- [**Id**](#id) -- [**AllowedApps**](#allowedapps) -- [**StartPins**](#startpins) -- [**Taskbar**](#taskbar) - -A kiosk profile in the XML has the following entries: - -- [**Id**](#id) -- [**KioskModeApp**](#kioskmodeapp) - -##### Id - -The profile **Id** is a GUID attribute to uniquely identify the profile. You can create a GUID using a GUID generator. The GUID just needs to be unique within this XML file. - -```xml - - - -``` - -##### AllowedApps - -**AllowedApps** is a list of applications that are allowed to run. Apps can be Universal Windows Platform (UWP) apps or Windows desktop applications. Starting with Windows 10 version 1809, you can configure a single app in the **AllowedApps** list to run automatically when the assigned access user account signs in. - -- For UWP apps, you need to provide the App User Model ID (AUMID). [Learn how to get the AUMID](./find-the-application-user-model-id-of-an-installed-app.md), or [get the AUMID from the Start Layout XML](#create-the-xml-file). -- For desktop apps, you need to specify the full path of the executable, which can contain one or more system environment variables in the form of `%variableName%`. For example, `%systemroot%` or `%windir%`. -- If an app has a dependency on another app, both must be included in the allowed apps list. For example, Internet Explorer 64-bit has a dependency on Internet Explorer 32-bit, so you must allow both `"C:\Program Files\internet explorer\iexplore.exe"` and `"C:\Program Files (x86)\Internet Explorer\iexplore.exe"`. -- To configure a single app to launch automatically when the user signs in, include `rs5:AutoLaunch="true"` after the AUMID or path. You can also include arguments to be passed to the app. For an example, see [the AllowedApps sample XML](#apps-sample). - -When the multi-app kiosk configuration is applied to a device, AppLocker rules will be generated to allow the apps that are listed in the configuration. Here are the predefined assigned access AppLocker rules for **UWP apps**: - -1. Default rule is to allow all users to launch the signed package apps. -1. The package app blocklist is generated at runtime when the assigned access user signs in. Based on the installed/provisioned package apps available for the user account, assigned access generates the blocklist. This list will exclude the default allowed inbox package apps, which are critical for the system to function. It then excludes the allowed packages that enterprises defined in the assigned access configuration. If there are multiple apps within the same package, all these apps will be excluded. This blocklist will be used to prevent the user from accessing the apps that are currently available for the user but not in the allowed list. - - > [!NOTE] - > You can't manage AppLocker rules that are generated by the multi-app kiosk configuration in [MMC snap-ins](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh994629(v=ws.11)#BKMK_Using_Snapins). Avoid creating AppLocker rules that conflict with AppLocker rules that are generated by the multi-app kiosk configuration. - > Multi-app kiosk mode doesn't block the enterprise or the users from installing UWP apps. When a new UWP app is installed during the current assigned access user session, this app will not be in the deny list. When the user signs out and signs in again, the app will be included in the blocklist. If this is an enterprise-deployed line-of-business app and you want to allow it to run, update the assigned access configuration to include it in the allowed app list. - -Here are the predefined assigned access AppLocker rules for **desktop apps**: - -1. Default rule is to allow all users to launch the desktop programs signed with Microsoft Certificate in order for the system to boot and function. The rule also allows the admin user group to launch all desktop programs. -1. There's a predefined inbox desktop app blocklist for the assigned access user account, and this blocklist is adjusted based on the desktop app allowlist that you defined in the multi-app configuration. -1. Enterprise-defined allowed desktop apps are added in the AppLocker allowlist. - -The following example allows Photos, Weather, Calculator, Paint, and Notepad apps to run on the device, with Notepad configured to automatically launch and create a file called `123.text` when the user signs in. - - - -```xml - - - - - - - - - -``` - -##### StartPins - -After you define the list of allowed applications, you can customize the Start layout for your kiosk experience. The easiest way to create a customized Start layout to apply to other Windows client devices is to set up the Start screen on a test device and then export the layout. Once you've decided, you can get the JSON needed for your kiosk configuration by following the steps to [Get the pinnedList JSON](../start/customize-and-export-start-layout.md). If you opt to do this using the PowerShell command, make sure that the system you run the command on has the same file structure as the device on which you will apply the kiosk (the path to the allowed apps must be the same). At the end of this step, you should have a JSON pinnedList that looks something like the below. - -Add your pinnedList JSON into the StartPins tag in your XML file. - -```xml - - - -``` - -> [!NOTE] -> If an app isn't installed for the user, but is included in the Start layout XML, the app isn't shown on the Start screen. - -##### Taskbar - -Define whether you want to have the taskbar present in the kiosk device. For tablet-based or touch-enabled all-in-one kiosks, when you don't attach a keyboard and mouse, you can hide the taskbar as part of the multi-app experience if you want. - -The following example exposes the taskbar to the end user: - -```xml - -``` - -The following example hides the taskbar: - -```xml - -``` - -> [!NOTE] -> This is different from the **Automatically hide the taskbar** option in tablet mode, which shows the taskbar when swiping up from or moving the mouse pointer down to the bottom of the screen. Setting **ShowTaskbar** as **false** will always keep the taskbar hidden. - -##### KioskModeApp - -**KioskModeApp** is used for a [kiosk profile](#profile) only. Enter the AUMID for a single app. You can only specify one kiosk profile in the XML. - -```xml - -``` - -> [!IMPORTANT] -> The kiosk profile is designed for public-facing kiosk devices. We recommend that you use a local, non-administrator account. If the device is connected to your company network, using a domain or Microsoft Entra account could potentially compromise confidential information. - -#### Configs - -Under **Configs**, define which user account will be associated with the profile. When this user account signs in on the device, the associated assigned access profile will be enforced. This behavior includes the allowed apps, Start layout, taskbar configuration, and other local group policies or mobile device management (MDM) policies set as part of the multi-app experience. - -The full multi-app assigned access experience can only work for non-admin users. It's not supported to associate an admin user with the assigned access profile. Making this configuration in the XML file will result in unexpected or unsupported experiences when this admin user signs in. - -You can assign: - -- [A local standard user account that signs in automatically](#config-for-autologon-account) (Applies to Windows 10, version 1803 only) -- [An individual account, which can be local, domain, or Microsoft Entra ID](#config-for-individual-accounts) -- [A group account, which can be local, Active Directory (domain), or Microsoft Entra ID](#config-for-group-accounts) (Applies to Windows 10, version 1803 only). - -> [!NOTE] -> Configs that specify group accounts cannot use a kiosk profile, only a lockdown profile. If a group is configured to a kiosk profile, the CSP will reject the request. - -##### Config for AutoLogon Account - -When you use `` and the configuration is applied to a device, the specified account (managed by Assigned Access) is created on the device as a local standard user account. The specified account is signed in automatically after restart. - -The following example shows how to specify an account to sign in automatically. - -```xml - - - - - - -``` - -Starting with Windows 10 version 1809, you can configure the display name that will be shown when the user signs in. The following example shows how to create an AutoLogon Account that shows the name "Hello World". - -```xml - - - - - - -``` - -On domain-joined devices, local user accounts aren't shown on the sign-in screen by default. To show the **AutoLogonAccount** on the sign-in screen, enable the following Group Policy setting: **Computer Configuration > Administrative Templates > System > Logon > Enumerate local users on domain-joined computers**. (The corresponding MDM policy setting is [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers in the Policy CSP](/windows/client-management/mdm/policy-csp-windowslogon#windowslogon-enumeratelocalusersondomainjoinedcomputers).) - ->[!IMPORTANT] ->When Exchange Active Sync (EAS) password restrictions are active on the device, the autologon feature does not work. This behavior is by design. For more informations, see [How to turn on automatic logon in Windows](/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon). - -##### Config for individual accounts - -Individual accounts are specified using ``. - -- Local account can be entered as `machinename\account` or `.\account` or just `account`. -- Domain account should be entered as `domain\account`. -- Microsoft Entra account must be specified in this format: `AzureAD\{email address}`. **AzureAD** must be provided *as is*, and consider it's a fixed domain name. Then follow with the Microsoft Entra ID email address. For example, `AzureAD\someone@contoso.onmicrosoft.com` - -> [!WARNING] -> Assigned access can be configured via WMI or CSP to run its applications under a domain user or service account, rather than a local account. However, use of domain user or service accounts introduces risks that an attacker subverting the assigned access application might gain access to sensitive domain resources that have been inadvertently left accessible to any domain account. We recommend that customers proceed with caution when using domain accounts with assigned access, and consider the domain resources potentially exposed by the decision to do so. - -Before applying the multi-app configuration, make sure the specified user account is available on the device, otherwise it will fail. - -> [!NOTE] -> For both domain and Microsoft Entra accounts, it's not required that target account is explicitly added to the device. As long as the device is AD-joined or Microsoft Entra joined, the account can be discovered in the domain forest or tenant that the device is joined to. For local accounts, it is required that the account exist before you configure the account for assigned access. - -```xml - - - MultiAppKioskUser - - - -``` - -##### Config for group accounts - -Group accounts are specified using ``. Nested groups aren't supported. For example, if user A is member of Group 1, Group 1 is member of Group 2, and Group 2 is used in ``, user A won't have the kiosk experience. - -- Local group: Specify the group type as **LocalGroup** and put the group name in Name attribute. Any Microsoft Entra accounts that are added to the local group won't have the kiosk settings applied. - - ```xml - - - - - ``` - -- Domain group: Both security and distribution groups are supported. Specify the group type as ActiveDirectoryGroup. Use the domain name as the prefix in the name attribute. - - ```xml - - - - - ``` - -- Microsoft Entra group: Use the group object ID from the Azure portal to uniquely identify the group in the Name attribute. You can find the object ID on the overview page for the group in **Users and groups** > **All groups**. Specify the group type as **AzureActiveDirectoryGroup**. The kiosk device must have internet connectivity when users that belong to the group sign-in. - - ```xml - - - - - ``` - - > [!NOTE] - > If a Microsoft Entra group is configured with a lockdown profile on a device, a user in the Microsoft Entra group must change their password (after the account has been created with default password on the portal) before they can sign in to this device. If the user uses the default password to sign in to the device, the user will be immediately signed out. - -## Configure a kiosk using WMI Bridge - -Environments that use [Windows Management Instrumentation (WMI)](/windows/win32/wmisdk/wmi-start-page) can use the [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal) to configure the MDM_AssignedAccess class. - -Here's an example of how to set AssignedAccess configuration: - -1. Download the [psexec tool](/sysinternals/downloads/psexec). - -1. Using an elevated command prompt, run `psexec.exe -i -s cmd.exe`. -1. In the command prompt launched by psexec.exe, enter `powershell.exe` to open PowerShell. -1. Save the following Powershell excerpt as a PowerShell script (.ps1), replacing the placeholder "your XML here" with the [Sample Assigned Access XML](#sample-assigned-access-xml) then run the script at the Powershell prompt from the previous step. - -```powershell -$eventLogFilterHashTable = @{ - ProviderName = "Microsoft-Windows-AssignedAccess"; - StartTime = Get-Date -Millisecond 0 -} - -$namespaceName="root\cimv2\mdm\dmmap" -$className="MDM_AssignedAccess" -$obj = Get-CimInstance -Namespace $namespaceName -ClassName $className -$obj.Configuration = [System.Net.WebUtility]::HtmlEncode(@" - - - -"@) - -$obj = Set-CimInstance -CimInstance $obj -ErrorVariable cimSetError -ErrorAction SilentlyContinue -if($cimSetError) { - Write-Output "An ERROR occurred. Displaying error record and attempting to retrieve error logs...`n" - Write-Error -ErrorRecord $cimSetError[0] - - $timeout = New-TimeSpan -Seconds 30 - $stopwatch = [System.Diagnostics.Stopwatch]::StartNew() - do{ - $events = Get-WinEvent -FilterHashtable $eventLogFilterHashTable -ErrorAction Ignore - } until ($events.Count -or $stopwatch.Elapsed -gt $timeout) # wait for the log to be available - - if($events.Count) { - $events | ForEach-Object { - - Write-Output "$($_.TimeCreated) [$($_.LevelDisplayName.ToUpper())] $($_.Message -replace "`n|`r")" - - } - } else { - Write-Warning "Timed-out attempting to retrieve event logs..." - } - - Exit 1 -} - -Write-Output "Successfully applied Assigned Access configuration" -``` - -## Sample Assigned Access XML - -This section contains a predefined XML file which can be used as a quickstart to get familiar with the Assigned Access multi-app kiosk feature on Windows 11. - -```xml - - - - - - - - - - - - - - - - - - - - - - - MultiAppKioskUser - - - - -``` diff --git a/windows/configuration/kiosk/lockdown-features-windows-10.md b/windows/configuration/kiosk/lockdown-features-windows-10.md deleted file mode 100644 index 592bf95d71..0000000000 --- a/windows/configuration/kiosk/lockdown-features-windows-10.md +++ /dev/null @@ -1,28 +0,0 @@ ---- -title: Lockdown features from Windows Embedded 8.1 Industry -description: Many of the lockdown feature available in Windows Embedded 8.1 Industry have been modified in some form for Windows 10. -ms.topic: article -appliesto: -- ✅ Windows 10 -ms.date: 12/31/2017 ---- - -# Lockdown features from Windows Embedded 8.1 Industry - -Many of the lockdown feature available in Windows Embedded 8.1 Industry have been modified in some form for Windows 1. This table maps Windows Embedded Industry 8.1 features to Windows 10 Enterprise features, along with links to documentation. - -|Windows Embedded 8.1 Industry lockdown feature|Windows 10 feature|Changes| -|--- |--- |--- | -|[Hibernate Once/Resume Many (HORM)](/previous-versions/windows/embedded/dn449302(v=winembedded.82)): Quick boot to device|[HORM](/windows-hardware/customize/enterprise/hibernate-once-resume-many-horm-)|HORM is supported in Windows 10, version 1607 and later.| -|[Unified Write Filter](/previous-versions/windows/embedded/dn449332(v=winembedded.82)): protect a device's physical storage media|[Unified Write Filter](/windows-hardware/customize/enterprise/unified-write-filter)|The Unified Write Filter is continued in Windows 10.| -|[Keyboard Filter](/previous-versions/windows/embedded/dn449298(v=winembedded.82)): block hotkeys and other key combinations|[Keyboard Filter](/windows-hardware/customize/enterprise/keyboardfilter)|Keyboard filter is added in Windows 10, version 151. As in Windows Embedded Industry 8.1, Keyboard Filter is an optional component that can be turned on via **Turn Windows Features On/Off**. Keyboard Filter (in addition to the WMI configuration previously available) will be configurable through Windows Imaging and Configuration Designer (ICD) in the SMISettings path.| -|[Shell Launcher](/previous-versions/windows/embedded/dn449423(v=winembedded.82)): launch a Windows desktop application on sign-on|[Shell Launcher](/windows-hardware/customize/enterprise/shell-launcher)|Shell Launcher continues in Windows 1. It's now configurable in Windows ICD under the **SMISettings** category.
    Learn [how to use Shell Launcher to create a kiosk device](/windows/configuration/kiosk-single-app) that runs a Windows desktop application.| -|[Application Launcher](/previous-versions/windows/embedded/dn449251(v=winembedded.82)): launch a Universal Windows Platform (UWP) app on sign-on|[Assigned Access](/windows/client-management/mdm/assignedaccess-csp)|The Windows 8 Application Launcher has been consolidated into Assigned Access. Application Launcher enabled launching a Windows 8 app and holding focus on that app. Assigned Access offers a more robust solution for ensuring that apps retain focus.| -|[Dialog Filter](/previous-versions/windows/embedded/dn449395(v=winembedded.82)): suppress system dialogs and control which processes can run|[AppLocker](/windows/device-security/applocker/applocker-overview)|Dialog Filter has been deprecated for Windows 1. Dialog Filter provided two capabilities; the ability to control which processes were able to run, and the ability to prevent dialogs (in practice, system dialogs) from appearing.
  • Control over which processes are able to run will now be provided by AppLocker.
  • System dialogs in Windows 10 have been replaced with system toasts. To see more on blocking system toasts, see Toast Notification Filter below.| -|[Toast Notification Filter](/previous-versions/windows/embedded/dn449360(v=winembedded.82)): suppress toast notifications|Mobile device management (MDM) and Group Policy|Toast Notification Filter has been replaced by MDM and Group Policy settings for blocking the individual components of noncritical system toasts that may appear. For example, to prevent a toast from appearing when a USB drive is connected, ensure that USB connections have been blocked using the USB-related policies, and turn off notifications from apps.
    Group Policy: **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** > **Notifications**
    MDM policy name may vary depending on your MDM service. In Microsoft Intune, use **Allow action center notifications** and a [custom OMA-URI setting](/mem/intune/configuration/custom-settings-windows-10) for **AboveLock/AllowActionCenterNotifications**.| -|[Embedded Lockdown Manager](/previous-versions/windows/embedded/dn449279(v=winembedded.82)): configure lockdown features|[Windows Imaging and Configuration Designer (ICD)](/windows/configuration/provisioning-packages/provisioning-install-icd)|The Embedded Lockdown Manager has been deprecated for Windows 10 and replaced by the Windows ICD. Windows ICD is the consolidated tool for Windows imaging and provisioning scenarios and enables configuration of all Windows settings, including the lockdown features previously configurable through Embedded Lockdown Manager.| -|[USB Filter](/previous-versions/windows/embedded/dn449350(v=winembedded.82)): restrict USB devices and peripherals on system|MDM and Group Policy|The USB Filter driver has been replaced by MDM and Group Policy settings for blocking the connection of USB devices.

    Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Device Installation** > **Device Installation Restrictions**
    MDM policy name may vary depending on your MDM service. In Microsoft Intune, use **Removable storage**.| -|[Assigned Access](/previous-versions/windows/embedded/dn449303(v=winembedded.82)): launch a UWP app on sign-in and lock access to system|[Assigned Access](/windows/client-management/mdm/assignedaccess-csp)|Assigned Access has undergone significant improvement for Windows 1. In Windows 8.1, Assigned Access blocked system hotkeys and edge gestures, and noncritical system notifications, but it also applied some of these limitations to other accounts on the device.
    In Windows 10, Assigned Access no longer affects accounts other than the one being locked down. Assigned Access now restricts access to other apps or system components by locking the device when the selected user account logs in and launching the designated app above the lock screen, ensuring that no unintended functionality can be accessed.

    Learn [how to use Assigned Access to create a kiosk device](/windows/configuration/kiosk-single-app) that runs a Universal Windows app.| -|[Gesture Filter](/previous-versions/windows/embedded/dn449374(v=winembedded.82)): block swipes from top, left, and right edges of screen|MDM and Group Policy|In Windows 8.1, gestures provided the ability to close an app, to switch apps, and to reach the Charms. In Windows 10, Charms have been removed. In Windows 10, version 1607, you can block swipes using the [Allow edge swipe](/windows/client-management/mdm/policy-configuration-service-provider#LockDown_AllowEdgeSwipe) policy.| -|[Custom sign in](/previous-versions/windows/embedded/dn449309(v=winembedded.82)): suppress Windows UI elements during Windows sign-on, sign out, and shut down|[Embedded sign in](/windows-hardware/customize/desktop/unattend/microsoft-windows-embedded-embeddedlogon)|No changes. Applies only to Windows 10 Enterprise and Windows 10 Education.| -|[Unbranded Boot](/previous-versions/windows/embedded/dn449249(v=winembedded.82)): custom brand a device by removing or replacing Windows boot UI elements|[Unbranded Boot](/windows-hardware/customize/enterprise/unbranded-boot)|No changes. Applies only to Windows 10 Enterprise and Windows 10 Education.| diff --git a/windows/configuration/kiosk/setup-digital-signage.md b/windows/configuration/kiosk/setup-digital-signage.md deleted file mode 100644 index f159299653..0000000000 --- a/windows/configuration/kiosk/setup-digital-signage.md +++ /dev/null @@ -1,65 +0,0 @@ ---- -title: Set up digital signs on Windows -description: A single-use device such as a digital sign is easy to set up in Windows 10 and Windows 11 (Pro, Enterprise, and Education). -ms.date: 09/20/2021 -ms.topic: article ---- - -# Set up digital signs - -Digital signage can be a useful and exciting business tool. Use digital signs to showcase your products and services, to display testimonials, or to advertise promotions and campaigns. A digital sign can be a static display, such as a building directory or menu, or it can be dynamic, such as repeating videos or a social media feed. - -For digital signage, simply select a digital sign player as your kiosk app. You can also use [Microsoft Edge in kiosk mode](/DeployEdge/microsoft-edge-configure-kiosk-mode) or the Kiosk Browser app, and configure it to show your online content. - ->[!TIP] ->Kiosk Browser can also be used in [single-app kiosks](kiosk-single-app.md) and [multi-app kiosk](lock-down-windows-10-to-specific-apps.md) as a web browser. For more information, see [Guidelines for web browsers](guidelines-for-assigned-access-app.md#guidelines-for-web-browsers). - -Kiosk Browser must be downloaded for offline licensing using Microsoft Store for Business. You can deploy Kiosk Browser to devices running Windows 11, and Windows 10 version 1803+. - ->[!NOTE] ->If you haven't set up your Microsoft Store for Business yet, check out [the prerequisites](/microsoft-store/prerequisites-microsoft-store-for-business) and then [sign up](/microsoft-store/sign-up-microsoft-store-for-business). - -This procedure explains how to configure digital signage using Kiosk Browser on a device running Windows client that has already been set up (completed the first-run experience). - -1. [Get **Kiosk Browser** in Microsoft Store for Business with offline, unencoded license type.](/microsoft-store/acquire-apps-microsoft-store-for-business#acquire-apps) -1. [Download the **Kiosk Browser** package, license file, and all required frameworks.](/microsoft-store/distribute-offline-apps#download-an-offline-licensed-app) -1. [Install Windows Configuration Designer.](~/provisioning-packages/provisioning-install-icd.md) -1. Open Windows Configuration Designer and select **Provision kiosk devices**. -1. Enter a friendly name for the project, and select **Finish**. -1. On **Set up device**, select **Disabled**, and select **Next**. -1. On **Set up network**, enable network setup: - - Toggle **On** wireless network connectivity. - - Enter the SSID, the network type (**Open** or **WPA2-Personal**), and (if **WPA2-Personal**) the password for the wireless network. -1. On **Account management**, select **Disabled**, and select **Next**. -1. On **Add applications**, select **Add an application**: - - For **Application name**, enter `Kiosk Browser`. - - For **Installer path**, browse to and select the AppxBundle that you downloaded from Microsoft Store for Business. After you select the package, additional fields are displayed. - - For **License file path**, browse to and select the XML license file that you downloaded from Microsoft Store for Business. - - The **Package family name** is populated automatically. - - Select **Next**. -1. On **Add certificates**, select **Next**. -1. On **Configure kiosk account and app**, toggle **Yes** to create a local user account for your digital signage: - - Enter a user name and password, and toggle **Auto sign-in** to **Yes**. - - Under **Configure the kiosk mode app**, enter the user name for the account that you're creating. - - For **App type**, select **Universal Windows App**. - - In **Enter the AUMID for the app**, enter `Microsoft.KioskBrowser_8wekyb3d8bbwe!App`. -1. In the bottom left corner of Windows Configuration Designer, select **Switch to advanced editor**. -1. Go to **Runtime settings** > **Policies** > **KioskBrowser**. Let's assume that the URL for your digital signage content is contoso.com/menu: - - In **BlockedUrlExceptions**, enter `https://www.contoso.com/menu`. - - In **BlockedUrl**, enter `*`. - - In **DefaultUrl**, enter `https://www.contoso.com/menu`. - - Set **EnableEndSessionButton**, **EnableHomeButton**, and **EnableNavigationButtons** to **No**. - - >[!TIP] - >For more information on kiosk browser settings, see [Guidelines for web browsers](guidelines-for-assigned-access-app.md#guidelines-for-web-browsers). - -1. On the **File** menu, select **Save**, and select **OK** in the **Keep your info secure** dialog box. -1. On the **Export** menu, select **Provisioning package**. -1. Change the **Owner** to **IT Admin**, and select **Next**. -1. On **Select security details for the provisioning package**, select **Next**. -1. On **Select where to save the provisioning package**, select **Next**. -1. On **Build the provisioning package**, select **Build**. -1. On the **All done!** screen, click the **Output location**. -1. Copy the .ppkg file to a USB drive. -1. Attach the USB drive to the device that you want to use for your digital sign. -1. Go to **Settings** > **Accounts** > **Access work or school** > **Add or remove a provisioning package** > **Add a package**, and select the package on the USB drive. diff --git a/windows/configuration/kiosk/toc.yml b/windows/configuration/kiosk/toc.yml deleted file mode 100644 index 3362daaabd..0000000000 --- a/windows/configuration/kiosk/toc.yml +++ /dev/null @@ -1,37 +0,0 @@ -items: -- name: Overview - href: kiosk-methods.md -- name: Prepare a device for kiosk configuration - href: kiosk-prepare.md -- name: Set up digital signs - href: setup-digital-signage.md -- name: Set up a single-app kiosk - href: kiosk-single-app.md -- name: Set up a multi-app kiosk for Windows 10 - href: lock-down-windows-10-to-specific-apps.md -- name: Set up a multi-app kiosk for Windows 11 - href: lock-down-windows-11-to-specific-apps.md -- name: Kiosk reference information - items: - - name: More kiosk methods and reference information - href: kiosk-additional-reference.md - - name: Find the Application User Model ID of an installed app - href: find-the-application-user-model-id-of-an-installed-app.md - - name: Validate your kiosk configuration - href: kiosk-validate.md - - name: Guidelines for choosing an app for assigned access (kiosk mode) - href: guidelines-for-assigned-access-app.md - - name: Policies enforced on kiosk devices - href: kiosk-policies.md - - name: Assigned access XML reference - href: kiosk-xml.md - - name: Use AppLocker to create a Windows 10 kiosk - href: lock-down-windows-10-applocker.md - - name: Use Shell Launcher to create a Windows client kiosk - href: kiosk-shelllauncher.md - - name: Use MDM Bridge WMI Provider to create a Windows client kiosk - href: kiosk-mdm-bridge.md - - name: Troubleshoot kiosk mode issues - href: /troubleshoot/windows-client/shell-experience/kiosk-mode-issues-troubleshooting -- name: Lockdown features from Windows Embedded 8.1 Industry - href: lockdown-features-windows-10.md \ No newline at end of file diff --git a/windows/configuration/provisioning-packages/toc.yml b/windows/configuration/provisioning-packages/toc.yml index 818ccc679e..afd0f1f158 100644 --- a/windows/configuration/provisioning-packages/toc.yml +++ b/windows/configuration/provisioning-packages/toc.yml @@ -1,5 +1,5 @@ items: - - name: Provisioning packages for Windows client + - name: Overview href: provisioning-packages.md - name: How provisioning works in Windows client href: provisioning-how-it-works.md diff --git a/windows/configuration/start/customize-and-export-start-layout.md b/windows/configuration/start/customize-and-export-start-layout.md index 725c7c8756..4a22ee3b6f 100644 --- a/windows/configuration/start/customize-and-export-start-layout.md +++ b/windows/configuration/start/customize-and-export-start-layout.md @@ -1,17 +1,180 @@ --- -title: Customize and export Start layout -description: The easiest method for creating a customized Start layout is to set up the Start screen and export the layout. +title: Customize and export the Start layout +description: Learn how to customize the Windows Start layout and export the configuration to apply to other devices. ms.topic: how-to +ms.date: 03/04/2024 +zone_pivot_groups: windows-versions-11-10 appliesto: -- ✅ Windows 10 -ms.date: 08/18/2023 ms.collection: - tier1 --- -# Customize and export Start layout +# Customize and export the Start layout ->**Looking for consumer information?** See [Customize the Start menu](https://go.microsoft.com/fwlink/p/?LinkId=623630) +> **Looking for OEM information?** See [Customize the Taskbar](/windows-hardware/customize/desktop/customize-the-windows-11-taskbar) and [Customize the Start layout](/windows-hardware/customize/desktop/customize-the-windows-11-start-menu). + +::: zone pivot="windows-11" + +Your organization can deploy a customized Start layout to your Windows 11 devices. Customizing the Start layout is common when you have similar devices used by many users, or you want to pin specific apps. + +For example, you can override the default set of apps with your own a set of pinned apps, and in the order you choose. As an administrator, use this feature to pin apps, remove default pinned apps, order the apps, and more. + +To add apps you want pinned to the Start menu, you use a JSON file. In previous Windows versions, IT administrators used an XML file to customize the Start menu. The XML file isn't available on Windows 11 and later ***unless*** [you're an OEM](/windows-hardware/customize/desktop/customize-the-windows-11-start-menu). + +This article shows you how to export an existing Start menu layout, and use the JSON in a Microsoft Intune policy. + +## Before you begin + +- When you customize the Start layout, you overwrite the entire full layout. A partial Start layout isn't available. Users can pin and unpin apps, and uninstall apps from Start. When a user signs in or Explorer restarts, Windows reapplies the MDM policy. This action restores the specified layout and doesn't retain any user changes. + + To prevent users from making any changes to the Start menu layout, see the [NoChangeStartMenu](/windows/client-management/mdm/policy-csp-admx-startmenu#admx-startmenu-nochangestartmenu) policy. + +- It's recommended to use a mobile device management (MDM) provider. MDM providers help manage your devices, and help manage apps on your devices. You can use Microsoft Intune. Intune is a family of products that include Microsoft Intune, which is a cloud service, and Configuration Manager, which is on-premises. + + In this article, we mention these services. If you're not managing your devices using an MDM provider, the following resources may help you get started: + + - [Endpoint Management at Microsoft](/mem/endpoint-manager-overview) + - [What is Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Intune planning guide](/mem/intune/fundamentals/intune-planning-guide) + - [What is Configuration Manager?](/mem/configmgr/core/understand/introduction) + +## Start menu features and areas + +In Windows 11, the Start menu is redesigned with a simplified set of apps that are arranged in a grid of pages. There aren't folders, groups, or different-sized app icons: + +:::image type="content" source="./images/start-windows-11.png" alt-text="Sample start menu layout on Windows 11 that shows pinned apps, access to all apps, and recommended files."::: + +Start has the following areas: + +- **Pinned**: Shows pinned apps, or a subset of all of the apps installed on the device. You can create a list of pinned apps you want on the devices using the **ConfigureStartPins** policy. **ConfigureStartPins** overrides the entire layout, which also removes apps that are pinned by default. + + This article shows you [how to use the **ConfigureStartPins** policy](#get-the-pinnedlist-json). + +- **All apps**: Users select this option to see an alphabetical list of all the apps on the device. This section can't be customized using the JSON file. + + The [Start/HideFrequentlyUsedApps CSP](/windows/client-management/mdm/policy-csp-start#start-hidefrequentlyusedapps) exposes settings that configure the "Most used" section, which is at the top of the all apps list. + + In **Intune**, you can configure this Start menu layout feature, and more. For more information on the Start menu settings you can configure in an Intune policy, see [Windows 10/11 device settings to allow or restrict features](/mem/intune/configuration/device-restrictions-windows-10#start). + + In **Group Policy**, there are policies that include settings that control the Start menu layout. Some policies may not work as expected. Be sure to test your policies before broadly deploying them across your devices: + + - `Computer Configuration\Administrative Templates\Start Menu and Taskbar` + - `User Configuration\Administrative Templates\Start Menu and Taskbar` + +- **Recommended**: Shows recently opened files and recently installed apps. This section can only be customized in Windows 11 SE using the following policy. + + - `Computer Configuration\Administrative Templates\Start Menu and Taskbar\Remove Recommended section from Start Menu` + +## Create the JSON file + +On an existing Windows 11 device, set up your own Start layout with the pinned apps you want users to see. Then, use the [Windows PowerShell Export-StartLayout](/powershell/module/startlayout/export-startlayout) cmdlet to export the existing layout to a `LayoutModification.json` file. + +The JSON file controls the Start menu layout, and lists all the apps that are pinned. You can update the JSON file to: + +- Change the order of existing apps. The apps in the JSON file are shown on Start in the same order. +- Add more apps by entering the app ID. For more information, see [Get the pinnedList JSON](#get-the-pinnedlist-json) (in this article). + +If you're familiar with creating JSON files, you can create your own `LayoutModification.json` file. But, it's easier and faster to export the layout from an existing device. + +### Export an existing Start layout + +1. Create a folder to save the `.json` file. For example, create the `C:\Layouts` folder. +1. On a Windows 11 device, open the Windows PowerShell app. +1. Run the following cmdlet. Name the file `LayoutModification.json`. + + ```powershell + Export-StartLayout -Path "C:\Layouts\LayoutModification.json" + + ``` + +### Get the pinnedList JSON + +1. Open the `LayoutModification.json` file in a JSON editor, such as Visual Studio Code or Notepad. For more information, see [edit JSON with Visual Studio Code](https://code.visualstudio.com/docs/languages/json). +1. In the file, you see the `pinnedList` section. This section includes all of the pinned apps. Copy the `pinnedList` content in the JSON file. You'll use it in the next section. + + In the following example, you see that Microsoft Edge, Microsoft Word, the Microsoft Store app, and Notepad are pinned: + + ```json + { + "pinnedList": [ + { "desktopAppId": "MSEdge" }, + { "desktopAppId": "Microsoft.Office.WINWORD.EXE.15" }, + { "packagedAppId": "Microsoft.WindowsStore_8wekyb3d8bbwe!App" }, + { "packagedAppId": "Microsoft.WindowsNotepad_8wekyb3d8bbwe!App" } + ] + } + ``` + +1. Starting with Windows 11, the **ConfigureStartPins** policy is available. This policy uses the `LayoutModification.json` file to add apps to the Pinned section. In your JSON file, you can add more apps to this section using the following keys: + +| Key | Description | +|--|--| +| packagedAppID | Use this option for Universal Windows Platform apps. To pin a UWP app, use the app's AUMID. | +| desktopAppID | Use this option for unpackaged Win32 apps. To pin a Win32 app, use the app's AUMID. If the app doesn't have an AUMID, then enter the `desktopAppLink` instead. | +| desktopAppLink | Use this option for unpackaged Win32 apps that don't have an associated AUMID. To pin this type of app, use the path to the `.lnk` shortcut that points to the app. | + +## Use MDM to create and deploy a pinned list policy + +Now that you have the JSON syntax, you're ready to deploy your customized Start layout to devices in your organization. + +MDM providers can deploy policies to devices managed by the organization, including organization-owned devices, and personal or bring your own device (BYOD). Using an MDM provider, such as Microsoft Intune, you can deploy a policy that configures the pinned list. + +This section shows you how to create a pinned list policy in Intune. There isn't a Group Policy to create a pinned list. + +### Create a pinned list using an Intune policy + +To deploy this policy, the devices must be enrolled, and managed by your organization. For more information, see [What is device enrollment?](/mem/intune/enrollment/device-enrollment). + +1. Sign in to the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). +1. Select **Devices** > **Configuration profiles** > **Create profile**. +1. Enter the following properties: + + - **Platform**: Select **Windows 10 and later**. + - **Profile**: Select **Templates** > **Custom**. + +1. Select **Create**. +1. In **Basics**, enter the following properties: + + - **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify them later. For example, a good profile name is **Win11: Custom Start layout**. + - **Description**: Enter a description for the profile. This setting is optional, and recommended. + +1. Select **Next**. +1. In **Configuration settings** > **OMA-URI**, select **Add**. Add the following properties: + + - **Name**: Enter something like **Configure Start pins**. + - **Description**: Enter a description for the row. This setting is optional, and recommended. + - **OMA-URI**: Enter `./Vendor/MSFT/Policy/Config/Start/ConfigureStartPins`. + - **Data type**: Select **String**. + - **Value**: Paste the JSON you created or updated in the previous section. For example, enter the following text: + + ```json + { + "pinnedList": [ + { "desktopAppId": "MSEdge" }, + { "desktopAppId": "Microsoft.Office.WINWORD.EXE.15" }, + { "packagedAppId": "Microsoft.WindowsStore_8wekyb3d8bbwe!App" }, + { "packagedAppId": "Microsoft.WindowsNotepad_8wekyb3d8bbwe!App" } + ] + } + ``` + + Your settings look similar to the following settings: + + :::image type="content" source="./images/endpoint-manager-admin-center-custom-oma-uri-start-layout.png" alt-text="Custom OMA-URI settings to customize Start menu layout using pinnedList"::: + +1. Select **Save** > **Next** to save your changes. +1. Configure the rest of the policy settings. For more specific information, see [Create a profile with custom settings](/mem/intune/configuration/custom-settings-configure). + +The Windows OS exposes many CSPs that apply to the Start menu. For a list, see [Supported CSP policies for Windows 11 Start menu](supported-csp-start-menu-layout-windows.md). + +### Deploy the policy using Intune + +When the policy is created, you can deploy it now, or deploy it later. Since this policy is a customized Start layout, the policy can be deployed anytime, including before users sign in the first time. + +For more information and guidance on assigning policies to devices in your organization, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign). + +::: zone-end + +::: zone pivot="windows-10" The easiest method for creating a customized Start layout to apply to other Windows 10 devices is to set up the Start screen on a test computer and then export the layout. @@ -21,15 +184,6 @@ When a full Start layout is applied, the users can't pin, unpin, or uninstall ap When [a partial Start layout](#configure-a-partial-start-layout) is applied, the contents of the specified tile groups can't be changed, but users can move those groups, and can also create and customize their own groups. -> [!NOTE] -> Partial Start layout is only supported on Windows 10, version 1511 and later. - -You can deploy the resulting .xml file to devices using one of the following methods: - -- [Group Policy](customize-windows-10-start-screens-by-using-group-policy.md) -- [Windows Configuration Designer provisioning package](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md) -- [Mobile device management (MDM)](customize-windows-10-start-screens-by-using-mobile-device-management.md) - ## Customize the Start screen on your test computer To prepare a Start layout for export, you simply customize the Start layout on a test computer. @@ -52,9 +206,7 @@ To customize Start: - **Create your own app groups**. Drag the apps to an empty area. To name a group, select above the group of tiles and then type the name in the **Name group** field that appears above the group. > [!IMPORTANT] -> In Windows 10, version 1703, if the Start layout includes tiles for apps that are not installed on the device that the layout is later applied to, the tiles for those apps will be blank. The blank tiles will persist until the next time the user signs in, at which time the blank tiles are removed. Some system events may cause the blank tiles to be removed before the next sign-in. -> -> In earlier versions of Windows 10, no tile would be pinned. +> If the Start layout includes tiles for apps that are not installed on the device that the layout is later applied to, the tiles for those apps will be blank. The blank tiles will persist until the next time the user signs in, at which time the blank tiles are removed. Some system events may cause the blank tiles to be removed before the next sign-in. ### Export the Start layout @@ -66,17 +218,13 @@ When you have the Start layout that you want your users to see, use the [Export- To export the Start layout to an .xml file: 1. While signed in with the same account that you used to customize Start, right-click Start, and select **Windows PowerShell**. -1. On a device running Windows 10, version 1607, 1703, or 1803, at the Windows PowerShell command prompt, enter the following command: - - `Export-StartLayout -path .xml` - - On a device running Windows 10, version 1809 or higher, run the **Export-StartLayout** with the switch **-UseDesktopApplicationID**. For example: +1. Run `Export-StartLayout` with the switch `-UseDesktopApplicationID`. For example: ```PowerShell Export-StartLayout -UseDesktopApplicationID -Path layout.xml ``` - In the previous command, `-path` is a required parameter that specifies the path and file name for the export file. You can specify a local path or a UNC path (for example, \\\\FileServer01\\StartLayouts\\StartLayoutMarketing.xml). + In the previous command, `-path` is a required parameter that specifies the path and file name for the export file. You can specify a local path or a UNC path (for example, `\\FileServer01\StartLayouts\StartLayoutMarketing.xml`). Use a file name of your choice—for example, StartLayoutMarketing.xml. Include the .xml file name extension. The [Export-StartLayout](/powershell/module/startlayout/export-startlayout) cmdlet doesn't append the file name extension, and the policy settings require the extension. @@ -99,7 +247,7 @@ To export the Start layout to an .xml file: ``` -1. (Optional) Edit the .xml file to add [a taskbar configuration](../taskbar/configure-windows-10-taskbar.md) or to [modify the exported layout](start-layout-xml-desktop.md). When you make changes to the exported layout, be aware that [the order of the elements in the .xml file is critical.](start-layout-xml-desktop.md#required-order) +1. (Optional) Edit the .xml file to add [a taskbar configuration](../taskbar/configure.md) or to [modify the exported layout](start-layout-xml-desktop.md). When you make changes to the exported layout, be aware that [the order of the elements in the .xml file is critical.](start-layout-xml-desktop.md#required-order) > [!IMPORTANT] > If the Start layout that you export contains tiles for desktop (Win32) apps or .url links, **Export-StartLayout** will use **DesktopApplicationLinkPath** in the resulting file. Use a text or XML editor to change **DesktopApplicationLinkPath** to **DesktopApplicationID**. See [Specify Start tiles](start-layout-xml-desktop.md#specify-start-tiles) for details on using the app ID in place of the link path. @@ -141,3 +289,236 @@ To configure a partial Start screen layout: > [!NOTE] > Office 2019 tiles might be removed from the Start menu when you upgrade Office 201. This only occurs if Office 2019 app tiles are in a custom group in the Start menu and only contains the Office 2019 app tiles. To avoid this problem, place another app tile in the Office 2019 group prior to the upgrade. For example, add Notepad.exe or calc.exe to the group. This issue occurs because Office 2019 removes and reinstalls the apps when they are upgraded. Start removes empty groups when it detects that all apps for that group have been removed. + +You can deploy the resulting .xml file to devices using one of the following methods: + +- Configuration Service Provider (CSP) +- Group Policy +- Provisioning package + +[!INCLUDE [tab-intro](../../../includes/configure/tab-intro.md)] + +#### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune) + +You can use a mobile device management (MDM) policy to deploy a customized Start and taskbar layout to users. No reimaging is required. The layout can be updated simply by overwriting the `.xml` file that contains the layout. This feature enables you to customize Start layouts for different departments or organizations, with minimal management overhead. + +**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md). + +>[!WARNING] +>When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. + +Two features enable Start layout control: + +- The **Export-StartLayout** cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. + + >[!NOTE] + >To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](/powershell/module/startlayout/import-startlayout) cmdlet. + +- In Microsoft Intune, you select the Start layout XML file and add it to a device configuration profile. + + >[!NOTE] + >Please do not include XML Prologs like \ in the Start layout XML file. The settings may not be reflected correctly. + +## Create a policy for your customized Start layout + +The following example uses Microsoft Intune to configure an MDM policy that applies a customized Start layout: + +1. Sign in to the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). + +1. Select **Devices** > **Configuration profiles** > **Create profile**. + +1. Enter the following properties: + + - **Platform**: Select **Windows 10 and later**. + - **Profile type**: Select **Templates** > **Device restrictions** > **Create**. + +1. In **Basics**, enter the following properties: + + - **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify it later. For example, a good profile name is **Customize Start menu and taskbar**. + - **Description**: Enter a description for the profile. This setting is optional, but recommended. + +1. Select **Next**. + +1. In **Configuration settings**, select **Start**: + + - If you're using an XML file, select **Start menu layout**. Browse to and select your Start layout XML file. + - If you don't have an XML file, configure the others settings. For more information on these settings, see [Start settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-windows-10#start). + +1. Select **Next**. +1. In **Scope tags**, select **Next**. For more information about scope tags, see [Use RBAC and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags). +1. In **Assignments**, select the user or groups that will receive your profile. Select **Next**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign). +1. In **Review + create**, review your settings. When you select **Create**, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list. + +> [!NOTE] +> For third party partner MDM solutions, you may need to use an OMA-URI setting for Start layout, based on the [Policy configuration service provider (CSP)](/windows/client-management/mdm/policy-configuration-service-provider). The OMA-URI setting is `./User/Vendor/MSFT/Policy/Config/Start/StartLayout`. + +#### [:::image type="icon" source="../images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg) + +You can use a provisioning package that you create with Windows Configuration Designer to deploy a customized Start and taskbar layout to users. No reimaging is required, and the Start and taskbar layout can be updated by overwriting the .xml file that contains the layout. The provisioning package can be applied to a running device. This enables you to customize Start and taskbar layouts for different departments or organizations, with minimal management overhead. + +> [!IMPORTANT] +> If you use a provisioning package to configure the taskbar, your configuration will be reapplied each time the explorer.exe process restarts. If your configuration pins an app and the user unpins that app, the user's change will be overwritten the next time the configuration is applied. To apply a taskbar configuration and allow users to make changes that will persist, apply your configuration by using Group Policy. + +**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) for desktop editions. + +Three features enable Start and taskbar layout control: + +- The **Export-StartLayout** cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. + + > [!NOTE] + > To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](/powershell/module/startlayout/import-startlayout) cmdlet. + +- [You can modify the Start .xml file](../taskbar/configure.md) to include `` or create an .xml file just for the taskbar configuration. + +- In Windows Configuration Designer, you use the **Policies/Start/StartLayout** setting to provide the contents of the .xml file that defines the Start and taskbar layout. + + + +## Prepare the Start layout XML file + +The **Export-StartLayout** cmdlet produces an XML file. Because Windows Configuration Designer produces a customizations.xml file that contains the configuration settings, adding the Start layout section to the customizations.xml file directly would result in an XML file embedded in an XML file. Before you add the Start layout section to the customizations.xml file, you must replace the markup characters in your layout.xml with escape characters. + +1. Copy the contents of layout.xml into an online tool that escapes characters. + +1. During the procedure to create a provisioning package, you will copy the text with the escape characters and paste it in the customizations.xml file for your project. + +## Create a provisioning package that contains a customized Start layout + +Use the Windows Configuration Designer tool to create a provisioning package. [Learn how to install Windows Configuration Designer.](../provisioning-packages/provisioning-install-icd.md) + +> [!IMPORTANT] +> When you build a provisioning package, you may include sensitive information in the project files and in the provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when they are no longer needed. + +1. Open Windows Configuration Designer (by default, %systemdrive%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). + +1. Choose **Advanced provisioning**. + +1. Name your project, and click **Next**. + +1. Choose **All Windows desktop editions** and click **Next**. + +1. On **New project**, click **Finish**. The workspace for your package opens. + +1. Expand **Runtime settings** > **Policies** > **Start**, and click **StartLayout**. + + > [!TIP] + > If **Start** is not listed, check the type of settings you selected in step 1. You must create the project using settings for **All Windows desktop editions**. + +1. Enter **layout.xml**. This value creates a placeholder in the customizations.xml file that you will replace with the contents of the layout.xml file in a later step. + +1. Save your project and close Windows Configuration Designer. + +1. In File Explorer, open the project's directory. (The default location is C:\Users\\*user name*\Documents\Windows Imaging and Configuration Designer (WICD)\\*project name*) + +1. Open the customizations.xml file in a text editor. + +1. Replace **layout.xml** with the text from the layout.xml file, [with markup characters replaced with escape characters](#escape). + +1. Save and close the customizations.xml file. + +1. Open Windows Configuration Designer and open your project. + +1. On the **File** menu, select **Save.** + +1. On the **Export** menu, select **Provisioning package**. + +1. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** + +1. Optional. In the **Provisioning package security** window, you can choose to encrypt the package and enable package signing. + + - **Enable package encryption** - If you select this option, an auto-generated password will be shown on the screen. + + - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Browse** and choosing the certificate you want to use to sign the package. + +1. Click **Next** to specify the output location where you want the provisioning package to go when it's built. By default, Windows Imaging and Configuration Designer (ICD) uses the project folder as the output location. + + Optionally, you can click **Browse** to change the default output location. + +1. Click **Next**. + +1. Click **Build** to start building the package. The provisioning package doesn't take long to build. The project information is displayed in the build page and the progress bar indicates the build status. + + If you need to cancel the build, click **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. + +1. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again. + + If your build is successful, the name of the provisioning package, output directory, and project directory will be shown. + + - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, click **Back** to change the output package name and path, and then click **Next** to start another build. + - If you are done, click **Finish** to close the wizard and go back to the **Customizations Page**. + +1. Copy the provisioning package to the target device. +1. Double-click the ppkg file and allow it to install. + +#### [:::image type="icon" source="../images/icons/group-policy.svg"::: **GPO**](#tab/gpo) + +You can use a Group Policy Object (GPO) to deploy a customized Start and taskbar layout to users in a domain. No reimaging is required, and the layout can be updated simply by overwriting the .xml file that contains the layout. This enables you to customize Start and taskbar layouts for different departments or organizations, with minimal management overhead. + +This topic describes how to update Group Policy settings to display a customized Start and taskbar layout when the users sign in. By creating a domain-based GPO with these settings, you can deploy a customized Start and taskbar layout to users in a domain. + +>[!WARNING] +>When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. When you apply a taskbar layout, users will still be able to pin and unpin apps, and change the order of pinned apps. + +**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) + +## Operating system requirements + +The GPO can be configured from any computer on which the necessary ADMX and ADML files (StartMenu.admx and StartMenu.adml) for Windows 10 are installed. In Group Policy, ADMX files are used to define Registry-based policy settings in the Administrative Templates category. To find out how to create a central store for Administrative Templates files, see [article 929841, written for Windows Vista and still applicable](/troubleshoot/windows-server/group-policy/create-central-store-domain-controller) in the Microsoft Knowledge Base. + +Three features enable Start and taskbar layout control: + +- The [Export-StartLayout](/powershell/module/startlayout/export-startlayout) cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. + >[!NOTE] + >To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](/powershell/module/startlayout/import-startlayout) cmdlet. +- [You can modify the Start .xml file](../taskbar/configure.md) to include `` or create an .xml file just for the taskbar configuration. +- In Group Policy, you use the **Start Layout** settings for the **Start Menu and Taskbar** administrative template to set a Start and taskbar layout from an .xml file when the policy is applied. The Group Policy object doesn't support an empty tile layout, so the default tile layout for Windows is loaded in that case. + +>[!NOTE] +>To learn how customize Start to include your line-of-business apps when you deploy Windows 10, see [Customize the Windows 10 Start layout]( https://go.microsoft.com/fwlink/p/?LinkId=620863). + +## Use Group Policy to apply a customized Start layout in a domain + +To apply the Start and taskbar layout to users in a domain, use the Group Policy Management Console (GPMC) to configure a domain-based Group Policy Object (GPO) that sets **Start Layout** policy settings in the **Start Menu and Taskbar** administrative template for users in a domain. + +The GPO applies the Start and taskbar layout at the next user sign-in. Each time the user signs in, the timestamp of the .xml file with the Start and taskbar layout is checked and if a newer version of the file is available, the settings in the latest version of the file are applied. + +The GPO can be configured from any computer on which the necessary ADMX and ADML files (StartMenu.admx and StartMenu.adml) for Windows 10 are installed. + +The .xml file with the Start and taskbar layout must be located on shared network storage that is available to the users' computers when they sign in and the users must have Read-only access to the file. If the file is not available when the first user signs in, Start and the taskbar are not customized during the session, but the user will be prevented from making changes to Start. On subsequent sign-ins, if the file is available at sign-in, the layout it contains will be applied to the user's Start and taskbar. + +For information about deploying GPOs in a domain, see [Working with Group Policy Objects](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)). + +## Use Group Policy to apply a customized Start layout on the local computer + +You can use the Local Group Policy Editor to provide a customized Start and taskbar layout for any user who signs in on the local computer. To display the customized Start and taskbar layout for any user who signs in, configure **Start Layout** policy settings for the **Start Menu and Taskbar** administrative template. You can use the **Start Menu and Taskbar** administrative template in **User Configuration** or **Computer Configuration**. + +>[!NOTE] +>This procedure applies the policy settings on the local computer only. For information about deploying the Start and taskbar layout to users in a domain, see [Use Group Policy to deploy a customized Start layout in a domain](#bkmk-domaingpodeployment). +> +>This procedure creates a Local Group Policy that applies to all users on the computer. To configure Local Group Policy that applies to a specific user or group on the computer, see [Step-by-Step Guide to Managing Multiple Local Group Policy Objects](/previous-versions/windows/it-pro/windows-vista/cc766291(v=ws.10)). The guide was written for Windows Vista and the procedures still apply to Windows 10. + +This procedure adds the customized Start and taskbar layout to the user configuration, which overrides any Start layout settings in the local computer configuration when a user signs in on the computer. + +To configure Start Layout policy settings in Local Group Policy Editor: + +1. On the test computer, press the Windows key, type **gpedit**, and then select **Edit group policy (Control panel)**. +1. Go to **User Configuration** or **Computer Configuration** > **Administrative Templates** >**Start Menu and Taskbar**. + ![start screen layout policy settings.](images/starttemplate.jpg) +1. Right-click **Start Layout** in the right pane, and click **Edit**. + This opens the **Start Layout** policy settings. + ![policy settings for start screen layout.](images/startlayoutpolicy.jpg) +1. Enter the following settings, and then click **OK**: + 1. Select **Enabled**. + 1. Under **Options**, specify the path to the .xml file that contains the Start and taskbar layout. For example, type **C:\\Users\\Test01\\StartScreenMarketing.xml**. + 1. Optionally, enter a comment to identify the Start and taskbar layout. + + > [!IMPORTANT] + > If you disable Start Layout policy settings that have been in effect and then re-enable the policy, users will not be able to make changes to Start, however the layout in the .xml file will not be reapplied unless the file has been updated. In Windows PowerShell, you can update the timestamp on a file by running the following command: + > + > `(ls ).LastWriteTime = Get-Date` + +## Update a customized Start layout + +After you use Group Policy to apply a customized Start and taskbar layout on a computer or in a domain, you can update the layout simply by replacing the .xml file that is specified in the Start Layout policy settings with a file with a newer timestamp. + +::: zone-end diff --git a/windows/configuration/start/customize-start-menu-layout-windows-11.md b/windows/configuration/start/customize-start-menu-layout-windows-11.md deleted file mode 100644 index e8995d4ee4..0000000000 --- a/windows/configuration/start/customize-start-menu-layout-windows-11.md +++ /dev/null @@ -1,169 +0,0 @@ ---- -title: Add or remove pinned apps on the Start menu in Windows 11 -description: Export Start layout to LayoutModification.json with pinned apps, and add or remove pinned apps. Use the JSON text in an MDM policy to deploy a custom Start menu layout to Windows 11 devices. -ms.date: 01/10/2023 -ms.topic: article -appliesto: -- ✅ Windows 11 ---- - -# Customize the Start menu layout on Windows 11 - -> **Looking for OEM information?** See [Customize the Taskbar](/windows-hardware/customize/desktop/customize-the-windows-11-taskbar) and [Customize the Start layout](/windows-hardware/customize/desktop/customize-the-windows-11-start-menu). - -Your organization can deploy a customized Start layout to your Windows 11 devices. Customizing the Start layout is common when you have similar devices used by many users, or you want to pin specific apps. - -For example, you can override the default set of apps with your own a set of pinned apps, and in the order you choose. As an administrator, use this feature to pin apps, remove default pinned apps, order the apps, and more. - -To add apps you want pinned to the Start menu, you use a JSON file. In previous Windows versions, IT administrators used an XML file to customize the Start menu. The XML file isn't available on Windows 11 and later ***unless*** [you're an OEM](/windows-hardware/customize/desktop/customize-the-windows-11-start-menu). - -This article shows you how to export an existing Start menu layout, and use the JSON in a Microsoft Intune policy. - -## Before you begin - -- When you customize the Start layout, you overwrite the entire full layout. A partial Start layout isn't available. Users can pin and unpin apps, and uninstall apps from Start. When a user signs in or Explorer restarts, Windows reapplies the MDM policy. This action restores the specified layout and doesn't retain any user changes. - - To prevent users from making any changes to the Start menu layout, see the [NoChangeStartMenu](/windows/client-management/mdm/policy-csp-admx-startmenu#admx-startmenu-nochangestartmenu) policy. - -- It's recommended to use a mobile device management (MDM) provider. MDM providers help manage your devices, and help manage apps on your devices. You can use Microsoft Intune. Intune is a family of products that include Microsoft Intune, which is a cloud service, and Configuration Manager, which is on-premises. - - In this article, we mention these services. If you're not managing your devices using an MDM provider, the following resources may help you get started: - - - [Endpoint Management at Microsoft](/mem/endpoint-manager-overview) - - [What is Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Intune planning guide](/mem/intune/fundamentals/intune-planning-guide) - - [What is Configuration Manager?](/mem/configmgr/core/understand/introduction) - -## Start menu features and areas - -In Windows 11, the Start menu is redesigned with a simplified set of apps that are arranged in a grid of pages. There aren't folders, groups, or different-sized app icons: - -:::image type="content" source="./images/start-windows-11.png" alt-text="Sample start menu layout on Windows 11 that shows pinned apps, access to all apps, and recommended files."::: - -Start has the following areas: - -- **Pinned**: Shows pinned apps, or a subset of all of the apps installed on the device. You can create a list of pinned apps you want on the devices using the **ConfigureStartPins** policy. **ConfigureStartPins** overrides the entire layout, which also removes apps that are pinned by default. - - This article shows you [how to use the **ConfigureStartPins** policy](#get-the-pinnedlist-json). - -- **All apps**: Users select this option to see an alphabetical list of all the apps on the device. This section can't be customized using the JSON file. - - The [Start/HideFrequentlyUsedApps CSP](/windows/client-management/mdm/policy-csp-start#start-hidefrequentlyusedapps) exposes settings that configure the "Most used" section, which is at the top of the all apps list. - - In **Intune**, you can configure this Start menu layout feature, and more. For more information on the Start menu settings you can configure in an Intune policy, see [Windows 10/11 device settings to allow or restrict features](/mem/intune/configuration/device-restrictions-windows-10#start). - - In **Group Policy**, there are policies that include settings that control the Start menu layout. Some policies may not work as expected. Be sure to test your policies before broadly deploying them across your devices: - - - `Computer Configuration\Administrative Templates\Start Menu and Taskbar` - - `User Configuration\Administrative Templates\Start Menu and Taskbar` - -- **Recommended**: Shows recently opened files and recently installed apps. This section can only be customized in Windows 11 SE using the following policy. - - - `Computer Configuration\Administrative Templates\Start Menu and Taskbar\Remove Recommended section from Start Menu` - -## Create the JSON file - -On an existing Windows 11 device, set up your own Start layout with the pinned apps you want users to see. Then, use the [Windows PowerShell Export-StartLayout](/powershell/module/startlayout/export-startlayout) cmdlet to export the existing layout to a `LayoutModification.json` file. - -The JSON file controls the Start menu layout, and lists all the apps that are pinned. You can update the JSON file to: - -- Change the order of existing apps. The apps in the JSON file are shown on Start in the same order. -- Add more apps by entering the app ID. For more information, see [Get the pinnedList JSON](#get-the-pinnedlist-json) (in this article). - -If you're familiar with creating JSON files, you can create your own `LayoutModification.json` file. But, it's easier and faster to export the layout from an existing device. - -### Export an existing Start layout - -1. Create a folder to save the `.json` file. For example, create the `C:\Layouts` folder. -1. On a Windows 11 device, open the Windows PowerShell app. -1. Run the following cmdlet. Name the file `LayoutModification.json`. - - ```powershell - Export-StartLayout -Path "C:\Layouts\LayoutModification.json" - - ``` - -### Get the pinnedList JSON - -1. Open the `LayoutModification.json` file in a JSON editor, such as Visual Studio Code or Notepad. For more information, see [edit JSON with Visual Studio Code](https://code.visualstudio.com/docs/languages/json). -1. In the file, you see the `pinnedList` section. This section includes all of the pinned apps. Copy the `pinnedList` content in the JSON file. You'll use it in the next section. - - In the following example, you see that Microsoft Edge, Microsoft Word, the Microsoft Store app, and Notepad are pinned: - - ```json - { - "pinnedList": [ - { "desktopAppId": "MSEdge" }, - { "desktopAppId": "Microsoft.Office.WINWORD.EXE.15" }, - { "packagedAppId": "Microsoft.WindowsStore_8wekyb3d8bbwe!App" }, - { "packagedAppId": "Microsoft.WindowsNotepad_8wekyb3d8bbwe!App" } - ] - } - ``` - -1. Starting with Windows 11, the **ConfigureStartPins** policy is available. This policy uses the `LayoutModification.json` file to add apps to the Pinned section. In your JSON file, you can add more apps to this section using the following keys: - -| Key | Description | -|--|--| -| packagedAppID | Use this option for Universal Windows Platform apps. To pin a UWP app, use the app's AUMID. | -| desktopAppID | Use this option for unpackaged Win32 apps. To pin a Win32 app, use the app's AUMID. If the app doesn't have an AUMID, then enter the `desktopAppLink` instead. | -| desktopAppLink | Use this option for unpackaged Win32 apps that don't have an associated AUMID. To pin this type of app, use the path to the `.lnk` shortcut that points to the app. | - -## Use MDM to create and deploy a pinned list policy - -Now that you have the JSON syntax, you're ready to deploy your customized Start layout to devices in your organization. - -MDM providers can deploy policies to devices managed by the organization, including organization-owned devices, and personal or bring your own device (BYOD). Using an MDM provider, such as Microsoft Intune, you can deploy a policy that configures the pinned list. - -This section shows you how to create a pinned list policy in Intune. There isn't a Group Policy to create a pinned list. - -### Create a pinned list using an Intune policy - -To deploy this policy, the devices must be enrolled, and managed by your organization. For more information, see [What is device enrollment?](/mem/intune/enrollment/device-enrollment). - -1. Sign in to the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). -1. Select **Devices** > **Configuration profiles** > **Create profile**. -1. Enter the following properties: - - - **Platform**: Select **Windows 10 and later**. - - **Profile**: Select **Templates** > **Custom**. - -1. Select **Create**. -1. In **Basics**, enter the following properties: - - - **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify them later. For example, a good profile name is **Win11: Custom Start layout**. - - **Description**: Enter a description for the profile. This setting is optional, and recommended. - -1. Select **Next**. -1. In **Configuration settings** > **OMA-URI**, select **Add**. Add the following properties: - - - **Name**: Enter something like **Configure Start pins**. - - **Description**: Enter a description for the row. This setting is optional, and recommended. - - **OMA-URI**: Enter `./Vendor/MSFT/Policy/Config/Start/ConfigureStartPins`. - - **Data type**: Select **String**. - - **Value**: Paste the JSON you created or updated in the previous section. For example, enter the following text: - - ```json - { - "pinnedList": [ - { "desktopAppId": "MSEdge" }, - { "desktopAppId": "Microsoft.Office.WINWORD.EXE.15" }, - { "packagedAppId": "Microsoft.WindowsStore_8wekyb3d8bbwe!App" }, - { "packagedAppId": "Microsoft.WindowsNotepad_8wekyb3d8bbwe!App" } - ] - } - ``` - - Your settings look similar to the following settings: - - :::image type="content" source="./images/endpoint-manager-admin-center-custom-oma-uri-start-layout.png" alt-text="Custom OMA-URI settings to customize Start menu layout using pinnedList"::: - -1. Select **Save** > **Next** to save your changes. -1. Configure the rest of the policy settings. For more specific information, see [Create a profile with custom settings](/mem/intune/configuration/custom-settings-configure). - -The Windows OS exposes many CSPs that apply to the Start menu. For a list, see [Supported CSP policies for Windows 11 Start menu](supported-csp-start-menu-layout-windows.md). - -### Deploy the policy using Intune - -When the policy is created, you can deploy it now, or deploy it later. Since this policy is a customized Start layout, the policy can be deployed anytime, including before users sign in the first time. - -For more information and guidance on assigning policies to devices in your organization, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign). diff --git a/windows/configuration/start/customize-windows-10-start-screens-by-using-group-policy.md b/windows/configuration/start/customize-windows-10-start-screens-by-using-group-policy.md deleted file mode 100644 index 6702f5d255..0000000000 --- a/windows/configuration/start/customize-windows-10-start-screens-by-using-group-policy.md +++ /dev/null @@ -1,85 +0,0 @@ ---- -title: Customize Windows 10 Start and taskbar with group policy -description: In Windows 10, you can use a Group Policy Object (GPO) to deploy a customized Start layout to users in a domain. -ms.date: 12/31/2017 -ms.topic: how-to -appliesto: -- ✅ Windows 10 ---- - -# Customize Windows 10 Start and taskbar with Group Policy - ->**Looking for consumer information?** See [Customize the Start menu](https://go.microsoft.com/fwlink/p/?LinkId=623630) - -In Windows 10 Pro, Enterprise, and Education, you can use a Group Policy Object (GPO) to deploy a customized Start and taskbar layout to users in a domain. No reimaging is required, and the layout can be updated simply by overwriting the .xml file that contains the layout. This enables you to customize Start and taskbar layouts for different departments or organizations, with minimal management overhead. - -This topic describes how to update Group Policy settings to display a customized Start and taskbar layout when the users sign in. By creating a domain-based GPO with these settings, you can deploy a customized Start and taskbar layout to users in a domain. - ->[!WARNING] ->When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. When you apply a taskbar layout, users will still be able to pin and unpin apps, and change the order of pinned apps. - -**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) - -## Operating system requirements - -In Windows 10, version 1607, Start and taskbar layout control using Group Policy is supported in Windows 10 Enterprise and Windows 10 Education. In Windows 10, version 1703, Start and taskbar layout control using Group Policy is also supported in Windows 10 Pro. - -The GPO can be configured from any computer on which the necessary ADMX and ADML files (StartMenu.admx and StartMenu.adml) for Windows 10 are installed. In Group Policy, ADMX files are used to define Registry-based policy settings in the Administrative Templates category. To find out how to create a central store for Administrative Templates files, see [article 929841, written for Windows Vista and still applicable](/troubleshoot/windows-server/group-policy/create-central-store-domain-controller) in the Microsoft Knowledge Base. - -## How Start layout control works - -Three features enable Start and taskbar layout control: - -- The [Export-StartLayout](/powershell/module/startlayout/export-startlayout) cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. - >[!NOTE] - >To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](/powershell/module/startlayout/import-startlayout) cmdlet. -- [You can modify the Start .xml file](../taskbar/configure-windows-10-taskbar.md) to include `` or create an .xml file just for the taskbar configuration. -- In Group Policy, you use the **Start Layout** settings for the **Start Menu and Taskbar** administrative template to set a Start and taskbar layout from an .xml file when the policy is applied. The Group Policy object doesn't support an empty tile layout, so the default tile layout for Windows is loaded in that case. - ->[!NOTE] ->To learn how customize Start to include your line-of-business apps when you deploy Windows 10, see [Customize the Windows 10 Start layout]( https://go.microsoft.com/fwlink/p/?LinkId=620863). - -## Use Group Policy to apply a customized Start layout in a domain - -To apply the Start and taskbar layout to users in a domain, use the Group Policy Management Console (GPMC) to configure a domain-based Group Policy Object (GPO) that sets **Start Layout** policy settings in the **Start Menu and Taskbar** administrative template for users in a domain. - -The GPO applies the Start and taskbar layout at the next user sign-in. Each time the user signs in, the timestamp of the .xml file with the Start and taskbar layout is checked and if a newer version of the file is available, the settings in the latest version of the file are applied. - -The GPO can be configured from any computer on which the necessary ADMX and ADML files (StartMenu.admx and StartMenu.adml) for Windows 10 are installed. - -The .xml file with the Start and taskbar layout must be located on shared network storage that is available to the users' computers when they sign in and the users must have Read-only access to the file. If the file is not available when the first user signs in, Start and the taskbar are not customized during the session, but the user will be prevented from making changes to Start. On subsequent sign-ins, if the file is available at sign-in, the layout it contains will be applied to the user's Start and taskbar. - -For information about deploying GPOs in a domain, see [Working with Group Policy Objects](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)). - -## Use Group Policy to apply a customized Start layout on the local computer - -You can use the Local Group Policy Editor to provide a customized Start and taskbar layout for any user who signs in on the local computer. To display the customized Start and taskbar layout for any user who signs in, configure **Start Layout** policy settings for the **Start Menu and Taskbar** administrative template. You can use the **Start Menu and Taskbar** administrative template in **User Configuration** or **Computer Configuration**. - ->[!NOTE] ->This procedure applies the policy settings on the local computer only. For information about deploying the Start and taskbar layout to users in a domain, see [Use Group Policy to deploy a customized Start layout in a domain](#bkmk-domaingpodeployment). -> ->This procedure creates a Local Group Policy that applies to all users on the computer. To configure Local Group Policy that applies to a specific user or group on the computer, see [Step-by-Step Guide to Managing Multiple Local Group Policy Objects](/previous-versions/windows/it-pro/windows-vista/cc766291(v=ws.10)). The guide was written for Windows Vista and the procedures still apply to Windows 10. - -This procedure adds the customized Start and taskbar layout to the user configuration, which overrides any Start layout settings in the local computer configuration when a user signs in on the computer. - -**To configure Start Layout policy settings in Local Group Policy Editor** - -1. On the test computer, press the Windows key, type **gpedit**, and then select **Edit group policy (Control panel)**. -1. Go to **User Configuration** or **Computer Configuration** > **Administrative Templates** >**Start Menu and Taskbar**. - ![start screen layout policy settings.](images/starttemplate.jpg) -1. Right-click **Start Layout** in the right pane, and click **Edit**. - This opens the **Start Layout** policy settings. - ![policy settings for start screen layout.](images/startlayoutpolicy.jpg) -1. Enter the following settings, and then click **OK**: - 1. Select **Enabled**. - 1. Under **Options**, specify the path to the .xml file that contains the Start and taskbar layout. For example, type **C:\\Users\\Test01\\StartScreenMarketing.xml**. - 1. Optionally, enter a comment to identify the Start and taskbar layout. - - > [!IMPORTANT] - > If you disable Start Layout policy settings that have been in effect and then re-enable the policy, users will not be able to make changes to Start, however the layout in the .xml file will not be reapplied unless the file has been updated. In Windows PowerShell, you can update the timestamp on a file by running the following command: - > - > `(ls ).LastWriteTime = Get-Date` - -## Update a customized Start layout - -After you use Group Policy to apply a customized Start and taskbar layout on a computer or in a domain, you can update the layout simply by replacing the .xml file that is specified in the Start Layout policy settings with a file with a newer timestamp. diff --git a/windows/configuration/start/customize-windows-10-start-screens-by-using-mobile-device-management.md b/windows/configuration/start/customize-windows-10-start-screens-by-using-mobile-device-management.md deleted file mode 100644 index 1b378a93ca..0000000000 --- a/windows/configuration/start/customize-windows-10-start-screens-by-using-mobile-device-management.md +++ /dev/null @@ -1,69 +0,0 @@ ---- -title: Change the Windows 10 Start and taskbar using mobile device management | Microsoft Docs -description: In Windows 10, you can use a mobile device management (MDM) policy to deploy a customized Start and taskbar layout to users. For example, use Microsoft Intune to configure the start menu layout and taskbar, and deploy the policy to your devices. -ms.topic: article -appliesto: -- ✅ Windows 10 -ms.date: 08/05/2021 ---- - -# Customize Windows 10 Start and taskbar with mobile device management (MDM) - ->**Looking for consumer information?** [Customize the Start menu](https://go.microsoft.com/fwlink/p/?LinkId=623630) - -In Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education, you can use a mobile device management (MDM) policy to deploy a customized Start and taskbar layout to users. No reimaging is required. The layout can be updated simply by overwriting the `.xml` file that contains the layout. This feature enables you to customize Start layouts for different departments or organizations, with minimal management overhead. - ->[!NOTE] ->Support for applying a customized taskbar using MDM is added in Windows 10, version 1703. - -**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) for desktop editions (also works for taskbar customization). - ->[!WARNING] ->When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. - -## How Start layout control works - -Two features enable Start layout control: - -- The **Export-StartLayout** cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. - - >[!NOTE] - >To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](/powershell/module/startlayout/import-startlayout) cmdlet. - -- In Microsoft Intune, you select the Start layout XML file and add it to a device configuration profile. - - >[!NOTE] - >Please do not include XML Prologs like \ in the Start layout XML file. The settings may not be reflected correctly. - -## Create a policy for your customized Start layout - -The following example uses Microsoft Intune to configure an MDM policy that applies a customized Start layout: - -1. Sign in to the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). - -1. Select **Devices** > **Configuration profiles** > **Create profile**. - -1. Enter the following properties: - - - **Platform**: Select **Windows 10 and later**. - - **Profile type**: Select **Templates** > **Device restrictions** > **Create**. - -1. In **Basics**, enter the following properties: - - - **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify it later. For example, a good profile name is **Customize Start menu and taskbar**. - - **Description**: Enter a description for the profile. This setting is optional, but recommended. - -1. Select **Next**. - -1. In **Configuration settings**, select **Start**: - - - If you're using an XML file, select **Start menu layout**. Browse to and select your Start layout XML file. - - If you don't have an XML file, configure the others settings. For more information on these settings, see [Start settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-windows-10#start). - -1. Select **Next**. -1. In **Scope tags**, select **Next**. For more information about scope tags, see [Use RBAC and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags). -1. In **Assignments**, select the user or groups that will receive your profile. Select **Next**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign). -1. In **Review + create**, review your settings. When you select **Create**, your changes are saved, and the profile is assigned. The policy is also shown in the profiles list. - -> [!NOTE] -> For third party partner MDM solutions, you may need to use an OMA-URI setting for Start layout, based on the [Policy configuration service provider (CSP)](/windows/client-management/mdm/policy-configuration-service-provider). The OMA-URI setting is `./User/Vendor/MSFT/Policy/Config/Start/StartLayout`. diff --git a/windows/configuration/start/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md b/windows/configuration/start/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md deleted file mode 100644 index b8653f7973..0000000000 --- a/windows/configuration/start/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md +++ /dev/null @@ -1,115 +0,0 @@ ---- -title: Customize Windows 10 Start and taskbar with provisioning packages -description: In Windows 10, you can use a provisioning package to deploy a customized Start layout to users. -ms.topic: article -appliesto: -- ✅ Windows 11 -ms.date: 12/31/2017 ---- - -# Customize Windows 10 Start and taskbar with provisioning packages - -> **Looking for consumer information?** [Customize the Start menu](https://go.microsoft.com/fwlink/p/?LinkId=623630) - -> [!NOTE] -> Currently, using provisioning packages to customize the Start menu layout is supported on Windows 1. It's not supported on Windows 11. - -In Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education, version 1703, you can use a provisioning package that you create with Windows Configuration Designer to deploy a customized Start and taskbar layout to users. No reimaging is required, and the Start and taskbar layout can be updated simply by overwriting the .xml file that contains the layout. The provisioning package can be applied to a running device. This enables you to customize Start and taskbar layouts for different departments or organizations, with minimal management overhead. - -> [!IMPORTANT] -> If you use a provisioning package to configure the taskbar, your configuration will be reapplied each time the explorer.exe process restarts. If your configuration pins an app and the user unpins that app, the user's change will be overwritten the next time the configuration is applied. To apply a taskbar configuration and allow users to make changes that will persist, apply your configuration by using Group Policy. - -**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) for desktop editions. - -## How Start layout control works - -Three features enable Start and taskbar layout control: - -- The **Export-StartLayout** cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. - - > [!NOTE] - > To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](/powershell/module/startlayout/import-startlayout) cmdlet. - -- [You can modify the Start .xml file](../taskbar/configure-windows-10-taskbar.md) to include `` or create an .xml file just for the taskbar configuration. - -- In Windows Configuration Designer, you use the **Policies/Start/StartLayout** setting to provide the contents of the .xml file that defines the Start and taskbar layout. - - - -## Prepare the Start layout XML file - -The **Export-StartLayout** cmdlet produces an XML file. Because Windows Configuration Designer produces a customizations.xml file that contains the configuration settings, adding the Start layout section to the customizations.xml file directly would result in an XML file embedded in an XML file. Before you add the Start layout section to the customizations.xml file, you must replace the markup characters in your layout.xml with escape characters. - -1. Copy the contents of layout.xml into an online tool that escapes characters. - -1. During the procedure to create a provisioning package, you will copy the text with the escape characters and paste it in the customizations.xml file for your project. - -## Create a provisioning package that contains a customized Start layout - -Use the Windows Configuration Designer tool to create a provisioning package. [Learn how to install Windows Configuration Designer.](../provisioning-packages/provisioning-install-icd.md) - -> [!IMPORTANT] -> When you build a provisioning package, you may include sensitive information in the project files and in the provisioning package (.ppkg) file. Although you have the option to encrypt the .ppkg file, project files are not encrypted. You should store the project files in a secure location and delete the project files when they are no longer needed. - -1. Open Windows Configuration Designer (by default, %systemdrive%\\Program Files (x86)\\Windows Kits\\10\\Assessment and Deployment Kit\\Imaging and Configuration Designer\\x86\\ICD.exe). - -1. Choose **Advanced provisioning**. - -1. Name your project, and click **Next**. - -1. Choose **All Windows desktop editions** and click **Next**. - -1. On **New project**, click **Finish**. The workspace for your package opens. - -1. Expand **Runtime settings** > **Policies** > **Start**, and click **StartLayout**. - - > [!TIP] - > If **Start** is not listed, check the type of settings you selected in step 1. You must create the project using settings for **All Windows desktop editions**. - -1. Enter **layout.xml**. This value creates a placeholder in the customizations.xml file that you will replace with the contents of the layout.xml file in a later step. - -1. Save your project and close Windows Configuration Designer. - -1. In File Explorer, open the project's directory. (The default location is C:\Users\\*user name*\Documents\Windows Imaging and Configuration Designer (WICD)\\*project name*) - -1. Open the customizations.xml file in a text editor. The **<Customizations>** section will look like this: - - ![Customizations file with the placeholder text to replace highlighted.](images/customization-start.png) - -1. Replace **layout.xml** with the text from the layout.xml file, [with markup characters replaced with escape characters](#escape). - -1. Save and close the customizations.xml file. - -1. Open Windows Configuration Designer and open your project. - -1. On the **File** menu, select **Save.** - -1. On the **Export** menu, select **Provisioning package**. - -1. Change **Owner** to **IT Admin**, which will set the precedence of this provisioning package higher than provisioning packages applied to this device from other sources, and then select **Next.** - -1. Optional. In the **Provisioning package security** window, you can choose to encrypt the package and enable package signing. - - - **Enable package encryption** - If you select this option, an auto-generated password will be shown on the screen. - - - **Enable package signing** - If you select this option, you must select a valid certificate to use for signing the package. You can specify the certificate by clicking **Browse** and choosing the certificate you want to use to sign the package. - -1. Click **Next** to specify the output location where you want the provisioning package to go when it's built. By default, Windows Imaging and Configuration Designer (ICD) uses the project folder as the output location. - - Optionally, you can click **Browse** to change the default output location. - -1. Click **Next**. - -1. Click **Build** to start building the package. The provisioning package doesn't take long to build. The project information is displayed in the build page and the progress bar indicates the build status. - - If you need to cancel the build, click **Cancel**. This cancels the current build process, closes the wizard, and takes you back to the **Customizations Page**. - -1. If your build fails, an error message will show up that includes a link to the project folder. You can scan the logs to determine what caused the error. Once you fix the issue, try building the package again. - - If your build is successful, the name of the provisioning package, output directory, and project directory will be shown. - - - If you choose, you can build the provisioning package again and pick a different path for the output package. To do this, click **Back** to change the output package name and path, and then click **Next** to start another build. - - If you are done, click **Finish** to close the wizard and go back to the **Customizations Page**. - -1. Copy the provisioning package to the target device. -1. Double-click the ppkg file and allow it to install. diff --git a/windows/configuration/start/start-layout-xml-desktop.md b/windows/configuration/start/start-layout-xml-desktop.md index 4e97904532..a0c742fc52 100644 --- a/windows/configuration/start/start-layout-xml-desktop.md +++ b/windows/configuration/start/start-layout-xml-desktop.md @@ -1,7 +1,7 @@ --- title: Start layout XML for desktop editions of Windows 10 description: This article describes the options for customizing Start layout in LayoutModification.xml for Windows 10 desktop editions. -ms.topic: article +ms.topic: reference ms.date: 10/02/2018 appliesto: - ✅ Windows 10 @@ -192,7 +192,6 @@ You can use the **start:DesktopApplicationTile** tag to pin a Windows desktop ap Column="4"/> ``` - You must set the **DesktopApplicationLinkPath** attribute to the .lnk file that points to the Windows desktop application. The path also supports environment variables. If you are pointing to a third-party Windows desktop application and the layout is being applied before the first boot, you must put the .lnk file in a legacy Start Menu directory before first boot; for example, "%APPDATA%\Microsoft\Windows\Start Menu\Programs\" or the all users profile "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\". diff --git a/windows/configuration/start/start-secondary-tiles.md b/windows/configuration/start/start-secondary-tiles.md index 60449adfba..17a578d2dd 100644 --- a/windows/configuration/start/start-secondary-tiles.md +++ b/windows/configuration/start/start-secondary-tiles.md @@ -1,7 +1,7 @@ --- title: Add image for secondary Microsoft Edge tiles description: Add app tiles on Windows 10 that's a secondary tile. -ms.topic: article +ms.topic: how-to ms.date: 12/31/2017 --- @@ -14,48 +14,30 @@ App tiles are the Start screen tiles that represent and launch an app. A tile th - Status and updates from an important contact in a social app - A website in Microsoft Edge -In a Start layout for Windows 10, version 1703, you can include secondary tiles for Microsoft Edge that display a custom image, rather than a tile with the standard Microsoft Edge logo. - Suppose that the [Start layout that you export](customize-and-export-start-layout.md) had two secondary tiles, such as in the following image: ![tile for MSN and for a SharePoint site.](images/edge-with-logo.png) -In prior versions of Windows 10, when you applied the Start layout to a device, the tiles would display as shown in the following image: - -![tile for MSN and for a SharePoint site with no logos.](images/edge-without-logo.png) - -In Windows 10, version 1703, by using the PowerShell cmdlet `export-StartLayoutEdgeAssets` and the policy setting `ImportEdgeAssets`, the tiles will now display the same as they did on the device from which you exported the Start layout. +By using the PowerShell cmdlet `export-StartLayoutEdgeAssets` and the policy setting `ImportEdgeAssets`, the tiles display the same as they did on the device from which you exported the Start layout. ![tile for MSN and for a SharePoint site.](images/edge-with-logo.png) -**Example of secondary tiles in XML generated by Export-StartLayout** +Example of secondary tiles in XML generated by Export-StartLayout: ```xml + AppUserModelID="Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe!App" + TileID="-9513911450" + DisplayName="Bing" + Size="2x2" + Column="0" + Row="0" + Arguments="-contentTile -formatVersion 0x00000003 -pinnedTimeLow 0x36a8c2e4 -pinnedTimeHigh 0x01d0919b -securityFlags 0x00000000 -tileType 0x00000000 -url 0x00000014 http://www.bing.com/" Square150x150LogoUri="ms-appdata:///local/PinnedTiles/-9513911450/lowres.png" + Wide310x150LogoUri="ms-appx:///" + ShowNameOnSquare150x150Logo="true" + ShowNameOnWide310x150Logo="true" + BackgroundColor="#7fffffff" +/> ``` ## Export Start layout and assets @@ -78,14 +60,13 @@ In Windows 10, version 1703, by using the PowerShell cmdlet `export-StartLayoutE 1. In Windows PowerShell, enter the following command: - ```powershell Export-StartLayoutEdgeAssets assets.xml ``` ## Configure policy settings -You can apply the customized Start layout with images for secondary tiles by using [mobile device management](customize-windows-10-start-screens-by-using-mobile-device-management.md) or [a provisioning package](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md). However, because you're including the images for secondary tiles, you must configure another setting to import the Edge assets. +You can apply the customized Start layout with images for secondary tiles by using mobile device management (MDM) or a provisioning package. However, because you're including the images for secondary tiles, you must configure another setting to import the Edge assets. ### Using MDM @@ -138,8 +119,6 @@ The **export-StartLayout** and **export-StartLayoutEdgeAssets** cmdlets produce #### Create a provisioning package that contains a customized Start layout - - Use the Windows Configuration Designer tool to create a provisioning package. [Learn how to install Windows Configuration Designer.](../provisioning-packages/provisioning-install-icd.md) >[!IMPORTANT] @@ -155,7 +134,7 @@ Use the Windows Configuration Designer tool to create a provisioning package. [L 1. On **New project**, select **Finish**. The workspace for your package opens. -1. Expand **Runtime settings** > **Policies** > **Start**, and select **StartLayout**. +1. Expand **Runtime settings** > **Policies** > **Start**, and select **StartLayout**. >[!TIP] >If **Start** is not listed, check the type of settings you selected in step 1. You must create the project using settings for **All Windows desktop editions**. @@ -170,9 +149,7 @@ Use the Windows Configuration Designer tool to create a provisioning package. [L 1. In File Explorer, open the project's directory. (The default location is C:\Users\\*user name*\Documents\Windows Imaging and Configuration Designer (WICD)\\*project name*) -1. Open the customizations.xml file in a text editor. The **<Customizations>** section will look like this: - - ![Customizations file with the placeholder text to replace highlighted.](images/customization-start-edge.png) +1. Open the customizations.xml file in a text editor. 1. Replace **layout.xml** with the text from the layout.xml file, [with markup characters replaced with escape characters](#escape). diff --git a/windows/configuration/start/supported-csp-start-menu-layout-windows.md b/windows/configuration/start/supported-csp-start-menu-layout-windows.md index fcc05cbe55..995c92acfa 100644 --- a/windows/configuration/start/supported-csp-start-menu-layout-windows.md +++ b/windows/configuration/start/supported-csp-start-menu-layout-windows.md @@ -2,7 +2,7 @@ title: Supported CSP policies to customize Start menu on Windows 11 | Microsoft Docs description: See a list of the Policy CSP - Start items that are supported on Windows 11 to customize the Start menu. ms.date: 12/31/2017 -ms.topic: article +ms.topic: reference appliesto: - ✅ Windows 11 --- @@ -13,7 +13,7 @@ The Windows OS exposes CSPs that are used by MDM providers, like [Microsoft Intu This article lists the CSPs that are available to customize the Start menu for Windows 11 devices. Windows 11 uses the [Policy CSP - Start](/windows/client-management/mdm/policy-csp-start). For more general information, see [Configuration service provider (CSP) reference](/windows/client-management/mdm/configuration-service-provider-reference). -For information on customizing the Start menu layout using policy, see [Customize the Start menu layout on Windows 11](customize-start-menu-layout-windows-11.md). +For information on customizing the Start menu layout using policy, see [Customize the Start menu layout](customize-and-export-start-layout.md). ## Existing Windows CSP policies that Windows 11 supports @@ -47,14 +47,14 @@ For information on customizing the Start menu layout using policy, see [Customiz - [Start/HideAppList](/windows/client-management/mdm/policy-csp-start#start-hideapplist) - [Start/DisableContextMenus](/windows/client-management/mdm/policy-csp-start#start-disablecontextmenus) + ## Existing CSP policies that Windows 11 doesn't support - [Start/StartLayout](/windows/client-management/mdm/policy-csp-start#start-startlayout) - Group policy: `User Configuration\Administrative Templates\Start Menu and Taskbar\Start Layout` - [Start/HideRecentlyAddedApps](/windows/client-management/mdm/policy-csp-start#start-hiderecentlyaddedapps) - - Group policy: `Computer Configuration\Administrative Templates\Start Menu and Taskbar\Remove "Recently added" list from Start Menu` - +- Group policy: `Computer Configuration\Administrative Templates\Start Menu and Taskbar\Remove "Recently added" list from Start Menu` > [!NOTE] > The following two policies are supported starting in Windows 11, version 22H2 diff --git a/windows/configuration/start/toc.yml b/windows/configuration/start/toc.yml index 649a679653..77492cb6fe 100644 --- a/windows/configuration/start/toc.yml +++ b/windows/configuration/start/toc.yml @@ -1,23 +1,15 @@ items: -- name: Customizethe Start menu in Windows 11 - href: customize-start-menu-layout-windows-11.md +- name: Customize and export the Start layout + href: customize-and-export-start-layout.md - name: Supported Start menu CSPs href: supported-csp-start-menu-layout-windows.md - name: Start layout and taskbar href: windows-10-start-layout-options-and-policies.md - name: Use XML items: - - name: Customize and export Start layout - href: customize-and-export-start-layout.md - name: Add image for secondary Microsoft Edge tiles href: start-secondary-tiles.md - name: Start layout XML for Windows 10 desktop editions (reference) href: start-layout-xml-desktop.md -- name: Use group policy - href: customize-windows-10-start-screens-by-using-group-policy.md -- name: Use provisioning packages - href: customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md -- name: Use mobile device management (MDM) - href: customize-windows-10-start-screens-by-using-mobile-device-management.md -- name: Troubleshoot Start menu errors +- name: Troubleshoot Start menu errors 🔗 href: /troubleshoot/windows-client/shell-experience/troubleshoot-start-menu-errors diff --git a/windows/configuration/start/windows-10-start-layout-options-and-policies.md b/windows/configuration/start/windows-10-start-layout-options-and-policies.md index 6bc1b415c5..aa22d3e5da 100644 --- a/windows/configuration/start/windows-10-start-layout-options-and-policies.md +++ b/windows/configuration/start/windows-10-start-layout-options-and-policies.md @@ -1,8 +1,10 @@ --- title: Customize and manage the Windows 10 Start and taskbar layout description: On Windows devices, customize the start menu layout and taskbar using XML, group policy, provisioning package, or MDM policy. You can add pinned folders, add a start menu size, pin apps to the taskbar, and more. -ms.topic: article +ms.topic: how-to ms.date: 08/05/2021 +appliesto: +- ✅ Windows 10 --- # Customize the Start menu and taskbar layout on Windows 10 and later devices @@ -31,19 +33,17 @@ For more information, see [Customize and export Start layout](customize-and-expo For the **taskbar**, you can use the same XML file as the start screen. Or, you can create a new XML file. When you have the XML file, add this file to a group policy or a provisioning package. Using these methods, you can deploy the XML file to your devices. When the devices receive your policy, they'll use the taskbar settings you configured in the XML file. -For more information, see [Configure Windows 10 taskbar](../taskbar/configure-windows-10-taskbar.md). +For more information, see [Configure Windows 10 taskbar](../taskbar/configure.md). ## Use group policy Using group policy objects (GPO), you can manage different parts of the Start menu and taskbar. You don't need to reimage the devices. Using administrative templates, you configure settings in a policy, and then deploy this policy to your devices. [Start menu policy settings](#start-menu-policy-settings) (in this article) lists the policies you can configure. -For more information, see [Use group policy to customize Windows 10 Start and taskbar](customize-windows-10-start-screens-by-using-group-policy.md). - ## Use provisioning packages Provisioning packages are containers that include a set of configuration settings. They're designed to configure a device quickly, without installing a new image. For more information on what provisioning packages are, and what they do, see [Provisioning packages](../provisioning-packages/provisioning-packages.md). -Using a provisioning package, you can customize the Start and taskbar. For more information, see [Use provisioning packages to customize Windows 10 Start and taskbar](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md). +Using a provisioning package, you can customize the Start and taskbar. ## Use a mobile device management (MDM) solution @@ -51,8 +51,6 @@ Using an MDM solution, you add an XML file to a policy, and then deploy this pol If you use Microsoft Intune for your MDM solution, then you can use settings to configure Start and the taskbar. For more information on the settings you can configure, see [Start settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-windows-10#start). -For more information, see [Use MDM to customize Windows 10 Start and taskbar](customize-windows-10-start-screens-by-using-mobile-device-management.md). - ## Start menu policy settings ![start layout sections.](images/startannotated.png) @@ -156,7 +154,7 @@ There are three app categories that could be pinned to a taskbar: - Default Windows apps pinned during the OS installation, such as Microsoft Edge, File Explorer, and Store - Apps pinned by your organization, such as in an unattended Windows setup - In an unattended Windows setup file, it's recommended to use the [layoutmodification.xml method](../taskbar/configure-windows-10-taskbar.md) to configure the taskbar options. It's not recommended to use [TaskbarLinks](/windows-hardware/customize/desktop/unattend/microsoft-windows-shell-setup-taskbarlinks). + In an unattended Windows setup file, it's recommended to use the [layoutmodification.xml method](../taskbar/configure.md) to configure the taskbar options. It's not recommended to use [TaskbarLinks](/windows-hardware/customize/desktop/unattend/microsoft-windows-shell-setup-taskbarlinks). The following example shows how apps are pinned. In OS configured to use a right-to-left language, the taskbar order is reversed: @@ -184,19 +182,6 @@ In a clean install, if you apply a taskbar layout, only the following apps are p After the layout is applied, users can pin more apps to the taskbar. -### Taskbar configuration applied to Windows 10 upgrades - -When a device is upgraded to Windows 10, apps are already pinned to the taskbar. Some apps may have been pinned to the taskbar by a user, by a customized base image, or by using Windows unattended setup. - -On Windows 10 version 1607 and later, the new taskbar layout for upgrades apply the following behavior: - -- If users pinned apps to the taskbar, then those pinned apps remain. New apps are added to the right. -- If users didn't pin any apps (they're pinned during installation or by policy), and the apps aren't in an updated layout file, then the apps are unpinned. -- If a user didn't pin the app, and the app is in the updated layout file, then the app is pinned to the right. -- New apps specified in updated layout file are pinned to right of user's pinned apps. - -[Learn how to configure Windows 10 taskbar](../taskbar/configure-windows-10-taskbar.md). - ## Start layout configuration errors If your Start layout customization isn't applied as you expect, open the **Event Viewer**. Go to **Applications and Services Log** > **Microsoft** > **Windows** > **ShellCommon-StartLayoutPopulation** > **Operational**. Look for the following events: diff --git a/windows/configuration/store/find-aumid.md b/windows/configuration/store/find-aumid.md new file mode 100644 index 0000000000..2e19c3355e --- /dev/null +++ b/windows/configuration/store/find-aumid.md @@ -0,0 +1,114 @@ +--- +title: Find the Application User Model ID of an installed app +description: Learn how to find the Application User Model ID (AUMID) of the applications installed on a Windows device. +ms.topic: how-to +ms.date: 02/06/2024 +--- + +# Find the Application User Model ID of an installed app + +Windows uses Application User Model Id (AUMID, also known as AppId) values to identify and differentiate applications for switching, launching, telemetry, and other functions.\ +AUMID are unique to each installed application, and independent of the installation path or the application's display name. + +To configure Assigned Access, which is the Configuration Service Provider (CSP) used to create a kiosk or dedicated device, you must use the AUMID of the apps installed on a device. This article describes how to find the AUMID of an installed application. + +## How to find the AUMID + +You can find an application's AUMID by using Windows PowerShell, File Explorer, or the registry. + +Follow the instructions to retrieve AUMIDs, selecting the tool of your choice. + +# [:::image type="icon" source="../images/icons/powershell.svg"::: **PowerShell**](#tab/ps) + +To get the names and AUMIDs for all apps that appear in the Start menu, open a Windows PowerShell command prompt and enter the following command: + +```powershell +Get-StartApps +``` + +>[!NOTE] +>Applications that are not listed in the Start menu will not appear in the output of the **Get-StartApps** cmdlet. + +To get the names and AUMIDs for Microsoft Store apps installed for the current user, open a Windows PowerShell command prompt and enter the following commands: + +```powershell +$installedapps = Get-AppxPackage + +$aumidList = @() +foreach ($app in $installedapps) +{ + foreach ($id in (Get-AppxPackageManifest $app).package.applications.application.id) + { + $aumidList += $app.packagefamilyname + "!" + $id + } +} + +$aumidList +``` + +> [!NOTE] +> You can add the `-user ` or the `-allusers` parameters to the `Get-AppxPackage` cmdlet to list AUMIDs for other users. You must use an elevated Windows PowerShell prompt to use the `-user` or -`allusers` parameters. + +### Example to get AUMIDs of the installed apps for the specified user + +The following code sample creates a function in Windows PowerShell that returns an array of AUMIDs of the installed apps for the specified user. + +### Example to get the AUMID of any application in the Start menu + +The following code sample creates a function in Windows PowerShell that returns the AUMID of any application currently listed in the Start menu. + +```powershell +function Get-AppAUMID { +param ( +[string]$AppName +) +$Apps = (New-Object -ComObject Shell.Application).NameSpace('shell:::{4234d49b-0245-4df3-b780-3893943456e1}').Items() +if ($AppName){ + $Result = $Apps | Where-Object { $_.name -like "*$AppName*" } | Select-Object name,@{n="AUMID";e={$_.path}} + if ($Result){ + Return $Result + } + else {"Unable to locate {0}" -f $AppName} +} +else { + $Result = $Apps | Select-Object name,@{n="AUMID";e={$_.path}} + Return $Result +} +} +``` + +The following Windows PowerShell commands demonstrate how you can call the Get-AppAUMID function after you've created it. + +```powershell +# Get the AUMID for OneDrive +Get-AppAUMID -AppName OneDrive + +# Get the AUMID for Microsoft Word +Get-AppAUMID -AppName Word + +# List all apps and their AUMID in the Start menu +Get-AppAUMID +``` + +# [:::image type="icon" source="../images/icons/explorer.svg"::: **Explorer**](#tab/explorer) + +To get the names and AUMIDs for all apps installed for the current user, perform the following steps: + +1. Select **Start** > **Run**, enter `shell:Appsfolder`, and select **OK** +1. A File Explorer window opens. Press Alt+V > **Choose details** +1. In the **Choose Details** window, select **AppUserModelId**, and then select **OK**. (You might need to c +1. Change the **View** setting from **Tiles** to **Details** + +:::image type="content" source="images/aumid-file-explorer.png" alt-text="Screenshot of the File Explorer showing the AUMID details." border="false"::: + +# [:::image type="icon" source="../images/icons/registry.svg"::: **Registry**](#tab/registry) + +Querying the registry can only return information about Microsoft Store apps that are installed for the current user, while the Windows PowerShell query can find information for any account on the device. + +At a command prompt, type the following command: + +```cmd +reg query HKEY_CURRENT_USER\Software\Classes\ActivatableClasses\Package /s /f AppUserModelID | find "REG_SZ" +``` + +--- diff --git a/windows/configuration/store/images/aumid-file-explorer.png b/windows/configuration/store/images/aumid-file-explorer.png new file mode 100644 index 0000000000..0361cd9bfe Binary files /dev/null and b/windows/configuration/store/images/aumid-file-explorer.png differ diff --git a/windows/configuration/store/images/store-blocked.png b/windows/configuration/store/images/store-blocked.png new file mode 100644 index 0000000000..c45c074f34 Binary files /dev/null and b/windows/configuration/store/images/store-blocked.png differ diff --git a/windows/configuration/store/index.md b/windows/configuration/store/index.md new file mode 100644 index 0000000000..09c92aea0f --- /dev/null +++ b/windows/configuration/store/index.md @@ -0,0 +1,66 @@ +--- +title: Configure access to the Microsoft Store app +description: Learn how to configure access to the Microsoft Store app. +ms.topic: how-to +ms.date: 03/13/2024 +--- + +# Configure access to the Microsoft Store app + +Microsoft Store is a digital distribution platform that provides a way for users to install applications on Windows devices. For some organizations, business policies require blocking access to Microsoft Store. + +This article describes how to configure access to the Microsoft Store app in your organization. + +## Prevent access to the Microsoft Store app + +You can use configuration service provider (CSP) or group policy (GPO) settings to configure access to the Microsoft Store app. The CSP configuration is available to Windows Enterprise and Education editions only. + +[!INCLUDE [tab-intro](../../../includes/configure/tab-intro.md)] + +#### [:::image type="icon" source="../images/icons/intune.svg" border="false"::: **Intune/CSP**](#tab/intune) + +[!INCLUDE [intune-settings-catalog-1](../../../includes/configure/intune-settings-catalog-1.md)] + +| Category | Setting name | Value | +|--|--|--| +| **Administrative Templates > Windows Components > Store** | Turn off the Store application| **Enabled**| + +[!INCLUDE [intune-settings-catalog-2](../../../includes/configure/intune-settings-catalog-2.md)] + +Alternatively, you can configure devices using a [custom policy][INT-1] with the [Policy CSP][CSP-1]. + +| Setting | +|--| +|- **OMA-URI:** `./Device/Vendor/MSFT/Policy/Config/ADMX_WindowsStore/RemoveWindowsStore_2`
    - **Data type:** string
    - **Value:** ``| + +#### [:::image type="icon" source="../images/icons/group-policy.svg" border="false"::: **GPO**](#tab/gpo) + +[!INCLUDE [gpo-settings-1](../../../includes/configure/gpo-settings-1.md)] + +| Group policy path | Group policy setting | Value | +| - | - | - | +| **Computer Configuration\Administrative Templates\Windows Components\Store** | Turn off the Store application| **Enabled**| + +[!INCLUDE [gpo-settings-2](../../../includes/configure/gpo-settings-2.md)] + +--- + +## User experience + +When you turn off the Microsoft Store application, users get the following message when they open it: + +:::image type="content" source="images/store-blocked.png" alt-text="Screenshot of the Microsoft Store app blocked access." border="false"::: + +## Considerations + +Here are some considerations when you prevent access to the Microsoft Store app: + +- Microsoft Store applications keep updating automatically, by default +- Users might still be able to install applications using Windows Package Manager (winget), or other methods, if they don't need to acquire the package from Microsoft Store +- Devices managed by Microsoft Intune can still install applications sourced from Microsoft Store, even if you block access to the Microsoft Store app. To learn more, see [Add Microsoft Store apps to Microsoft Intune][INT-2] + + + +[CSP-1]: /windows/client-management/mdm/policy-csp-admx-windowsstore +[INT-1]: /mem/intune/configuration/settings-catalog +[INT-2]: /mem/intune/apps/store-apps-microsoft diff --git a/windows/configuration/store/stop-employees-from-using-microsoft-store.md b/windows/configuration/store/stop-employees-from-using-microsoft-store.md deleted file mode 100644 index a70a6b5922..0000000000 --- a/windows/configuration/store/stop-employees-from-using-microsoft-store.md +++ /dev/null @@ -1,107 +0,0 @@ ---- -title: Configure access to Microsoft Store -description: Learn how to configure access to Microsoft Store for client computers and mobile devices in your organization. -ms.topic: conceptual -ms.date: 11/29/2022 ---- - -# Configure access to Microsoft Store - -IT pros can configure access to Microsoft Store for client computers in their organization. For some organizations, business policies require blocking access to Microsoft Store. - -> [!IMPORTANT] -> All executable code including Microsoft Store applications should have an update and maintenance plan. Organizations that use Microsoft Store applications should ensure that the applications can be updated through the Microsoft Store over the internet, through the [Private Store](/microsoft-store/distribute-apps-from-your-private-store), or [distributed offline](/microsoft-store/distribute-offline-apps) to keep the applications up to date. - -## Options to configure access to Microsoft Store - -You can use either AppLocker or Group Policy to configure access to Microsoft Store. For Windows 10, configuring access to Microsoft Store is only supported on Windows 10 Enterprise edition. - -## Block Microsoft Store using AppLocker - -Applies to: Windows 10 Enterprise, Windows 10 Education - -AppLocker provides policy-based access control management for applications. You can block access to Microsoft Store app with AppLocker by creating a rule for packaged apps. You'll give the name of the Microsoft Store app as the packaged app that you want to block from client computers. - -For more information on AppLocker, see [What is AppLocker?](/windows/device-security/applocker/what-is-applocker) For more information on creating an AppLocker rule for app packages, see [Create a rule for packaged apps](/windows/device-security/applocker/create-a-rule-for-packaged-apps). - -**To block Microsoft Store using AppLocker:** - -1. Enter **`secpol`** in the search bar to find and start AppLocker. - -1. In the console tree of the snap-in, select **Application Control Policies**, select **AppLocker**, and then select **Packaged app Rules**. - -1. On the **Action** menu, or by right-clicking on **Packaged app Rules**, select **Create New Rule**. - -1. On **Before You Begin**, select **Next**. - -1. On **Permissions**, select the action (allow or deny) and the user or group that the rule should apply to, and then select **Next**. - -1. On **Publisher**, you can select **Use an installed app package as a reference**, and then select **Select**. - -1. On **Select applications**, find and select **Store** under **Applications** column, and then select **OK**. Select **Next**. - - [Create a rule for packaged apps](/windows/device-security/applocker/create-a-rule-for-packaged-apps) has more information on reference options and setting the scope on packaged app rules. - -1. Optional: On **Exceptions**, specify conditions by which to exclude files from being affected by the rule. Conditions allow you to add exceptions based on the same rule reference and rule scope as you set before. Select **Next**. - -## Block Microsoft Store using configuration service provider - -Applies to: Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education - -If you have Windows 10 devices in your organization that are managed using a mobile device management (MDM) system, such as Microsoft Intune, you can block access to Microsoft Store app using the following configuration service providers (CSPs): - -- [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) -- [AppLocker CSP](/windows/client-management/mdm/applocker-csp) - -For more information, see [Configure an MDM provider](/microsoft-store/configure-mdm-provider-microsoft-store-for-business). - -For more information on the rules available via AppLocker on the different supported operating systems, see [Operating system requirements](/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker#operating-system-requirements). - -> [!IMPORTANT] -> If you block access to the Store using CSP, you need to also configure [AllowAppStoreAutoUpdate](/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-allowappstoreautoupdate) to enable in-box store apps to update while still blocking access to the store. - -## Block Microsoft Store using Group Policy - -Applies to: Windows 10 Enterprise, Windows 10 Education - -> [!NOTE] -> Not supported on Windows 10 Pro, starting with version 151. For more info, see [Knowledge Base article #3135657](/troubleshoot/windows-client/group-policy/cannot-disable-microsoft-store). - -You can also use Group Policy to manage access to Microsoft Store. - -**To block Microsoft Store using Group Policy:** - -1. Enter **`gpedit`** in the search bar to find and start Group Policy Editor. - -1. In the console tree of the snap-in, select **Computer Configuration**, select **Administrative Templates**, select **Windows Components**, and then select **Store**. - -1. In the Setting pane, select **Turn off the Store application**, and then select **Edit policy setting**. - -1. On the **Turn off the Store application** setting page, select **Enabled**, and then select **OK**. - -> [!IMPORTANT] -> When you enable the policy to **Turn off the Store application**, it turns off app updates from the Microsoft Store. To allow store apps to update, disable the policy to **Turn off automatic download and install of Updates**. This policy is found under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Store**. This configuration allows in-box store apps to update while still blocking access to the store. - -## Show private store only using Group Policy - -Applies to Windows 10 Enterprise, Windows 10 Education - -If you're using Microsoft Store for Business and you want employees to only see apps you're managing in your private store, you can use Group Policy to show only the private store. Microsoft Store app will still be available, but employees can't view or purchase apps. Employees can view and install apps that the admin has added to your organization's private store. - -**To show private store only in Microsoft Store app:** - -1. Enter **`gpedit`** in the search bar, and then select **Edit group policy (Control panel)** to find and start Group Policy Editor. - -1. In the console tree of the snap-in, go to **User Configuration** or **Computer Configuration** > **Administrative Templates** > **Windows Components**, and then select **Store**. - -1. Right-click **Only display the private store within the Microsoft Store app** in the right pane, and select **Edit**. - - The **Only display the private store within the Microsoft Store app** policy settings will open. - -1. On the **Only display the private store within the Microsoft Store app** setting page, select **Enabled**, and then select **OK**. - -## Related articles - -[Distribute apps using your private store](/microsoft-store/distribute-apps-from-your-private-store) - -[Manage access to private store](/microsoft-store/manage-access-to-private-store) diff --git a/windows/configuration/taskbar/customize-taskbar-windows-11.md b/windows/configuration/taskbar/customize-taskbar-windows-11.md deleted file mode 100644 index 6af8ef100f..0000000000 --- a/windows/configuration/taskbar/customize-taskbar-windows-11.md +++ /dev/null @@ -1,234 +0,0 @@ ---- -title: Configure and customize Windows 11 taskbar -description: On Windows 11 devices, pin and unpin default apps and organization apps on the taskbar using an XML file. Deploy the taskbar XML file using Group Policy or MDM and Microsoft Intune. See what happens to the taskbar when the Windows OS client is installed or upgraded. -ms.date: 08/17/2023 -ms.topic: article -ms.collection: - - tier1 -appliesto: -- ✅ Windows 11 ---- - -# Customize the Taskbar on Windows 11 - -> **Looking for OEM information?** See [Customize the Taskbar](/windows-hardware/customize/desktop/customize-the-windows-11-taskbar) and [Customize the Start layout](/windows-hardware/customize/desktop/customize-the-windows-11-start-menu). - -Your organization can deploy a customized taskbar to your Windows devices. Customizing the taskbar is common when your organization uses a common set of apps, or wants to bring attention to specific apps. You can also remove the default pinned apps. - -For example, you can override the default set of apps with your own a set of pinned apps, and in the order you choose. As an administrator, use this feature to pin apps, remove default pinned apps, order the apps, and more on the taskbar. - -To add apps you want pinned to the taskbar, you use an XML file. You can use an existing XML file, or create a new file. If you have an XML file that's used on Windows 10 devices, you can also use it on Windows 11 devices. You may have to update the App IDs. - -This article shows you how to create the XML file, add apps to the XML, and deploy the XML file. To learn how to customize the taskbar buttons, see [CSP policies to customize Windows 11 taskbar buttons](supported-csp-taskbar-windows.md#csp-policies-to-customize-windows-11-taskbar-buttons). - -## Before you begin - -- There isn't a limit on the number of apps that you can pin. In the XML file, add apps using the [Application User Model ID (AUMID)](../kiosk/find-the-application-user-model-id-of-an-installed-app.md) or Desktop Application Link Path (the local path to the app). -- There are some situations that an app pinned in your XML file won't be pinned in the taskbar. For example, if an app isn't approved or installed for a user, then the pinned icon won't show on the taskbar. -- The order of apps in the XML file dictates the order of pinned apps on the taskbar, from left to right, and to the right of any existing apps pinned by the user. If the OS is configured to use a right-to-left language, then the taskbar order is reversed. -- Some classic Windows applications are packaged differently than they were in previous versions of Windows, including Notepad and File Explorer. Be sure to enter the correct AppID. For more information, see [Application User Model ID (AUMID)](../kiosk/find-the-application-user-model-id-of-an-installed-app.md) and [Get the AUMID and Desktop app link path](#get-the-aumid-and-desktop-app-link-path) (in this article). -- It's recommended to use a Mobile Device Management (MDM) provider. MDM providers help manage your devices, and help manage apps on your devices. You can use Microsoft Intune. Intune is a family of products that include Microsoft Intune, which is a cloud service, and Configuration Manager, which is on-premises. - - In this article, we mention these services. If you're not managing your devices using an MDM provider, the following resources may help you get started: - - - [Endpoint Management at Microsoft](/mem/endpoint-manager-overview) - - [What is Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Intune planning guide](/mem/intune/fundamentals/intune-planning-guide) - - [What is Configuration Manager?](/mem/configmgr/core/understand/introduction) - -## Create the XML file - -1. In a text editor, such as Visual Studio Code, create a new XML file. To help you get started, you can copy and paste the following XML sample. The sample pins 2 apps to the taskbar - File Explorer and the Command Prompt: - - ```xml - - - - - - - - - - - - ``` - -1. In the `` node, add (or remove) the apps you want pinned. You can pin Universal Windows Platform (UWP) apps and desktop apps: - - - ``: Select this option for UWP apps. Add the [AUMID](../kiosk/find-the-application-user-model-id-of-an-installed-app.md) of the UWP app. - - ``: Select this option for desktop apps. Add the Desktop Application Link Path of the desktop app. - - You can pin as many apps as you want. Just keep adding them to the list. Remember, the app order in the list is the same order the apps are shown on the taskbar. - - For more information, see [Get the AUMID and Desktop app link path](#get-the-aumid-and-desktop-app-link-path) (in this article). - -1. In the `` node, the apps you add are pinned after the default apps. If you want to remove the default apps, and only show the apps you add in the XML file, then add `PinListPlacement="Replace"`: - - - ``: Keeps the default pinned apps. After the default apps, the apps you add are pinned. - - ``: Unpins the default apps. Only the apps you add are pinned. - - If you want to remove some of the default pinned apps, then add `PinListPlacement="Replace"`. When you add your apps to ``, include the default apps you still want pinned. - -1. In the `` node, use `region=" | "` to use different taskbar configurations based on the device locale and region. - - In the following XML example, two regions are added: `US|UK` and `DE|FR`: - - ```xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ``` - - The taskbar applies when: - - - If the `` node has a country or region, then the apps are pinned on devices configured for that country or region. - - If the `` node doesn't have a region tag for the current region, then the first `` node with no region is applied. - -1. Save the file, and name the file so you know what it is. For example, name the file something like `TaskbarLayoutModification.xml`. Once you have the file, it's ready to be deployed to your Windows devices. - -## Use Group Policy or MDM to create and deploy a taskbar policy - -Now that you have the XML file with your customized taskbar, you're ready to deploy it to devices in your organization. You can deploy your taskbar XML file using Group Policy, or using an MDM provider, like Microsoft Intune. - -This section shows you how to deploy the XML both ways. - -### Use Group Policy to deploy your XML file - -Use the following steps to add your XML file to a group policy, and apply the policy: - -1. Open your policy editor. For example, open Group Policy Management Console (GPMC) for domain-based group policies, or open `gpedit` for local policies. -1. Go to one of the following policies: - - - `Computer Configuration\Administrative Templates\Start Menu and Taskbar\Start Layout` - - `User Configuration\Administrative Templates\Start Menu and Taskbar\Start Layout` - -1. Double-select `Start Layout` > **Enable**. Enter the fully qualified path to your XML file, including the XML file name. You can enter a local path, like `C:\StartLayouts\TaskbarLayoutModification.xml`, or a network path, like `\\Server\Share\TaskbarLayoutModification.xml`. Be sure you enter the correct file path. If using a network share, be sure to give users read access to the XML file. If the file isn't available when the user signs in, then the taskbar isn't changed. Users can't customize the taskbar when this setting is enabled. - - Your policy looks like the following policy: - - :::image type="content" source="images/start-layout-group-policy.png" alt-text="Add your taskbar layout XML file to the Start Layout policy on Windows devices."::: - - The `User Configuration\Administrative Templates\Start Menu and Taskbar` policy includes other settings that control the taskbar. Some policies may not work as expected. Be sure to test your policies before broadly deploying them across your devices. - -1. When you apply the policy, the taskbar includes your changes. The next time users sign in, they'll see the changes. - - For more information on using group policies, see [Implement Group Policy Objects](/training/modules/implement-group-policy-objects/). - -### Create a Microsoft Intune policy to deploy your XML file - -MDM providers can deploy policies to devices managed by the organization, including organization-owned devices, and personal or bring your own device (BYOD). Using an MDM provider, such as Microsoft Intune, you can deploy a policy that configures the pinned list. - -Use the following steps to create an Intune policy that deploys your taskbar XML file: - -1. Sign in to the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). - -1. Select **Devices** > **Configuration profiles** > **Create profile**. - -1. Enter the following properties: - - - **Platform**: Select **Windows 10 and later**. - - **Profile type**: Select **Templates** > **Device restrictions** > **Create**. - -1. In **Basics**, enter the following properties: - - - **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify it later. For example, a good profile name is **Win11: Custom taskbar**. - - **Description**: Enter a description for the profile. This setting is optional, and recommended. - -1. Select **Next**. - -1. In **Configuration settings**, select **Start** > **Start menu layout**. Browse to, and select your taskbar XML file. - -1. Select **Next**, and configure the rest of the policy settings. For more specific information, see [Configure device restriction settings](/mem/intune/configuration/device-restrictions-configure). - -1. When the policy is created, you can deploy it now, or deploy it later. Since this policy is a customized taskbar, the policy can also be deployed before users sign in the first time. - - For more information and guidance on assigning policies using Microsoft Intune, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign). - -> [!NOTE] -> For third party partner MDM solutions, you may need to use an OMA-URI setting for Start layout, based on the [Policy configuration service provider (CSP)](/windows/client-management/mdm/policy-configuration-service-provider). The OMA-URI setting is `./User/Vendor/MSFT/Policy/Config/Start/StartLayout`. - -## Get the AUMID and Desktop app link path - -In the layout modification XML file, you add apps in the XML markup. To pin an app, you enter the AUMID or Desktop Application Link Path. The easiest way to find this app information is to use the [Export-StartLayout](/powershell/module/startlayout/export-startlayout) Windows PowerShell cmdlet: - -1. On an existing Windows 11 device, pin the app to the Start menu. -1. Create a folder to save an output file. For example, create the `C:\Layouts` folder. -1. Open the Windows PowerShell app, and run the following cmdlet: - - ```powershell - Export-StartLayout -Path "C:\Layouts\GetIDorPath.xml" - ``` - -1. Open the generated GetIDorPath.xml file, and look for the app you pinned. When you find the app, get the AppID or Path. Add these properties to your XML file. - -## Pin order for all apps - -On a taskbar, the following apps are typically pinned: - -- Apps pinned by the user -- Default Windows apps pinned during the OS installation, such as Microsoft Edge, File Explorer, and Microsoft Store. -- Apps pinned by your organization, such as in an unattended Windows setup. - - In an unattended Windows setup file, use the XML file you created in this article. It's not recommended to use [TaskbarLinks](/windows-hardware/customize/desktop/unattend/microsoft-windows-shell-setup-taskbarlinks). - -Apps are pinned in the following order: - -1. Windows default apps are pinned first. -1. User-pinned apps are pinned after the Windows default apps. -1. XML-pinned apps are pinned after the user-pinned apps. - -If the OS is configured to use a right-to-left language, then the taskbar order is reversed. - -## OS install and upgrade - -- On a clean install of the Windows client, if you apply a taskbar layout, the following apps are pinned to the taskbar: - - - Apps you specifically add - - Any default apps you don't remove - - After the taskbar layout is applied, users can pin more apps, change the order, and unpin apps. - -- On a Windows client upgrade, apps are already pinned to the taskbar. These apps may have been pinned by a user, by an image, or by using Windows unattended setup. For upgrades, the taskbar layout applies the following behavior: - - - If users pinned apps to the taskbar, then those pinned apps remain. New apps are pinned after the existing user-pinned apps. - - If the apps are pinned during the install or by a policy (not by a user), and the apps aren't pinned in an updated layout file, then the apps are unpinned. - - If a user didn't pin an app, and the same app is pinned in the updated layout file, then the app is pinned after any existing pinned apps. - - New apps in updated layout file are pinned after the user's pinned apps. - - After the layout is applied, users can pin more apps, change the order, and unpin apps. diff --git a/windows/configuration/taskbar/configure-windows-10-taskbar.md b/windows/configuration/taskbar/index.md similarity index 50% rename from windows/configuration/taskbar/configure-windows-10-taskbar.md rename to windows/configuration/taskbar/index.md index b9ac41035d..8061acd2b6 100644 --- a/windows/configuration/taskbar/configure-windows-10-taskbar.md +++ b/windows/configuration/taskbar/index.md @@ -4,10 +4,12 @@ description: Administrators can pin more apps to the taskbar and remove default ms.topic: how-to ms.date: 08/18/2023 appliesto: -- ✅ Windows 10 +zone_pivot_groups: windows-versions-11-10 --- -# Configure Windows 10 taskbar +# Configure Windows Taskbar + +::: zone pivot="windows-10" Starting in Windows 10, version 1607, administrators can pin more apps to the taskbar and remove default pinned apps from the taskbar by adding a `` section to a layout modification XML file. This method never removes user-pinned apps from the taskbar. @@ -38,7 +40,7 @@ To configure the taskbar: - Add `xmlns:taskbar="http://schemas.microsoft.com/Start/2014/TaskbarLayout"` to the first line of the file, before the closing \>. - Use `` and [AUMID](../kiosk/find-the-application-user-model-id-of-an-installed-app.md) to pin Universal Windows Platform apps - Use `` and Desktop Application Link Path to pin desktop applications -1. Apply the layout modification XML file to devices using [Group Policy](../start/customize-windows-10-start-screens-by-using-group-policy.md) or a [provisioning package created in Windows Imaging and Configuration Designer (Windows ICD)](../start/customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md). +1. Apply the layout modification XML file to devices using Group Policy or a provisioning package. >[!IMPORTANT] >If you use a provisioning package or import-startlayout to configure the taskbar, your configuration will be reapplied each time the explorer.exe process restarts. If your configuration pins an app and the user then unpins that app, the user's change will be overwritten the next time the configuration is applied. To apply a taskbar configuration that allows users to make changes that will persist, apply your configuration by using Group Policy. @@ -308,3 +310,231 @@ The resulting taskbar for computers in any other country region: ``` + +::: zone-end + +::: zone pivot="windows-11" + +> **Looking for OEM information?** See [Customize the Taskbar](/windows-hardware/customize/desktop/customize-the-windows-11-taskbar) and [Customize the Start layout](/windows-hardware/customize/desktop/customize-the-windows-11-start-menu). + +Your organization can deploy a customized taskbar to your Windows devices. Customizing the taskbar is common when your organization uses a common set of apps, or wants to bring attention to specific apps. You can also remove the default pinned apps. + +For example, you can override the default set of apps with your own a set of pinned apps, and in the order you choose. As an administrator, use this feature to pin apps, remove default pinned apps, order the apps, and more on the taskbar. + +To add apps you want pinned to the taskbar, you use an XML file. You can use an existing XML file, or create a new file. If you have an XML file that's used on Windows 10 devices, you can also use it on Windows 11 devices. You may have to update the App IDs. + +This article shows you how to create the XML file, add apps to the XML, and deploy the XML file. To learn how to customize the taskbar buttons, see [CSP policies to customize Windows 11 taskbar buttons](supported-csp-taskbar-windows.md#csp-policies-to-customize-windows-11-taskbar-buttons). + +## Before you begin + +- There isn't a limit on the number of apps that you can pin. In the XML file, add apps using the [Application User Model ID (AUMID)](../kiosk/find-the-application-user-model-id-of-an-installed-app.md) or Desktop Application Link Path (the local path to the app). +- There are some situations that an app pinned in your XML file won't be pinned in the taskbar. For example, if an app isn't approved or installed for a user, then the pinned icon won't show on the taskbar. +- The order of apps in the XML file dictates the order of pinned apps on the taskbar, from left to right, and to the right of any existing apps pinned by the user. If the OS is configured to use a right-to-left language, then the taskbar order is reversed. +- Some classic Windows applications are packaged differently than they were in previous versions of Windows, including Notepad and File Explorer. Be sure to enter the correct AppID. For more information, see [Application User Model ID (AUMID)](../kiosk/find-the-application-user-model-id-of-an-installed-app.md) and [Get the AUMID and Desktop app link path](#get-the-aumid-and-desktop-app-link-path) (in this article). +- It's recommended to use a Mobile Device Management (MDM) provider. MDM providers help manage your devices, and help manage apps on your devices. You can use Microsoft Intune. Intune is a family of products that include Microsoft Intune, which is a cloud service, and Configuration Manager, which is on-premises. + + In this article, we mention these services. If you're not managing your devices using an MDM provider, the following resources may help you get started: + + - [Endpoint Management at Microsoft](/mem/endpoint-manager-overview) + - [What is Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Intune planning guide](/mem/intune/fundamentals/intune-planning-guide) + - [What is Configuration Manager?](/mem/configmgr/core/understand/introduction) + +## Create the XML file + +1. In a text editor, such as Visual Studio Code, create a new XML file. To help you get started, you can copy and paste the following XML sample. The sample pins 2 apps to the taskbar - File Explorer and the Command Prompt: + + ```xml + + + + + + + + + + + + ``` + +1. In the `` node, add (or remove) the apps you want pinned. You can pin Universal Windows Platform (UWP) apps and desktop apps: + + - ``: Select this option for UWP apps. Add the [AUMID](../kiosk/find-the-application-user-model-id-of-an-installed-app.md) of the UWP app. + - ``: Select this option for desktop apps. Add the Desktop Application Link Path of the desktop app. + + You can pin as many apps as you want. Just keep adding them to the list. Remember, the app order in the list is the same order the apps are shown on the taskbar. + + For more information, see [Get the AUMID and Desktop app link path](#get-the-aumid-and-desktop-app-link-path) (in this article). + +1. In the `` node, the apps you add are pinned after the default apps. If you want to remove the default apps, and only show the apps you add in the XML file, then add `PinListPlacement="Replace"`: + + - ``: Keeps the default pinned apps. After the default apps, the apps you add are pinned. + - ``: Unpins the default apps. Only the apps you add are pinned. + + If you want to remove some of the default pinned apps, then add `PinListPlacement="Replace"`. When you add your apps to ``, include the default apps you still want pinned. + +1. In the `` node, use `region=" | "` to use different taskbar configurations based on the device locale and region. + + In the following XML example, two regions are added: `US|UK` and `DE|FR`: + + ```xml + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + ``` + + The taskbar applies when: + + - If the `` node has a country or region, then the apps are pinned on devices configured for that country or region. + - If the `` node doesn't have a region tag for the current region, then the first `` node with no region is applied. + +1. Save the file, and name the file so you know what it is. For example, name the file something like `TaskbarLayoutModification.xml`. Once you have the file, it's ready to be deployed to your Windows devices. + +## Use Group Policy or MDM to create and deploy a taskbar policy + +Now that you have the XML file with your customized taskbar, you're ready to deploy it to devices in your organization. You can deploy your taskbar XML file using Group Policy, or using an MDM provider, like Microsoft Intune. + +This section shows you how to deploy the XML both ways. + +### Use Group Policy to deploy your XML file + +Use the following steps to add your XML file to a group policy, and apply the policy: + +1. Open your policy editor. For example, open Group Policy Management Console (GPMC) for domain-based group policies, or open `gpedit` for local policies. +1. Go to one of the following policies: + + - `Computer Configuration\Administrative Templates\Start Menu and Taskbar\Start Layout` + - `User Configuration\Administrative Templates\Start Menu and Taskbar\Start Layout` + +1. Double-select `Start Layout` > **Enable**. Enter the fully qualified path to your XML file, including the XML file name. You can enter a local path, like `C:\StartLayouts\TaskbarLayoutModification.xml`, or a network path, like `\\Server\Share\TaskbarLayoutModification.xml`. Be sure you enter the correct file path. If using a network share, be sure to give users read access to the XML file. If the file isn't available when the user signs in, then the taskbar isn't changed. Users can't customize the taskbar when this setting is enabled. + + Your policy looks like the following policy: + + :::image type="content" source="images/start-layout-group-policy.png" alt-text="Add your taskbar layout XML file to the Start Layout policy on Windows devices."::: + + The `User Configuration\Administrative Templates\Start Menu and Taskbar` policy includes other settings that control the taskbar. Some policies may not work as expected. Be sure to test your policies before broadly deploying them across your devices. + +1. When you apply the policy, the taskbar includes your changes. The next time users sign in, they'll see the changes. + + For more information on using group policies, see [Implement Group Policy Objects](/training/modules/implement-group-policy-objects/). + +### Create a Microsoft Intune policy to deploy your XML file + +MDM providers can deploy policies to devices managed by the organization, including organization-owned devices, and personal or bring your own device (BYOD). Using an MDM provider, such as Microsoft Intune, you can deploy a policy that configures the pinned list. + +Use the following steps to create an Intune policy that deploys your taskbar XML file: + +1. Sign in to the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). + +1. Select **Devices** > **Configuration profiles** > **Create profile**. + +1. Enter the following properties: + + - **Platform**: Select **Windows 10 and later**. + - **Profile type**: Select **Templates** > **Device restrictions** > **Create**. + +1. In **Basics**, enter the following properties: + + - **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify it later. For example, a good profile name is **Win11: Custom taskbar**. + - **Description**: Enter a description for the profile. This setting is optional, and recommended. + +1. Select **Next**. + +1. In **Configuration settings**, select **Start** > **Start menu layout**. Browse to, and select your taskbar XML file. + +1. Select **Next**, and configure the rest of the policy settings. For more specific information, see [Configure device restriction settings](/mem/intune/configuration/device-restrictions-configure). + +1. When the policy is created, you can deploy it now, or deploy it later. Since this policy is a customized taskbar, the policy can also be deployed before users sign in the first time. + + For more information and guidance on assigning policies using Microsoft Intune, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign). + +> [!NOTE] +> For third party partner MDM solutions, you may need to use an OMA-URI setting for Start layout, based on the [Policy configuration service provider (CSP)](/windows/client-management/mdm/policy-configuration-service-provider). The OMA-URI setting is `./User/Vendor/MSFT/Policy/Config/Start/StartLayout`. + +## Get the AUMID and Desktop app link path + +In the layout modification XML file, you add apps in the XML markup. To pin an app, you enter the AUMID or Desktop Application Link Path. The easiest way to find this app information is to use the [Export-StartLayout](/powershell/module/startlayout/export-startlayout) Windows PowerShell cmdlet: + +1. On an existing Windows 11 device, pin the app to the Start menu. +1. Create a folder to save an output file. For example, create the `C:\Layouts` folder. +1. Open the Windows PowerShell app, and run the following cmdlet: + + ```powershell + Export-StartLayout -Path "C:\Layouts\GetIDorPath.xml" + ``` + +1. Open the generated GetIDorPath.xml file, and look for the app you pinned. When you find the app, get the AppID or Path. Add these properties to your XML file. + +## Pin order for all apps + +On a taskbar, the following apps are typically pinned: + +- Apps pinned by the user +- Default Windows apps pinned during the OS installation, such as Microsoft Edge, File Explorer, and Microsoft Store. +- Apps pinned by your organization, such as in an unattended Windows setup. + + In an unattended Windows setup file, use the XML file you created in this article. It's not recommended to use [TaskbarLinks](/windows-hardware/customize/desktop/unattend/microsoft-windows-shell-setup-taskbarlinks). + +Apps are pinned in the following order: + +1. Windows default apps are pinned first. +1. User-pinned apps are pinned after the Windows default apps. +1. XML-pinned apps are pinned after the user-pinned apps. + +If the OS is configured to use a right-to-left language, then the taskbar order is reversed. + +## OS install and upgrade + +- On a clean install of the Windows client, if you apply a taskbar layout, the following apps are pinned to the taskbar: + + - Apps you specifically add + - Any default apps you don't remove + + After the taskbar layout is applied, users can pin more apps, change the order, and unpin apps. + +- On a Windows client upgrade, apps are already pinned to the taskbar. These apps may have been pinned by a user, by an image, or by using Windows unattended setup. For upgrades, the taskbar layout applies the following behavior: + + - If users pinned apps to the taskbar, then those pinned apps remain. New apps are pinned after the existing user-pinned apps. + - If the apps are pinned during the install or by a policy (not by a user), and the apps aren't pinned in an updated layout file, then the apps are unpinned. + - If a user didn't pin an app, and the same app is pinned in the updated layout file, then the app is pinned after any existing pinned apps. + - New apps in updated layout file are pinned after the user's pinned apps. + + After the layout is applied, users can pin more apps, change the order, and unpin apps. + +::: zone-end diff --git a/windows/configuration/taskbar/supported-csp-taskbar-windows.md b/windows/configuration/taskbar/policy-settings.md similarity index 100% rename from windows/configuration/taskbar/supported-csp-taskbar-windows.md rename to windows/configuration/taskbar/policy-settings.md diff --git a/windows/configuration/taskbar/toc.yml b/windows/configuration/taskbar/toc.yml index cbe3e66b83..c3601e77ec 100644 --- a/windows/configuration/taskbar/toc.yml +++ b/windows/configuration/taskbar/toc.yml @@ -1,7 +1,5 @@ items: -- name: Customize the Taskbar in Windows 11 - href: customize-taskbar-windows-11.md +- name: Customize the Taskbar + href: index.md - name: Supported Taskbar CSPs - href: supported-csp-taskbar-windows.md -- name: Customize the Taskbar in Windows 10 - href: configure-windows-10-taskbar.md \ No newline at end of file + href: policy-settings.md \ No newline at end of file diff --git a/windows/configuration/tips/manage-tips-and-suggestions.md b/windows/configuration/tips/manage-tips-and-suggestions.md deleted file mode 100644 index 02b2484664..0000000000 --- a/windows/configuration/tips/manage-tips-and-suggestions.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -title: Manage Windows 10 and Microsoft Store tips, fun facts, and suggestions -description: Windows 10 provides organizations with various options to manage user experiences to provide a consistent and predictable experience for employees. -ms.topic: article -ms.date: 09/20/2017 ---- - -# Manage Windows 10 and Microsoft Store tips, "fun facts", and suggestions - -Since its inception, Windows 10 has included a number of user experience features that provide useful tips, "fun facts", and suggestions as you use Windows, as well as app suggestions from the Microsoft Store. These features are designed to help people get the most out of their Windows 10 experience by, for example, sharing new features, providing more details on the features they use, or sharing content available in the Microsoft Store. Examples of such user experiences include: - -* **Windows Spotlight on the lock screen**. Daily updated images on the lock screen that can include additional facts and tips in "hotspots" that are revealed on hover. -* **Start menu app suggestions**. App suggestions in Start that recommend productivity tool or utilities from the Microsoft Store. -* **Additional apps on Start**. Additional apps pre-installed on the Start screen which can enhance the user's experience. -* **Windows tips**. Contextual tips that appear based on specific user actions to reveal related Windows features or help users complete a scenario. -* **Microsoft account notifications**. For users who have a connected Microsoft account, toast notifications about their account like parental control notifications or subscription expiration. - ->[!TIP] -> On all Windows desktop editions, users can directly enable and disable Windows 10 tips, "fun facts", and suggestions and Microsoft Store suggestions. For example, users are able to select personal photos for the lock screen as opposed to the images provided by Microsoft, or turn off tips, "fun facts", or suggestions as they use Windows. - -Windows 10 provides organizations the ability to centrally manage the type of content provided by these features through Group Policy or mobile device management (MDM). The following table describes how administrators can manage suggestions and tips in Windows 10 commercial and education editions. - -## Options available to manage Windows 10 tips and "fun facts" and Microsoft Store suggestions - -| Windows 10 edition | Disable | Show Microsoft apps only | Show Microsoft and popular third-party apps | -|--|--|--|--| -| Windows 10 Pro | No | Yes | Yes (default) | -| Windows 10 Enterprise | Yes | Yes | Yes (default) | -| Windows 10 Pro Education | Yes (default) | Yes | No (setting cannot be changed) | -| Windows 10 Education | Yes (default) | Yes | No (setting cannot be changed) | - -[Learn more about policy settings for Windows Spotlight.](../lock-screen/windows-spotlight.md) diff --git a/windows/configuration/toc.yml b/windows/configuration/toc.yml index ca93c8e7db..25256515be 100644 --- a/windows/configuration/toc.yml +++ b/windows/configuration/toc.yml @@ -9,23 +9,23 @@ items: href: start/toc.yml - name: Taskbar href: taskbar/toc.yml + - name: Windows Spotlight + href: lock-screen/windows-spotlight.md - name: Microsoft Store items: - - name: Configure access to the Microsoft Store - href: store/stop-employees-from-using-microsoft-store.md - - name: Manage Microsoft Store tips, "fun facts", and suggestions - href: tips/manage-tips-and-suggestions.md -- name: Windows Spotlight - href: lock-screen/windows-spotlight.md + - name: Configure access to Microsoft Store + href: store/index.md + - name: Find the AUMID of an installed app + href: store/find-aumid.md - name: Cellular settings href: cellular/provisioning-apn.md -- name: Kiosks and restricted user experience - href: kiosk/toc.yml +- name: Kiosks and restricted user experiences + href: assigned-access/toc.yml - name: Multi-user and guest devices href: shared-pc/toc.yml -- name: Use provisioning packages +- name: Provisioning packages href: provisioning-packages/toc.yml -- name: Windows Configuration Designer reference +- name: Windows Configuration Designer href: wcd/toc.yml - name: User Experience Virtualization (UE-V) href: ue-v/toc.yml \ No newline at end of file diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 6ef6203e11..68c83b8121 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -295,7 +295,7 @@ This section describes the **Policies** settings that you can configure in [prov ## KioskBrowser -These settings apply to the **Kiosk Browser** app available in Microsoft Store. For more information, see [Guidelines for web browsers](../kiosk/guidelines-for-assigned-access-app.md#guidelines-for-web-browsers). +These settings apply to the **Kiosk Browser** app available in Microsoft Store. | Setting | Description | Windows client | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml index 47091d44c1..9920192616 100644 --- a/windows/deployment/TOC.yml +++ b/windows/deployment/TOC.yml @@ -387,7 +387,7 @@ - name: Additional Windows Update settings href: update/waas-wu-settings.md - name: Update other Microsoft products - href: update/update-other-microsoft-products.md + href: update/update-other-microsoft-products.md - name: Delivery Optimization reference href: do/waas-delivery-optimization-reference.md?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json - name: Windows client in S mode @@ -573,7 +573,7 @@ href: planning/testing-your-application-mitigation-packages.md - name: Use the Sdbinst.exe Command-Line Tool href: planning/using-the-sdbinstexe-command-line-tool.md - - name: Install fonts in Windows client - href: windows-10-missing-fonts.md + - name: Add fonts in Windows + href: windows-missing-fonts.md - name: Customize Windows PE boot images href: customize-boot-image.md \ No newline at end of file diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md index 01f1505029..0d05bd2cd3 100644 --- a/windows/deployment/update/update-other-microsoft-products.md +++ b/windows/deployment/update/update-other-microsoft-products.md @@ -11,7 +11,7 @@ manager: aaroncz appliesto: - ✅ Windows 11 - ✅ Windows 10 -ms.date: 02/27/2024 +ms.date: 03/14/2024 --- # Update other Microsoft products @@ -23,7 +23,7 @@ This article contains a list of other Microsoft products that might be updated w - **MDM**: ./Device/Vendor/MSFT/Policy/Config/Update/[AllowMUUpdateService](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#allowmuupdateservice) > [!Note] -> This policy includes drivers. If you need to exclude drivers, use [ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update&bc=/windows/deployment/breadcrumb/toc.json#excludewudriversinqualityupdate). +> This policy includes drivers. If you need to exclude drivers, use [ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#excludewudriversinqualityupdate). ## List of other Microsoft products @@ -70,7 +70,6 @@ The following is a list of other Microsoft products that might be updated: - Windows Azure Pack - Windows Azure Service Bus - Windows Embedded Developer Update -- Windows Intune - Windows Live Sign-in Assistant - Windows Small Business Server - Zune diff --git a/windows/deployment/update/waas-overview.md b/windows/deployment/update/waas-overview.md index 52cda69c7b..d76f5a49c9 100644 --- a/windows/deployment/update/waas-overview.md +++ b/windows/deployment/update/waas-overview.md @@ -14,20 +14,20 @@ ms.collection: appliesto: - ✅ Windows 11 - ✅ Windows 10 -ms.date: 12/31/2017 +ms.date: 03/13/2024 --- # Overview of Windows as a service > **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2). -Windows as a service is a way to simplify the lives of IT pros and maintain a consistent Windows 10 experience for its customers. These improvements focus on maximizing customer involvement in Windows development, simplifying the deployment and servicing of Windows client computers, and leveling out the resources needed to deploy and maintain Windows over time. +Windows as a service is a way to simplify the lives of IT pros and maintain a consistent Windows experience for its customers. These improvements focus on maximizing customer involvement in Windows development, simplifying the deployment and servicing of Windows client computers, and leveling out the resources needed to deploy and maintain Windows over time. ## Building Prior to Windows 10, Microsoft released new versions of Windows every few years. This traditional deployment schedule imposed a training burden on users because the feature revisions were often significant. That schedule also meant waiting long periods without new features. That scenario doesn't always work in today's rapidly changing world, a world in which new security, management, and deployment capabilities are necessary to address challenges. -In the past, when Microsoft developed new versions of Windows, it typically released technical previews near the end of the process, when Windows was nearly ready to ship. With Windows 10, new features are delivered to the [Windows Insider Program](/windows-insider/) as soon as possible, during the development cycle, through a process called *flighting*. Organizations can see exactly what Microsoft is developing and start their testing as soon as possible. +In the past, when Microsoft developed new versions of Windows, it typically released technical previews near the end of the process, when Windows was nearly ready to ship. Now, new features are delivered to the [Windows Insider Program](/windows-insider/) as soon as possible, during the development cycle, through a process called *flighting*. Organizations can see exactly what Microsoft is developing and start their testing as soon as possible. Microsoft also depends on receiving feedback from organizations throughout the development process so that it can make adjustments as quickly as possible rather than waiting until after release. For more information about the Windows Insider Program and how to sign up, see the section [Windows Insider](#windows-insider). @@ -35,7 +35,7 @@ Microsoft also runs extensive internal testing, with engineering teams installin ## Deploying -Deploying Windows 10 and Windows 11 is simpler than with previous versions of Windows. When migrating from earlier versions of Windows, you can use an easy in-place upgrade process to automatically preserve all apps, settings, and data. Afterwards, deployment of feature updates is equally simple. +Deploying a modern version of Windows is simpler than with previous versions of Windows. When migrating from earlier versions of Windows, you can use an easy in-place upgrade process to automatically preserve all apps, settings, and data. Afterwards, deployment of feature updates is equally simple. ### Application compatibility @@ -43,7 +43,9 @@ Application compatibility testing has historically been a burden when approachin ## Servicing -Traditional Windows servicing has included several release types: major revisions (for example, the Windows 8.1, Windows 8, and Windows 7 operating systems), service packs, and monthly updates. With Windows 10 and Windows 11, there are two release types: feature updates that add new functionality and quality updates that provide security and reliability fixes. +Traditional Windows servicing has included several release types: major revisions (for example, the Windows 8.1, Windows 8, and Windows 7 operating systems), service packs, and monthly updates. With Windows 10 and Windows 11, there are two release types: +- **Quality updates**: Updates that provide security and reliability fixes and can also add new functionality or features periodically. +- **Feature updates**: Updates that are released once a year on which the [servicing timeline](/lifecycle/faq/windows#windows-11) for the operating system is based. These updates can contain new features and functionality and previously released quality updates. Servicing channels are the first way to separate users into deployment groups for feature and quality updates. For more information about developing a deployment strategy that uses servicing channels, see [Plan servicing strategy for Windows client updates](waas-servicing-strategy-windows-10-updates.md). @@ -54,50 +56,42 @@ There are three servicing channels, each of which provides different levels of f There are currently three release channels for Windows clients: - The **General Availability Channel** receives feature updates as soon as they're available. -- The **Long-Term Servicing Channel**, which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. -- The **Windows Insider Program** provides organizations with the opportunity to test and provide feedback on features that will be shipped in the next feature update. +- The **Long-Term Servicing Channel** (LTSC) is designed to be used only for specialized devices such as those that control medical equipment or ATM machines. LTSC receives new feature releases every two to three years. +- The **Windows Insider Program** provides organizations with the opportunity to test and provide feedback on features that will be shipped in upcoming updates. ->[!NOTE] ->With each General Availability release, we recommend beginning deployment right away to devices selected for early adoption (targeted validation) and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible. +With each General Availability release, you would typically begin deploying right away to devices selected for early adoption (targeted validation) and then ramp up to full deployment at your discretion. This enables you to gain access to new features, experiences, and integrated security as soon as possible. >[!IMPORTANT] ->Devices on the General Availability Channel must have their diagnostic data set to **1 (Basic)** or higher in order to ensure that the service is performing at the expected quality. For instructions to set the diagnostic data level, see [Configure Windows diagnostic data in your organization](/windows/privacy/configure-windows-diagnostic-data-in-your-organization). +> Devices on the General Availability Channel must have their diagnostic data set to **1 (Basic)** or higher in order to ensure that the service is performing at the expected quality. For instructions to set the diagnostic data level, see [Configure Windows diagnostic data in your organization](/windows/privacy/configure-windows-diagnostic-data-in-your-organization). ### Feature updates -New features are packaged into feature updates that you can deploy using existing management tools. These changes come in bite-sized chunks rather than all at once, decreasing user readiness time. +You can deploy feature updates using existing management tools. These changes come in bite-sized chunks rather than all at once like in previous versions of Windows, decreasing user readiness time. ### Quality updates Monthly updates in previous Windows versions were often overwhelming because of the sheer number of updates available each month. Many organizations selectively chose which updates they wanted to install and which they didn't, and this created countless scenarios in which organizations deployed essential security updates but picked only a subset of nonsecurity fixes. -Rather than receiving several updates each month and trying to figure out which the organization needs, which ultimately causes platform fragmentation, administrators see one cumulative monthly update that supersedes the previous month's update, containing both security and non-security fixes. This approach makes updating simpler and ensures that devices are more closely aligned with the testing done at Microsoft, reducing unexpected issues resulting from updates. +Rather than receiving several updates each month and trying to figure out which the organization needs, which ultimately causes platform fragmentation, administrators see one cumulative monthly update that supersedes the previous month's update, containing both security and nonsecurity payloads. This approach makes updating simpler and ensures that devices are more closely aligned with the testing done at Microsoft, reducing unexpected issues resulting from updates. ## Servicing channels There are three servicing channels. The [Windows Insider Program](#windows-insider) provides organizations with the opportunity to test and provide feedback on features that will be shipped in the next feature update. The [General Availability Channel](#general-availability-channel) provides new functionality with feature update releases. Organizations can choose when to deploy updates from the General Availability Channel. The [Long-Term Servicing Channel](#long-term-servicing-channel), which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. For more information about the versions in each servicing channel, see [Windows release information](/windows/release-health/). -> [!NOTE] -> Servicing channels aren't the only way to separate groups of devices when consuming updates. Each channel can contain subsets of devices, which staggers servicing even further. For information about the servicing strategy and ongoing deployment process for Windows 10, including the role of servicing channels, see [Plan servicing strategy for Windows client updates](waas-servicing-strategy-windows-10-updates.md). +Servicing channels aren't the only way to separate groups of devices when consuming updates. Each channel can contain subsets of devices, which staggers servicing even further. For information about the servicing strategy and ongoing deployment process for Windows 10, including the role of servicing channels, see [Plan servicing strategy for Windows client updates](waas-servicing-strategy-windows-10-updates.md). ### General Availability Channel In the General Availability Channel, feature updates are available annually. This servicing model is ideal for pilot deployments and testing of feature updates and for users such as developers who need to work with the latest features. Once the latest release has gone through pilot deployment and testing, you'll be able to choose the timing at which it goes into broad deployment. -When Microsoft officially releases a feature update, we make it available to any device not configured to defer feature updates so that those devices can immediately install it. Organizations that use Windows Server Update Services (WSUS), Microsoft Configuration Manager, or Windows Update for Business, however, can defer feature updates to selective devices by withholding their approval and deployment. In this scenario, the content available for the General Availability Channel is available but not necessarily immediately mandatory, depending on the policy of the management system. For more information about servicing tools, see [Servicing tools](#servicing-tools). +When Microsoft officially releases a feature update, we make it available to any device not configured to defer feature updates so that those devices can immediately install it. Organizations that use Windows Server Update Services (WSUS), Microsoft Configuration Manager, or Windows Update for Business, however, can defer feature updates to selective devices by withholding their approval and deployment. In this scenario, the content available for the General Availability Channel is available but not necessarily immediately mandatory, depending on the policy of the management system. Organizations can electively delay feature updates into as many phases as they wish by using servicing tools. For more information about servicing tools, see [Servicing tools](#servicing-tools). -> [!NOTE] -> All releases of Windows 10 have **18 months of servicing for all editions**--these updates provide security and feature updates for the release. However, fall releases of the **Enterprise and Education editions** will have an **additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release**. This extended servicing window applies to Enterprise and Education editions starting with Windows 10, version 1607. -> -> Organizations can electively delay feature updates into as many phases as they wish by using one of the servicing tools mentioned in the section Servicing tools. ### Long-term Servicing Channel Specialized systems—such as devices that control medical equipment, point-of-sale systems, and ATMs—often require a longer servicing option because of their purpose. These devices typically perform a single important task and don't need feature updates as frequently as other devices in the organization. It's more important that these devices be kept as stable and secure as possible than up to date with user interface changes. The LTSC servicing model prevents Enterprise LTSC devices from receiving the usual feature updates and provides only quality updates to ensure that device security stays up to date. With this in mind, quality updates are still immediately available to Windows 10 Enterprise LTSC clients, but customers can choose to defer them by using one of the servicing tools mentioned in the section Servicing tools. -> [!NOTE] -> -> The Long-term Servicing channel is not intended for deployment on most or all the devices in an organization; it should be used only for special-purpose devices. As a general guideline, a device with Microsoft Office installed is a general-purpose device, typically used by an information worker, and therefore it is better suited for the General Availability channel. +The Long-term Servicing channel isn't intended for deployment on most or all the devices in an organization. It should be used only for special-purpose devices. As a general guideline, a device with Microsoft Office installed is a general-purpose device, typically used by an information worker, and therefore it's better suited for the General Availability channel. Microsoft never publishes feature updates through Windows Update on devices that run Windows 10 Enterprise LTSC. Instead, it typically offers new LTSC releases every 2-3 years, and organizations can choose to install them as in-place upgrades or even skip releases over the product's lifecycle. Always check your individual LTSC release to verify its servicing lifecycle. For more information, see [release information](/windows/release-health/), or perform a search on the [product's lifecycle information](/lifecycle/products/) page. @@ -114,7 +108,7 @@ Microsoft recommends that all organizations have at least a few devices enrolled ## Servicing tools -There are many tools you can use to service Windows as a service. Each option has its pros and cons, ranging from capabilities and control to simplicity and low administrative requirements. The following are examples of the servicing tools available to manage Windows as a service updates: +There are many tools you can use to service Windows as a service. Each option has its pros and cons, ranging from capabilities and control to simplicity and low administrative requirements. The following are examples of the servicing tools available to manage Windows updates: - **Windows Update (stand-alone)** provides limited control over feature updates, with IT pros manually configuring the device to be in the General Availability Channel. Organizations can target which devices defer updates by selecting the **Defer upgrades** check box in **Start\Settings\Update & Security\Advanced Options** on a Windows client device. - **Windows Update for Business** includes control over update deferment and provides centralized management using Group Policy or MDM. Windows Update for Business can be used to defer updates by up to 365 days, depending on the version. These deployment options are available to clients in the General Availability Channel. In addition to being able to use Group Policy to manage Windows Update for Business, either option can be configured without requiring any on-premises infrastructure by using Microsoft Intune. diff --git a/windows/deployment/update/wufb-reports-schema-ucclient.md b/windows/deployment/update/wufb-reports-schema-ucclient.md index b4c113ef71..993c45e682 100644 --- a/windows/deployment/update/wufb-reports-schema-ucclient.md +++ b/windows/deployment/update/wufb-reports-schema-ucclient.md @@ -11,7 +11,7 @@ manager: aaroncz appliesto: - ✅ Windows 11 - ✅ Windows 10 -ms.date: 12/06/2023 +ms.date: 03/12/2024 --- # UCClient @@ -35,7 +35,6 @@ UCClient acts as an individual device's record. It contains data such as the cur | **IsVirtual** | [bool](/azure/data-explorer/kusto/query/scalar-data-types/bool) | No | `Yes, No` | Whether device is a virtual device. | | **LastCensusScanTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | The last time this device performed a successful census scan, if any. | | **LastWUScanTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | The last time this device performed a successful Windows Update scan, if any. | -| **NewTest_CF [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. | | **OSArchitecture** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `x86` | The architecture of the operating system (not the device) this device is currently on. | | **OSBuild** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `10.0.22621.1702` | The full operating system build installed on this device, such as Major.Minor.Build.Revision | | **OSBuildNumber** | [int](/azure/kusto/query/scalar-data-types/int) | No | `22621` | The major build number, in int format, the device is using. | @@ -62,18 +61,18 @@ UCClient acts as an individual device's record. It contains data such as the cur | **WUAutomaticUpdates** | | No | | Currently, data isn't gathered to populate this field. Manage automatic update behavior to scan, download, and install updates. | | **WUDeadlineNoAutoRestart** | | No | | Currently, data isn't gathered to populate this field. Devices won't automatically restart outside of active hours until the deadline is reached - It's 1 by default and indicates enabled, 0 indicates disabled | | **WUDODownloadMode** | | No | | Currently, data isn't gathered to populate this field. The Windows Update DO DownloadMode configuration. | -| **WUFeatureDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | CSP: ConfigureDeadlineForFeatureUpdates. The Windows Update feature update deadline configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values > 0 indicate the deadline in days. | -| **WUFeatureDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | CSP: DeferFeatureUpdates. The Windows Update feature update deferral configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values > 0 indicate the policy setting. | -| **WUFeatureGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `7` | The Windows Update grace period for feature update in days. -1 indicates not configured, 0 indicates configured and set to 0. Values greater than 0 indicate the grace period in days. | -| **WUFeaturePauseEndTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update feature update pause will end, if activated, else null. | +| **WUFeatureDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | CSP: ConfigureDeadlineForFeatureUpdates. The feature update deadline configuration in days. -1 indicates not configured. 0 indicates configured but set to 0. Values > 0 indicate the deadline in days. | +| **WUFeatureDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | CSP: DeferFeatureUpdates. The feature update deferral configuration in days. -1 indicates not configured. 0 indicates configured but set to 0. Values > 0 indicate the policy setting. | +| **WUFeatureGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `7` | The Windows Update grace period for feature update in days. -1 indicates not configured. 0 indicates configured and set to 0. Values greater than 0 indicate the grace period in days. | +| **WUFeaturePauseEndTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update feature update pause ends, if activated, else null. | | **WUFeaturePauseStartTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update feature update pause was activated, if activated, else null. Feature updates are paused for 35 days from the specified start date. | | **WUFeaturePauseState** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `NotConfigured` | Indicates pause status of device for feature updates. Possible values are Paused, NotPaused, NotConfigured. | -| **WUNotificationLevel** | | No | | Currently, data isn't gathered to populate this field. This policy allows you to define what Windows Update notifications users see. 0 (default) - Use the default Windows Update notifications. 1 - Turn off all notifications, excluding restart warnings. 2 - Turn off all notifications, including restart warnings | +| **WUNotificationLevel** | | No | | Currently, data isn't gathered to populate this field. This policy allows you to define what Windows Update notifications users see. 0 (default) - Use the default Windows Update notifications. 1 - Turn off all notifications, excluding restart warnings. 2 - Turn off all notifications, including restart warnings | | **WUPauseUXDisabled** | | No | | Currently, data isn't gathered to populate this field. This policy allows the IT admin to disable the Pause Updates feature. When this policy is enabled, the user can't access the Pause updates' feature. Supported values 0, 1. | -| **WUQualityDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `7` | CSP: ConfigureDeadlineForQualityUpdates. The Windows update quality update deadline configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values > 0 indicate the deadline in days. | -| **WUQualityDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `-1` | CSP: DeferQualityUpdates. The Windows Update quality update deferral configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values greater than 0 indicate the policy setting. | -| **WUQualityGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | The Windows Update grace period for quality update in days. -1 indicates not configured, 0 indicates configured and set to 0. Values greater than 0 indicate the grace period in days. | -| **WUQualityPauseEndTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update quality update pause- will end, if activated, else null. | +| **WUQualityDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `7` | CSP: ConfigureDeadlineForQualityUpdates. The Windows update quality update deadline configuration in days. -1 indicates not configured. 0 indicates configured but set to 0. Values > 0 indicate the deadline in days. | +| **WUQualityDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `-1` | CSP: DeferQualityUpdates. The Windows Update quality update deferral configuration in days. -1 indicates not configured. 0 indicates configured but set to 0. Values greater than 0 indicate the policy setting. | +| **WUQualityGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | The Windows Update grace period for quality update in days. -1 indicates not configured. 0 indicates configured and set to 0. Values greater than 0 indicate the grace period in days. | +| **WUQualityPauseEndTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time the quality update pause ends, if activated, else null. | | **WUQualityPauseStartTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update quality update pause- was activated; if activated; else null. | | **WUQualityPauseState** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `NotConfigured` | Indicates pause status of device for quality updates. Possible values are Paused, NotPaused, NotConfigured. | | **WURestartNotification** | | No | | Currently, data isn't gathered to populate this field. Allows the IT Admin to specify the method by which the auto restart required notification is dismissed. The following list shows the supported values: 1 (default) = Auto Dismissal. 2 - User Dismissal. | diff --git a/windows/deployment/windows-10-missing-fonts.md b/windows/deployment/windows-10-missing-fonts.md deleted file mode 100644 index 3ba1d1b034..0000000000 --- a/windows/deployment/windows-10-missing-fonts.md +++ /dev/null @@ -1,112 +0,0 @@ ---- -title: How to install fonts missing after upgrading to Windows client -description: Some of the fonts are missing from the system after you upgrade to Windows client. -ms.service: windows-client -ms.localizationpriority: medium -author: frankroj -ms.author: frankroj -manager: aaroncz -ms.topic: article -ms.date: 11/23/2022 -ms.subservice: itpro-deploy ---- -# How to install fonts that are missing after upgrading to Windows client - -*Applies to:* - -- Windows 10 -- Windows 11 - -When you upgrade from the Windows 7, Windows 8, or Windows 8.1 operating system to Windows 10 or Windows 11, certain fonts are no longer available by default post-upgrade. To reduce the operating system footprint, improve performance, and optimize disk space usage, we moved many of the fonts that were previously shipped with prior versions of Windows to the optional features of Windows client. If you install a fresh instance of Windows client, or upgrade an older version of Windows to Windows client, these optional features aren't enabled by default. As a result, these fonts appear to be missing from the system. - -If you have documents created using the missing fonts, these documents might display differently on Windows client. - -For example, if you've an English, French, German, or Spanish version of Windows 10 installed, you might notice that fonts such as the following are appear to be missing: - -- `Gautami` -- `Meiryo` -- `Narkism/Batang` -- `BatangChe` -- `Dotum` -- `DotumChe` -- `Gulim` -- `GulimChe` -- `Gungsuh` -- `GungsuhChe` - -If you want to use these fonts, you can enable the optional feature to add them back to your system. The removal of these fonts is a permanent change in behavior for Windows client, and it will remain this way in future releases. - -## Installing language-associated features via language settings - -If you want to use the fonts from the optional feature and you know that you'll want to view Web pages, edit documents, or use apps in the language associated with that feature, add that language into your user profile. Use the Settings app. - -For example, here are the steps to install the fonts associated with the Hebrew language: - -1. Select **Start > Settings**. - -2. For Windows 10, in **Settings**, select **Time & language**, and then select **Region & language**. - - For Windows 11, in **Settings**, select **Time & language**, and then select **Language & Region**. - -3. If Hebrew isn't included in the list of languages, select the plus sign (**+**) to add a language. - -4. Find **Hebrew**, and then select it to add it to your language list. - -Once you've added Hebrew to your language list, then the optional Hebrew font feature and other optional features for Hebrew language support are installed. This process should only take a few minutes. - -> [!NOTE] -> The optional features are installed by Windows Update. You need to be online for the Windows Update service to work. - -## Install optional fonts manually without changing language settings - -If you want to use fonts in an optional feature but don't need to search web pages, edit documents, or use apps in the associated language, you can install the optional font features manually without changing your language settings. - -For example, here are the steps to install the fonts associated with the Hebrew language without adding the Hebrew language itself to your language preferences: - -1. Select **Start > Settings**. - -2. In **Settings**, select **Apps**, select **Apps & features**, and then select **Manage optional features**. - -3. If you don't see **Hebrew Supplemental Fonts** in the list of installed features, select the plus sign (**+**) to add a feature. - -4. Select **Hebrew Supplemental Fonts** in the list, and then select **Install**. - -> [!NOTE] -> The optional features are installed by Windows Update. You need to be online for the Windows Update service to work. - -## Fonts included in optional font features - -Here's a comprehensive list of the font families in each of the optional features. Some font families might include multiple fonts for different weights and styles. - -- Arabic Script Supplemental Fonts: `Aldhabi, Andalus, Arabic Typesetting, Microsoft Uighur, Sakkal Majalla, Simplified Arabic, Traditional Arabic, Urdu Typesetting` -- Bangla Script Supplemental Fonts: `Shonar Bangla, Vrinda` -- Canadian Aboriginal Syllabics Supplemental Fonts: `Euphemia` -- Cherokee Supplemental Fonts: `Plantagenet Cherokee` -- Chinese (Simplified) Supplemental Fonts: `DengXian, FangSong, KaiTi, SimHei` -- Chinese (Traditional) Supplemental Fonts: `DFKai-SB, MingLiU, MingLiU_HKSCS, PMingLiU` -- Devanagari Supplemental Fonts: `Aparajita, Kokila, Mangal, Sanskrit Text, Utsaah` -- Ethiopic Supplemental Fonts: `Nyala` -- Gujarati Supplemental Fonts: `Shruti` -- Gurmukhi Supplemental Fonts: `Raavi` -- Hebrew Supplemental Fonts: `Aharoni Bold, David, FrankRuehl, Gisha, Levanim MT, Miriam, Miriam Fixed, Narkism, Rod` -- Japanese Supplemental Fonts: `Meiryo, Meiryo UI, MS Gothic, MS PGothic, MS UI Gothic, MS Mincho, MS PMincho, Yu Mincho` -- Kannada Supplemental Fonts: `Tunga` -- Khmer Supplemental Fonts: `DaunPenh, Khmer UI, MoolBoran` -- Korean Supplemental Fonts: `Batang, BatangChe, Dotum, DotumChe, Gulim, GulimChe, Gungsuh, GungsuhChe` -- Lao Supplemental Fonts: `DokChampa, Lao UI` -- Malayalam Supplemental Fonts: `Karthika` -- Odia Supplemental Fonts: `Kalinga` -- Pan-European Supplemental Fonts: `Arial Nova, Georgia Pro, Gill Sans Nova, Neue Haas Grotesk, Rockwell Nova, Verdana Pro` -- Sinhala Supplemental Fonts: `Iskoola Pota` -- Syriac Supplemental Fonts: `Estrangelo Edessa` -- Tamil Supplemental Fonts: `Latha, Vijaya` -- Telugu Supplemental Fonts: `Gautami, Vani` -- Thai Supplemental Fonts: `Angsana New, AngsanaUPC, Browallia New, BrowalliaUPC, Cordia New, CordiaUPC, DilleniaUPC, EucrosiaUPC, FreesiaUPC, IrisUPC, JasmineUPC, KodchiangUPC, Leelawadee, LilyUPC` - -## Related articles - -[Download the list of all available language FODs](https://download.microsoft.com/download/0/A/A/0AA4342D-3933-4216-A90D-3BA8392FB1D1/Windows%2010%201703%20FOD%20to%20LP%20Mapping%20Table.xlsx) - -[Features On Demand V2 (Capabilities)](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities#span-idrelatedtopicsspanrelated-topics) - -[Add Language Packs to Windows](/windows-hardware/manufacture/desktop/add-language-packs-to-windows) diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-feature-update-summary-dashboard.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-feature-update-summary-dashboard.md index eb73ee5af6..38af149ad8 100644 --- a/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-feature-update-summary-dashboard.md +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-feature-update-summary-dashboard.md @@ -1,7 +1,7 @@ --- title: Windows feature update summary dashboard description: Provides a broader view of the current Windows OS upgrade status for all devices registered with Windows Autopatch. -ms.date: 10/11/2023 +ms.date: 01/22/2024 ms.service: windows-client ms.subservice: itpro-updates ms.topic: how-to @@ -41,6 +41,7 @@ The following information is available in the Summary dashboard: | In progress | Total device counts reporting the In progress status. For more information, see [In progress](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md#up-to-date-sub-statuses). | | Paused | Total device count reporting the status of the pause whether it's Service or Customer initiated. For more information, see [Up to Date](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md#up-to-date-devices). | | Not ready | Total device count reporting the Not ready status. For more information, see [Not ready](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md#not-up-to-date-devices). | +| % with the target feature update | Percent of [Up to Date](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md#up-to-date-devices) devices on the targeted feature update. | ## Report options diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md index fdacc1576c..36e2fe54de 100644 --- a/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md @@ -1,7 +1,7 @@ --- title: Windows quality and feature update reports overview -description: This article details the types of reports available and info about update device eligibility, device update health, device update trends in Windows Autopatch groups -ms.date: 07/25/2023 +description: This article details the types of reports available and info about update device eligibility, device update health, device update trends in Windows Autopatch groups. +ms.date: 01/22/2024 ms.service: windows-client ms.subservice: itpro-updates ms.topic: conceptual @@ -82,7 +82,7 @@ Up to date devices are devices that meet all of the following prerequisites: - Have applied the current monthly cumulative updates > [!NOTE] -> [Up to Date devices](#up-to-date-devices) will remain with the **In Progress** status for the 21-day service level objective period until the device either applies the current monthly cumulative update or receives an [alert](../operate/windows-autopatch-device-alerts.md). If the device receives an alert, the device's status will change to [Not up to Date](#not-up-to-date-devices). +> Device that are [Up to Date](#up-to-date-devices) will remain with the **In Progress** status until either the current monthly cumulative update is applied, or an [alert](../operate/windows-autopatch-device-alerts.md) is received. If the device receives an alert, the device's status will change to [Not up to Date](#not-up-to-date-devices). #### Up to Date sub statuses @@ -96,7 +96,7 @@ Up to date devices are devices that meet all of the following prerequisites: Not Up to Date means a device isn't up to date when the: - Quality or feature update is out of date, or the device is on the previous update. -- Device is more than 21 days overdue from the last release. +- The assigned update schedule has elapsed and the device still has not applied the current release. - Device has an [alert](../operate/windows-autopatch-device-alerts.md) resulting in an error and action must be taken. ### Not Ready devices diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-quality-update-summary-dashboard.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-quality-update-summary-dashboard.md index 9f3cb93c97..64ed6a7a91 100644 --- a/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-quality-update-summary-dashboard.md +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-groups-windows-quality-update-summary-dashboard.md @@ -1,7 +1,7 @@ --- title: Windows quality update summary dashboard description: Provides a summary view of the current update status for all devices enrolled into Windows Autopatch with Autopatch groups -ms.date: 10/04/2023 +ms.date: 01/22/2024 ms.service: windows-client ms.subservice: itpro-updates ms.topic: how-to @@ -40,6 +40,7 @@ The following information is available in the Summary dashboard: | In progress | Total device counts reporting the In progress status. For more information, see [In progress](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md#up-to-date-sub-statuses). | | Paused | Total device count reporting the status of the pause whether it's Service or Customer initiated. For more information, see [Up to Date](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md#up-to-date-devices). | | Not ready | Total device count reporting the Not ready status. For more information, see [Not ready](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md#not-up-to-date-devices). | +| % with the latest quality update | Percent of [Up to Date](../operate/windows-autopatch-groups-windows-quality-and-feature-update-reports-overview.md#up-to-date-devices) devices on the most current Windows release and its build number | ## Report options diff --git a/windows/deployment/windows-missing-fonts.md b/windows/deployment/windows-missing-fonts.md new file mode 100644 index 0000000000..d98de67b71 --- /dev/null +++ b/windows/deployment/windows-missing-fonts.md @@ -0,0 +1,271 @@ +--- +title: How to add fonts missing after upgrading Windows +description: Some of the fonts are missing from the system after upgrading Windows. +ms.service: windows-client +ms.localizationpriority: medium +author: frankroj +ms.author: frankroj +manager: aaroncz +ms.topic: article +ms.date: 03/13/2024 +ms.subservice: itpro-deploy +zone_pivot_groups: windows-versions-11-10 +appliesto: + - ✅ Windows 11 + - ✅ Windows 10 +--- + +# How to add fonts that are missing after upgrading Windows + + + +When Windows is upgraded from older versions of Windows to currently supported versions of Windows, previously available fonts might no longer be available post-upgrade. Many of the fonts that were previously shipped with Windows were moved to the optional features of Windows to: + +- Reduce the operating system footprint. +- Improve performance. +- Optimize disk space usage. + + In the following instances: + +- A fresh instance of Windows is installed +- Windows is upgraded from an older version of Windows + +optional fonts aren't enabled by default. As a result, these fonts are missing from the system. If documents were created using the missing fonts, these documents might display differently in the updated version of Windows. + +For example, if an English, French, German, or Spanish version of Windows is installed, fonts such as the following are missing: + +- `Gautami` +- `Meiryo` +- `Narkism/Batang` +- `BatangChe` +- `Dotum` +- `DotumChe` +- `Gulim` +- `GulimChe` +- `Gungsuh` +- `GungsuhChe` + +If these fonts are needed, you can add them back to your system via optional features. The removal of these fonts is a permanent change in behavior for Windows, and it will remain this way in future releases. + +## Adding language-associated features via language settings + +If fonts associated with a language are needed across the system, then that language should be added to the user profile followed by switching to that language. For example, the fonts are needed to: + +- View web pages. +- Edit documents. +- Use apps in that language. + +Adding a language and then switching to it can be done via the **Settings** app. + +::: zone pivot="windows-11" + +To add the fonts associated with a language and then switch to that language, first open the **Language & region** pane in the **Settings** app by selecting the following link: + +> [!div class="nextstepaction"] +> [Language & region](ms-settings:regionlanguage) + +::: zone-end + +::: zone pivot="windows-10" + +To add the fonts associated with a language and then switch to that language, first open the **Language** pane in the **Settings** app by selecting the following link: + +> [!div class="nextstepaction"] +> [Language](ms-settings:regionlanguage) + +::: zone-end + +or + +1. Right-click on the **Start** menu and select **Run**. + +1. In the **Run** window, next to **Open:**, enter: + + ```console + ms-settings:regionlanguage + ``` + + and then select **OK**. + +or + +::: zone pivot="windows-11" + +1. Right-click on the **Start** menu and select **Settings**. + +1. In the left hand pane of the Settings app, select **Time & language**. + +1. In the right hand **Time & language** pane, select **Language & region**. + +Once the **Time & language > Language & region** pane is open, add the fonts associated with a language and then switch to that language with the following steps: + +1. Under the **Language** section: + + 1. Drop down the menu next to **Windows display language** to show all of the languages currently added to the device. + + 1. If the desired language isn't listed, add the fonts for the desired language by selecting the **Add a language** button next to **Preferred languages**. + + 1. In the **Choose a language to install** window that opens: + + 1. Find the desired language by scrolling through the list of languages. Alternatively, search for the desired language in the **Type a language name...** search box. + + 1. Once the desired language is found, select the language, and then select the **Next** button. + + 1. In the **Install language features** window, select the desired options for the language, and then select the **Install** button. + + 1. The desired language should now be available in the drop-down menu next to **Windows display language**. Drop down the **Windows display language** menu and select the desired language. + + 1. Below **Windows display language** the message **Windows needs to sign you out in order to apply your new display language.** is displayed. Select the **Sign out** button to finish applying the language including the additional language fonts. + +::: zone-end + +::: zone pivot="windows-10" + +1. Right-click on the **Start** menu and select **Settings**. + +1. In the Settings app, select **Time & Language**. + +1. In the left hand pane, select **Language**. + +Once the **Language** pane is open, add the fonts associated with a language and then switch to that language with the following steps: + +1. Drop down the menu below **Windows display language** to show all of the languages currently added to the device. + +1. If the desired language isn't listed, add the fonts for the desired language by selecting the **+** button next to **Add a language**. + +1. In the **Choose a language to install** window that opens: + + 1. Find the desired language by scrolling through the list of languages. Alternatively, search for the desired language in the **Type a language name...** search box. + + 1. Once the desired language is found, select the language, and then select the **Next** button. + + 1. In the **Install language features** window, select the desired features for the language, and then select the **Install** button. + +1. The desired language should now be available in the drop-down menu below **Windows display language**. Drop down the **Windows display language** menu and select the desired language. + +1. The following message is displayed: + + > **Setting Windows display language** + > **Windows needs to sign you out in order to fully apply the new language. Continue?** + + Select the **Yes, sign out now** button to finish applying the language including the additional language fonts. + +::: zone-end + +> [!IMPORTANT] +> +> Windows Update is used to add the language including the associated fonts. The device needs to be online so Windows Update can download the content that it needs to add. + +## Add optional fonts manually without changing language settings + +If fonts associated with a language are needed but aren't needed across the entire system, then that language should be added to the user profile as a supplemental font. Adding a font as a supplemental font doesn't require the user switch to that language. Adding a font as a supplemental font can be done via the **Settings** app. + +To add supplemental fonts associated with a language while staying with the current language: + +Open the **Optional features** pane in the **Settings** app by selecting the following link: + +> [!div class="nextstepaction"] +> [Optional features](ms-settings:optionalfeatures) + +or + +1. Right-click on the **Start** menu and select **Run**. + +1. In the **Run** window, next to **Open:**, enter: + + ```console + ms-settings:optionalfeatures + ``` + + and then select **OK**. + +or + +::: zone pivot="windows-11" + +1. Right-click on the **Start** menu and select **Settings**. + +1. In the left hand pane of the Settings app, select **System**. + +1. In the right hand **System** pane, select **Optional features**. + +> [!NOTE] +> +> The navigation steps, UI elements, and UI text in this section are based on the latest version of Windows 11 with the latest cumulative update installed. For other versions of Windows 11 that are currently supported or don't have the latest cumulative update, some of the navigation steps, UI elements, and UI text might be different. For example, the [**Optional features**](ms-settings:optionalfeatures) pane might be located under **Settings** > **Apps**. + +Once the **System > Optional features** pane is open, add a supplemental font with the following steps: + +1. Select the **View features** button next to **Add an optional feature**. + +1. In the **Add an optional feature** window that opens: + + 1. Find the desired supplemental font to add and then select the box next to the supplemental font to add it. Multiple supplemental fonts can be selected. + + 1. Once all of the desired supplemental fonts are selected, select the **Next** button. + + 1. Review the selected list of features and then select the **Install** button to add the selected features. + +::: zone-end + +::: zone pivot="windows-10" + +1. Right-click on the **Start** menu and select **Settings**. + +1. In the Settings app, select **System**. + +1. In the left hand pane, select **Optional features**. + +> [!NOTE] +> +> The navigation steps, UI elements, and UI text in this section are based on Windows 10 22H2 with the latest cumulative update installed. For other versions of Windows 10 that are currently supported or don't have the latest cumulative update, some of the navigation steps, UI elements, and UI text might be different. For example, the [**Optional features**](ms-settings:optionalfeatures) pane might be located under **Settings** > **Apps** > **Apps & features**. + +Once the **Optional features** pane is open, add a supplemental font with the following steps: + +1. Select the **+** button next to **Add a feature**. + +1. In the **Add an optional feature** window that opens: + + 1. Find the desired supplemental font to add and then select the box next to the supplemental font to add it. Multiple supplemental fonts can be selected. + + 1. Once all of the desired supplemental fonts are selected, select the **Install** button. + +::: zone-end + +> [!IMPORTANT] +> +> Windows Update is used to add the optional features including the supplemental fonts. The device needs to be online so Windows Update can download the content that it needs to add. + +## Fonts included in optional font features + +Here's a comprehensive list of the font families in each of the optional features. Some font families might include multiple fonts for different weights and styles. + +- Arabic Script Supplemental Fonts: `Aldhabi, Andalus, Arabic Typesetting, Microsoft Uighur, Sakkal Majalla, Simplified Arabic, Traditional Arabic, Urdu Typesetting` +- Bangla Script Supplemental Fonts: `Shonar Bangla, Vrinda` +- Canadian Aboriginal Syllabics Supplemental Fonts: `Euphemia` +- Cherokee Supplemental Fonts: `Plantagenet Cherokee` +- Chinese (Simplified) Supplemental Fonts: `DengXian, FangSong, KaiTi, SimHei` +- Chinese (Traditional) Supplemental Fonts: `DFKai-SB, MingLiU, MingLiU_HKSCS, PMingLiU` +- Devanagari Supplemental Fonts: `Aparajita, Kokila, Mangal, Sanskrit Text, Utsaah` +- Ethiopic Supplemental Fonts: `Nyala` +- Gujarati Supplemental Fonts: `Shruti` +- Gurmukhi Supplemental Fonts: `Raavi` +- Hebrew Supplemental Fonts: `Aharoni Bold, David, FrankRuehl, Gisha, Levanim MT, Miriam, Miriam Fixed, Narkism, Rod` +- Japanese Supplemental Fonts: `Meiryo, Meiryo UI, MS Gothic, MS PGothic, MS UI Gothic, MS Mincho, MS PMincho, Yu Mincho` +- Kannada Supplemental Fonts: `Tunga` +- Khmer Supplemental Fonts: `DaunPenh, Khmer UI, MoolBoran` +- Korean Supplemental Fonts: `Batang, BatangChe, Dotum, DotumChe, Gulim, GulimChe, Gungsuh, GungsuhChe` +- Lao Supplemental Fonts: `DokChampa, Lao UI` +- Malayalam Supplemental Fonts: `Karthika` +- Odia Supplemental Fonts: `Kalinga` +- Pan-European Supplemental Fonts: `Arial Nova, Georgia Pro, Gill Sans Nova, Neue Haas Grotesk, Rockwell Nova, Verdana Pro` +- Sinhala Supplemental Fonts: `Iskoola Pota` +- Syriac Supplemental Fonts: `Estrangelo Edessa` +- Tamil Supplemental Fonts: `Latha, Vijaya` +- Telugu Supplemental Fonts: `Gautami, Vani` +- Thai Supplemental Fonts: `Angsana New, AngsanaUPC, Browallia New, BrowalliaUPC, Cordia New, CordiaUPC, DilleniaUPC, EucrosiaUPC, FreesiaUPC, IrisUPC, JasmineUPC, KodchiangUPC, Leelawadee, LilyUPC` + +## Related content + +- [Download the list of all available language FODs](https://download.microsoft.com/download/0/A/A/0AA4342D-3933-4216-A90D-3BA8392FB1D1/Windows%2010%201703%20FOD%20to%20LP%20Mapping%20Table.xlsx). +- [Features On Demand V2 (Capabilities)](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities#span-idrelatedtopicsspanrelated-topics). +- [Add Language Packs to Windows](/windows-hardware/manufacture/desktop/add-language-packs-to-windows). diff --git a/windows/privacy/changes-to-windows-diagnostic-data-collection.md b/windows/privacy/changes-to-windows-diagnostic-data-collection.md index 4815879665..090b84a4dd 100644 --- a/windows/privacy/changes-to-windows-diagnostic-data-collection.md +++ b/windows/privacy/changes-to-windows-diagnostic-data-collection.md @@ -9,6 +9,7 @@ ms.author: danbrown manager: laurawi ms.date: 06/04/2020 ms.topic: conceptual +ms.collection: privacy-windows --- # Changes to Windows diagnostic data collection @@ -83,4 +84,13 @@ Starting with the January 2023 preview cumulative update, how you enable the pro We made this change to help ensure the diagnostic data for all devices in an organization is processed in a consistent way and in the same geographic region, and to help us implement our plan to [store and process EU Data for European enterprise customers in the EU](/privacy/eudb/eu-data-boundary-learn). -For more information, see [Enable Windows diagnostic data processor configuration](configure-windows-diagnostic-data-in-your-organization.md#enable-windows-diagnostic-data-processor-configuration). \ No newline at end of file +For more information, see [Enable Windows diagnostic data processor configuration](configure-windows-diagnostic-data-in-your-organization.md#enable-windows-diagnostic-data-processor-configuration). + +## Data collection changes + +> [!NOTE] +> The information in this section applies to the following versions of Windows: +> - Windows 10, version 22H2 and newer +> - Windows 11, version 23H2 and newer + +As of March 6, 2024, Microsoft Edge diagnostic data is collected separately from Windows diagnostic data on Windows 10 and Windows 11 devices in the European Economic Area. The collection of Microsoft Edge diagnostic data is subject to its own settings. For more information related to this change, see [Microsoft Edge, browsing data, and privacy](https://support.microsoft.com/windows/bb8174ba-9d73-dcf2-9b4a-c582b4e640dd). \ No newline at end of file diff --git a/windows/privacy/copilot-supplemental-terms.md b/windows/privacy/copilot-supplemental-terms.md index 69ce081127..6ccbc90c48 100644 --- a/windows/privacy/copilot-supplemental-terms.md +++ b/windows/privacy/copilot-supplemental-terms.md @@ -7,7 +7,7 @@ ms.localizationpriority: medium author: DHB-MSFT ms.author: danbrown manager: laurawi -ms.date: 09/20/2023 +ms.date: 03/04/2024 ms.topic: conceptual hideEdit: true layout: ContentPage @@ -17,7 +17,7 @@ feedback_system: None # COPILOT IN WINDOWS (PREVIEW) SUPPLEMENTAL TERMS -Copilot in Windows is your AI companion that brings productivity to your fingertips. Leveraging Bing Chat or Bing Chat Enterprise, Copilot in Windows accelerates your tasks, reduces friction, saves you time and provides you with personalized answers, inspiration and task assistance. Your use of Copilot in Windows is subject to these supplemental terms of use (“Terms”). By using Copilot in Windows you agree to be bound by these Terms. +Copilot in Windows is your AI companion that brings productivity to your fingertips by leveraging Microsoft Copilot (previously named Bing Chat), Microsoft Copilot with commercial data protection (previously named Bing Chat Enterprise), or Microsoft Copilot for Microsoft 365. Copilot in Windows accelerates your tasks, reduces friction, saves you time and provides you with personalized answers, inspiration, and task assistance. Your use of Copilot in Windows is subject to these supplemental terms of use (“Terms”). By using Copilot in Windows, you agree to be bound by these Terms. 1. Preview @@ -27,44 +27,48 @@ Copilot in Windows is your AI companion that brings productivity to your fingert 2. Eligibility and Use Requirements. - a. You must be signed into Windows with your Microsoft account to access Copilot in Windows. + a. If you're signed into Windows with your work or school account, your organization may have given you the ability to use Copilot in Windows. If you have access to Copilot in Windows but your organization hasn't enabled Microsoft Copilot with commercial data protection, your use will be limited to Microsoft Copilot’s current turn limit. - b. If you're signed into Windows with your work or school account, your organization may have given you the ability to use Copilot in Windows. If you have access to Copilot in Windows but your organization hasn't enabled Bing Chat Enterprise, your use will be limited to Bing Chat’s current turn limit. + b. Along with these Terms, your use of Copilot in Windows is also governed by the Microsoft Services Agreement, which is incorporated by reference. You agree that Copilot in Windows constitutes a Service, as defined in the [Microsoft Services Agreement](https://www.microsoft.com/servicesagreement). If there's any conflict between these Terms and the Microsoft Services Agreement, the conflicting provision in these Terms will control. - c. Along with these Terms, your use of Copilot in Windows is also governed by the Microsoft Services Agreement, which is incorporated by reference. You agree that Copilot in Windows constitutes a Service, as defined in the [Microsoft Services Agreement](https://www.microsoft.com/servicesagreement). If there's any conflict between these Terms and the Microsoft Services Agreement, the conflicting provision in these Terms will control. +3. Microsoft Copilot -3. Bing Chat + a. Your Copilot in Windows experiences powered by Microsoft Copilot are subject to [Microsoft Copilot’s terms of use](https://www.bing.com/new/termsofuse). - a. Your Copilot in Windows experiences powered by Bing Chat are subject to [Bing Chat’s terms of use](https://www.bing.com/new/termsofuse). + b. If your organization is allowing you to use Microsoft Copilot with commercial data protection, your Copilot in Windows experiences may be powered by Microsoft Copilot with commercial data protection and subject to [Microsoft Copilot with commercial data protection’s terms of use](/copilot/terms-of-use). - b. If your organization is allowing you to use Bing Chat Enterprise, your Copilot in Windows experiences will be powered by Bing Chat Enterprise and will be subject to [Bing Chat Enterprise’s terms of use](/bing-chat-enterprise/terms-of-use). + c. If your organization is allowing you to use Microsoft Copilot for Microsoft 365, your Copilot in Windows experiences may be powered by Microsoft Copilot for Microsoft 365 and subject to [Microsoft's Product Terms](https://www.microsoft.com/licensing/terms/product/ForOnlineServices/all). 4. Using Copilot in Windows - a. Copilot in Windows may allow you to submit text inputs and converse with an online computer-powered chatbot and in certain circumstances generate text content or image content. Your use of Copilot in Windows must comply with the Code of Conduct section of the Microsoft Services Agreement and the Bing Chat Code of Conduct or Bing Chat Enterprise Content Policy. + a. Copilot in Windows may allow you to submit text inputs and converse with an online computer-powered chatbot and in certain circumstances generate text content or image content. Your use of Copilot in Windows must comply with the Code of Conduct section of the Microsoft Services Agreement and the Microsoft Copilot Code of Conduct or Microsoft Copilot with commercial data protection Content Policy. b. Copilot in Windows may allow you to change some of your Windows settings based on the text you submit into Copilot in Windows. Additionally, when you copy text in other apps while Copilot in Windows is open, it may automatically prompt you with suggestions to send the copied text to the chat and offer further suggestions of what you can do with that text. - c. You can consent to letting Copilot in Windows access your Microsoft Edge webpage content. This allows Copilot in Windows to provide relevant responses by accessing content from your active foreground Edge tab. This can be adjusted anytime in Copilot in Windows settings. + c. You can consent to letting Copilot in Windows access your Microsoft Edge webpage content. This allows Copilot in Windows to provide relevant responses by accessing content from your visible Microsoft Edge windows. This can be adjusted anytime in Copilot in Windows settings. 5. Data a. All data processed by Copilot in Windows, including voice input data, will be processed according to the Microsoft Privacy Statement. -6. Ownership of Content +6. Intellectual Property - a. Microsoft doesn't claim ownership of any content you provide, post, input, or submit to, or receive from, Copilot in Windows, Bing Chat, or Bing Chat Enterprise (including feedback and suggestions). You'll need to make your own determination regarding the intellectual property rights you have in output content and its commercial usability, taking into account, among other things, your usage scenario(s) and the laws of the relevant jurisdiction. You warrant and represent that you or your organization owns or otherwise controls all of the rights to your content as described in these Terms including, without limitation, all the rights necessary for you to provide, post, upload, input or submit the content.  + a. You’re responsible for respecting, and shouldn’t break, digital rights management (DRM) or any other copyright protections. -7. Third-party claims +7. Ownership of Content + + a. Microsoft doesn't claim ownership of any content you provide, post, input, or submit to, or receive from, Copilot in Windows, Microsoft Copilot, or Microsoft Copilot with commercial data protection (including feedback and suggestions). You'll need to make your own determination regarding the intellectual property rights you have in output content and its commercial usability, taking into account, among other things, your usage scenario(s) and the laws of the relevant jurisdiction. You warrant and represent that you or your organization owns or otherwise controls all of the rights to your content as described in these Terms including, without limitation, all the rights necessary for you to provide, post, upload, input, or submit the content.  + +8. Third-party claims a. You're responsible for responding to any third-party claims regarding your use of Copilot in Windows in compliance with applicable laws (including, but not limited to, copyright infringement or other claims relating to output content that was output during your use of Copilot in Windows). -8. Reverse engineering +9. Reverse engineering a. You may not use Copilot in Windows to discover any underlying components of the models, algorithms, or systems, such as exfiltrating the weights of models. -9. Extracting data +10. Extracting data a. You may not use web scraping, web harvesting, or web data extraction methods to extract data from Copilot in Windows or from any output content. -10. **IF YOU LIVE IN (OR YOUR PRINCIPAL PLACE OF BUSINESS IS IN) THE UNITED STATES, PLEASE READ THE BINDING ARBITRATION CLAUSE AND CLASS ACTION WAIVER IN SECTION 15 OF THE MICROSOFT SERVICES AGREEMENT. IT AFFECTS HOW DISPUTES RELATING TO THIS AGREEMENT ARE RESOLVED.** \ No newline at end of file +11. **IF YOU LIVE IN (OR YOUR PRINCIPAL PLACE OF BUSINESS IS IN) THE UNITED STATES, PLEASE READ THE BINDING ARBITRATION CLAUSE AND CLASS ACTION WAIVER IN SECTION 15 OF THE MICROSOFT SERVICES AGREEMENT. IT AFFECTS HOW DISPUTES RELATING TO THIS AGREEMENT ARE RESOLVED.** \ No newline at end of file diff --git a/windows/security/application-security/application-control/windows-defender-application-control/design/applications-that-can-bypass-wdac.md b/windows/security/application-security/application-control/windows-defender-application-control/design/applications-that-can-bypass-wdac.md index bcce7c5578..008ae3d8ea 100644 --- a/windows/security/application-security/application-control/windows-defender-application-control/design/applications-that-can-bypass-wdac.md +++ b/windows/security/application-security/application-control/windows-defender-application-control/design/applications-that-can-bypass-wdac.md @@ -26,6 +26,7 @@ Unless your use scenarios explicitly require them, Microsoft recommends that you - csi.exe - dbghost.exe - dbgsvc.exe +- dbgsrv.exe - dnx.exe - dotnet.exe - fsi.exe @@ -143,6 +144,7 @@ The blocklist policy that follows includes "Allow all" rules for both kernel and + @@ -854,6 +856,7 @@ The blocklist policy that follows includes "Allow all" rules for both kernel and + diff --git a/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules.md b/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules.md index 2b18eadcc2..5b5d018a69 100644 --- a/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules.md +++ b/windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules.md @@ -14,7 +14,7 @@ ms.topic: article >[!NOTE] >Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability). -Microsoft has strict requirements for code running in kernel. So, malicious actors are turning to exploit vulnerabilities in legitimate and signed kernel drivers to run malware in kernel. One of the many strengths of the Windows platform is our strong collaboration with independent hardware vendors (IHVs) and OEMs. Microsoft works closely with our IHVs and security community to ensure the highest level of driver security for our customers. When vulnerabilities in drivers are found, we work with our partners to ensure they're quickly patched and rolled out to the ecosystem. The vulnerable driver blocklist is designed to help harden systems against third party-developed drivers across the Windows ecosystem with any of the following attributes: +Microsoft has strict requirements for code running in kernel. So, malicious actors are turning to exploit vulnerabilities in legitimate and signed kernel drivers to run malware in kernel. One of the many strengths of the Windows platform is our strong collaboration with independent hardware vendors (IHVs) and OEMs. Microsoft works closely with our IHVs and security community to ensure the highest level of driver security for our customers. When vulnerabilities in drivers are found, we work with our partners to ensure they're quickly patched and rolled out to the ecosystem. The vulnerable driver blocklist is designed to help harden systems against non-Microsoft-developed drivers across the Windows ecosystem with any of the following attributes: - Known security vulnerabilities that can be exploited by attackers to elevate privileges in the Windows kernel - Malicious behaviors (malware) or certificates used to sign malware @@ -1071,7 +1071,7 @@ The following recommended blocklist xml policy file can also be downloaded from - + @@ -1929,7 +1929,7 @@ The following recommended blocklist xml policy file can also be downloaded from - + @@ -1938,10 +1938,10 @@ The following recommended blocklist xml policy file can also be downloaded from - - + + - + @@ -2234,7 +2234,7 @@ The following recommended blocklist xml policy file can also be downloaded from - + @@ -3312,7 +3312,7 @@ The following recommended blocklist xml policy file can also be downloaded from - + diff --git a/windows/security/docfx.json b/windows/security/docfx.json index 7ecc2e42ce..87d822d8a1 100644 --- a/windows/security/docfx.json +++ b/windows/security/docfx.json @@ -55,17 +55,25 @@ }, "titleSuffix": "Windows Security", "contributors_to_exclude": [ - "dstrome2", - "rjagiewich", + "alekyaj", + "alexbuckgit", "American-Dipper", - "claydetels19", + "AngelaMotherofDragons", + "beccarobins", + "claydetels19", + "dstrome", + "dstrome2", + "garycentric", "jborsecnik", - "v-stchambers", + "rjagiewich", + "rmca14", "shdyas", "Stacyrch140", - "garycentric", - "dstrome", - "alekyaj" + "tiburd", + "traya1", + "v-dihans", + "v-stchambers", + "v-stsavell" ], "searchScope": [ "Windows 10" @@ -79,10 +87,10 @@ "application-security/application-control/windows-defender-application-control/**/*.yml": "jsuther1974", "hardware-security/**/*.md": "vinaypamnani-msft", "hardware-security/**/*.yml": "vinaypamnani-msft", - "information-protection/**/*.md": "vinaypamnani-msft", - "information-protection/**/*.yml": "vinaypamnani-msft", "identity-protection/**/*.md": "paolomatarazzo", "identity-protection/**/*.yml": "paolomatarazzo", + "information-protection/**/*.md": "vinaypamnani-msft", + "information-protection/**/*.yml": "vinaypamnani-msft", "operating-system-security/**/*.md": "vinaypamnani-msft", "operating-system-security/**/*.yml": "vinaypamnani-msft", "operating-system-security/data-protection/**/*.md": "paolomatarazzo", @@ -97,10 +105,10 @@ "application-security/application-control/windows-defender-application-control/**/*.yml": "jsuther", "hardware-security//**/*.md": "vinpa", "hardware-security//**/*.yml": "vinpa", - "information-protection/**/*.md": "vinpa", - "information-protection/**/*.yml": "vinpa", "identity-protection/**/*.md": "paoloma", "identity-protection/**/*.yml": "paoloma", + "information-protection/**/*.md": "vinpa", + "information-protection/**/*.yml": "vinpa", "operating-system-security/**/*.md": "vinpa", "operating-system-security/**/*.yml": "vinpa", "operating-system-security/data-protection/**/*.md": "paoloma", @@ -208,23 +216,23 @@ "ms.reviewer": { "application-security/application-control/windows-defender-application-control/**/*.md": "vinpa", "application-security/application-isolation/microsoft-defender-application-guard/*.md": "sazankha", - "identity-protection/hello-for-business/*.md": "erikdau", - "identity-protection/credential-guard/*.md": "zwhittington", "identity-protection/access-control/*.md": "sulahiri", + "identity-protection/credential-guard/*.md": "zwhittington", + "identity-protection/hello-for-business/*.md": "erikdau", "identity-protection/smart-cards/*.md": "ardenw", "identity-protection/virtual-smart-cards/*.md": "ardenw", - "operating-system-security/network-security/windows-firewall/*.md": "nganguly", - "operating-system-security/network-security/vpn/*.md": "pesmith", "operating-system-security/data-protection/personal-data-encryption/*.md": "rhonnegowda", - "operating-system-security/device-management/windows-security-configuration-framework/*.md": "jmunck" + "operating-system-security/device-management/windows-security-configuration-framework/*.md": "jmunck", + "operating-system-security/network-security/vpn/*.md": "pesmith", + "operating-system-security/network-security/windows-firewall/*.md": "nganguly" }, "ms.collection": { "identity-protection/hello-for-business/*.md": "tier1", "information-protection/pluton/*.md": "tier1", "information-protection/tpm/*.md": "tier1", - "threat-protection/auditing/*.md": "tier3", "operating-system-security/data-protection/bitlocker/*.md": "tier1", - "operating-system-security/data-protection/personal-data-encryption/*.md": "tier1" + "operating-system-security/data-protection/personal-data-encryption/*.md": "tier1", + "threat-protection/auditing/*.md": "tier3" } }, "template": [], diff --git a/windows/security/hardware-security/tpm/how-windows-uses-the-tpm.md b/windows/security/hardware-security/tpm/how-windows-uses-the-tpm.md index b513a67096..fc6a8fad0f 100644 --- a/windows/security/hardware-security/tpm/how-windows-uses-the-tpm.md +++ b/windows/security/hardware-security/tpm/how-windows-uses-the-tpm.md @@ -33,7 +33,7 @@ The security features of Windows combined with the benefits of a TPM offer pract Windows includes a cryptography framework called Cryptographic API: Next Generation (CNG), the basic approach of which is to implement cryptographic algorithms in different ways but with a common application programming interface (API). Applications that use cryptography can use the common API without knowing the details of how an algorithm is implemented much less the algorithm itself. -Although CNG sounds like a mundane starting point, it illustrates some of the advantages that a TPM provides. Underneath the CNG interface, Windows or third parties supply a cryptographic provider (that is, an implementation of an algorithm) implemented as software libraries alone or in a combination of software and available system hardware or third-party hardware. If implemented through hardware, the cryptographic provider communicates with the hardware behind the software interface of CNG. +Although CNG sounds like a mundane starting point, it illustrates some of the advantages that a TPM provides. Underneath the CNG interface, Windows or third parties supply a cryptographic provider (that is, an implementation of an algorithm) implemented as software libraries alone or in a combination of software and available system hardware or non-Microsoft hardware. If implemented through hardware, the cryptographic provider communicates with the hardware behind the software interface of CNG. The Platform Crypto Provider, introduced in the Windows 8, exposes the following special TPM properties, which software-only CNG providers can't offer or can't offer as effectively: @@ -94,7 +94,7 @@ For software measurements, Device Encryption relies on measurements of the autho Windows 8 introduced Measured Boot as a way for the operating system to record the chain of measurements of software components and configuration information in the TPM through the initialization of the Windows operating system. In previous Windows versions, the measurement chain stopped at the Windows Boot Manager component itself, and the measurements in the TPM were not helpful for understanding the starting state of Windows. -The Windows boot process happens in stages and often involves third-party drivers to communicate with vendor-specific hardware or implement antimalware solutions. For software, Measured Boot records measurements of the Windows kernel, Early-Launch Anti-Malware drivers, and boot drivers in the TPM. For configuration settings, Measured Boot records security-relevant information such as signature data that antimalware drivers use and configuration data about Windows security features (e.g., whether BitLocker is on or off). +The Windows boot process happens in stages and often involves non-Microsoft drivers to communicate with vendor-specific hardware or implement antimalware solutions. For software, Measured Boot records measurements of the Windows kernel, Early-Launch Anti-Malware drivers, and boot drivers in the TPM. For configuration settings, Measured Boot records security-relevant information such as signature data that antimalware drivers use and configuration data about Windows security features (e.g., whether BitLocker is on or off). Measured Boot ensures that TPM measurements fully reflect the starting state of Windows software and configuration settings. If security settings and other protections are set up correctly, they can be trusted to maintain the security of the running operating system thereafter. Other scenarios can use the operating system's starting state to determine whether the running operating system should be trusted. diff --git a/windows/security/identity-protection/credential-guard/considerations-known-issues.md b/windows/security/identity-protection/credential-guard/considerations-known-issues.md index dbf52336f8..ebae34dece 100644 --- a/windows/security/identity-protection/credential-guard/considerations-known-issues.md +++ b/windows/security/identity-protection/credential-guard/considerations-known-issues.md @@ -22,9 +22,9 @@ For WiFi and VPN connections, it's recommended to move from MSCHAPv2-based conne When you enable Credential Guard, you can no longer use Kerberos unconstrained delegation or DES encryption. Unconstrained delegation could allow attackers to extract Kerberos keys from the isolated LSA process.\ Use constrained or resource-based Kerberos delegation instead. -## Third party Security Support Providers considerations +## Non-Microsoft Security Support Providers considerations -Some third party Security Support Providers (SSPs and APs) might not be compatible with Credential Guard because it doesn't allow third-party SSPs to ask for password hashes from LSA. However, SSPs and APs still get notified of the password when a user logs on and/or changes their password. Any use of undocumented APIs within custom SSPs and APs aren't supported.\ +Some non-Microsoft Security Support Providers (SSPs and APs) might not be compatible with Credential Guard because it doesn't allow non-Microsoft SSPs to ask for password hashes from LSA. However, SSPs and APs still get notified of the password when a user logs on and/or changes their password. Any use of undocumented APIs within custom SSPs and APs aren't supported.\ It's recommended that custom implementations of SSPs/APs are tested with Credential Guard. SSPs and APs that depend on any undocumented or unsupported behaviors fail. For example, using the KerbQuerySupplementalCredentialsMessage API isn't supported. Replacing the NTLM or Kerberos SSPs with custom SSPs and APs. For more information, see [Restrictions around Registering and Installing a Security Package](/windows/win32/secauthn/restrictions-around-registering-and-installing-a-security-package). @@ -110,15 +110,15 @@ Credential Guard blocks certain authentication capabilities. Applications that r This article describes known issues when Credential Guard is enabled. -### Single sign-on for Network services breaks after upgrading to Windows 11, version 22H2 +### Single sign-on for Network services breaks after upgrading to Windows 11, version 22H2 -Devices that use 802.1x wireless or wired network, RDP, or VPN connections that rely on insecure protocols with password-based authentication are unable to use SSO to sign in and are forced to manually re-authenticate in every new Windows session when Credential Guard is running. +Devices that use 802.1x wireless or wired network, RDP, or VPN connections that rely on insecure protocols with password-based authentication are unable to use SSO to sign in and are forced to manually re-authenticate in every new Windows session when Credential Guard is running. #### Affected devices Any device with Credential Guard enabled may encounter the issue. As part of the Windows 11, version 22H2 update, eligible devices that didn't disable Credential Guard, have it enabled by default. This affected all devices on Enterprise (E3 and E5) and Education licenses, as well as some Pro licenses, as long as they met the [minimum hardware requirements](index.md#hardware-and-software-requirements). - -All Windows Pro devices that previously ran Credential Guard on an eligible license and later downgraded to Pro, and which still meet the [minimum hardware requirements](index.md#hardware-and-software-requirements), will receive default enablement. + +All Windows Pro devices that previously ran Credential Guard on an eligible license and later downgraded to Pro, and which still meet the [minimum hardware requirements](index.md#hardware-and-software-requirements), will receive default enablement. > [!TIP] > To determine if a Windows Pro device receives default enablement when upgraded to **Windows 11, version 22H2**, check if the registry key `IsolatedCredentialsRootSecret` is present in `Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0`. @@ -188,16 +188,16 @@ MS-CHAP and NTLMv1 are relevant to the SSO breakage after the Windows 11, versio #### How to fix the issue -We recommend moving away from MSCHAPv2-based connections, such as PEAP-MSCHAPv2 and EAP-MSCHAPv2, to certificate-based authentication, like PEAP-TLS or EAP-TLS. Credential Guard doesn't block certificate-based authentication. +We recommend moving away from MSCHAPv2-based connections, such as PEAP-MSCHAPv2 and EAP-MSCHAPv2, to certificate-based authentication, like PEAP-TLS or EAP-TLS. Credential Guard doesn't block certificate-based authentication. For a more immediate, but less secure fix, [disable Credential Guard](configure.md#disable-credential-guard). Credential Guard doesn't have per-protocol or per-application policies, and it can either be turned on or off. If you disable Credential Guard, you leave stored domain credentials vulnerable to theft. > [!TIP] > To prevent default enablement, configure your devices [to disable Credential Guard](configure.md#disable-credential-guard) before updating to Windows 11, version 22H2. If the setting is not configured (which is the default state) and if the device is eligible, the device automatically enable Credential Guard after the update. > -> If Credential Guard is explicitly disabled, the device won't automatically enable Credential Guard after the update. +> If Credential Guard is explicitly disabled, the device won't automatically enable Credential Guard after the update. -### Issues with third-party applications +### Issues with non-Microsoft applications The following issue affects MSCHAPv2: diff --git a/windows/security/identity-protection/credential-guard/how-it-works.md b/windows/security/identity-protection/credential-guard/how-it-works.md index e618929b94..95c2cc6b76 100644 --- a/windows/security/identity-protection/credential-guard/how-it-works.md +++ b/windows/security/identity-protection/credential-guard/how-it-works.md @@ -25,7 +25,7 @@ Some ways to store credentials aren't protected by Credential Guard, including: - Key loggers - Physical attacks - Doesn't prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access to high value assets in your organization -- Third-party security packages +- Non-Microsoft security packages - When Credential Guard is enabled, NTLMv1, MS-CHAPv2, Digest, and CredSSP can't use the signed-in credentials. Thus, single sign-on doesn't work with these protocols. However, applications can prompt for credentials or use credentials stored in the Windows Vault, which aren't protected by Credential Guard with any of these protocols > [!CAUTION] > It's recommended that valuable credentials, such as the sign-in credentials, aren't used with NTLMv1, MS-CHAPv2, Digest, or CredSSP protocols. If these protocols must be used by domain or Microsoft Entra users, secondary credentials should be provisioned for these use cases. diff --git a/windows/security/identity-protection/enterprise-certificate-pinning.md b/windows/security/identity-protection/enterprise-certificate-pinning.md index e384f47efe..55551c53ca 100644 --- a/windows/security/identity-protection/enterprise-certificate-pinning.md +++ b/windows/security/identity-protection/enterprise-certificate-pinning.md @@ -2,7 +2,7 @@ title: Enterprise certificate pinning description: Enterprise certificate pinning is a Windows feature for remembering, or pinning, a root issuing certificate authority, or end-entity certificate to a domain name. ms.topic: concept-article -ms.date: 05/24/2023 +ms.date: 03/12/2024 --- # Enterprise certificate pinning overview @@ -29,7 +29,7 @@ To deploy enterprise certificate pinning, you need to: - Apply the pin rules certificate trust list file to a reference administrative computer - Deploy the registry configuration on the reference computer via group policy -### Create a pin rules XML file +### Create a pin rules XML file The XML-based pin rules file consists of a sequence of PinRule elements. Each PinRule element contains a sequence of one or more Site elements and a sequence of zero or more Certificate elements. @@ -61,12 +61,12 @@ Each PinRule element contains a sequence of one or more Site elements and a sequ #### PinRules element The PinRules element can have the following attributes. -For help with formatting Pin Rules, see [Represent a date in XML](#represent-a-date-in-xml) or [Represent a duration in XML](#represent-a-duration-in-xml). +For help with formatting Pin Rules, see [Represent a date in XML](#represent-a-date-in-xml) or [Represent a duration in XML](#represent-a-duration-in-xml). | Attribute | Description | Required | |-----------|-------------|----------| | **Duration** or **NextUpdate** | Specifies when the Pin Rules expires. Either is required. **NextUpdate** takes precedence if both are specified.
    **Duration**, represented as an XML TimeSpan data type, doesn't allow years and months. You represent the **NextUpdate** attribute as an XML DateTime data type in UTC. | **Required?** Yes. At least one is required. | -| **LogDuration** or **LogEndDate** | Configures auditing only to extend beyond the expiration of enforcing the Pin Rules.
    **LogEndDate**, represented as an XML DateTime data type in UTC, takes precedence if both are specified.
    You represent **LogDuration** as an XML TimeSpan data type, which doesn't allow years and months.
    If `none of the attributes are specified, auditing expiration uses **Duration** or **NextUpdate** attributes. | No. | +| **LogDuration** or **LogEndDate** | Configures auditing only to extend beyond the expiration of enforcing the Pin Rules.
    **LogEndDate**, represented as an XML DateTime data type in UTC, takes precedence if both are specified.
    You represent **LogDuration** as an XML TimeSpan data type, which doesn't allow years and months.
    If `none of the attributes are specified, auditing expiration uses **Duration** or **NextUpdate** attributes. | No. | | **ListIdentifier** | Provides a friendly name for the list of pin rules. Windows doesn't use this attribute for certificate pinning enforcement; however, it's included when the pin rules are converted to a certificate trust list (CTL). | No. | #### PinRule element @@ -86,7 +86,7 @@ The **Certificate** element can have the following attributes. | Attribute | Description | Required | |-----------|-------------|----------| | **File** | Path to a file containing one or more certificates. Where the certificate(s) can be encoded as:
    - single certificate
    - p7b
    - sst
    These files can also be Base64 formatted. All **Site** elements included in the same **PinRule** element can match any of these certificates. | Yes (File, Directory, or Base64 must be present). | -| **Directory** | Path to a directory containing one or more of the above certificate files. Skips any files not containing any certificates. | Yes (File, Directory, or Base64 must be present). | +| **Directory** | Path to a directory containing one or more of the above certificate files. Skips any files not containing any certificates. | Yes (File, Directory, or Base64 must be present). | | **Base64** | Base64 encoded certificate(s). Where the certificate(s) can be encoded as:
    - single certificate
    - p7b
    - sst
    This allows the certificates to be included in the XML file without a file directory dependency.
    Note:
    You can use **certutil -encode** to convert a .cer file into base64. You can then use Notepad to copy and paste the base64 encoded certificate into the pin rule. | Yes (File, Directory, or Base64 must be present). | | **EndDate** | Enables you to configure an expiration date for when the certificate is no longer valid in the pin rule.
    If you are in the process of switching to a new root or CA, you can set the **EndDate** to allow matching of this element's certificates.
    If the current time is past the **EndDate**, when creating the certificate trust list (CTL) the parser outputs a warning message and excludes the certificate(s) from the Pin Rule in the generated CTL.
    For help with formatting Pin Rules, see [Represent a date in XML](#represent-a-date-in-xml).| No.| @@ -138,8 +138,8 @@ certutil -generatePinRulesCTL certPinRules.xml pinrules.stl ### Apply certificate pinning rules to a reference computer -Now that your certificate pinning rules are in the certificate trust list format, you need to apply the settings to a reference computer as a prerequisite to deploying the setting to your enterprise. -To simplify the deployment configuration, it's best to apply your certificate pinning rules to a computer that has the Group Policy Management Console (GPMC) included in the Remote Server Administration Tools (RSAT). +Now that your certificate pinning rules are in the certificate trust list format, you need to apply the settings to a reference computer as a prerequisite to deploying the setting to your enterprise. +To simplify the deployment configuration, it's best to apply your certificate pinning rules to a computer that has the Group Policy Management Console (GPMC) included in the Remote Server Administration Tools (RSAT). Use *certutil.exe* to apply your certificate pinning rules to your reference computer using the *setreg* argument.\ The *setreg* argument takes a secondary argument that determines the location of where certutil writes the certificate pining rules.\ @@ -148,7 +148,7 @@ The last argument you provide is the name of file that contains your certificate You pass the name of the file as the last argument. You must prefix the file name with the `@` symbol as in the following example: ```cmd -Certutil -setreg chain\PinRules @pinrules.stl +Certutil -setreg chain\PinRules @pinrules.stl ``` > [!NOTE] @@ -215,7 +215,7 @@ You can run the following commands from an elevated command prompt to achieve th set PinRulesLogDir=c:\PinRulesLog mkdir %PinRulesLogDir% icacls %PinRulesLogDir% /grant *S-1-15-2-1:(OI)(CI)(F) -icacls %PinRulesLogDir% /grant *S-1-1-0:(OI)(CI)(F) +icacls %PinRulesLogDir% /grant *S-1-1-0:(OI)(CI)(F) icacls %PinRulesLogDir% /grant *S-1-5-12:(OI)(CI)(F) icacls %PinRulesLogDir% /inheritance:e /setintegritylevel (OI)(CI)L ``` @@ -233,7 +233,7 @@ For example: - `DE28F4A4_www.yammer.com.p7b` If there's either an enterprise certificate pin rule or a Microsoft certificate pin rule mismatch, then Windows writes the .p7b file to the **MismatchPinRules** child folder. -If the pin rules have expired, then Windows writes the .p7b to the **ExpiredPinRules** child folder. +If the pin rules have expired, then Windows writes the .p7b to the **ExpiredPinRules** child folder. ## Represent a date in XML @@ -244,7 +244,7 @@ You can then copy and paste the output of the cmdlet into the XML file. ![Representing a date.](images/enterprise-certificate-pinning-representing-a-date.png) -For simplicity, you can truncate decimal point (.) and the numbers after it. +For simplicity, you can truncate decimal point (.) and the numbers after it. However, be certain to append the uppercase "Z" to the end of the XML date string. ```cmd @@ -268,7 +268,7 @@ You can use Windows PowerShell to properly format and validate durations (timesp ## Convert an XML duration -You can convert an XML formatted timespan into a timespan variable that you can read. +You can convert an XML formatted timespan into a timespan variable that you can read. ![Converting an XML duration.](images/enterprise-certificate-pinning-converting-a-duration.png) diff --git a/windows/security/identity-protection/hello-for-business/deploy/cloud-only.md b/windows/security/identity-protection/hello-for-business/deploy/cloud-only.md index 475b2dc597..d7e4822aaa 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/cloud-only.md +++ b/windows/security/identity-protection/hello-for-business/deploy/cloud-only.md @@ -1,8 +1,8 @@ --- title: Windows Hello for Business cloud-only deployment guide description: Learn how to deploy Windows Hello for Business in a cloud-only deployment scenario. -ms.date: 01/03/2024 -ms.topic: how-to +ms.date: 03/12/2024 +ms.topic: tutorial --- # Cloud-only deployment guide @@ -32,7 +32,7 @@ When you Microsoft Entra join a device, the system attempts to automatically enr Cloud-only deployments use Microsoft Entra multifactor authentication (MFA) during Windows Hello for Business enrollment, and there's no other MFA configuration needed. If you aren't already registered in MFA, you're guided through the MFA registration as part of the Windows Hello for Business enrollment process. -Policy settings can be configured to control the behavior of Windows Hello for Business, via configuration service provider (CSP) or group policy (GPO). In cloud-only deployments, devices are +Policy settings can be configured to control the behavior of Windows Hello for Business, via configuration service provider (CSP) or group policy (GPO). In cloud-only deployments, devices are typically configured via an MDM solution like Microsoft Intune, using the [PassportForWork CSP][WIN-1]. > [!NOTE] diff --git a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-adfs.md b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-adfs.md index 447f1f5c55..94167d36b9 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-adfs.md @@ -1,7 +1,7 @@ --- title: Configure Active Directory Federation Services in a hybrid certificate trust model description: Learn how to configure Active Directory Federation Services (AD FS) to support the Windows Hello for Business hybrid certificate trust model. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- @@ -21,7 +21,7 @@ The CRA enrolls for an *enrollment agent certificate*, and the Windows Hello for Sign-in the AD FS server with *domain administrator* equivalent credentials. Open a **Windows PowerShell** prompt and type the following command: - + ```PowerShell Set-AdfsCertificateAuthority -EnrollmentAgent -EnrollmentAgentCertificateTemplate WHFBEnrollmentAgent -WindowsHelloCertificateTemplate WHFBAuthentication -WindowsHelloCertificateProxyEnabled $true ``` diff --git a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-enroll.md b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-enroll.md index 2bc061e33b..2891e83911 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-enroll.md +++ b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-enroll.md @@ -1,7 +1,7 @@ --- title: Configure and enroll in Windows Hello for Business in hybrid certificate trust model description: Learn how to configure devices and enroll them in Windows Hello for Business in a hybrid certificate trust scenario. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- diff --git a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-pki.md b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-pki.md index 85dd13860f..35d1ff0083 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-pki.md +++ b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust-pki.md @@ -1,7 +1,7 @@ --- title: Configure and validate the PKI in an hybrid certificate trust model description: Configure and validate the Public Key Infrastructure when deploying Windows Hello for Business in a hybrid certificate trust model. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- diff --git a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust.md b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust.md index 3fcb86b928..58e8cc3e3d 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust.md +++ b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cert-trust.md @@ -1,7 +1,7 @@ --- title: Windows Hello for Business hybrid certificate trust deployment guide description: Learn how to deploy Windows Hello for Business in a hybrid certificate trust scenario. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- @@ -28,7 +28,7 @@ ms.topic: tutorial > Once the prerequisites are met, deploying Windows Hello for Business consists of the following steps: > > - [Configure and validate the Public Key Infrastructure](hybrid-cert-trust-pki.md) -> - [Configure Active Directory Federation Services](hybrid-cert-trust-adfs.md) +> - [Configure Active Directory Federation Services](hybrid-cert-trust-adfs.md) > - [Configure and enroll in Windows Hello for Business](hybrid-cert-trust-enroll.md) > - (optional) [Configure single sign-on for Microsoft Entra joined devices](../hello-hybrid-aadj-sso.md) diff --git a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust.md b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust.md index 1c67b375b7..9af88ba3bf 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust.md +++ b/windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust.md @@ -1,7 +1,7 @@ --- title: Windows Hello for Business cloud Kerberos trust deployment guide description: Learn how to deploy Windows Hello for Business in a cloud Kerberos trust scenario. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- diff --git a/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust-enroll.md b/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust-enroll.md index a1686099b6..62f5d4401e 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust-enroll.md +++ b/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust-enroll.md @@ -1,7 +1,7 @@ --- title: Configure and enroll in Windows Hello for Business in a hybrid key trust model description: Learn how to configure devices and enroll them in Windows Hello for Business in a hybrid key trust scenario. -ms.date: 12/29/2023 +ms.date: 03/12/2024 ms.topic: tutorial --- diff --git a/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust.md b/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust.md index e5a08f2117..2b775003f0 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust.md +++ b/windows/security/identity-protection/hello-for-business/deploy/hybrid-key-trust.md @@ -1,7 +1,7 @@ --- title: Windows Hello for Business hybrid key trust deployment guide description: Learn how to deploy Windows Hello for Business in a hybrid key trust scenario. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- @@ -36,7 +36,7 @@ Windows Hello for Business must have a Public Key Infrastructure (PKI) when usin Key trust deployments don't need client-issued certificates for on-premises authentication. *Microsoft Entra Connect Sync* configures Active Directory user accounts for public key mapping, by synchronizing the public key of the Windows Hello for Business credential to an attribute on the user's Active Directory object (`msDS-KeyCredentialLink` attribute). -A Windows Server-based PKI or a third-party Enterprise certification authority can be used. For more information, see [Requirements for domain controller certificates from a third-party CA][SERV-1]. +A Windows Server-based PKI or a non-Microsoft Enterprise certification authority can be used. For more information, see [Requirements for domain controller certificates from a non-Microsoft CA][SERV-1]. [!INCLUDE [lab-based-pki-deploy](includes/lab-based-pki-deploy.md)] diff --git a/windows/security/identity-protection/hello-for-business/deploy/includes/adfs-mfa.md b/windows/security/identity-protection/hello-for-business/deploy/includes/adfs-mfa.md index e9f18f3925..a684145a1d 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/includes/adfs-mfa.md +++ b/windows/security/identity-protection/hello-for-business/deploy/includes/adfs-mfa.md @@ -8,12 +8,12 @@ ms.topic: include Windows Hello for Business requires users perform multifactor authentication (MFA) prior to enroll in the service. On-premises deployments can use, as MFA option: - certificates -- third-party authentication providers for AD FS +- non-Microsoft authentication providers for AD FS - custom authentication provider for AD FS > [!IMPORTANT] > As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to require multifactor authentication from their users should use cloud-based Microsoft Entra multifactor authentication. Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future updates and generate activation credentials as usual. -For information on available third-party authentication methods see [Configure Additional Authentication Methods for AD FS](/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs). For creating a custom authentication method see [Build a Custom Authentication Method for AD FS in Windows Server](/windows-server/identity/ad-fs/development/ad-fs-build-custom-auth-method) +For information on available non-Microsoft authentication methods see [Configure Additional Authentication Methods for AD FS](/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs). For creating a custom authentication method see [Build a Custom Authentication Method for AD FS in Windows Server](/windows-server/identity/ad-fs/development/ad-fs-build-custom-auth-method) Follow the integration and deployment guide for the authentication provider you select to integrate and deploy it to AD FS. Make sure that the authentication provider is selected as a multifactor authentication option in the AD FS authentication policy. For information on configuring AD FS authentication policies see [Configure Authentication Policies](/windows-server/identity/ad-fs/operations/configure-authentication-policies). diff --git a/windows/security/identity-protection/hello-for-business/deploy/includes/dc-certificate-supersede.md b/windows/security/identity-protection/hello-for-business/deploy/includes/dc-certificate-supersede.md index e2d6f588de..a113cec641 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/includes/dc-certificate-supersede.md +++ b/windows/security/identity-protection/hello-for-business/deploy/includes/dc-certificate-supersede.md @@ -26,7 +26,7 @@ The certificate template is configured to supersede all the certificate template However, the certificate template and the superseding of certificate templates isn't active until the template is published to one or more certificate authorities. > [!NOTE] -> The domain controller's certificate must chain to a root in the NTAuth store. By default, the Active Directory Certificate Authority's root certificate is added to the NTAuth store. If you are using a third-party CA, this may not be done by default. If the domain controller certificate does not chain to a root in the NTAuth store, user authentication will fail. +> The domain controller's certificate must chain to a root in the NTAuth store. By default, the Active Directory Certificate Authority's root certificate is added to the NTAuth store. If you are using a non-Microsoft CA, this may not be done by default. If the domain controller certificate does not chain to a root in the NTAuth store, user authentication will fail. >To see all certificates in the NTAuth store, use the following command: > > `Certutil -viewstore -enterprise NTAuth` diff --git a/windows/security/identity-protection/hello-for-business/deploy/index.md b/windows/security/identity-protection/hello-for-business/deploy/index.md index 061c4a62e1..b28e7db255 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/index.md +++ b/windows/security/identity-protection/hello-for-business/deploy/index.md @@ -1,8 +1,8 @@ --- title: Plan a Windows Hello for Business Deployment description: Learn about the role of each component within Windows Hello for Business and how certain deployment decisions affect other aspects of your infrastructure. -ms.date: 01/02/2024 -ms.topic: overview +ms.date: 03/12/2024 +ms.topic: concept-article --- # Plan a Windows Hello for Business deployment @@ -112,11 +112,11 @@ Users can authenticate to Microsoft Entra ID using federated authentication or c | | Deployment model | Trust type | Authentication to Microsoft Entra ID | Requirements | |--|--|--|--|--| | **🔲** | **Cloud-only** | n/a | Cloud authentication | n/a | -| **🔲** | **Cloud-only** | n/a | Federated authentication | Third-party federation service | +| **🔲** | **Cloud-only** | n/a | Federated authentication | Non-Microsoft federation service | | **🔲** | **Hybrid** | Cloud Kerberos trust | Cloud authentication | Password hash sync (PHS) or Pass-through authentication (PTA) | -| **🔲** | **Hybrid** | Cloud Kerberos trust | Federated authentication | AD FS or third-party federation service | +| **🔲** | **Hybrid** | Cloud Kerberos trust | Federated authentication | AD FS or non-Microsoft federation service | | **🔲** | **Hybrid** | Key trust | Cloud authentication | Password hash sync (PHS) or Pass-through authentication (PTA) | -| **🔲** | **Hybrid** | Key trust | Federated authentication | AD FS or third-party federation service | +| **🔲** | **Hybrid** | Key trust | Federated authentication | AD FS or non-Microsoft federation service | | **🔲** | **Hybrid** | Certificate trust | Federated authentication | This deployment model doesn't support PTA or PHS. Active Directory must be federated with Microsoft Entra ID using AD FS| To learn more: @@ -143,7 +143,7 @@ For on-premises deployments, the server running the Active Directory Federation The goal of Windows Hello for Business is to move organizations away from passwords by providing them with a *strong credential* that enables easy two-factor authentication. The built-in provisioning experience accepts the user's weak credentials (username and password) as the first factor authentication. However, the user must provide a second factor of authentication before Windows provisions a strong credential: - For cloud-only and hybrid deployments, there are different choices for multifactor authentication, including [Microsoft Entra MFA][ENTRA-1] -- On-premises deployments must use a multifactor option that can integrate as an AD FS multifactor adapter. Organizations can choose from third-party options that offer an AD FS MFA adapter. For more information, see [Microsoft and third-party additional authentication methods][SER-2] +- On-premises deployments must use a multifactor option that can integrate as an AD FS multifactor adapter. Organizations can choose from non-Microsoft options that offer an AD FS MFA adapter. For more information, see [Microsoft and non-Microsoft additional authentication methods][SER-2] > [!IMPORTANT] > As of July 1, 2019, Microsoft doesn't offer MFA Server for new deployments. New deployments that require multifactor authentication should use cloud-based Microsoft Entra multifactor authentication. Existing deployment where the MFA Server was activated prior to July 1, 2019 can download the latest version, future updates, and generate activation credentials. For more information, see [Getting started with the Azure Multi-Factor Authentication Server][ENTRA-2]. @@ -151,9 +151,9 @@ The goal of Windows Hello for Business is to move organizations away from passwo || Deployment model | MFA options | |--|--|--| | **🔲** | **Cloud-only** | Microsoft Entra MFA | -| **🔲** | **Cloud-only** | Third-party MFA via Microsoft Entra ID custom controls or federation | +| **🔲** | **Cloud-only** | Non-Microsoft MFA via Microsoft Entra ID custom controls or federation | | **🔲** | **Hybrid** | Microsoft Entra MFA | -| **🔲** | **Hybrid** | Third-party MFA via Microsoft Entra ID custom controls or federation| +| **🔲** | **Hybrid** | Non-Microsoft MFA via Microsoft Entra ID custom controls or federation| | **🔲** | **On-premises** | AD FS MFA adapter | For more information how to configure Microsoft Entra multifactor authentication, see [Configure Microsoft Entra multifactor authentication settings][ENTRA-4]. @@ -224,7 +224,7 @@ Windows Hello for Business provides a rich set of granular policy settings. Ther Here are some considerations regarding licensing requirements for cloud services: - Windows Hello for Business doesn't require a Microsoft Entra ID P1 or P2 subscription. However, some dependencies, such as [MDM automatic enrollment][MEM-1] and [Conditional Access][ENTRA-8] do - - Devices managed via MDM don't require a Microsoft Entra ID P1 or P2 subscription. By forgoing the subscription, users must manually enroll devices in the MDM solution, such as Microsoft Intune or a supported third-party MDM + - Devices managed via MDM don't require a Microsoft Entra ID P1 or P2 subscription. By forgoing the subscription, users must manually enroll devices in the MDM solution, such as Microsoft Intune or a supported non-Microsoft MDM - You can deploy Windows Hello for Business using the Microsoft Entra ID Free tier. All Microsoft Entra ID Free accounts can use Microsoft Entra multifactor authentication for the Windows passwordless features - Some Microsoft Entra multifactor authentication features require a license. For more information, see [Features and licenses for Microsoft Entra multifactor authentication][ENTRA-9]. - Enrolling a certificate using the AD FS registration authority requires devices to authenticate to the AD FS server, which requires device write-back, a Microsoft Entra ID P1 or P2 feature diff --git a/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-adfs.md b/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-adfs.md index 335e4d5cb6..dc000be03a 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-adfs.md @@ -1,7 +1,7 @@ --- title: Configure Active Directory Federation Services in an on-premises certificate trust model description: Learn how to configure Active Directory Federation Services (AD FS) to support the Windows Hello for Business on-premises certificate trust model. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- @@ -36,7 +36,7 @@ Windows Hello for Business works exclusively with the Active Directory Federatio > [!div class="checklist"] > Before you continue with the deployment, validate your deployment progress by reviewing the following items: > -> - Record the information about the AD FS certificate, and set a renewal reminder at least six weeks before it expires. Relevant information includes: certificate serial number, thumbprint, common name, subject alternate name, name of the physical host server, the issued date, the expiration date, and issuing CA vendor (if a third-party certificate) +> - Record the information about the AD FS certificate, and set a renewal reminder at least six weeks before it expires. Relevant information includes: certificate serial number, thumbprint, common name, subject alternate name, name of the physical host server, the issued date, the expiration date, and issuing CA vendor (if a non-Microsoft certificate) > - Confirm you added the AD FS service account to the KeyAdmins group > - Confirm you enabled the Device Registration service @@ -72,7 +72,7 @@ Use the event logs on the AD FS service to confirm the service account enrolled - The thumbprint of the certificate - The certificate template used to issue the certificate -You cannot use the Certificate Manager to view enrolled certificates for group managed service accounts. Use the event log information to confirm the AD FS service account enrolled a certificate. Use certutil.exe to view the details of the certificate shown in the event log. +You cannot use the Certificate Manager to view enrolled certificates for group managed service accounts. Use the event log information to confirm the AD FS service account enrolled a certificate. Use `certutil.exe` to view the details of the certificate shown in the event log. Group managed service accounts use user profiles to store user information, which included enrolled certificates. On the AD FS server, use a command prompt and navigate to `%systemdrive%\users\\appdata\roaming\Microsoft\systemcertificates\my\certificates`. diff --git a/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-enroll.md b/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-enroll.md index 045a6ba24c..f856919e78 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-enroll.md +++ b/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust-enroll.md @@ -1,5 +1,5 @@ --- -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial title: Configure Windows Hello for Business Policy settings in an on-premises certificate trust description: Configure Windows Hello for Business Policy settings for Windows Hello for Business in an on-premises certificate trust scenario diff --git a/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust.md b/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust.md index 6bd1a94800..92ee0befff 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust.md +++ b/windows/security/identity-protection/hello-for-business/deploy/on-premises-cert-trust.md @@ -1,7 +1,7 @@ --- title: Windows Hello for Business on-premises certificate trust deployment guide description: Learn how to deploy Windows Hello for Business in an on-premises, certificate trust scenario. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- diff --git a/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-adfs.md b/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-adfs.md index 12685b46eb..d9e217575b 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-adfs.md @@ -1,7 +1,7 @@ --- title: Configure Active Directory Federation Services in an on-premises key trust model description: Learn how to configure Active Directory Federation Services (AD FS) to support the Windows Hello for Business key trust model. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- @@ -21,7 +21,7 @@ Before you continue with the deployment, validate your deployment progress by re > [!div class="checklist"] > -> - Record the information about the AD FS certificate, and set a renewal reminder at least six weeks before it expires. Relevant information includes: certificate serial number, thumbprint, common name, subject alternate name, name of the physical host server, the issued date, the expiration date, and issuing CA vendor (if a third-party certificate) +> - Record the information about the AD FS certificate, and set a renewal reminder at least six weeks before it expires. Relevant information includes: certificate serial number, thumbprint, common name, subject alternate name, name of the physical host server, the issued date, the expiration date, and issuing CA vendor (if a non-Microsoft certificate) > - Confirm you added the AD FS service account to the KeyAdmins group > - Confirm you enabled the Device Registration service diff --git a/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-enroll.md b/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-enroll.md index 442ead237c..34f55f78f3 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-enroll.md +++ b/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust-enroll.md @@ -1,5 +1,5 @@ --- -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial title: Configure Windows Hello for Business Policy settings in an on-premises key trust description: Configure Windows Hello for Business Policy settings for Windows Hello for Business in an on-premises key trust scenario diff --git a/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust.md b/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust.md index a5a2281196..0b7ef9d9a3 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust.md +++ b/windows/security/identity-protection/hello-for-business/deploy/on-premises-key-trust.md @@ -1,7 +1,7 @@ --- title: Windows Hello for Business on-premises key trust deployment guide description: Learn how to deploy Windows Hello for Business in an on-premises, key trust scenario. -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: tutorial --- diff --git a/windows/security/identity-protection/hello-for-business/deploy/prepare-users.md b/windows/security/identity-protection/hello-for-business/deploy/prepare-users.md index 9dbdfc8a07..0aeded8941 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/prepare-users.md +++ b/windows/security/identity-protection/hello-for-business/deploy/prepare-users.md @@ -1,7 +1,7 @@ --- title: Prepare users to provision and use Windows Hello for Business description: Learn how to prepare users to enroll and to use Windows Hello for Business. -ms.date: 01/02/2024 +ms.date: 03/12/2024 ms.topic: end-user-help --- diff --git a/windows/security/identity-protection/hello-for-business/faq.yml b/windows/security/identity-protection/hello-for-business/faq.yml index 1b9e0947ca..3d8f631c06 100644 --- a/windows/security/identity-protection/hello-for-business/faq.yml +++ b/windows/security/identity-protection/hello-for-business/faq.yml @@ -37,18 +37,18 @@ sections: Anytime key material is generated, it must be protected against attack. The most robust way to do this is through specialized hardware. There's a long history of using hardware security modules (HSMs) to generate, store, and process keys for security-critical applications. Smart cards are a special type of HSM, as are devices that are compliant with the Trusted Computing Group TPM standard. Wherever possible, the Windows Hello for Business implementation takes advantage of onboard TPM hardware to generate and protect keys. Administrators can choose to allow key operations in software, but it's recommended the use of TPM hardware. The TPM protects against a variety of known and potential attacks, including PIN brute-force attacks. The TPM provides an additional layer of protection after an account lockout, too. When the TPM has locked the key material, the user will have to reset the PIN (which means the user will have to use MFA to reauthenticate to the IdP before the IdP allows re-registration). Resetting the PIN means that all keys and certificates encrypted with the old key material will be removed. - question: How does PIN caching work with Windows Hello for Business? answer: | - Windows Hello for Business provides a PIN caching user experience by using a ticketing system. Rather than caching a PIN, processes cache a ticket they can use to request private key operations. Microsoft Entra ID and Active Directory sign-in keys are cached under lock. This means the keys remain available for use without prompting, as long as the user is interactively signed-in. Microsoft Account sign-in keys are transactional keys, which means the user is always prompted when accessing the key. - - Windows Hello for Business used as a smart card (smart card emulation that is enabled by default) provides the same user experience of default smart card PIN caching. Each process requesting a private key operation prompts the user for the PIN on first use. Subsequent private key operations won't prompt the user for the PIN. - + Windows Hello for Business provides a PIN caching user experience by using a ticketing system. Rather than caching a PIN, processes cache a ticket they can use to request private key operations. Microsoft Entra ID and Active Directory sign-in keys are cached under lock. This means the keys remain available for use without prompting, as long as the user is interactively signed-in. Microsoft Account sign-in keys are transactional keys, which means the user is always prompted when accessing the key. + + Windows Hello for Business used as a smart card (smart card emulation that is enabled by default) provides the same user experience of default smart card PIN caching. Each process requesting a private key operation prompts the user for the PIN on first use. Subsequent private key operations won't prompt the user for the PIN. + The smart card emulation feature of Windows Hello for Business verifies the PIN and then discards the PIN in exchange for a ticket. The process doesn't receive the PIN, but rather the ticket that grants them private key operations. There isn't a policy setting to adjust the caching. - question: Where is Windows Hello biometrics data stored? answer: | When you enroll in Windows Hello, a representation of your biometrics, called an enrollment profile, is created more information can be found on [Windows Hello face authentication](/windows-hardware/design/device-experiences/windows-hello-face-authentication). This enrollment profile biometrics data is device specific, is stored locally on the device, and does not leave the device or roam with the user. Some external fingerprint sensors store biometric data on the fingerprint module itself rather than on Windows device. Even in this case, the biometrics data is stored locally on those modules, is device specific, doesn't roam, never leaves the module, and is never sent to Microsoft cloud or external server. For more details, see [Windows Hello biometrics in the enterprise](/windows/security/identity-protection/hello-for-business/hello-biometrics-in-enterprise#where-is-windows-hello-data-stored). - question: What is the format used to store Windows Hello biometrics data on the device? answer: | - Windows Hello biometrics data is stored on the device as an encrypted template database. The data from the biometrics sensor (like face camera or fingerprint reader) creates a data representation—or graph—that is then encrypted before it's stored on the device. Each biometrics sensor on the device which is used by Windows Hello (face or fingerprint) will have its own biometric database file where template data is stored. Each biometrics database file is encrypted with unique, randomly generated key that is encrypted to the system using AES encryption producing an SHA256 hash. - - question: Who has access on Windows Hello biometrics data? + Windows Hello biometrics data is stored on the device as an encrypted template database. The data from the biometrics sensor (like face camera or fingerprint reader) creates a data representation—or graph—that is then encrypted before it's stored on the device. Each biometrics sensor on the device which is used by Windows Hello (face or fingerprint) will have its own biometric database file where template data is stored. Each biometrics database file is encrypted with unique, randomly generated key that is encrypted to the system using AES encryption producing an SHA256 hash. + - question: Who has access on Windows Hello biometrics data? answer: | Since Windows Hello biometrics data is stored in encrypted format, no user, or any process other than Windows Hello has access to it. - question: When is Windows Hello biometrics database file created? How is a user enrolled into Windows Hello face or fingerprint authentication? @@ -59,18 +59,18 @@ sections: To remove Windows Hello and any associated biometric identification data from the device, open **Start > Settings > Accounts > Sign-in options**. Select the Windows Hello biometrics authentication method you want to remove, and then select **Remove**. The action unenrolls from Windows Hello biometrics authentication and deletes the associated biometrics template database file. For more details, see [Windows sign-in options and account protection (microsoft.com)](https://support.microsoft.com/windows/windows-sign-in-options-and-account-protection-7b34d4cf-794f-f6bd-ddcc-e73cdf1a6fbf#bkmk_helloandprivacy). - name: Management and operations - questions: + questions: - question: Can I deploy and manage Windows Hello for Business by using Microsoft Configuration Manager? answer: | Starting in Configuration Manager, version 2203, Windows Hello for Business deployments using Configuration Manager are no longer supported. - question: How do I delete a Windows Hello for Business container on a device? - answer: | - You can delete the Windows Hello for Business container by executing the command `certutil.exe -deleteHelloContainer`. + answer: | + You can delete the Windows Hello for Business container by executing the command `certutil.exe -deleteHelloContainer`. - question: What happens when a user forgets their PIN? answer: | If the user can sign in with a password, they can reset their PIN by selecting the *I forgot my PIN* link in the Settings app or from the lock screen, by selecting the *I forgot my PIN* link on the PIN credential provider. - - For on-premises deployments, devices must be connected to their on-premises network (domain controllers and/or certificate authority) to reset their PINs. Hybrid deployments can onboard their Microsoft Entra tenant to use the *Windows Hello for Business PIN reset service* to reset their PINs. Non-destructive PIN reset works without access to the corporate network. Destructive PIN reset requires access to the corporate network. For more details about destructive and non-destructive PIN reset, see [PIN reset](/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset). + + For on-premises deployments, devices must be connected to their on-premises network (domain controllers and/or certificate authority) to reset their PINs. Hybrid deployments can onboard their Microsoft Entra tenant to use the *Windows Hello for Business PIN reset service* to reset their PINs. Non-destructive PIN reset works without access to the corporate network. Destructive PIN reset requires access to the corporate network. For more details about destructive and non-destructive PIN reset, see [PIN reset](pin-reset.md). - question: Does Windows Hello for Business prevent the use of simple PINs? answer: | Yes. Our simple PIN algorithm looks for and disallows any PIN that has a constant delta from one digit to the next. The algorithm counts the number of steps required to reach the next digit, overflowing at 10 ('zero'). @@ -84,7 +84,7 @@ sections: - The PIN 7036 has a constant delta of (3,3,3), so it isn't allowed - The PIN 1231 doesn't have a constant delta (1,1,2), so it's allowed - The PIN 1872 doesn't have a constant delta (7,9,5), so it's allowed - + This check prevents repeating numbers, sequential numbers, and simple patterns. It always results in a list of 100 disallowed PINs (independent of the PIN length). This algorithm doesn't apply to alphanumeric PINs. - question: Which diagnostic data is collected when Windows Hello for Business is enabled? answer: | @@ -92,7 +92,7 @@ sections: - Data about whether people sign in with their face, iris, fingerprint, or PIN - The number of times they use it - Whether it works or not - All this is valuable information that helps Microsoft building a better product. The data is pseudonymized, does not include biometric information, and is encrypted before it is transmitted to Microsoft. You can choose to stop sending diagnostic data to Microsoft at any time. [Learn more about diagnostic data in Windows](https://support.microsoft.com/windows/diagnostics-feedback-and-privacy-in-windows-28808a2b-a31b-dd73-dcd3-4559a5199319). + All this is valuable information that helps Microsoft building a better product. The data is pseudonymized, does not include biometric information, and is encrypted before it is transmitted to Microsoft. You can choose to stop sending diagnostic data to Microsoft at any time. [Learn more about diagnostic data in Windows](https://support.microsoft.com/windows/diagnostics-feedback-and-privacy-in-windows-28808a2b-a31b-dd73-dcd3-4559a5199319). - question: Can I disable the PIN while using Windows Hello for Business? answer: | No. The movement away from passwords is accomplished by gradually reducing the use of the password. In situations where you can't authenticate by using biometrics, you need a fallback mechanism that isn't a password. The PIN is the fallback mechanism. Disabling or hiding the PIN credential provider will disable the use of biometrics. @@ -102,7 +102,7 @@ sections: If the user attempts to unlock the device by entering random PINs, after three unsuccessful attempts the credential provider will display the following message: **You've entered an incorrect PIN several times. To try again, enter A1B2C3 below**. Upon entering the challenge phrase *A1B2C3*, the user will be granted one more opportunity to enter the PIN. If unsuccessful, the provider will be disabled, leaving the user with the only option to reboot the device. Following the reboot, the aforementioned pattern repeats. - + If unsuccessful attempts continue, the device will enter a lockout state, lasting for 1 minute after the first reboot, 2 minutes after the fourth reboot, and 10 minutes after the fifth reboot. The duration of each lockout increases accordingly. This behavior is a result of the TPM 2.0 anti-hammering feature. For more information about the TPM anti-hammering feature, see [TPM 2.0 anti-hammering](/windows/security/information-protection/tpm/tpm-fundamentals#tpm-20-anti-hammering). @@ -110,7 +110,7 @@ sections: questions: - question: Can Windows Hello for Business work in air-gapped environments? answer: | - Yes. You can use the on-premises Windows Hello for Business deployment and combine it with a third-party MFA provider that doesn't require internet connectivity to achieve an air-gapped Windows Hello for Business deployment. + Yes. You can use the on-premises Windows Hello for Business deployment and combine it with a non-Microsoft MFA provider that doesn't require internet connectivity to achieve an air-gapped Windows Hello for Business deployment. - question: How many users can enroll for Windows Hello for Business on a single Windows device? answer: | The maximum number of supported enrollments on a single device is 10. This lets 10 users each enroll their face and up to 10 fingerprints. For devices with more than 10 users, or for users that sign-in to many devices (for example, a support technician), it's recommended the use of FIDO2 security keys. @@ -120,17 +120,17 @@ sections: - question: What attributes are synchronized by Microsoft Entra Connect with Windows Hello for Business? answer: | Review [Microsoft Entra Connect Sync: Attributes synchronized to Microsoft Entra ID](/entra/identity/hybrid/connect/reference-connect-sync-attributes-synchronized) for a list of attributes that sync based on scenarios. The base scenarios that include Windows Hello for Business are the [Windows 10](/entra/identity/hybrid/connect/reference-connect-sync-attributes-synchronized#windows-10) scenario and the [Device writeback](/entra/identity/hybrid/connect/reference-connect-sync-attributes-synchronized#device-writeback) scenario. Your environment may include other attributes. - - question: Can I use third-party MFA providers with Windows Hello for Business? + - question: Can I use non-Microsoft MFA providers with Windows Hello for Business? answer: | - Yes, if you're using federated hybrid deployment, you can use any third-party that provides an AD FS MFA adapter. A list of third-party MFA adapters can be found [here](/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods). - - question: Does Windows Hello for Business work with third-party federation servers? + Yes, if you're using federated hybrid deployment, you can use any non-Microsoft that provides an AD FS MFA adapter. A list of non-Microsoft MFA adapters can be found [here](/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs#microsoft-and-third-party-additional-authentication-methods). + - question: Does Windows Hello for Business work with non-Microsoft federation servers? answer: | - Windows Hello for Business works with any third-party federation servers that support the protocols used during the provisioning experience.

    - + Windows Hello for Business works with any non-Microsoft federation servers that support the protocols used during the provisioning experience.

    + | Protocol | Description | | :--- | :--- | | [[MS-KPP]: Key Provisioning Protocol](/openspecs/windows_protocols/ms-kpp/25ff7bd8-50e3-4769-af23-bcfd0b4d4567) | Specifies the Key Provisioning Protocol, which defines a mechanism for a client to register a set of cryptographic keys on a user and device pair. | - | [[MS-OAPX]: OAuth 2.0 Protocol Extensions](/openspecs/windows_protocols/ms-oapx/7612efd4-f4c8-43c3-aed6-f5c5ce359da2)| Specifies the OAuth 2.0 Protocol Extensions, which are used to extend the OAuth 2.0 Authorization Framework. These extensions enable authorization features such as resource specification, request identifiers, and log in hints. | + | [[MS-OAPX]: OAuth 2.0 Protocol Extensions](/openspecs/windows_protocols/ms-oapx/7612efd4-f4c8-43c3-aed6-f5c5ce359da2)| Specifies the OAuth 2.0 Protocol Extensions, which are used to extend the OAuth 2.0 Authorization Framework. These extensions enable authorization features such as resource specification, request identifiers, and log in hints. | | [[MS-OAPXBC]: OAuth 2.0 Protocol Extensions for Broker Clients](/openspecs/windows_protocols/ms-oapxbc/2f7d8875-0383-4058-956d-2fb216b44706) | Specifies the OAuth 2.0 Protocol Extensions for Broker Clients, extensions to RFC6749 (the OAuth 2.0 Authorization Framework) that allow a broker client to obtain access tokens on behalf of calling clients. | | [[MS-OIDCE]: OpenID Connect 1.0 Protocol Extensions](/openspecs/windows_protocols/ms-oidce/718379cf-8bc1-487e-962d-208aeb8e70ee) | Specifies the OpenID Connect 1.0 Protocol Extensions. These extensions define other claims to carry information about the user, including the user principal name, a locally unique identifier, a time for password expiration, and a URL for password change. These extensions also define more provider meta-data that enables the discovery of the issuer of access tokens and gives additional information about provider capabilities. | - question: Can I enroll local Windows accounts in Windows Hello for Business? @@ -146,9 +146,9 @@ sections: answer: | A user will be prompted to set up a Windows Hello for Business key on a Microsoft Entra registered devices if the feature is enabled by policy. If the user has an existing Windows Hello container, the Windows Hello for Business key will be enrolled in that container and will be protected using existing gestures. - If a user has signed into their Microsoft Entra registered device with Windows Hello, their Windows Hello for Business key will be used to authenticate the user's work identity when they try to use Microsoft Entra resources. The Windows Hello for Business key meets Microsoft Entra multifactor authentication (MFA) requirements and reduces the number of MFA prompts users will see when accessing resources. + If a user has signed into their Microsoft Entra registered device with Windows Hello, their Windows Hello for Business key will be used to authenticate the user's work identity when they try to use Microsoft Entra resources. The Windows Hello for Business key meets Microsoft Entra multifactor authentication (MFA) requirements and reduces the number of MFA prompts users will see when accessing resources. - It's possible to Microsoft Entra register a domain joined device. If the domain joined device has a convenience PIN, sign in with the convenience PIN will no longer work. This configuration isn't supported by Windows Hello for Business. + It's possible to Microsoft Entra register a domain joined device. If the domain joined device has a convenience PIN, sign in with the convenience PIN will no longer work. This configuration isn't supported by Windows Hello for Business. For more information, see [Microsoft Entra registered devices](/azure/active-directory/devices/concept-azure-ad-register). - question: Does Windows Hello for Business work with non-Windows operating systems? @@ -181,11 +181,11 @@ sections: - question: What URLs do I need to allow for a hybrid deployment? answer: | For a list of required URLs, see [Microsoft 365 Common and Office Online](/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide#microsoft-365-common-and-office-online). - + If your environment uses Microsoft Intune, see [Network endpoints for Microsoft Intune](/mem/intune/fundamentals/intune-endpoints). - name: Features - questions: + questions: - question: Can I use an external Windows Hello compatible camera when my computer has a built-in Windows Hello compatible camera? answer: | Yes, you can use an external Windows Hello compatible camera if a device has an internal Windows Hello camera. When both cameras are present, the external camera is used for face authentication. For more information, see [IT tools to support Windows 10, version 21H1](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/it-tools-to-support-windows-10-version-21h1/ba-p/2365103). If ESS is enabled, see [Windows Hello Enhanced Sign-in Security](/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security). @@ -217,7 +217,7 @@ sections: - attempting to access on-premises resources secured by Active Directory - question: Can I use RDP/VDI with Windows Hello for Business cloud Kerberos trust? answer: | - Windows Hello for Business cloud Kerberos trust can't be used as a supplied credential with RDP/VDI. Similar to key trust, cloud Kerberos trust can be used for RDP if a [certificate is enrolled into Windows Hello for Business](rdp-sign-in.md) for this purpose. As an alternative, consider using [Remote Credential Guard](/windows/security/identity-protection/remote-credential-guard) which doesn't require to deploy certificates. + Windows Hello for Business cloud Kerberos trust can't be used as a supplied credential with RDP/VDI. Similar to key trust, cloud Kerberos trust can be used for RDP if a [certificate is enrolled into Windows Hello for Business](rdp-sign-in.md) for this purpose. As an alternative, consider using [Remote Credential Guard](../remote-credential-guard.md) which doesn't require to deploy certificates. - question: Do all my domain controllers need to be fully patched as per the prerequisites for me to use Windows Hello for Business cloud Kerberos trust? answer: | No, only the number necessary to handle the load from all cloud Kerberos trust devices. @@ -229,4 +229,4 @@ sections: In a hybrid deployment, a user's public key must sync from Microsoft Entra ID to Active Directory before it can be used to authenticate against a domain controller. This sync is handled by Microsoft Entra Connect and will occur during a normal sync cycle. - question: Can I use Windows Hello for Business key trust and RDP? answer: | - Remote Desktop Protocol (RDP) doesn't support using key-based authentication as supplied credentials. However, you can deploy certificates in the key trust model to enable RDP. For more information, see [Deploying certificates to key trust users to enable RDP](hello-deployment-rdp-certs.md). As an alternative, consider using [Remote Credential Guard](/windows/security/identity-protection/remote-credential-guard) which doesn't require to deploy certificates. + Remote Desktop Protocol (RDP) doesn't support using key-based authentication as supplied credentials. However, you can deploy certificates in the key trust model to enable RDP. For more information, see [Deploying certificates to key trust users to enable RDP](hello-deployment-rdp-certs.md). As an alternative, consider using [Remote Credential Guard](../remote-credential-guard.md) which doesn't require to deploy certificates. diff --git a/windows/security/identity-protection/hello-for-business/hello-deployment-issues.md b/windows/security/identity-protection/hello-for-business/hello-deployment-issues.md index a1df8320f4..4f77b96763 100644 --- a/windows/security/identity-protection/hello-for-business/hello-deployment-issues.md +++ b/windows/security/identity-protection/hello-for-business/hello-deployment-issues.md @@ -1,7 +1,7 @@ --- title: Windows Hello for Business known deployment issues description: This article is a troubleshooting guide for known Windows Hello for Business deployment issues. -ms.date: 06/02/2023 +ms.date: 03/12/2024 ms.topic: troubleshooting --- @@ -17,7 +17,7 @@ PIN reset on Microsoft Entra joined devices uses a flow called *web sign-in* to The user can launch the PIN reset flow from the lock screen using the *I forgot my PIN* link in the PIN credential provider. Selecting the link launches a full screen UI for the PIN experience on Microsoft Entra join devices. Typically, the UI displays an Azure authentication page, where the user authenticates using Microsoft Entra credentials and completes MFA. -In federated environments, authentication may be configured to route to AD FS or a third-party identity provider. If the PIN reset flow is launched and attempts to navigate to a federated identity provider server page, it fails and displays the *We can't open that page right now* error, if the domain for the server page isn't included in an allowlist. +In federated environments, authentication may be configured to route to AD FS or a non-Microsoft identity provider. If the PIN reset flow is launched and attempts to navigate to a federated identity provider server page, it fails and displays the *We can't open that page right now* error, if the domain for the server page isn't included in an allowlist. If you're a customer of *Azure US Government* cloud, PIN reset also attempts to navigate to a domain that isn't included in the default allowlist. The result is the message *We can't open that page right now*. @@ -49,18 +49,18 @@ After the initial sign-in attempt, the user's Windows Hello for Business public To resolve the issue, update Windows Server 2016 and 2019 domain controllers with the latest patches. For Windows Server 2016, the behavior is fixed in build *14393.4104* ([KB4593226](https://support.microsoft.com/help/4593226)) and later. For Windows Server 2019, the behavior is fixed in build *17763.1637* ([KB4592440](https://support.microsoft.com/help/4592440)). -## Microsoft Entra joined device access to on-premises resources using key trust and third-party Certificate Authority (CA) +## Microsoft Entra joined device access to on-premises resources using key trust and non-Microsoft Certificate Authority (CA) Applies to: - Microsoft Entra joined key trust deployments -- Third-party certificate authority (CA) issuing domain controller certificates +- Non-Microsoft certificate authority (CA) issuing domain controller certificates -Windows Hello for Business uses smart-card based authentication for many operations. This type of authentication has special guidelines when using a third-party CA for certificate issuance, some of which apply to the domain controllers. Not all Windows Hello for Business deployment types require these configurations. Accessing on-premises resources from a Microsoft Entra joined device does require special configuration when using a third-party CA to issue domain controller certificates. +Windows Hello for Business uses smart-card based authentication for many operations. This type of authentication has special guidelines when using a non-Microsoft CA for certificate issuance, some of which apply to the domain controllers. Not all Windows Hello for Business deployment types require these configurations. Accessing on-premises resources from a Microsoft Entra joined device does require special configuration when using a non-Microsoft CA to issue domain controller certificates. -For more information, read [Guidelines for enabling smart card sign in with third-party certification authorities](/troubleshoot/windows-server/windows-security/enabling-smart-card-logon-third-party-certification-authorities). +For more information, read [Guidelines for enabling smart card sign in with non-Microsoft certification authorities](/troubleshoot/windows-server/windows-security/enabling-smart-card-logon-third-party-certification-authorities). -### Identify on-premises resource access issues with third party CAs +### Identify on-premises resource access issues with non-Microsoft CAs The issue can be identified using network traces or Kerberos logging from the client. In the network trace, the client fails to place a `TGS_REQ` request when a user attempts to access a resource. On the client, it can be observed in the Kerberos operation event log under `Application and Services/Microsoft/Windows/Security-Kerberos/Operational`. The logs are disabled by default. The failure event for this case includes the following information: @@ -80,7 +80,7 @@ Expected Domain Name: ad.contoso.com Error Code: 0xC000006D ``` -### Resolve on-premises resource access issue with third party CAs +### Resolve on-premises resource access issue with non-Microsoft CAs To resolve the issue, domain controller certificates must be updated so that the certificate subject contains the directory path of the server object (distinguished name). Example Subject: `CN=DC1,OU=Domain Controllers,DC=ad,DC=contoso,DC=com` diff --git a/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation.md b/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation.md index 2c3b021381..cfe9d5519f 100644 --- a/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation.md +++ b/windows/security/identity-protection/hello-for-business/hello-errors-during-pin-creation.md @@ -1,13 +1,16 @@ --- title: Windows Hello errors during PIN creation -description: When you set up Windows Hello, you may get an error during the Create a work PIN step. +description: Learn about the Windows Hello error codes that might happen during PIN creation. ms.topic: troubleshooting -ms.date: 01/26/2024 +ms.date: 03/12/2024 --- # Windows Hello errors during PIN creation -When you set up Windows Hello in Windows client, you may get an error during the **Create a PIN** step. This topic lists some of the error codes with recommendations for mitigating the problem. If you get an error code that is not listed here, contact Microsoft Support. +When you set up Windows Hello in Windows client, you might get an error during the **Create a PIN** step. This article lists some of the error codes with recommendations for mitigating the problem. + +> [!IMPORTANT] +> If you get an error code that isn't listed here, contact Microsoft Support. ## Where is the error code? @@ -19,72 +22,72 @@ The following image shows an example of an error during **Create a PIN**. When a user encounters an error when creating the work PIN, advise the user to try the following steps. Many errors can be mitigated by one of these steps. -1. Try to create the PIN again. Some errors are transient and resolve themselves. -2. Sign out, sign in, and try to create the PIN again. -3. Reboot the device and then try to create the PIN again. -4. Unjoin the device from Microsoft Entra ID, rejoin, and then try to create the PIN again. To unjoin a device, go to **Settings > System > About > Disconnect from organization**. +1. Try to create the PIN again. Some errors are transient and resolve themselves +1. Sign out, sign in, and try to create the PIN again +1. Reboot the device and then try to create the PIN again +1. Unjoin the device from Microsoft Entra ID, rejoin, and then try to create the PIN again. To unjoin a device, go to **Settings > System > About > Disconnect from organization** -If the error occurs again, check the error code against the following table to see if there is another mitigation for that error. When no mitigation is listed in the table, contact Microsoft Support for assistance. +If the error occurs again, check the error code against the following table to see if there's another mitigation for that error. When no mitigation is listed in the table, contact Microsoft Support for assistance. -| Hex | Cause | Mitigation | -| :--------- | :----------------------------------------------------------------- | :------------------------------------------ | -| 0x80090005 | NTE_BAD_DATA | Unjoin the device from Microsoft Entra ID and rejoin. | -| 0x8009000F | The container or key already exists. | Unjoin the device from Microsoft Entra ID and rejoin. | -| 0x80090011 | The container or key was not found. | Unjoin the device from Microsoft Entra ID and rejoin. | -| 0x80090029 | TPM is not set up. | Sign on with an administrator account. Select **Start**, type `tpm.msc`, and select **tpm.msc Microsoft Common Console Document**. In the **Actions** pane, select **Prepare the TPM**. | -| 0x8009002A | NTE_NO_MEMORY | Close programs which are taking up memory and try again. | -| 0x80090031 | NTE_AUTHENTICATION_IGNORED | Reboot the device. If the error occurs again after rebooting, [reset the TPM](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd851452(v=ws.11)) or run [Clear-TPM](/powershell/module/trustedplatformmodule/clear-tpm). | -| 0x80090035 | Policy requires TPM and the device does not have TPM. | Change the Windows Hello for Business policy to not require a TPM. | -| 0x80090036 | User canceled an interactive dialog. | User will be asked to try again. | -| 0x801C0003 | User is not authorized to enroll. | Check if the user has permission to perform the operation​. | -| 0x801C000E | Registration quota reached. | Unjoin some other device that is currently joined using the same account or [increase the maximum number of devices per user](/azure/active-directory/devices/device-management-azure-portal). | -| 0x801C000F | Operation successful, but the device requires a reboot. | Reboot the device. | -| 0x801C0010 | The AIK certificate is not valid or trusted. | Sign out and then sign in again. | -| 0x801C0011 | The attestation statement of the transport key is invalid. | Sign out and then sign in again. | -| 0x801C0012 | Discovery request is not in a valid format. | Sign out and then sign in again. | +| Hex | Cause | Mitigation | +|:-|:-|:-| +| 0x80090005 | NTE_BAD_DATA | Unjoin the device from Microsoft Entra ID and rejoin. | +| 0x8009000F | The container or key already exists. | Unjoin the device from Microsoft Entra ID and rejoin. | +| 0x80090011 | The container or key wasn't found. | Unjoin the device from Microsoft Entra ID and rejoin. | +| 0x80090029 | TPM isn't set up. | Sign on with an administrator account. Select **Start**, type `tpm.msc`, and select **tpm.msc Microsoft Common Console Document**. In the **Actions** pane, select **Prepare the TPM**. | +| 0x8009002A | NTE_NO_MEMORY | Close programs, which are taking up memory and try again. | +| 0x80090031 | NTE_AUTHENTICATION_IGNORED | Reboot the device. If the error occurs again after rebooting, [reset the TPM](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd851452(v=ws.11)) or run [Clear-TPM](/powershell/module/trustedplatformmodule/clear-tpm). | +| 0x80090035 | Policy requires TPM and the device doesn't have TPM. | Change the Windows Hello for Business policy to not require a TPM. | +| 0x80090036 | User canceled an interactive dialog. | User is asked to try again. | +| 0x801C0003 | User isn't authorized to enroll. | Check if the user has permission to perform the operation​. | +| 0x801C000E | Registration quota reached. | Unjoin some other device that is currently joined using the same account or [increase the maximum number of devices per user](/azure/active-directory/devices/device-management-azure-portal). | +| 0x801C000F | Operation successful, but the device requires a reboot. | Reboot the device. | +| 0x801C0010 | The AIK certificate isn't valid or trusted. | Sign out and then sign in again. | +| 0x801C0011 | The attestation statement of the transport key is invalid. | Sign out and then sign in again. | +| 0x801C0012 | Discovery request isn't in a valid format. | Sign out and then sign in again. | | 0x801C0015 | The device is required to be joined to an Active Directory domain. | Join the device to an Active Directory domain. | -| 0x801C0016 | The federation provider configuration is empty | Go to http://clientconfig.microsoftonline-p.net/FPURL.xml and verify that the file is not empty. | -| 0x801C0017 | The federation provider domain is empty | Go to http://clientconfig.microsoftonline-p.net/FPURL.xml and verify that the FPDOMAINNAME element is not empty. | -| 0x801C0018 | The federation provider client configuration URL is empty | Go to http://clientconfig.microsoftonline-p.net/FPURL.xml and verify that the CLIENTCONFIG element contains a valid URL. | -| 0x801C03E9 | Server response message is invalid | Sign out and then sign in again. | -| 0x801C03EA | Server failed to authorize user or device. | Check if the token is valid and user has permission to register Windows Hello for Business keys. | -| 0x801C03EB | Server response http status is not valid | Sign out and then sign in again. | -| 0x801C03EC | Unhandled exception from server. | sign out and then sign in again. | -| 0x801C03ED | Multi-factor authentication is required for a 'ProvisionKey' operation, but was not performed.

    -or-

    Token was not found in the Authorization header.

    -or-

    Failed to read one or more objects.

    -or-

    The request sent to the server was invalid.

    -or-

    User does not have permissions to join to Microsoft Entra ID. | Sign out and then sign in again. If that doesn't resolve the issue, unjoin the device from Azure AD and rejoin.
    Allow user(s) to join to Microsoft Entra ID under Microsoft Entra Device settings. -| 0x801C03EE | Attestation failed. | Sign out and then sign in again. | -| 0x801C03EF | The AIK certificate is no longer valid. | Sign out and then sign in again. | -| 0x801C03F2 | Windows Hello key registration failed. | ERROR_BAD_DIRECTORY_REQUEST. Another object with the same value for property proxyAddresses already exists. To resolve the issue, refer to [Duplicate Attributes Prevent Dirsync](/office365/troubleshoot/administration/duplicate-attributes-prevent-dirsync). Also, if no sync conflict exists, please verify that the "Mail/Email address" in Microsoft Entra ID and the Primary SMTP address are the same in the proxy address. -| 0x801C044D | Authorization token does not contain device ID. | Unjoin the device from Microsoft Entra ID and rejoin. | -| | Unable to obtain user token. | Sign out and then sign in again. Check network and credentials. | -| 0x801C044E | Failed to receive user credentials input. | Sign out and then sign in again. | -| 0x801C0451 | User token switch account. | Delete the Web Account Manager token broker files located in `%LOCALAPPDATA%\Packages\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\AC\TokenBroker\Accounts\*.*\` and reboot.| -| 0xC00000BB | Your PIN or this option is temporarily unavailable. | The destination domain controller doesn't support the login method. Most often the KDC service doesn't have the proper certificate to support the login. Another common cause can be the client cannot verify the KDC certificate CRL. Use a different login method.| +| 0x801C0016 | The federation provider configuration is empty | Go to http://clientconfig.microsoftonline-p.net/FPURL.xml and verify that the file isn't empty. | +| 0x801C0017 | The federation provider domain is empty | Go to http://clientconfig.microsoftonline-p.net/FPURL.xml and verify that the FPDOMAINNAME element isn't empty. | +| 0x801C0018 | The federation provider client configuration URL is empty | Go to http://clientconfig.microsoftonline-p.net/FPURL.xml and verify that the CLIENTCONFIG element contains a valid URL. | +| 0x801C03E9 | Server response message is invalid | Sign out and then sign in again. | +| 0x801C03EA | Server failed to authorize user or device. | Check if the token is valid and user has permission to register Windows Hello for Business keys. | +| 0x801C03EB | Server response http status isn't valid | Sign out and then sign in again. | +| 0x801C03EC | Unhandled exception from server. | sign out and then sign in again. | +| 0x801C03ED | Multi-factor authentication is required for a 'ProvisionKey' operation, but wasn't performed.

    -or-

    Token wasn't found in the Authorization header.

    -or-

    Failed to read one or more objects.

    -or-

    The request sent to the server was invalid.

    -or-

    User doesn't have permissions to join to Microsoft Entra ID. | Sign out and then sign in again. If that doesn't resolve the issue, unjoin the device from Azure AD and rejoin.
    Allow user(s) to join to Microsoft Entra ID under Microsoft Entra Device settings. | +| 0x801C03EE | Attestation failed. | Sign out and then sign in again. | +| 0x801C03EF | The AIK certificate is no longer valid. | Sign out and then sign in again. | +| 0x801C03F2 | Windows Hello key registration failed. | ERROR_BAD_DIRECTORY_REQUEST. Another object with the same value for property proxyAddresses already exists. To resolve the issue, refer to [Duplicate Attributes Prevent Dirsync](/office365/troubleshoot/administration/duplicate-attributes-prevent-dirsync). Also, if no sync conflict exists, please verify that the "Mail/Email address" in Microsoft Entra ID and the Primary SMTP address are the same in the proxy address. | +| 0x801C044D | Authorization token doesn't contain device ID. | Unjoin the device from Microsoft Entra ID and rejoin. | +| | Unable to obtain user token. | Sign out and then sign in again. Check network and credentials. | +| 0x801C044E | Failed to receive user credentials input. | Sign out and then sign in again. | +| 0x801C0451 | User token switch account. | Delete the Web Account Manager token broker files located in `%LOCALAPPDATA%\Packages\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\AC\TokenBroker\Accounts\*.*\` and reboot. | +| 0xC00000BB | Your PIN or this option is temporarily unavailable. | The destination domain controller doesn't support the login method. Most often the KDC service doesn't have the proper certificate to support the login. Another common cause can be the client cannot verify the KDC certificate CRL. Use a different login method. | ## Errors with unknown mitigation For errors listed in this table, contact Microsoft Support for assistance. -| Hex | Cause | -|-------------|---------| -| 0x80070057 | Invalid parameter or argument is passed. | -| 0X80072F0C | Unknown | -| 0x80072F8F | A mismatch happens between the system's clock and the activation server's clock when attempting to activate Windows.| -| 0x80090010 | NTE_PERM | -| 0x80090020 | NTE_FAIL | -| 0x80090027 | Caller provided a wrong parameter. If third-party code receives this error, they must change their code. | -| 0x8009002D | NTE_INTERNAL_ERROR | -| 0x801C0001 | ADRS server response is not in a valid format. | -| 0x801C0002 | Server failed to authenticate the user. | -| 0x801C0006 | Unhandled exception from server. | -| 0x801C000B | Redirection is needed and redirected location is not a well known server. | -| 0x801C000C | Discovery failed. | -| 0x801C0013 | Tenant ID is not found in the token. | -| 0x801C0014 | User SID is not found in the token. | -| 0x801C0019 | ​The federation provider client configuration is empty | -| 0x801C001A | The DRS endpoint in the federation provider client configuration is empty. | -| 0x801C001B | ​The device certificate is not found. | -| 0x801C03F0 | ​There is no key registered for the user. | -| 0x801C03F1 | ​There is no UPN in the token. | -| ​0x801C044C | There is no core window for the current thread. | -| 0x801c004D | DSREG_NO_DEFAULT_ACCOUNT: NGC provisioning is unable to find the default WAM account to use to request Microsoft Entra token for provisioning. Unable to enroll a device to use a PIN for login. | -| 0xCAA30193 | HTTP 403 Request Forbidden: it means request left the device, however either Server, proxy or firewall generated this response. | +| Hex | Cause | +|--|--| +| 0x80070057 | Invalid parameter or argument is passed. | +| 0X80072F0C | Unknown | +| 0x80072F8F | A mismatch happens between the system's clock and the activation server's clock when attempting to activate Windows. | +| 0x80090010 | NTE_PERM | +| 0x80090020 | NTE_FAIL | +| 0x80090027 | Caller provided a wrong parameter. If non-Microsoft code receives this error, they must change their code. | +| 0x8009002D | NTE_INTERNAL_ERROR | +| 0x801C0001 | ADRS server response isn't in a valid format. | +| 0x801C0002 | Server failed to authenticate the user. | +| 0x801C0006 | Unhandled exception from server. | +| 0x801C000B | Redirection is needed and redirected location isn't a well known server. | +| 0x801C000C | Discovery failed. | +| 0x801C0013 | Tenant ID isn't found in the token. | +| 0x801C0014 | User SID isn't found in the token. | +| 0x801C0019 | ​The federation provider client configuration is empty | +| 0x801C001A | The DRS endpoint in the federation provider client configuration is empty. | +| 0x801C001B | ​The device certificate isn't found. | +| 0x801C03F0 | ​There's no key registered for the user. | +| 0x801C03F1 | ​There's no UPN in the token. | +| ​0x801C044C | There's no core window for the current thread. | +| 0x801c004D | DSREG_NO_DEFAULT_ACCOUNT: NGC provisioning is unable to find the default WAM account to use to request Microsoft Entra token for provisioning. Unable to enroll a device to use a PIN for login. | +| 0xCAA30193 | HTTP 403 Request Forbidden: it means request left the device, however either Server, proxy or firewall generated this response. | diff --git a/windows/security/identity-protection/hello-for-business/hello-feature-dynamic-lock.md b/windows/security/identity-protection/hello-for-business/hello-feature-dynamic-lock.md index 28401253c2..5fe562311d 100644 --- a/windows/security/identity-protection/hello-for-business/hello-feature-dynamic-lock.md +++ b/windows/security/identity-protection/hello-for-business/hello-feature-dynamic-lock.md @@ -1,7 +1,7 @@ --- title: Dynamic lock description: Learn how to configure dynamic lock on Windows devices via group policies. This feature locks a device when a Bluetooth signal falls below a set value. -ms.date: 03/10/2023 +ms.date: 02/29/2024 ms.topic: how-to --- @@ -16,21 +16,21 @@ You can configure Windows devices to use the **dynamic lock** using a Group Poli 1. Using the Group Policy Management Console (GPMC), scope a domain-based Group Policy to computer accounts in Active Directory. 1. Edit the Group Policy object from Step 1. -1. Enable the **Configure dynamic lock factors** policy setting located under **Computer Configuration > Administrative Templates > Windows Components > Windows Hello for Business**. +1. Enable the **Configure dynamic lock factors** policy setting located under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Hello for Business**. 1. Close the Group Policy Management Editor to save the Group Policy object. The Group Policy Editor, when the policy is enabled, creates a default signal rule policy with the following value: ```xml - + ``` >[!IMPORTANT] >Microsoft recommends using the default values for this policy settings. Measurements are relative based on the varying conditions of each environment. Therefore, the same values may produce different results. Test policy settings in each environment prior to broadly deploying the setting. -For this policy setting, the **type** and **scenario** attribute values are static and can't change. The **classofDevice** is configurable but Phone is the only currently supported configuration. The attribute defaults to Phone and uses the values from the following table: +For this policy setting, the `type` and `scenario` attribute values are static and can't change. The `classofDevice` is configurable but Phone is the only currently supported configuration. The attribute defaults to Phone and uses the values from the following table: |Description|Value| |:-------------|:-------:| @@ -46,6 +46,6 @@ For this policy setting, the **type** and **scenario** attribute values are stat |Health|2304| |Uncategorized|7936| -The **rssiMin** attribute value signal indicates the strength needed for the device to be considered *in-range*. The default value of **-10** enables a user to move about an average size office or cubicle without triggering Windows to lock the device. The **rssiMaxDelta** has a default value of **-10**, which instruct Windows to lock the device once the signal strength weakens by more than measurement of 10. +The `rssiMin` attribute value signal indicates the strength needed for the device to be considered *in-range*. The default value of `-10` enables a user to move about an average size office or cubicle without triggering Windows to lock the device. The `rssiMaxDelta` has a default value of `-10`, which instruct Windows to lock the device once the signal strength weakens by more than measurement of 10. RSSI measurements are relative and lower as the bluetooth signals between the two paired devices reduces. Therefore a measurement of 0 is stronger than -10, which is stronger than -60, which is an indicator the devices are moving further apart from each other. diff --git a/windows/security/identity-protection/hello-for-business/how-it-works-provisioning.md b/windows/security/identity-protection/hello-for-business/how-it-works-provisioning.md index 9c6ef249eb..ad4a07825a 100644 --- a/windows/security/identity-protection/hello-for-business/how-it-works-provisioning.md +++ b/windows/security/identity-protection/hello-for-business/how-it-works-provisioning.md @@ -1,6 +1,6 @@ --- title: How Windows Hello for Business provisioning works -description: Explore the provisioning flows for Windows Hello for Business, from within a variety of environments. +description: Learn about the provisioning flows for Windows Hello for Business. ms.date: 01/03/2024 ms.topic: reference appliesto: @@ -8,7 +8,7 @@ appliesto: # How Windows Hello for Business provisioning works -Windows Hello for Business provisioning enables a user to enroll a new, strong, two-factor credential that they can use for passwordless authentication. Provisioning experience vary based on: +Windows Hello for Business provisioning enables a user to enroll a new, strong, two-factor credential that they can use for passwordless authentication. Provisioning experience vary based on: - How the device is joined to Microsoft Entra ID - The Windows Hello for Business deployment type @@ -23,8 +23,8 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | Phase | Description | |:-:|:-| -| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service provides the second factor of authentication. If the user has performed Microsoft Entra multifactor authentication within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they aren't prompted for MFA because the current MFA remains valid.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | -| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | +| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service provides the second factor of authentication. If the user has performed Microsoft Entra multifactor authentication within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they aren't prompted for MFA because the current MFA remains valid.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | +| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | | C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Microsoft Entra ID, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Microsoft Entra ID returns a key ID to the application, which signals the end of user provisioning and the application exits. | ## Provisioning for Microsoft Entra joined devices with federated authentication @@ -33,9 +33,9 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | Phase | Description | |:-:|:-| -| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    In a federated environment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service provides the second factor of authentication. If the user has performed Microsoft Entra multifactor authentication within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they aren't prompted for MFA because the current MFA remains valid.
    The on-premises STS server issues an enterprise token on successful MFA. The application sends the token to Microsoft Entra ID.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | -| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | -| C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates MFA claim remains current. On successful validation, Azure DRS locates the user's object in Microsoft Entra ID, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Microsoft Entra ID returns key ID to the application, which signals the end of user provisioning and the application exits. | +| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    In a federated environment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service provides the second factor of authentication. If the user has performed Microsoft Entra multifactor authentication within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they aren't prompted for MFA because the current MFA remains valid.
    The on-premises STS server issues an enterprise token on successful MFA. The application sends the token to Microsoft Entra ID.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | +| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | +| C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates MFA claim remains current. On successful validation, Azure DRS locates the user's object in Microsoft Entra ID, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Microsoft Entra ID returns key ID to the application, which signals the end of user provisioning and the application exits. | ## Provisioning in a cloud Kerberos trust deployment model with managed authentication @@ -43,9 +43,9 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | Phase | Description | |:-:|:-| -| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service provides the second factor of authentication. If the user has performed Microsoft Entra multifactor authentication within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they aren't prompted for MFA because the current MFA remains valid.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | -| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | -| C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Microsoft Entra ID, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Microsoft Entra ID returns a key ID to the application, which signals the end of user provisioning and the application exits. | +| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service provides the second factor of authentication. If the user has performed Microsoft Entra multifactor authentication within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they aren't prompted for MFA because the current MFA remains valid.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | +| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | +| C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Microsoft Entra ID, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Microsoft Entra ID returns a key ID to the application, which signals the end of user provisioning and the application exits. | > [!NOTE] > Windows Hello for Business cloud Kerberos trust does not require users' keys to be synced from Microsoft Entra ID to Active Directory. Users can immediately authenticate to Microsoft Entra ID and AD after provisioning their credential. @@ -56,9 +56,9 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | Phase | Description | |:-:|:-| -| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service provides the second factor of authentication. If the user has performed Microsoft Entra multifactor authentication within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they aren't prompted for MFA because the current MFA remains valid.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | -| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | -| C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Microsoft Entra ID, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Microsoft Entra ID returns a key ID to the application, which signals the end of user provisioning and the application exits. | +| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service provides the second factor of authentication. If the user has performed Microsoft Entra multifactor authentication within the last 10 minutes, such as when registering the device from the out-of-box-experience (OOBE), then they aren't prompted for MFA because the current MFA remains valid.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | +| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | +| C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Microsoft Entra ID, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Microsoft Entra ID returns a key ID to the application, which signals the end of user provisioning and the application exits. | | D | Microsoft Entra Connect requests updates on its next synchronization cycle. Microsoft Entra ID sends the user's public key that was securely registered through provisioning. Microsoft Entra Connect receives the public key and writes it to user's `msDS-KeyCredentialLink` attribute in Active Directory. | > [!IMPORTANT] @@ -70,16 +70,16 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | Phase | Description | |:-|:-| -| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    In a federated environment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service (or a third party MFA service) provides the second factor of authentication.
    The on-premises STS server issues an enterprise token on successful MFA. The application sends the token to Microsoft Entra ID.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | -| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | -| C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Microsoft Entra ID, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Microsoft Entra ID returns a key ID and a key receipt to the application, which represents the end of user key registration. | -| D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
    The application sends the key receipt and certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
    After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentialsLink for a list of registered public keys. | +| A | The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Azure Device Registration Service (ADRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    In a federated environment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. The Microsoft Entra multifactor authentication service (or a non-Microsoft MFA service) provides the second factor of authentication.
    The on-premises STS server issues an enterprise token on successful MFA. The application sends the token to Microsoft Entra ID.
    Microsoft Entra ID validates the access token request and the MFA claim associated with it, creates an ADRS access token, and returns it to the application. | +| B | After receiving an ADRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv). | +| C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates the MFA claim remains current. On successful validation, Azure DRS locates the user's object in Microsoft Entra ID, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Microsoft Entra ID returns a key ID and a key receipt to the application, which represents the end of user key registration. | +| D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
    The application sends the key receipt and certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
    After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentialsLink for a list of registered public keys. | | E | The registration authority validates the public key in the certificate request matches a registered key for the user.
    If the public key in the certificate isn't found in the list of registered public keys, it then validates the key receipt to confirm the key was securely registered with Azure.
    After validating the key receipt or public key, the registration authority signs the certificate request using its enrollment agent certificate. | | F | The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application. | -| G | The application receives the newly issued certificate and installs it into the Personal store of the user. This signals the end of provisioning. | +| G | The application receives the newly issued certificate and installs it into the Personal store of the user. This signals the end of provisioning. | > [!IMPORTANT] -> Synchronous certificate enrollment doesn't depend on Microsoft Entra Connect to synchronize the user's public key to issue the Windows Hello for Business authentication certificate. Users can sign-in using the certificate immediately after provisioning completes. Microsoft Entra Connect continues to synchronize the public key to Active Directory, but is not shown in this flow. +> Synchronous certificate enrollment doesn't depend on Microsoft Entra Connect to synchronize the user's public key to issue the Windows Hello for Business authentication certificate. Users can sign-in using the certificate immediately after provisioning completes. Microsoft Entra Connect continues to synchronize the public key to Active Directory, but is not shown in this flow. ## Provisioning in an on-premises key trust deployment model @@ -87,9 +87,9 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | Phase | Description | | :----: | :----------- | -|A| The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Enterprise Device Registration Service (EDRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    In an on-premises deployment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. Microsoft Entra multifactor authentication server (or a third party MFA service) provides the second factor of authentication.
    The on-premises STS server issues an enterprise DRS token on successful MFA.| -| B| After receiving an EDRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv).| -|C | The application sends the EDRS token, ukpub, attestation data, and device information to the Enterprise DRS for user key registration. Enterprise DRS validates the MFA claim remains current. On successful validation, the Enterprise DRS locates the user's object in Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. The Enterprise DRS returns a key ID to the application, which represents the end of user key registration.| +|A| The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Enterprise Device Registration Service (EDRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    In an on-premises deployment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. Microsoft Entra multifactor authentication server (or a non-Microsoft MFA service) provides the second factor of authentication.
    The on-premises STS server issues an enterprise DRS token on successful MFA.| +| B| After receiving an EDRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv).| +|C | The application sends the EDRS token, ukpub, attestation data, and device information to the Enterprise DRS for user key registration. Enterprise DRS validates the MFA claim remains current. On successful validation, the Enterprise DRS locates the user's object in Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. The Enterprise DRS returns a key ID to the application, which represents the end of user key registration.| ## Provisioning in an on-premises certificate trust deployment model @@ -97,10 +97,10 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong, | Phase | Description | | :----: | :----------- | -|A| The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Enterprise Device Registration Service (EDRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    In an on-premises deployment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. Microsoft Entra multifactor authentication server (or a third party MFA service) provides the second factor of authentication.
    The on-premises STS server issues an enterprise DRS token on successful MFA.| -| B| After receiving an EDRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv).| -|C | The application sends the EDRS token, ukpub, attestation data, and device information to the Enterprise DRS for user key registration. Enterprise DRS validates the MFA claim remains current. On successful validation, the Enterprise DRS locates the user's object in Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. The Enterprise DRS returns a key ID to the application, which represents the end of user key registration.| -|D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
    The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
    After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentialsLink for a list of registered public keys.| +|A| The provisioning application hosted in the Cloud Experience Host (CXH) starts provisioning by requesting an access token for the Enterprise Device Registration Service (EDRS). The application makes the request using the Microsoft Entra Web Account Manager plug-in.
    In an on-premises deployment, the plug-in sends the token request to the on-premises STS, such as Active Directory Federation Services. The on-premises STS authenticates the user and determines if the user should perform another factor of authentication.
    Users must provide two factors of authentication. In this phase, the user has already provided one factor of authentication, typically user name and password. Microsoft Entra multifactor authentication server (or a non-Microsoft MFA service) provides the second factor of authentication.
    The on-premises STS server issues an enterprise DRS token on successful MFA.| +| B| After receiving an EDRS access token, the application detects if the device has a Windows Hello biometric compatible sensor. If the application detects a biometric sensor, it gives the user the choice to enroll biometrics. After completing or skipping biometric enrollment, the application requires the user to create a PIN and the default (and fall-back gesture when used with biometrics). The user provides and confirms their PIN. Next, the application requests a Windows Hello for Business key pair from the key pregeneration pool, which includes attestation data. This is the user key (ukpub/ukpriv).| +|C | The application sends the EDRS token, ukpub, attestation data, and device information to the Enterprise DRS for user key registration. Enterprise DRS validates the MFA claim remains current. On successful validation, the Enterprise DRS locates the user's object in Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. The Enterprise DRS returns a key ID to the application, which represents the end of user key registration.| +|D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.
    The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.
    After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentialsLink for a list of registered public keys.| |E | The registration authority validates the public key in the certificate request matches a registered key for the user.
    After validating the public key, the registration authority signs the certificate request using its enrollment agent certificate.| |F |The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application.| -|G | The application receives the newly issued certificate and installs it into the Personal store of the user. This signals the end of provisioning.| +|G | The application receives the newly issued certificate and installs it into the Personal store of the user. This signals the end of provisioning.| diff --git a/windows/security/identity-protection/hello-for-business/how-it-works.md b/windows/security/identity-protection/hello-for-business/how-it-works.md index 87250d1fa9..fb493c8800 100644 --- a/windows/security/identity-protection/hello-for-business/how-it-works.md +++ b/windows/security/identity-protection/hello-for-business/how-it-works.md @@ -96,7 +96,16 @@ For detailed sequence diagrams, see [how device registration works][ENTRA-4]. :::row-end::: > [!NOTE] -> The list of prerequisites varies depending on the deployment type, as described in the article [Plan a Windows Hello for Business deployment](deploy/index.md). +> +> Depending on the deployment type, Windows Hello for Business provisioning is launched only if: +> +> - The device meets the Windows Hello hardware requirements +> - The device is joined to Active Directory or Microsoft Entra ID +> - The user signs in with an account defined in Active Directory or Microsoft Entra ID +> - The Windows Hello for Business policy is enabled +> - The user is not connected to the machine via Remote Desktop +> +> Additional prerequisites for specific deployment types are described in the article [Plan a Windows Hello for Business deployment](deploy/index.md). During the provisioning phase, a *Windows Hello container* is created. A Windows Hello container is a logical grouping of *key material*, or data. The container holds organization's credentials only on devices that are *registered* with the organization's IdP. diff --git a/windows/security/identity-protection/hello-for-business/images/fingerprint.svg b/windows/security/identity-protection/hello-for-business/images/fingerprint.svg index e2b816716a..2494d65659 100644 --- a/windows/security/identity-protection/hello-for-business/images/fingerprint.svg +++ b/windows/security/identity-protection/hello-for-business/images/fingerprint.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/hello-for-business/images/hello.svg b/windows/security/identity-protection/hello-for-business/images/hello.svg index 5601c82127..a4fa1ca0df 100644 --- a/windows/security/identity-protection/hello-for-business/images/hello.svg +++ b/windows/security/identity-protection/hello-for-business/images/hello.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/hello-for-business/images/iris.svg b/windows/security/identity-protection/hello-for-business/images/iris.svg index 871cac50d5..465902e0b3 100644 --- a/windows/security/identity-protection/hello-for-business/images/iris.svg +++ b/windows/security/identity-protection/hello-for-business/images/iris.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/hello-for-business/images/pin.svg b/windows/security/identity-protection/hello-for-business/images/pin.svg index a34b2fa5db..a5bfdc4148 100644 --- a/windows/security/identity-protection/hello-for-business/images/pin.svg +++ b/windows/security/identity-protection/hello-for-business/images/pin.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/hello-for-business/images/smartcard.svg b/windows/security/identity-protection/hello-for-business/images/smartcard.svg index c9d40368b5..d1924ffebb 100644 --- a/windows/security/identity-protection/hello-for-business/images/smartcard.svg +++ b/windows/security/identity-protection/hello-for-business/images/smartcard.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/hello-for-business/includes/allow-enumeration-of-emulated-smart-card-for-all-users.md b/windows/security/identity-protection/hello-for-business/includes/allow-enumeration-of-emulated-smart-card-for-all-users.md index 9157046e94..52db564aea 100644 --- a/windows/security/identity-protection/hello-for-business/includes/allow-enumeration-of-emulated-smart-card-for-all-users.md +++ b/windows/security/identity-protection/hello-for-business/includes/allow-enumeration-of-emulated-smart-card-for-all-users.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/configure-device-unlock-factors.md b/windows/security/identity-protection/hello-for-business/includes/configure-device-unlock-factors.md index 23a614db9d..47e1022638 100644 --- a/windows/security/identity-protection/hello-for-business/includes/configure-device-unlock-factors.md +++ b/windows/security/identity-protection/hello-for-business/includes/configure-device-unlock-factors.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/configure-dynamic-lock-factors.md b/windows/security/identity-protection/hello-for-business/includes/configure-dynamic-lock-factors.md index 4cd7b376f1..1b5068c34f 100644 --- a/windows/security/identity-protection/hello-for-business/includes/configure-dynamic-lock-factors.md +++ b/windows/security/identity-protection/hello-for-business/includes/configure-dynamic-lock-factors.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/configure-enhanced-anti-spoofing.md b/windows/security/identity-protection/hello-for-business/includes/configure-enhanced-anti-spoofing.md index 057da41f74..5256533b74 100644 --- a/windows/security/identity-protection/hello-for-business/includes/configure-enhanced-anti-spoofing.md +++ b/windows/security/identity-protection/hello-for-business/includes/configure-enhanced-anti-spoofing.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/enable-ess-with-supported-peripherals.md b/windows/security/identity-protection/hello-for-business/includes/enable-ess-with-supported-peripherals.md index d5308cbb87..95e830989d 100644 --- a/windows/security/identity-protection/hello-for-business/includes/enable-ess-with-supported-peripherals.md +++ b/windows/security/identity-protection/hello-for-business/includes/enable-ess-with-supported-peripherals.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/expiration.md b/windows/security/identity-protection/hello-for-business/includes/expiration.md index 6d5e71de6c..f73356aa04 100644 --- a/windows/security/identity-protection/hello-for-business/includes/expiration.md +++ b/windows/security/identity-protection/hello-for-business/includes/expiration.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/history.md b/windows/security/identity-protection/hello-for-business/includes/history.md index f172d6e9f6..3aad27181a 100644 --- a/windows/security/identity-protection/hello-for-business/includes/history.md +++ b/windows/security/identity-protection/hello-for-business/includes/history.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/maximum-pin-length.md b/windows/security/identity-protection/hello-for-business/includes/maximum-pin-length.md index 9ab86cb5f7..552a814af0 100644 --- a/windows/security/identity-protection/hello-for-business/includes/maximum-pin-length.md +++ b/windows/security/identity-protection/hello-for-business/includes/maximum-pin-length.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/minimum-pin-length.md b/windows/security/identity-protection/hello-for-business/includes/minimum-pin-length.md index ba9b806c2b..6af211532d 100644 --- a/windows/security/identity-protection/hello-for-business/includes/minimum-pin-length.md +++ b/windows/security/identity-protection/hello-for-business/includes/minimum-pin-length.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/require-digits.md b/windows/security/identity-protection/hello-for-business/includes/require-digits.md index e2ca5a2621..148606301d 100644 --- a/windows/security/identity-protection/hello-for-business/includes/require-digits.md +++ b/windows/security/identity-protection/hello-for-business/includes/require-digits.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/require-lowercase-letters.md b/windows/security/identity-protection/hello-for-business/includes/require-lowercase-letters.md index b84ed743ee..6548a94ede 100644 --- a/windows/security/identity-protection/hello-for-business/includes/require-lowercase-letters.md +++ b/windows/security/identity-protection/hello-for-business/includes/require-lowercase-letters.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/require-special-characters.md b/windows/security/identity-protection/hello-for-business/includes/require-special-characters.md index deeb7f56e4..944b7caa4f 100644 --- a/windows/security/identity-protection/hello-for-business/includes/require-special-characters.md +++ b/windows/security/identity-protection/hello-for-business/includes/require-special-characters.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/require-uppercase-letters.md b/windows/security/identity-protection/hello-for-business/includes/require-uppercase-letters.md index b90cda9fa3..cd988bb6f7 100644 --- a/windows/security/identity-protection/hello-for-business/includes/require-uppercase-letters.md +++ b/windows/security/identity-protection/hello-for-business/includes/require-uppercase-letters.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/turn-off-smart-card-emulation.md b/windows/security/identity-protection/hello-for-business/includes/turn-off-smart-card-emulation.md index 502e1d18f1..8491027950 100644 --- a/windows/security/identity-protection/hello-for-business/includes/turn-off-smart-card-emulation.md +++ b/windows/security/identity-protection/hello-for-business/includes/turn-off-smart-card-emulation.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/use-a-hardware-security-device.md b/windows/security/identity-protection/hello-for-business/includes/use-a-hardware-security-device.md index 3dfb45f8ba..018d2f1834 100644 --- a/windows/security/identity-protection/hello-for-business/includes/use-a-hardware-security-device.md +++ b/windows/security/identity-protection/hello-for-business/includes/use-a-hardware-security-device.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/use-biometrics.md b/windows/security/identity-protection/hello-for-business/includes/use-biometrics.md index 761017763f..e21ef5fc23 100644 --- a/windows/security/identity-protection/hello-for-business/includes/use-biometrics.md +++ b/windows/security/identity-protection/hello-for-business/includes/use-biometrics.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/use-certificate-for-on-premises-authentication.md b/windows/security/identity-protection/hello-for-business/includes/use-certificate-for-on-premises-authentication.md index 78c1064fbe..4b7546777c 100644 --- a/windows/security/identity-protection/hello-for-business/includes/use-certificate-for-on-premises-authentication.md +++ b/windows/security/identity-protection/hello-for-business/includes/use-certificate-for-on-premises-authentication.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/use-cloud-trust-for-on-premises-authentication.md b/windows/security/identity-protection/hello-for-business/includes/use-cloud-trust-for-on-premises-authentication.md index 77b3878741..03e75dd008 100644 --- a/windows/security/identity-protection/hello-for-business/includes/use-cloud-trust-for-on-premises-authentication.md +++ b/windows/security/identity-protection/hello-for-business/includes/use-cloud-trust-for-on-premises-authentication.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/use-pin-recovery.md b/windows/security/identity-protection/hello-for-business/includes/use-pin-recovery.md index 8f28f8f8d1..fad4f27fef 100644 --- a/windows/security/identity-protection/hello-for-business/includes/use-pin-recovery.md +++ b/windows/security/identity-protection/hello-for-business/includes/use-pin-recovery.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/use-windows-hello-for-business-certificates-as-smart-card-certificates.md b/windows/security/identity-protection/hello-for-business/includes/use-windows-hello-for-business-certificates-as-smart-card-certificates.md index 2d3b0707f3..d57a3d459a 100644 --- a/windows/security/identity-protection/hello-for-business/includes/use-windows-hello-for-business-certificates-as-smart-card-certificates.md +++ b/windows/security/identity-protection/hello-for-business/includes/use-windows-hello-for-business-certificates-as-smart-card-certificates.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- diff --git a/windows/security/identity-protection/hello-for-business/includes/use-windows-hello-for-business.md b/windows/security/identity-protection/hello-for-business/includes/use-windows-hello-for-business.md index 9278bcd9ef..d850382fae 100644 --- a/windows/security/identity-protection/hello-for-business/includes/use-windows-hello-for-business.md +++ b/windows/security/identity-protection/hello-for-business/includes/use-windows-hello-for-business.md @@ -1,7 +1,7 @@ --- author: paolomatarazzo ms.author: paoloma -ms.date: 01/03/2024 +ms.date: 03/12/2024 ms.topic: include --- @@ -11,7 +11,7 @@ ms.topic: include - If you disable this policy setting, the device doesn't provision Windows Hello for Business for any user - If you don't configure this policy setting, users can provision Windows Hello for Business -Select the option *Don't start Windows Hello provisioning after sign-in* when you use a third-party solution to provision Windows Hello for Business: +Select the option *Don't start Windows Hello provisioning after sign-in* when you use a non-Microsoft solution to provision Windows Hello for Business: - If you select *Don't start Windows Hello provisioning after sign-in*, Windows Hello for Business doesn't automatically start provisioning after the user has signed in - If you don't select *Don't start Windows Hello provisioning after sign-in*, Windows Hello for Business automatically starts provisioning after the user has signed in diff --git a/windows/security/identity-protection/hello-for-business/multifactor-unlock.md b/windows/security/identity-protection/hello-for-business/multifactor-unlock.md index 2662652a30..3980ef906c 100644 --- a/windows/security/identity-protection/hello-for-business/multifactor-unlock.md +++ b/windows/security/identity-protection/hello-for-business/multifactor-unlock.md @@ -31,7 +31,7 @@ The policy setting has three components: ## Configure unlock factors > [!CAUTION] -> When the [DontDisplayLastUserName](/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name) security policy is enabled, it is known to interfere with the ability to use multi factor unlock. +> When the [DontDisplayLastUserName](../../threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md) security policy is enabled, it is known to interfere with the ability to use multi factor unlock. The **First unlock factor credential providers** and **Second unlock factor credential providers** portion of the policy setting each contain a comma separated list of credential providers. @@ -39,13 +39,13 @@ Supported credential providers include: |Credential Provider| GUID| |:------------------|:----| -|PIN| `{D6886603-9D2F-4EB2-B667-1971041FA96B}`| +|PIN| `{D6886603-9D2F-4EB2-B667-1971041FA96B}`| |Fingerprint| `{BEC09223-B018-416D-A0AC-523971B639F5}`| |Facial Recognition| `{8AF662BF-65A0-4D0A-A540-A338A999D36F}`| |Trusted Signal
    (Phone proximity, Network location) | `{27FBDB57-B613-4AF2-9D7E-4FA7A66C21AD}`| > [!NOTE] -> Multifactor unlock does not support third-party credential providers or credential providers not listed in the above table. +> Multifactor unlock does not support non-Microsoft credential providers or credential providers not listed in the above table. The default credential providers for the **First unlock factor credential provider** include: @@ -121,7 +121,7 @@ The **classofDevice** attribute defaults to Phone and uses the values from the f |Health|2304| |Uncategorized|7936| -The **rssiMin** attribute value signal indicates the strength needed for the device to be considered "in-range". The default value of **-10** enables a user to move about an average size office or cubicle without triggering Windows to lock the device. The **rssiMaxDelta** has a default value of **-10**, which instruct Windows to lock the device once the signal strength weakens by more than measurement of 10. +The **rssiMin** attribute value signal indicates the strength needed for the device to be considered "in-range". The default value of **-10** enables a user to move about an average size office or cubicle without triggering Windows to lock the device. The **rssiMaxDelta** has a default value of **-10**, which instruct Windows to lock the device once the signal strength weakens by more than measurement of 10. RSSI measurements are relative, and lower as the bluetooth signals between the two paired devices reduces. A measurement of 0 is stronger than -10. A measurement of -10 is stronger than -60, and indicates that the devices are moving further apart from each other. @@ -169,7 +169,7 @@ The IPv4 DNS server represented in Internet standard dotted-decimal notation. A ##### IPv6Prefix -The IPv6 network prefix represented in IPv6 network using Internet standard hexadecimal encoding. A network prefix in CIDR notation is required as part of the network string. A network port or scope ID must not be present in the network string. A **signal** element may only contain one **ipv6Prefix** element. For example: +The IPv6 network prefix represented in IPv6 network using Internet standard hexadecimal encoding. A network prefix in CIDR notation is required as part of the network string. A network port or scope ID must not be present in the network string. A **signal** element may only contain one **ipv6Prefix** element. For example: ```xml 21DA:D3::/48 @@ -243,7 +243,7 @@ Contains the type of security the client uses when connecting to the wireless ne For example: ```xml -WPA2-Enterprise +WPA2-Enterprise ``` #### TrustedRootCA @@ -273,13 +273,13 @@ For example: The following example configures an **IPConfig** signal type using **Ipv4Prefix**, **Ipv4DnsServer**, and **DnsSuffix** elements. ```xml - - + + 10.10.10.0/24 10.10.0.1 10.10.0.2 - corp.contoso.com - + corp.contoso.com + ``` @@ -291,10 +291,10 @@ The following example configures an **IpConfig** signal type using a **dnsSuffix >Separate each rule element using a comma. ```xml - - - corp.contoso.com - + + + corp.contoso.com + , @@ -310,7 +310,7 @@ The following example configures the same as example 2 using compounding `and` e corp.microsoft.com - + @@ -382,7 +382,7 @@ Alternatively, you can configure devices using a [custom policy][INT-1] with the --- >[!IMPORTANT] ->You should remove all third party credential providers to ensure users cannot unlock their devices if they do not have the required factors. The fall back options are to use passwords or smart cards (both of which could be disabled as needed). +>You should remove all non-Microsoft credential providers to ensure users cannot unlock their devices if they do not have the required factors. The fall back options are to use passwords or smart cards (both of which could be disabled as needed). ## User experience diff --git a/windows/security/identity-protection/hello-for-business/pin-reset.md b/windows/security/identity-protection/hello-for-business/pin-reset.md index 85a33cf10c..14caaa3144 100644 --- a/windows/security/identity-protection/hello-for-business/pin-reset.md +++ b/windows/security/identity-protection/hello-for-business/pin-reset.md @@ -179,7 +179,7 @@ The _PIN reset_ configuration can be viewed by running [**dsregcmd /status**](/a **Applies to:** Microsoft Entra joined devices PIN reset on Microsoft Entra joined devices uses a flow called *web sign-in* to authenticate users in the lock screen. Web sign-in only allows navigation to specific domains. If web sign-in attempts to navigate to a domain that isn't allowed, it displays a page with the error message: *We can't open that page right now*.\ -If you have a federated environment and authentication is handled using AD FS or a third-party identity provider, then you must configure your devices with a policy to allow a list of domains that can be reached during PIN reset flows. When set, it ensures that authentication pages from that identity provider can be used during Microsoft Entra joined PIN reset. +If you have a federated environment and authentication is handled using AD FS or a non-Microsoft identity provider, then you must configure your devices with a policy to allow a list of domains that can be reached during PIN reset flows. When set, it ensures that authentication pages from that identity provider can be used during Microsoft Entra joined PIN reset. [!INCLUDE [intune-settings-catalog-1](../../../../includes/configure/intune-settings-catalog-1.md)] diff --git a/windows/security/identity-protection/hello-for-business/rdp-sign-in.md b/windows/security/identity-protection/hello-for-business/rdp-sign-in.md index 6a84e6ea32..725c2d715d 100644 --- a/windows/security/identity-protection/hello-for-business/rdp-sign-in.md +++ b/windows/security/identity-protection/hello-for-business/rdp-sign-in.md @@ -197,9 +197,9 @@ Here are the steps to manually request a certificate using an Active Directory C --- -## Use third-party certification authorities +## Use non-Microsoft certification authorities -If you're using a non-Microsoft PKI, the certificate templates published to the on-premises Active Directory may not be available. For guidance with integration of Intune/SCEP with non-Microsoft PKI deployments, refer to [Use third-party certification authorities (CA) with SCEP in Microsoft Intune][MEM-6]. +If you're using a non-Microsoft PKI, the certificate templates published to the on-premises Active Directory may not be available. For guidance with integration of Intune/SCEP with non-Microsoft PKI deployments, refer to [Use non-Microsoft certification authorities (CA) with SCEP in Microsoft Intune][MEM-6]. As an alternative to using SCEP, or if none of the previously covered solutions work in your environment, you can manually generate Certificate Signing Requests (CSR) for submission to your PKI. To assist with this approach, you can use the [Generate-CertificateRequest][HTTP-1] PowerShell commandlet. diff --git a/windows/security/identity-protection/hello-for-business/toc.yml b/windows/security/identity-protection/hello-for-business/toc.yml index d328574c69..946281222c 100644 --- a/windows/security/identity-protection/hello-for-business/toc.yml +++ b/windows/security/identity-protection/hello-for-business/toc.yml @@ -3,7 +3,7 @@ items: href: index.md - name: How Windows Hello for Business works items: - - name: Core concepts + - name: Core concepts href: how-it-works.md - name: How device registration works 🔗 href: /entra/identity/devices/device-registration-how-it-works @@ -15,12 +15,12 @@ items: href: configure.md - name: Deployment guides href: deploy/toc.yml -- name: How-to-guides +- name: How-to guides items: - name: Configure PIN reset href: pin-reset.md - name: Configure dual enrollment - href: hello-feature-dual-enrollment.md + href: hello-feature-dual-enrollment.md - name: Configure dynamic lock href: hello-feature-dynamic-lock.md - name: Configure multi-factor unlock @@ -42,4 +42,4 @@ items: - name: Windows Hello Enhanced Security Sign-in (ESS) 🔗 href: /windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security - name: Frequently Asked Questions (FAQ) - href: faq.yml + href: faq.yml diff --git a/windows/security/identity-protection/index.md b/windows/security/identity-protection/index.md index c624632fcc..b9dc9037e7 100644 --- a/windows/security/identity-protection/index.md +++ b/windows/security/identity-protection/index.md @@ -2,7 +2,7 @@ title: Windows identity protection description: Learn more about identity protection technologies in Windows. ms.topic: overview -ms.date: 07/27/2023 +ms.date: 03/12/2024 --- # Windows identity protection diff --git a/windows/security/identity-protection/passkeys/images/laptop.svg b/windows/security/identity-protection/passkeys/images/laptop.svg index 2440c97fd5..5b8d16655e 100644 --- a/windows/security/identity-protection/passkeys/images/laptop.svg +++ b/windows/security/identity-protection/passkeys/images/laptop.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/identity-protection/passkeys/images/phone.svg b/windows/security/identity-protection/passkeys/images/phone.svg index acb1dce81f..d701cabb0d 100644 --- a/windows/security/identity-protection/passkeys/images/phone.svg +++ b/windows/security/identity-protection/passkeys/images/phone.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/identity-protection/passkeys/images/qr-code.svg b/windows/security/identity-protection/passkeys/images/qr-code.svg index d84c521351..b52c264ab3 100644 --- a/windows/security/identity-protection/passkeys/images/qr-code.svg +++ b/windows/security/identity-protection/passkeys/images/qr-code.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/identity-protection/passkeys/images/usb.svg b/windows/security/identity-protection/passkeys/images/usb.svg index 18027400c1..ab1ccbc8d9 100644 --- a/windows/security/identity-protection/passkeys/images/usb.svg +++ b/windows/security/identity-protection/passkeys/images/usb.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/identity-protection/passwordless-experience/index.md b/windows/security/identity-protection/passwordless-experience/index.md index 37dc49c775..2301f86f81 100644 --- a/windows/security/identity-protection/passwordless-experience/index.md +++ b/windows/security/identity-protection/passwordless-experience/index.md @@ -1,9 +1,9 @@ --- title: Windows passwordless experience description: Learn how Windows passwordless experience enables your organization to move away from passwords. -ms.collection: +ms.collection: - tier1 -ms.date: 09/27/2023 +ms.date: 03/12/2024 ms.topic: how-to appliesto: - ✅ Windows 11 @@ -19,7 +19,7 @@ With Windows passwordless experience, users who sign in with Windows Hello or a - Can't use the password credential provider on the Windows lock screen - Aren't prompted to use a password during in-session authentications (for example, UAC elevation, password manager in the browser, etc.) - Don't have the option *Accounts > Change password* in the Settings app - + >[!NOTE] >Users can reset their password using CTRL+ALT+DEL > **Manage your account** diff --git a/windows/security/identity-protection/passwordless-strategy/journey-step-2.md b/windows/security/identity-protection/passwordless-strategy/journey-step-2.md index 4d8d3b920a..52859b1022 100644 --- a/windows/security/identity-protection/passwordless-strategy/journey-step-2.md +++ b/windows/security/identity-protection/passwordless-strategy/journey-step-2.md @@ -54,7 +54,7 @@ Mitigating password usage with applications is one of the more challenging obsta The ideal mitigation for applications that prompt the user for a password is to enable those applications to use an existing authenticated identity, such as Microsoft Entra ID or Active Directory. Work with the applications vendors to have them add support for Microsoft Entra identities. For on-premises applications, have the application use Windows integrated authentication. The goal for your users should be a seamless single sign-on experience where each user authenticates once when they sign-in to Windows. Use this same strategy for applications that store their own identities in their own databases. -Each scenario on your list should now have a problem statement, an investigation as to why the password was used, and a mitigation plan on how to make the password usage go away. Armed with this data, one-by-one, close the gaps on user-visible passwords. Change policies and procedures as needed, make infrastructure changes where possible. Convert in-house applications to integrate in your Microsoft Entra ID tenant, use federated identities, or use Windows integrated authentication. Work with third-party software publishers to update their software to integrate in Microsoft Entra ID, support federated identities, or use Windows integrated authentication. +Each scenario on your list should now have a problem statement, an investigation as to why the password was used, and a mitigation plan on how to make the password usage go away. Armed with this data, one-by-one, close the gaps on user-visible passwords. Change policies and procedures as needed, make infrastructure changes where possible. Convert in-house applications to integrate in your Microsoft Entra ID tenant, use federated identities, or use Windows integrated authentication. Work with non-Microsoft software publishers to update their software to integrate in Microsoft Entra ID, support federated identities, or use Windows integrated authentication. ## Repeat until all user password usage is mitigated diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md index dc9d66ddbd..e07f9e5739 100644 --- a/windows/security/identity-protection/remote-credential-guard.md +++ b/windows/security/identity-protection/remote-credential-guard.md @@ -2,7 +2,7 @@ title: Remote Credential Guard description: Learn how Remote Credential Guard helps to secure Remote Desktop credentials by never sending them to the target device. ms.topic: how-to -ms.date: 12/08/2023 +ms.date: 03/12/2024 appliesto: - ✅ Windows 11 - ✅ Windows 10 @@ -169,7 +169,7 @@ Alternatively, you can configure devices using a [custom policy][INT-3] with the | Setting | |--| -|- **OMA-URI:** `./Device/Vendor/MSFT/Policy/Config/ADMX_CredSsp/RestrictedRemoteAdministration`
    - **Data type:** string
    - **Value:** ``

    Possible values for `RestrictedRemoteAdministrationDrop` are:
    - `0`: Disabled
    - `1`: Require Restricted Admin
    - `2`: Require Remote Credential Guard
    - `3`: Restrict credential delegation | +|- **OMA-URI:** `./Device/Vendor/MSFT/Policy/Config/ADMX_CredSsp/RestrictedRemoteAdministration`
    - **Data type:** string
    - **Value:** ``

    Possible values for `RestrictedRemoteAdministrationDrop` are:
    - `0`: Disabled
    - `1`: Require Restricted Admin
    - `2`: Require Remote Credential Guard
    - `3`: Restrict credential delegation | #### [:::image type="icon" source="../images/icons/group-policy.svg" border="false"::: **GPO**](#tab/gpo) diff --git a/windows/security/identity-protection/web-sign-in/index.md b/windows/security/identity-protection/web-sign-in/index.md index f4d5ddb8ce..61c01d2a42 100644 --- a/windows/security/identity-protection/web-sign-in/index.md +++ b/windows/security/identity-protection/web-sign-in/index.md @@ -1,7 +1,7 @@ --- title: Web sign-in for Windows description: Learn how Web sign-in in Windows works, key scenarios, and how to configure it. -ms.date: 12/11/2023 +ms.date: 03/12/2023 ms.topic: how-to appliesto: - ✅ Windows 11 @@ -11,8 +11,8 @@ ms.collection: # Web sign-in for Windows -Starting in Windows 11, version 22H2 with [KB5030310][KB-1], you can enable a web-based sign-in experience on Microsoft Entra joined devices, unlocking new sign-in options and capabilities. -This feature is called *Web sign-in*. +Starting in Windows 11, version 22H2 with [KB5030310][KB-1], you can enable a web-based sign-in experience on Microsoft Entra joined devices. +This feature is called *Web sign-in*, and it unlocks new sign-in options and capabilities. Web sign-in is a *credential provider*, and it was initially introduced in Windows 10 with support for Temporary Access Pass (TAP) only. With the release of Windows 11, the supported scenarios and capabilities of Web sign-in are expanded.\ For example, you can sign in with the Microsoft Authenticator app or with a SAML-P federated identity. @@ -21,11 +21,11 @@ This article describes how to configure Web sign-in and the supported key scenar ## System requirements -To use web sign-in, the clients must meet the following prerequisites: +Here are the prerequisites for using Web sign-in: - Windows 11, version 22H2 with [5030310][KB-1], or later -- Must be [Microsoft Entra joined](/entra/identity/devices/concept-directory-join) -- Must have Internet connectivity, as the authentication is done over the Internet +- [Microsoft Entra joined](/entra/identity/devices/concept-directory-join) +- Internet connectivity, as the authentication is done over the Internet > [!IMPORTANT] > Web sign-in is not supported for Microsoft Entra hybrid joined or domain joined devices. @@ -134,7 +134,7 @@ For more information, see [Use a Temporary Access Pass][AAD-3]. :::row::: :::column span="2"::: - If the Microsoft Entra tenant is federated with a third-party SAML-P identity provider (IdP), federated users can sign using the Web sign-in credential provider. + If the Microsoft Entra tenant is federated with a non-Microsoft SAML-P identity provider (IdP), federated users can sign using the Web sign-in credential provider. :::column-end::: :::column span="2"::: > [!VIDEO https://learn-video.azurefd.net/vod/player?id=88ad0efb-9031-428c-a3cf-612c47810ecf] diff --git a/windows/security/images/icons/accessibility.svg b/windows/security/images/icons/accessibility.svg index 21a6b4f235..5cd9234699 100644 --- a/windows/security/images/icons/accessibility.svg +++ b/windows/security/images/icons/accessibility.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/images/icons/activation.svg b/windows/security/images/icons/activation.svg deleted file mode 100644 index 0060e89a0b..0000000000 --- a/windows/security/images/icons/activation.svg +++ /dev/null @@ -1,3 +0,0 @@ - - - diff --git a/windows/security/images/icons/certificate.svg b/windows/security/images/icons/certificate.svg index 0060e89a0b..956bfc1e42 100644 --- a/windows/security/images/icons/certificate.svg +++ b/windows/security/images/icons/certificate.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/images/icons/cmd.svg b/windows/security/images/icons/cmd.svg new file mode 100644 index 0000000000..e712a4fff5 --- /dev/null +++ b/windows/security/images/icons/cmd.svg @@ -0,0 +1,9 @@ + + + + + + + + + diff --git a/windows/security/images/icons/control-panel.svg b/windows/security/images/icons/control-panel.svg new file mode 100644 index 0000000000..6eebbe9be8 --- /dev/null +++ b/windows/security/images/icons/control-panel.svg @@ -0,0 +1,9 @@ + + + + + + + + + diff --git a/windows/security/images/icons/drive.svg b/windows/security/images/icons/drive.svg new file mode 100644 index 0000000000..0293932c8e --- /dev/null +++ b/windows/security/images/icons/drive.svg @@ -0,0 +1,75 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/face.svg b/windows/security/images/icons/face.svg new file mode 100644 index 0000000000..a4fa1ca0df --- /dev/null +++ b/windows/security/images/icons/face.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/feedback.svg b/windows/security/images/icons/feedback.svg index 2ecd143695..cd887f3a0f 100644 --- a/windows/security/images/icons/feedback.svg +++ b/windows/security/images/icons/feedback.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/images/icons/fingerprint.svg b/windows/security/images/icons/fingerprint.svg new file mode 100644 index 0000000000..2494d65659 --- /dev/null +++ b/windows/security/images/icons/fingerprint.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/folder.svg b/windows/security/images/icons/folder.svg new file mode 100644 index 0000000000..468edaf961 --- /dev/null +++ b/windows/security/images/icons/folder.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/gear.svg b/windows/security/images/icons/gear.svg index caca268bea..36da6757f2 100644 --- a/windows/security/images/icons/gear.svg +++ b/windows/security/images/icons/gear.svg @@ -1,10 +1,3 @@ - - - - - - - - + diff --git a/windows/security/images/icons/group-policy.svg b/windows/security/images/icons/group-policy.svg index c9cb511415..e6ec2d2c2e 100644 --- a/windows/security/images/icons/group-policy.svg +++ b/windows/security/images/icons/group-policy.svg @@ -1,9 +1,14 @@ - - + + + + - + - + + + + diff --git a/windows/security/images/icons/information.svg b/windows/security/images/icons/information.svg index bc692eabb9..4a33944103 100644 --- a/windows/security/images/icons/information.svg +++ b/windows/security/images/icons/information.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/images/icons/insider.svg b/windows/security/images/icons/insider.svg new file mode 100644 index 0000000000..fa002fa2a1 --- /dev/null +++ b/windows/security/images/icons/insider.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/intune.svg b/windows/security/images/icons/intune.svg index 6e0d938aed..22148b48fb 100644 --- a/windows/security/images/icons/intune.svg +++ b/windows/security/images/icons/intune.svg @@ -1,24 +1,23 @@ - - - - - - - - - - - - - - - - Icon-intune-329 - - - - - - - - \ No newline at end of file + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/iris.svg b/windows/security/images/icons/iris.svg new file mode 100644 index 0000000000..465902e0b3 --- /dev/null +++ b/windows/security/images/icons/iris.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/key.svg b/windows/security/images/icons/key.svg index c9df33c18f..62e4755d33 100644 --- a/windows/security/images/icons/key.svg +++ b/windows/security/images/icons/key.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/images/icons/kiosk.svg b/windows/security/images/icons/kiosk.svg new file mode 100644 index 0000000000..f975677d19 --- /dev/null +++ b/windows/security/images/icons/kiosk.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/laptop.svg b/windows/security/images/icons/laptop.svg new file mode 100644 index 0000000000..5b8d16655e --- /dev/null +++ b/windows/security/images/icons/laptop.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/license.svg b/windows/security/images/icons/license.svg deleted file mode 100644 index 4be1c3b5f7..0000000000 --- a/windows/security/images/icons/license.svg +++ /dev/null @@ -1,3 +0,0 @@ - - - diff --git a/windows/security/images/icons/lock.svg b/windows/security/images/icons/lock.svg new file mode 100644 index 0000000000..ccd1850fbb --- /dev/null +++ b/windows/security/images/icons/lock.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/locked-drive.svg b/windows/security/images/icons/locked-drive.svg new file mode 100644 index 0000000000..59a6edbe09 --- /dev/null +++ b/windows/security/images/icons/locked-drive.svg @@ -0,0 +1,351 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/os-drive.svg b/windows/security/images/icons/os-drive.svg new file mode 100644 index 0000000000..504abbd5a9 --- /dev/null +++ b/windows/security/images/icons/os-drive.svg @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/phone.svg b/windows/security/images/icons/phone.svg new file mode 100644 index 0000000000..d701cabb0d --- /dev/null +++ b/windows/security/images/icons/phone.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/pin-code.svg b/windows/security/images/icons/pin-code.svg new file mode 100644 index 0000000000..a5bfdc4148 --- /dev/null +++ b/windows/security/images/icons/pin-code.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/pin.svg b/windows/security/images/icons/pin.svg new file mode 100644 index 0000000000..64426df32c --- /dev/null +++ b/windows/security/images/icons/pin.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/power.svg b/windows/security/images/icons/power.svg new file mode 100644 index 0000000000..e74606b72c --- /dev/null +++ b/windows/security/images/icons/power.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/powershell.svg b/windows/security/images/icons/powershell.svg index b23a99c61d..3d90e2ff6f 100644 --- a/windows/security/images/icons/powershell.svg +++ b/windows/security/images/icons/powershell.svg @@ -1,9 +1,9 @@ - - + + - + - + diff --git a/windows/security/images/icons/provisioning-package.svg b/windows/security/images/icons/provisioning-package.svg index dbbad7d780..99c1148922 100644 --- a/windows/security/images/icons/provisioning-package.svg +++ b/windows/security/images/icons/provisioning-package.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/images/icons/qr-code.svg b/windows/security/images/icons/qr-code.svg new file mode 100644 index 0000000000..b52c264ab3 --- /dev/null +++ b/windows/security/images/icons/qr-code.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/registry.svg b/windows/security/images/icons/registry.svg index bc4aa2f534..667bce7438 100644 --- a/windows/security/images/icons/registry.svg +++ b/windows/security/images/icons/registry.svg @@ -1,9 +1,9 @@ - + - + - + diff --git a/windows/security/images/icons/rocket.svg b/windows/security/images/icons/rocket.svg new file mode 100644 index 0000000000..ee39fb57aa --- /dev/null +++ b/windows/security/images/icons/rocket.svg @@ -0,0 +1,155 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/sc.svg b/windows/security/images/icons/sc.svg new file mode 100644 index 0000000000..d1924ffebb --- /dev/null +++ b/windows/security/images/icons/sc.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/settings-app.svg b/windows/security/images/icons/settings-app.svg new file mode 100644 index 0000000000..d62d13fb54 --- /dev/null +++ b/windows/security/images/icons/settings-app.svg @@ -0,0 +1,24 @@ + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/settings.svg b/windows/security/images/icons/settings.svg index 9ec19d16aa..36da6757f2 100644 --- a/windows/security/images/icons/settings.svg +++ b/windows/security/images/icons/settings.svg @@ -1,19 +1,3 @@ - - - - - - - - - - - - - - - - - + diff --git a/windows/security/images/icons/start.svg b/windows/security/images/icons/start.svg new file mode 100644 index 0000000000..a3e6c3d8e8 --- /dev/null +++ b/windows/security/images/icons/start.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/subscription.svg b/windows/security/images/icons/subscription.svg index 4be1c3b5f7..ffa73c424e 100644 --- a/windows/security/images/icons/subscription.svg +++ b/windows/security/images/icons/subscription.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/images/icons/unlocked-drive.svg b/windows/security/images/icons/unlocked-drive.svg new file mode 100644 index 0000000000..a8464ec134 --- /dev/null +++ b/windows/security/images/icons/unlocked-drive.svg @@ -0,0 +1,120 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/usb.svg b/windows/security/images/icons/usb.svg new file mode 100644 index 0000000000..ab1ccbc8d9 --- /dev/null +++ b/windows/security/images/icons/usb.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/user.svg b/windows/security/images/icons/user.svg new file mode 100644 index 0000000000..76c0b2ce5d --- /dev/null +++ b/windows/security/images/icons/user.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/vsc.svg b/windows/security/images/icons/vsc.svg new file mode 100644 index 0000000000..cbf23de89e --- /dev/null +++ b/windows/security/images/icons/vsc.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/includes/sections/identity.md b/windows/security/includes/sections/identity.md index 5a643de599..f50a087c3c 100644 --- a/windows/security/includes/sections/identity.md +++ b/windows/security/includes/sections/identity.md @@ -22,7 +22,7 @@ ms.topic: include | Feature name | Description | |:---|:---| | **[Web sign-in](/windows/security/identity-protection/web-sign-in)** | Web sign-in is a credential provider initially introduced in Windows 10 with support for Temporary Access Pass (TAP) only. With the release of Windows 11, the supported scenarios and capabilities of Web sign-in have been expanded. For example, users can sign-in to Windows using the Microsoft Authenticator app or with a federated identity. | -| **[Federated sign-in](/education/windows/federated-sign-in)** | Windows 11 Education editions support federated sign-in with third-party identity providers. Federated sign-in enables secure sign in through methods like QR codes or pictures. | +| **[Federated sign-in](/education/windows/federated-sign-in)** | Windows 11 Education editions support federated sign-in with non-Microsoft identity providers. Federated sign-in enables secure sign in through methods like QR codes or pictures. | | **[Windows LAPS](/windows-server/identity/laps/laps-overview)** | Windows Local Administrator Password Solution (Windows LAPS) is a Windows feature that automatically manages and backs up the password of a local administrator account on your Microsoft Entra joined or Windows Server Active Directory-joined devices. You also can use Windows LAPS to automatically manage and back up the Directory Services Restore Mode (DSRM) account password on your Windows Server Active Directory domain controllers. An authorized administrator can retrieve the DSRM password and use it. | | **[Account Lockout Policy](/windows/security/threat-protection/security-policy-settings/account-lockout-policy)** | Account Lockout Policy settings control the response threshold for failed logon attempts and the actions to be taken after the threshold is reached. | | **[Enhanced phishing protection with SmartScreen](/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection)** | Users who are still using passwords can benefit from powerful credential protection. Microsoft Defender SmartScreen includes enhanced phishing protection to automatically detect when a user enters their Microsoft password into any app or website. Windows then identifies if the app or site is securely authenticating to Microsoft and warns if the credentials are at risk. Since users are alerted at the moment of potential credential theft, they can take preemptive action before their password is used against them or their organization. | diff --git a/windows/security/includes/sections/operating-system-security.md b/windows/security/includes/sections/operating-system-security.md index ea66bca2df..4fa55308cf 100644 --- a/windows/security/includes/sections/operating-system-security.md +++ b/windows/security/includes/sections/operating-system-security.md @@ -13,7 +13,7 @@ ms.topic: include | **[Measured boot](/windows/compatibility/measured-boot)** | Measured Boot measures all important code and configuration settings during the boot of Windows. This includes: the firmware, boot manager, hypervisor, kernel, secure kernel and operating system. Measured Boot stores the measurements in the TPM on the machine, and makes them available in a log that can be tested remotely to verify the boot state of the client.

    The Measured Boot feature provides anti-malware software with a trusted (resistant to spoofing and tampering) log of all boot components that started before it. The anti-malware software can use the log to determine whether components that ran before it are trustworthy, or if they're infected with malware. The anti-malware software on the local machine can send the log to a remote server for evaluation. The remote server may initiate remediation actions, either by interacting with software on the client, or through out-of-band mechanisms, as appropriate. | | **[Device health attestation service](/windows/security/operating-system-security/system-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices)** | The Windows device health attestation process supports a zero-trust paradigm that shifts the focus from static, network-based perimeters, to users, assets, and resources. The attestation process confirms the device, firmware, and boot process are in a good state and haven't been tampered with before they can access corporate resources. The determinations are made with data stored in the TPM, which provides a secure root of trust. The information is sent to an attestation service, such as Azure Attestation, to verify the device is in a trusted state. Then, an MDM tool like Microsoft Intune reviews device health and connects this information with Microsoft Entra ID for conditional access. | | **[Windows security policy settings and auditing](/windows/security/threat-protection/security-policy-settings/security-policy-settings)** | Microsoft provides a robust set of security settings policies that IT administrators can use to protect Windows devices and other resources in their organization. | -| **[Assigned Access (kiosk mode)](/windows/configuration/kiosk-methods)** | Some desktop devices in an enterprise serve a special purpose. For example, a PC in the lobby that customers use to see your product catalog. Or, a PC displaying visual content as a digital sign. Windows client offers two different locked-down experiences for public or specialized use: A single-app kiosk that runs a single Universal Windows Platform (UWP) app in full screen above the lock screen, or A multi-app kiosk that runs one or more apps from the desktop.

    Kiosk configurations are based on Assigned Access, a feature in Windows that allows an administrator to manage the user's experience by limiting the application entry points exposed to the user. | +| **[Assigned Access](/windows/configuration/)** | Some desktop devices in an enterprise serve a special purpose. For example, a PC in the lobby that customers use to see your product catalog. Or, a PC displaying visual content as a digital sign. Windows client offers two different locked-down experiences for public or specialized use: A single-app kiosk that runs a single Universal Windows Platform (UWP) app in full screen above the lock screen, or A multi-app kiosk that runs one or more apps from the desktop.

    Kiosk configurations are based on Assigned Access, a feature in Windows that allows an administrator to manage the user's experience by limiting the application entry points exposed to the user. | ## Virus and threat protection diff --git a/windows/security/index.yml b/windows/security/index.yml index 8f543bcde6..afb32d0f77 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -1,167 +1,156 @@ -### YamlMime:Hub +### YamlMime:Landing -title: Windows client security documentation -summary: Learn how to secure Windows clients for your organization. -brand: windows +title: Windows security documentation +summary: Windows is designed with zero-trust principles at its core, offering powerful security from chip to cloud. As organizations embrace hybrid work environments, the need for robust security solutions becomes paramount. Windows integrates advanced hardware and software protection, ensuring data integrity and access control across devices. Learn about the different security features included in Windows. metadata: - ms.topic: hub-page + ms.topic: landing-page ms.collection: - tier1 - essentials-navigation author: paolomatarazzo ms.author: paoloma manager: aaroncz - ms.date: 09/18/2023 + ms.date: 03/12/2024 -highlightedContent: - items: - - title: Get started with Windows security - itemType: get-started - url: introduction.md - - title: Windows 11, version 22H2 - itemType: whats-new - url: /windows/whats-new/whats-new-windows-11-version-22H2 - - title: Advance your security posture with Microsoft Intune from chip to cloud - itemType: learn - url: https://learn.microsoft.com/training/modules/m365-advance-organization-security-posture/ - - title: Security features licensing and edition requirements - itemType: overview - url: /windows/security/licensing-and-edition-requirements +# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | tutorial | overview | quickstart | reference | sample | tutorial | video | whats-new +landingContent: -productDirectory: - title: Get started - items: + - title: Learn about hardware security + linkLists: + - linkListType: overview + links: + - text: Trusted Platform Module (TPM) + url: /windows/security/hardware-security/tpm/trusted-platform-module-overview + - text: Microsoft Pluton + url: /windows/security/hardware-security/pluton/microsoft-pluton-security-processor + - text: Windows Defender System Guard + url: /windows-hardware/design/device-experiences/oem-vbs + - text: Virtualization-based security (VBS) + url: /windows/security/hardware-security/how-hardware-based-root-of-trust-helps-protect-windows + - text: Secured-core PC + url: /windows-hardware/design/device-experiences/oem-highly-secure-11 - - title: Hardware security - imageSrc: /media/common/i_usb.svg - links: - - url: /windows/security/hardware-security/tpm/trusted-platform-module-overview - text: Trusted Platform Module - - url: /windows/security/hardware-security/pluton/microsoft-pluton-security-processor - text: Microsoft Pluton - - url: /windows/security/hardware-security/how-hardware-based-root-of-trust-helps-protect-windows - text: Windows Defender System Guard - - url: /windows-hardware/design/device-experiences/oem-vbs - text: Virtualization-based security (VBS) - - url: /windows-hardware/design/device-experiences/oem-highly-secure-11 - text: Secured-core PC - - url: /windows/security/hardware-security - text: Learn more about hardware security > + - title: Learn about OS security + linkLists: + - linkListType: overview + links: + - text: Trusted boot + url: /windows/security/operating-system-security + - text: Windows security settings + url: /windows/security/operating-system-security/system-security/windows-defender-security-center/windows-defender-security-center + - text: BitLocker + url: /windows/security/operating-system-security/data-protection/bitlocker/ + - text: Personal Data Encryption (PDE) + url: /windows/security/operating-system-security/data-protection/personal-data-encryption + - text: Windows security baselines + url: /windows/security/operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines + - text: Microsoft Defender SmartScreen + url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/ + - text: Windows Firewall + url: /windows/security/operating-system-security/network-security/windows-firewall/ + - linkListType: architecture + links: + - text: BitLocker planning guide + url: /windows/security/operating-system-security/data-protection/bitlocker/planning-guide + - linkListType: how-to-guide + links: + - text: Configure BitLocker + url: /windows/security/operating-system-security/data-protection/bitlocker/configure + - text: Configure PDE + url: /windows/security/operating-system-security/data-protection/personal-data-encryption/configure + - linkListType: whats-new + links: + - text: Hyper-V firewall + url: /windows/security/operating-system-security/network-security/windows-firewall/hyper-v-firewall - - title: OS security - imageSrc: /media/common/i_threat-protection.svg - links: - - url: /windows/security/operating-system-security - text: Trusted boot - - url: /windows/security/operating-system-security/system-security/windows-defender-security-center/windows-defender-security-center - text: Windows security settings - - url: /windows/security/operating-system-security/data-protection/bitlocker/ - text: BitLocker - - url: /windows/security/operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines - text: Windows security baselines - - url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/ - text: Microsoft Defender SmartScreen - - url: /windows/security/operating-system-security - text: Learn more about OS security > + - title: Learn about identity protection + linkLists: + - linkListType: overview + links: + - text: Passwordless strategy + url: /windows/security/identity-protection/passwordless-strategy + - text: Windows Hello for Business + url: /windows/security/identity-protection/hello-for-business + - text: Windows passwordless experience + url: /windows/security/identity-protection/passwordless-experience + - text: Web sign-in for Windows + url: /windows/security/identity-protection/web-sign-in + - text: Passkeys + url: /windows/security/identity-protection/passkeys + - text: FIDO2 security keys + url: /azure/active-directory/authentication/howto-authentication-passwordless-security-key + - text: Enhanced phishing protection with SmartScreen + url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection + - linkListType: how-to-guide + links: + - text: Configure PIN reset + url: /windows/security/identity-protection/hello-for-business/pin-reset + - text: RDP sign-in with Windows Hello for Business + url: /windows/security/identity-protection/hello-for-business/rdp-sign-in + - linkListType: architecture + links: + - text: Plan a Windows Hello for Business deployment + url: /windows/security/identity-protection/hello-for-business/deploy/ + - linkListType: deploy + links: + - text: Cloud Kerberos trust deployment guide + url: /windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust - - title: Identity protection - imageSrc: /media/common/i_identity-protection.svg - links: - - url: /windows/security/identity-protection/hello-for-business - text: Windows Hello for Business - - url: /windows/security/identity-protection/passwordless-experience - text: Windows passwordless experience - - url: /windows/security/identity-protection/web-sign-in - text: Web sign-in for Windows - - url: /windows/security/identity-protection/passkeys - text: Support for passkeys in Windows - - url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection - text: Enhanced phishing protection with SmartScreen - - url: /windows/security/identity-protection - text: Learn more about identity protection > + - title: Learn about application security + linkLists: + - linkListType: overview + links: + - text: Windows Defender Application Control (WDAC) + url: /windows/security/application-security/application-control/windows-defender-application-control/ + - text: User Account Control (UAC) + url: /windows/security/application-security/application-control/user-account-control + - text: Microsoft vulnerable driver blocklist + url: /windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules + - text: Microsoft Defender Application Guard (MDAG) + url: /windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview + - text: Windows Sandbox + url: /windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview + - linkListType: how-to-guide + links: + - text: Configure Windows Sandbox + url: /windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file - - title: Application security - imageSrc: /media/common/i_queries.svg - links: - - url: /windows/security/application-security/application-control/windows-defender-application-control/ - text: Windows Defender Application Control (WDAC) - - url: /windows/security/application-security/application-control/user-account-control - text: User Account Control (UAC) - - url: /windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules - text: Microsoft vulnerable driver blocklist - - url: /windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview - text: Microsoft Defender Application Guard (MDAG) - - url: /windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview - text: Windows Sandbox - - url: /windows/security/application-security - text: Learn more about application security > + - title: Learn about security foundations + linkLists: + - linkListType: overview + links: + - text: Zero trust + url: /windows/security/security-foundations/zero-trust-windows-device-health + - text: FIPS 140 validation + url: /windows/security/security-foundations/certification/fips-140-validation + - text: Common Criteria Certifications + url: /windows/security/security-foundations/certification/windows-platform-common-criteria + - text: Microsoft Security Development Lifecycle (SDL) + url: /windows/security/security-foundations/msft-security-dev-lifecycle + - text: Microsoft Windows Insider Preview bounty program + url: https://www.microsoft.com/msrc/bounty-windows-insider-preview + - text: OneFuzz service + url: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/ + - linkListType: whats-new + links: + - text: Completed FIPS validations - Windows 11 + url: /windows/security/security-foundations/certification/validations/fips-140-windows11 + - text: Completed CC certifications - Windows 11 + url: /windows/security/security-foundations/certification/validations/cc-windows11 - - title: Security foundations - imageSrc: /media/common/i_build.svg - links: - - url: /windows/security/security-foundations/certification/fips-140-validation - text: FIPS 140-2 validation - - url: /windows/security/security-foundations/certification/windows-platform-common-criteria - text: Common Criteria Certifications - - url: /windows/security/security-foundations/msft-security-dev-lifecycle - text: Microsoft Security Development Lifecycle (SDL) - - url: https://www.microsoft.com/msrc/bounty-windows-insider-preview - text: Microsoft Windows Insider Preview bounty program - - url: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/ - text: OneFuzz service - - url: /windows/security/security-foundations - text: Learn more about security foundations > - - - title: Cloud security - imageSrc: /media/common/i_cloud-security.svg - links: - - url: /mem/intune/protect/security-baselines - text: Security baselines with Intune - - url: /windows/deployment/windows-autopatch - text: Windows Autopatch - - url: /windows/deployment/windows-autopilot - text: Windows Autopilot - - url: /universal-print - text: Universal Print - - url: /windows/client-management/mdm/remotewipe-csp - text: Remote wipe - - url: /windows/security/cloud-security - text: Learn more about cloud security > - -additionalContent: - sections: - - title: More Windows resources - items: - - - title: Windows Server - links: - - text: Windows Server documentation - url: /windows-server - - text: What's new in Windows Server 2022? - url: /windows-server/get-started/whats-new-in-windows-server-2022 - - text: Windows Server blog - url: https://cloudblogs.microsoft.com/windowsserver/ - - - title: Windows product site and blogs - links: - - text: Find out how Windows enables your business to do more - url: https://www.microsoft.com/microsoft-365/windows - - text: Windows blogs - url: https://blogs.windows.com/ - - text: Windows IT Pro blog - url: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/bg-p/Windows10Blog - - text: Microsoft Intune blog - url: https://techcommunity.microsoft.com/t5/microsoft-intune-blog/bg-p/MicrosoftEndpointManagerBlog - - text: "Windows help & learning: end-user documentation" - url: https://support.microsoft.com/windows - - - title: Participate in the community - links: - - text: Windows community - url: https://techcommunity.microsoft.com/t5/windows/ct-p/Windows10 - - text: Microsoft Intune community - url: https://techcommunity.microsoft.com/t5/microsoft-intune/bd-p/Microsoft-Intune - - text: Microsoft Support community - url: https://answers.microsoft.com/windows/forum \ No newline at end of file + - title: Learn about cloud security + linkLists: + - linkListType: overview + links: + - text: Security baselines with Intune + url: /mem/intune/protect/security-baselines + - text: Windows Autopatch + url: /windows/deployment/windows-autopatch + - text: Windows Autopilot + url: /windows/deployment/windows-autopilot + - text: Universal Print + url: /universal-print + - text: Remote wipe + url: /windows/client-management/mdm/remotewipe-csp \ No newline at end of file diff --git a/windows/security/licensing-and-edition-requirements.md b/windows/security/licensing-and-edition-requirements.md index e2ef744996..5514543d97 100644 --- a/windows/security/licensing-and-edition-requirements.md +++ b/windows/security/licensing-and-edition-requirements.md @@ -19,7 +19,7 @@ Select one of the two tabs to learn about licensing requirements to use the secu [!INCLUDE [licensing-requirements](../../includes/licensing/_licensing-requirements.md)] -#### [:::image type="icon" source="images/icons/activation.svg" border="false"::: **Edition requirements**](#tab/edition) +#### [:::image type="icon" source="images/icons/subscription.svg" border="false"::: **Edition requirements**](#tab/edition) [!INCLUDE [_edition-requirements](../../includes/licensing/_edition-requirements.md)] diff --git a/windows/security/operating-system-security/data-protection/bitlocker/faq.yml b/windows/security/operating-system-security/data-protection/bitlocker/faq.yml index e67401c81a..d82b8f6355 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/faq.yml +++ b/windows/security/operating-system-security/data-protection/bitlocker/faq.yml @@ -19,53 +19,53 @@ sections: answer: Two partitions are required to run BitLocker because pre-startup authentication and system integrity verification must occur on a separate partition from the encrypted operating system drive. This configuration helps protect the operating system and the information in the encrypted drive. - question: How can I tell if a computer has a TPM? - answer: The TPM status can be checked in **Windows Defender Security Center** > **Device Security** > **Security processor details**. + answer: The TPM status can be checked in **Windows Defender Security Center** > **Device Security** > **Security processor details**. - question: Can I use BitLocker on an operating system drive without a TPM? answer: | Yes, BitLocker can be enabled on an operating system drive without a TPM, if the BIOS or UEFI firmware has the ability to read from a USB flash drive in the boot environment. BitLocker won't unlock the protected drive until BitLocker's own volume master key is first released by either the computer's TPM or by a USB flash drive containing the BitLocker startup key for that computer. However, computers without TPMs won't be able to use the system integrity verification that BitLocker can also provide. To help determine whether a computer can read from a USB device during the boot process, use the BitLocker system check as part of the BitLocker setup process. This system check performs tests to confirm that the computer can properly read from the USB devices at the appropriate time and that the computer meets other BitLocker requirements. - + - question: How do I obtain BIOS support for the TPM on my computer? answer: | Contact the computer manufacturer to request a Trusted Computing Group (TCG)-compliant BIOS or UEFI boot firmware that meets the following requirements: - + - It's compliant with the TCG standards for a client computer - It has a secure update mechanism to help prevent a malicious BIOS or boot firmware from being installed on the computer - + - question: What user rights are required to use BitLocker? answer: To turn on, turn off, or change configurations of BitLocker on operating system and fixed data drives, membership to the local *Administrators* group is required. Standard users can turn on, turn off, or change configurations of BitLocker on removable data drives. - question: What is the recommended boot order for computers that are going to be BitLocker-protected? - answer: The computer's startup options should be configured to have the hard disk drive first in the boot order, before any other drives such as CD/DVD drives or USB drives. If the hard disk isn't first and the computer typically boots from the hard disk, then a boot order change may be detected or assumed when removable media is found during boot. The boot order typically affects the system measurement that is verified by BitLocker and a change in boot order will cause a prompt for the BitLocker recovery key. For the same reason, if a laptop is used with a docking station, ensure that the hard disk drive is first in the boot order both when the laptop is docked and undocked. + answer: The computer's startup options should be configured to have the hard disk drive first in the boot order, before any other drives such as CD/DVD drives or USB drives. If the hard disk isn't first and the computer typically boots from the hard disk, then a boot order change may be detected or assumed when removable media is found during boot. The boot order typically affects the system measurement that is verified by BitLocker and a change in boot order will cause a prompt for the BitLocker recovery key. For the same reason, if a laptop is used with a docking station, ensure that the hard disk drive is first in the boot order both when the laptop is docked and undocked. - name: BitLocker and Windows upgrade questions: - question: | Can I upgrade Windows versions with BitLocker enabled? answer: | - Yes. + Yes. - question: | What is the difference between suspending and decrypting BitLocker? answer: | *Decrypt* completely removes BitLocker protection and fully decrypts the drive. - + *Suspend* keeps the data encrypted but encrypts the BitLocker volume master key with a clear key. The clear key is a cryptographic key stored unencrypted and unprotected on the disk drive. By storing this key unencrypted, the *Suspend* option allows for changes or upgrades to the computer without the time and cost of decrypting and re-encrypting the entire drive. After the changes are made and BitLocker is again enabled, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade, the volume master key is changed, the protectors are updated to match and the clear key is erased. - + - question: | Do I have to suspend BitLocker protection to download and install system updates and upgrades? answer: | - No user action is required for BitLocker in order to apply updates from Microsoft, including [Windows quality updates and feature updates](/windows/deployment/update/waas-quick-start). - Users need to suspend BitLocker for Non-Microsoft software updates, such as: - + No user action is required for BitLocker in order to apply updates from Microsoft, including [Windows quality updates and feature updates](/windows/deployment/update/waas-quick-start). + Users need to suspend BitLocker for Non-Microsoft software updates, such as: + - Some TPM firmware updates if these updates clear the TPM outside of the Windows API. Not every TPM firmware update will clear the TPM. Users don't have to suspend BitLocker if the TPM firmware update uses Windows API to clear the TPM because in this case, BitLocker will be automatically suspended. It's recommended that users test their TPM firmware updates if they don't want to suspend BitLocker protection - Non-Microsoft application updates that modify the UEFI\BIOS configuration - - Manual or third-party updates to secure boot databases (only if BitLocker uses Secure Boot for integrity validation) + - Manual or non-Microsoft updates to secure boot databases (only if BitLocker uses Secure Boot for integrity validation) - Updates to UEFI\BIOS firmware, installation of additional UEFI drivers, or UEFI applications without using the Windows update mechanism (only if BitLocker doesn't use Secure Boot for integrity validation during updates) - BitLocker can be checked if it uses Secure Boot for integrity validation with the command line `manage-bde.exe -protectors -get C:`. If Secure Boot for integrity validation is being used, it reports **Uses Secure Boot for integrity validation** - - + + > [!NOTE] > If BitLocker is suspended, you can resume BitLocker protection after the upgrade or update is installed. Upon resuming protection, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade or update. If these types of upgrades or updates are applied without suspending BitLocker, the computer will enter recovery mode when restarting and will require a recovery key or password to access the computer. @@ -74,16 +74,16 @@ sections: - question: Can BitLocker deployment be automated in an enterprise environment? answer: | Yes, the deployment and configuration BitLocker can be automated using either Windows PowerShell or with the `manage-bde.exe` command. For more information about common BitLocker management commands, check the [BitLocker operations guide](operations-guide.md). - + - question: Is there a noticeable performance impact when BitLocker is enabled on a computer? answer: Typically, there's a small performance overhead, often in single-digit percentages, which is relative to the throughput of the storage operations on which it needs to operate. - question: How long will initial encryption take when BitLocker is turned on? answer: | Although BitLocker encryption occurs in the background while a user continues to work with the system remaining usable, encryption times vary depending on the type of drive that is being encrypted, the size of the drive, and the speed of the drive. If encrypting large drives, encryption may want to be scheduled during times when the drive isn't being used. - + When BitLocker is enabled, BitLocker can also be set to encrypt the entire drive or just the used space on the drive. On a new hard drive, encrypting just the used spaced can be considerably faster than encrypting the entire drive. When this encryption option is selected, BitLocker automatically encrypts data as it is saved, ensuring that no data is stored unencrypted. - + - question: What happens if the computer is turned off during encryption or decryption? answer: If the computer is turned off or goes into hibernation, the BitLocker encryption and decryption process will resume where it stopped the next time Windows starts. BitLocker resuming encryption or decryption is true even if the power is suddenly unavailable. @@ -94,35 +94,35 @@ sections: answer: | Policy settings can be configured to require that data drives be BitLocker-protected before a BitLocker-protected computer can write data to them. For more info, see [BitLocker policy settings](configure.md). When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that aren't protected by BitLocker as read-only. - + - question: | What is Used Disk Space Only encryption? answer: | BitLocker lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to be encrypted. For more information, see [Used Disk Space Only encryption](planning-guide.md#used-disk-space-only-encryption). - + - question: | What system changes would cause the integrity check on the OS drive to fail? answer: | The following types of system changes can cause an integrity check failure and prevent the TPM from releasing the BitLocker key to decrypt the protected operating system drive: - + - Moving the BitLocker-protected drive into a new computer - Installing a new motherboard with a new TPM - Turning off, disabling, or clearing the TPM - Changing any boot configuration settings - Changing the BIOS, UEFI firmware, master boot record, boot sector, boot manager, option ROM, or other early boot components or boot configuration data - + - question: What causes BitLocker to start into recovery mode when attempting to start the operating system drive? answer: | - Because BitLocker is designed to protect computers from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode. - For example: - + Because BitLocker is designed to protect computers from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode. + For example: + - Changing the BIOS boot order to boot another drive in advance of the hard drive - Adding or removing hardware, such as inserting a new card in the computer - Removing, inserting, or completely depleting the charge on a smart battery on a portable computer - - In BitLocker, recovery consists of decrypting a copy of the volume master key using either a recovery key stored on a USB flash drive or a cryptographic key derived from a recovery password. + + In BitLocker, recovery consists of decrypting a copy of the volume master key using either a recovery key stored on a USB flash drive or a cryptographic key derived from a recovery password. The TPM isn't involved in any recovery scenarios, so recovery is still possible if the TPM fails boot component validation, malfunctions, or is removed. - + - question: What can prevent BitLocker from binding to PCR 7? answer: BitLocker can be prevented from binding to PCR 7 if a non-Windows OS booted prior to Windows, or if Secure Boot isn't available to the device, either because it's disabled or the hardware doesn't support it. @@ -139,15 +139,15 @@ sections: answer: Any number of internal, fixed data drives can be protected with BitLocker. On some versions ATA and SATA-based, direct-attached storage devices are also supported. - name: Key Management - questions: + questions: - question: How can I authenticate or unlock my removable data drive? answer: | Removable data drives can be unlocked using a password or a smart card. A SID protector can also be configured to unlock a drive by using user domain credentials. After encryption has started, the drive can also be automatically unlocked on a specific computer for a specific user account. System administrators can configure which options are available for users including password complexity and minimum length requirements. To unlock by using a SID protector, use `manage-bde.exe`: - + ```cmd Manage-bde.exe -protectors -add e: -sid domain\username ``` - + - question: What is the difference between a TPM owner password, recovery password, recovery key, PIN, enhanced PIN, and startup key? answer: | There are multiple keys that can be generated and used by BitLocker. Some keys are required and some are optional protectors you can choose to use depending on the level of security you require. @@ -164,7 +164,7 @@ sections: - A key file on a USB flash drive that is read directly by the BitLocker recovery console. During recovery, you need to insert this USB device **PIN and enhanced PIN** - + For a higher level of security with the TPM, you can configure BitLocker with a personal identification number (PIN). The PIN is a user-created value that must be entered each time the computer starts or resumes from hibernation. The PIN can consist of 4 to 20 digits as specified by the *Configure minimum PIN length for startup* policy setting and is stored internally as a 256-bit hash of the entered Unicode characters. This value is never displayed to the user. The PIN is used to provide another factor of authentication in conjunction with TPM authentication.\ For an even higher level of security with the TPM, you can configure BitLocker to use enhanced PINs. Enhanced PINs are PINs that use the full keyboard character set in addition to the numeric set to allow for more possible PIN combinations and are between 4 and 20 characters in length. To use enhanced PINs, you must enable the *Allow enhanced PINs for startup* policy setting before adding the PIN to the drive. By enabling this policy, all PINs created can utilize full keyboard characters. @@ -178,15 +178,15 @@ sections: - question: How can the recovery password and recovery key be stored? answer: | The recovery password and recovery key for an operating system drive or a fixed data drive can be saved to a folder, saved to one or more USB devices, saved to a Microsoft Account, or printed. - + For removable data drives, the recovery password and recovery key can be saved to a folder, saved to a Microsoft Account, or printed. By default, a recovery key for a removable drive can't be stored on a removable drive. - + A domain administrator can also configure policy settings to automatically generate recovery passwords and store them in Active Directory Domain Services (AD DS) or Microsoft Entra ID for any BitLocker-protected drive. - + - question: Is it possible to add an additional method of authentication without decrypting the drive if I only have the TPM authentication method enabled? answer: | The `Manage-bde.exe` command-line tool can be used to replace TPM-only authentication mode with a multifactor authentication mode. For example, if BitLocker is enabled with TPM authentication only and PIN authentication needs to be added, use the following commands from an elevated Command Prompt, replacing *4-20 digit numeric PIN* with the desired numeric PIN: - + ```cmd manage-bde.exe -protectors -delete %systemdrive% -type tpm @@ -195,13 +195,13 @@ sections: - question: When should an additional method of authentication be considered? answer: | - New hardware that meets [Windows Hardware Compatibility Program](/windows-hardware/design/compatibility/) requirements make a PIN less critical as a mitigation, and having a TPM-only protector is likely sufficient when combined with policies like device lockout. For example, Surface Pro and Surface Book don't have external DMA ports to attack. - For older hardware, where a PIN may be needed, it's recommended to enable [enhanced PINs](configure.md) that allow non-numeric characters such as letters and punctuation marks, and to set the PIN length based on the risk tolerance and the hardware anti-hammering capabilities available to the TPMs on the computers. - + New hardware that meets [Windows Hardware Compatibility Program](/windows-hardware/design/compatibility/) requirements make a PIN less critical as a mitigation, and having a TPM-only protector is likely sufficient when combined with policies like device lockout. For example, Surface Pro and Surface Book don't have external DMA ports to attack. + For older hardware, where a PIN may be needed, it's recommended to enable [enhanced PINs](configure.md) that allow non-numeric characters such as letters and punctuation marks, and to set the PIN length based on the risk tolerance and the hardware anti-hammering capabilities available to the TPMs on the computers. + - question: If I lose my recovery information, will the BitLocker-protected data be unrecoverable? answer: | BitLocker is designed to make the encrypted drive unrecoverable without the required authentication. When in recovery mode, the user needs the recovery password or recovery key to unlock the encrypted drive. - + > [!IMPORTANT] > Store the recovery information in Microsoft Entra ID, AD DS, Microsoft Account, or another safe location. @@ -226,39 +226,39 @@ sections: - question: Where are the encryption keys stored? answer: | The full volume encryption key is encrypted by the volume master key and stored in the encrypted drive. The volume master key is encrypted by the appropriate key protector and stored in the encrypted drive. If BitLocker has been suspended, the clear key that is used to encrypt the volume master key is also stored in the encrypted drive, along with the encrypted volume master key. - + This storage process ensures that the volume master key is never stored unencrypted and is protected unless BitLocker is disabled. The keys are also saved to two additional locations on the drive for redundancy. The keys can be read and processed by the boot manager. - + - question: Why do I have to use the function keys to enter the PIN or the 48-character recovery password? answer: | The F1 through F10 keys are universally mapped scan codes available in the pre-boot environment on all computers and in all languages. The numeric keys 0 through 9 aren't usable in the pre-boot environment on all keyboards. - + When using an enhanced PIN, users should run the optional system check during the BitLocker setup process to ensure that the PIN can be entered correctly in the pre-boot environment. - + - question: How does BitLocker help prevent an attacker from discovering the PIN that unlocks my operating system drive? answer: | It's possible that a personal identification number (PIN) can be discovered by an attacker performing a brute force attack. A brute force attack occurs when an attacker uses an automated tool to try different PIN combinations until the correct one is discovered. For BitLocker-protected computers, this type of attack, also known as a dictionary attack, requires that the attacker has physical access to the computer. - + The TPM has the built-in ability to detect and react to these types of attacks. Because different manufacturers' TPMs may support different PIN and attack mitigations, contact the TPM's manufacturer to determine how the computer's TPM mitigates PIN brute force attacks. After the TPM's manufacturer is determined, contact the manufacturer to gather the TPM's vendor-specific information. Most manufacturers use the PIN authentication failure count to exponentially increase lockout time to the PIN interface. However, each manufacturer has different policies regarding when and how the failure counter is decreased or reset. - + - question: How can I determine the manufacturer of my TPM? answer: The TPM manufacturer can be determined in **Windows Defender Security Center** > **Device Security** > **Security processor details**. - question: How can I evaluate a TPM's dictionary attack mitigation mechanism? answer: | The following questions can assist when asking a TPM manufacturer about the design of a dictionary attack mitigation mechanism: - + - How many failed authorization attempts can occur before lockout? - What is the algorithm for determining the duration of a lockout based on the number of failed attempts and any other relevant parameters? - What actions can cause the failure count and lockout duration to be decreased or reset? - + - question: Can PIN length and complexity be managed with policy settings? answer: | The minimum personal identification number (PIN) length can be configured by using the **Configure minimum PIN length for startup** Group Policy setting and allow the use of alphanumeric PINs by enabling the **Allow enhanced PINs for startup** policy setting. PIN complexity can't be required via policy settings. - + For more info, see [BitLocker policy settings](configure.md). - + - question: How are the PIN and TPM used to derive the volume master key? answer: | BitLocker hashes the user-specified personal identification number (PIN) by using SHA-256, and the first 160 bits of the hash are used as authorization data sent to the TPM to seal the volume master key. The volume master key is now protected by both the TPM and the PIN. To unseal the volume master key, you are required to enter the PIN each time the computer restarts or resumes from hibernation. @@ -267,18 +267,18 @@ sections: questions: - question: What is BitLocker To Go? answer: | - BitLocker To Go is BitLocker Drive Encryption on removable data drives. This feature includes the encryption of: - + BitLocker To Go is BitLocker Drive Encryption on removable data drives. This feature includes the encryption of: + - USB flash drives - SD cards - External hard disk drives - - Other drives that are formatted by using the NTFS, FAT16, FAT32, or exFAT file system. + - Other drives that are formatted by using the NTFS, FAT16, FAT32, or exFAT file system. Drive partitioning must meet the [BitLocker Drive Encryption Partitioning Requirements](/windows-hardware/manufacture/desktop/bitlocker-drive-encryption#bitlocker-drive-encryption-partitioning-requirements). - + As with BitLocker, drives that are encrypted by BitLocker To Go can be opened by using a password or smart card on another computer. In Control Panel, use **BitLocker Drive Encryption**. - - name: BitLocker and Active Directory Domain Services (AD DS) + - name: BitLocker and Active Directory Domain Services (AD DS) questions: - question: | What type of information is stored in AD DS? @@ -286,15 +286,15 @@ sections: Stored information | Description -------------------|------------ BitLocker recovery password | The recovery password allows unlocking of and access to the drive after a recovery incident. Domain administrators can view the BitLocker recovery password by using the BitLocker Recovery Password Viewer. For more information about this tool, see [BitLocker: Use BitLocker Recovery Password Viewer](bitlocker-use-bitlocker-recovery-password-viewer.md). - BitLocker key package | The key package helps to repair damage to the hard disk that would otherwise prevent standard recovery. Using the key package for recovery requires the BitLocker Repair Tool, `Repair-bde`. - + BitLocker key package | The key package helps to repair damage to the hard disk that would otherwise prevent standard recovery. Using the key package for recovery requires the BitLocker Repair Tool, `Repair-bde`. + - question: | What if BitLocker is enabled on a computer before the computer joins the domain? answer: | If BitLocker is enabled on a drive before policy settings are applied to enforce a backup, the recovery information won't be automatically backed up to AD DS when the computer joins the domain or when the policy settings are subsequently applied. However, the policy settings **Choose how BitLocker-protected operating system drives can be recovered**, **Choose how BitLocker-protected fixed drives can be recovered**, and **Choose how BitLocker-protected removable drives can be recovered** can be chosen to require the computer to be connected to a domain before BitLocker can be enabled to help ensure that recovery information for BitLocker-protected drives in the organization is backed up to AD DS. - + For more information how to back up the recovery password to AD DS or Microsoft Entra ID, review the [BitLocker operations guide](operations-guide.md). - + > [!IMPORTANT] > Joining a computer to the domain should be the first step for new computers within an organization. After computers are joined to a domain, storing the BitLocker recovery key to AD DS is automatic (when enabled with policy settings). @@ -302,9 +302,9 @@ sections: Is there an event log entry recorded on the client computer to indicate the success or failure of the Microsoft Entra ID or Active Directory backup? answer: | Yes, an event log entry that indicates the success or failure of a backup is recorded on the client computer. However, even if an event log entry says "Success," the information could have been subsequently removed from AD DS, or BitLocker could have been reconfigured in such a way that the Active Directory information can no longer unlock the drive (such as by removing the recovery password key protector). In addition, it's also possible that the log entry could be spoofed. - + Ultimately, determining whether a legitimate backup exists in AD DS requires querying AD DS with domain administrator credentials by using the BitLocker password viewer tool. - + - question: | If I change the BitLocker recovery password on my computer and store the new password in AD DS, will AD DS overwrite the old password? answer: | @@ -314,11 +314,11 @@ sections: What happens if the backup initially fails? Will BitLocker retry it? answer: | If the backup initially fails, such as when a domain controller is unreachable at the time when the BitLocker setup wizard is run, BitLocker doesn't try again to back up the recovery information to AD DS. - + When an administrator selects the **Do not enable BitLocker until recovery information is stored in AD DS for (operating system | fixed data | removable data) drives** check box in any of the **Choose how BitLocker-protected operating system drives can be recovered**, **Choose how BitLocker-protected fixed data drives can be recovered**, and **Choose how BitLocker-protected removable data drives can be recovered** policy settings, users can't enable BitLocker unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds. With these settings configured if the backup fails, BitLocker can't be enabled, ensuring that administrators will be able to recover BitLocker-protected drives in the organization. - + For more info, see [BitLocker policy settings](configure.md). - + When an administrator clears these check boxes, the administrator is allowing a drive to be BitLocker-protected without having the recovery information successfully backed up to AD DS; however, BitLocker won't automatically retry the backup if it fails. Instead, administrators can create a backup script, as described earlier in [What if BitLocker is enabled on a computer before the computer joins the domain?](#what-if-bitlocker-is-enabled-on-a-computer-before-the-computer-joins-the-domain-) to capture the information after connectivity is restored. - name: Security @@ -336,29 +336,29 @@ sections: - question: | What are the implications of using the sleep or hibernate power management options? answer: | - BitLocker on operating system drives in its basic configuration provides extra security for the hibernate mode. In sleep mode, the computer is vulnerable to direct memory access attacks, since unprotected data remains in RAM. Therefore, for improved security, it's recommended to disable sleep mode. Startup authentication can be configured by using a [policy setting](configure.md). - + BitLocker on operating system drives in its basic configuration provides extra security for the hibernate mode. In sleep mode, the computer is vulnerable to direct memory access attacks, since unprotected data remains in RAM. Therefore, for improved security, it's recommended to disable sleep mode. Startup authentication can be configured by using a [policy setting](configure.md). + - question: | What are the advantages of a TPM? answer: | Most operating systems use a shared memory space and rely on the operating system to manage physical memory. A TPM is a hardware component that uses its own internal firmware and logic circuits for processing instructions, thus shielding it from external software vulnerabilities. Attacking the TPM requires physical access to the computer. Additionally, the tools and skills necessary to attack hardware are often more expensive, and usually aren't as available as the ones used to attack software. And because each TPM is unique to the computer that contains it, attacking multiple TPM computers would be difficult and time-consuming. - + > [!NOTE] > Configuring BitLocker with an additional factor of authentication provides even more protection against TPM hardware attacks. - + - name: Network Unlock questions: - question: | What is BitLocker Network Unlock? - answer: | + answer: | BitLocker Network Unlock enables easier management for BitLocker-enabled clients and servers that use the TPM+PIN protection method in a domain environment. When a computer that is connected to a wired corporate network is rebooted, Network Unlock allows the PIN entry prompt to be bypassed. It automatically unlocks BitLocker-protected operating system volumes by using a trusted key that is provided by the Windows Deployment Services server as its secondary authentication method. - + To use Network Unlock, a PIN must be configured for the computer. When the computer isn't connected to the network, a PIN will need to be provided to unlock it. - + BitLocker Network Unlock has software and hardware requirements for both client computers, Windows Deployment services, and domain controllers that must be met before it can be used. - + Network Unlock uses two protectors - the TPM protector and the protector provided by the network or by the PIN. Automatic unlock uses a single protector - the one stored in the TPM. If the computer is joined to a network without the key protector, it will prompt to enter a PIN. If the PIN isn't available, the recovery key will need to be used to unlock the computer if it can't be connected to the network. - + For more info, see [BitLocker: How to enable Network Unlock](network-unlock.md). - name: Use BitLocker with other programs @@ -397,7 +397,7 @@ sections: Why is the system check failing when I'm encrypting my operating system drive? answer: | The system check is designed to ensure the computer's BIOS or UEFI firmware is compatible with BitLocker and that the TPM is working correctly. The system check can fail for several reasons: - + - The computer's BIOS or UEFI firmware can't read USB flash drives - The computer's BIOS, uEFI firmware, or boot menu doesn't have reading USB flash drives enabled - There are multiple USB flash drives inserted into the computer @@ -405,7 +405,7 @@ sections: - The computer's BIOS or UEFI firmware only supports using the function keys (F1-F10) to enter numerals in the pre-boot environment - The startup key was removed before the computer finished rebooting - The TPM has malfunctioned and fails to unseal the keys - + - question: | What can I do if the recovery key on my USB flash drive can't be read? answer: | @@ -430,18 +430,18 @@ sections: How do I "lock" a data drive? answer: | Both fixed and removable data drives can be locked by using the Manage-bde command-line tool and the -lock command. - + > [!NOTE] > Ensure all data is saved to the drive before locking it. Once locked, the drive will become inaccessible. The syntax of this command is: - + ```cmd manage-bde.exe -lock ```` - + Outside of using this command, data drives will be locked on shutdown and restart of the operating system. A removable data drive will also be locked automatically when the drive is removed from the computer. - + - question: | Can I use BitLocker with the Volume Shadow Copy Service? answer: | @@ -453,9 +453,9 @@ sections: BitLocker should work like any specific physical machine within its hardware limitations as long as the environment (physical or virtual) meets Windows Operating System requirements to run. - With TPM: Yes, it's supported. - Without TPM: Yes, it's supported (with password protector). - + BitLocker is also supported on data volume VHDs, such as those used by clusters. - + - question: | Can I use BitLocker with virtual machines (VMs)? answer: | diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.svg index 0cddf31701..e712a4fff5 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.svg @@ -1,9 +1,9 @@ - - - - - - - - + + + + + + + + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/controlpanel.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/controlpanel.svg index 3f526ed38d..6eebbe9be8 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/controlpanel.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/controlpanel.svg @@ -1,9 +1,9 @@ - - + + - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/drive.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/drive.svg index fdd0ac46fd..0293932c8e 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/drive.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/drive.svg @@ -1,35 +1,35 @@ - - + + - - - - - - - + + + + + + + - + - + - + - + @@ -37,38 +37,38 @@ - + - + - + - + - + - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/locked-drive.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/locked-drive.svg index 9c1d764581..59a6edbe09 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/locked-drive.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/locked-drive.svg @@ -1,83 +1,83 @@ - - + + - - - - - - - + + + + + + + - + - + - + - + - + - + - + - + - + - - - - + + + + - - + + - - + + - + - - - - + + + + - - + + - - + + - + - - - + + + @@ -95,16 +95,16 @@ - + - + - - - + + + @@ -122,13 +122,13 @@ - + - - + + @@ -148,19 +148,19 @@ - + - + - + @@ -168,74 +168,74 @@ - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + @@ -243,42 +243,42 @@ - + - + - + - + - + - + - + - + - + @@ -286,51 +286,51 @@ - + - + - + - + - + - + - + - + - + - + - + - + @@ -341,10 +341,10 @@ - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/os-drive.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/os-drive.svg index 4b4f7f766f..504abbd5a9 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/os-drive.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/os-drive.svg @@ -1,57 +1,57 @@ - - + + - - - - - - - + + + + + + + - + - - + + - - + + - + - + - + - + - + - + - + - + - + - + - + - + @@ -59,19 +59,19 @@ - + - + - + @@ -79,50 +79,50 @@ - + - + - + - + - + - + - + - + - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/powershell.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/powershell.svg index f70257047f..3d90e2ff6f 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/powershell.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/powershell.svg @@ -1,9 +1,9 @@ - - + + - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/unlocked-drive.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/unlocked-drive.svg index 94f06bf78b..a8464ec134 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/unlocked-drive.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/unlocked-drive.svg @@ -1,73 +1,71 @@ - - - + + - - - - - - - + + + + + + + - + - - + + - - + + - + - + - + - + - + - + - + - + - + - + - + - - + - + - + - + @@ -75,50 +73,47 @@ - + - + - + - + - + - + - + - + - - - - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/includes/allow-warning-for-other-disk-encryption.md b/windows/security/operating-system-security/data-protection/bitlocker/includes/allow-warning-for-other-disk-encryption.md index 4463d21b87..8ec41110c5 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/includes/allow-warning-for-other-disk-encryption.md +++ b/windows/security/operating-system-security/data-protection/bitlocker/includes/allow-warning-for-other-disk-encryption.md @@ -15,7 +15,7 @@ With this policy you can disable all notification for encryption, warning prompt This policy takes effect only if [Require device encryption](../configure.md?tabs=os#require-device-encryption) policy is enabled. > [!WARNING] -> When you enable BitLocker on a device with third party encryption, it may render the device unusable and will require reinstallation of Windows. +> When you enable BitLocker on a device with non-Microsoft encryption, it may render the device unusable and will require reinstallation of Windows. The expected values for this policy are: diff --git a/windows/security/operating-system-security/data-protection/bitlocker/includes/configure-use-of-passwords-for-removable-data-drives.md b/windows/security/operating-system-security/data-protection/bitlocker/includes/configure-use-of-passwords-for-removable-data-drives.md index 336f1e1f59..bf37aeafae 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/includes/configure-use-of-passwords-for-removable-data-drives.md +++ b/windows/security/operating-system-security/data-protection/bitlocker/includes/configure-use-of-passwords-for-removable-data-drives.md @@ -14,7 +14,7 @@ This policy setting specifies whether a password is required to unlock BitLocker If you enable this policy setting, users can configure a password that meets the requirements you define. To enforce complexity requirements on the password, select **Require complexity**: -- When set to **Require complexity**, a connection to a domain controller is necessary when BitLocker is enabled to validate the complexity the password +- When set to **Require complexity**, a connection to a domain controller is necessary when BitLocker is enabled to validate the complexity of the password - When set to **Allow complexity**, a connection to a domain controller is attempted to validate that the complexity adheres to the rules set by the policy. If no domain controllers are found, the password is accepted regardless of actual password complexity and the drive will be encrypted using that password as a protector - When set to **Do not allow complexity**, password complexity isn't validated @@ -25,4 +25,4 @@ If you disable or don't configure this policy setting, the default length constr | | Path | |--|--| | **CSP** | Not available | -| **GPO** | **Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Removable Data Drives** | \ No newline at end of file +| **GPO** | **Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Removable Data Drives** | diff --git a/windows/security/operating-system-security/device-management/block-untrusted-fonts-in-enterprise.md b/windows/security/operating-system-security/device-management/block-untrusted-fonts-in-enterprise.md index 6e0afc3b28..75a3f08635 100644 --- a/windows/security/operating-system-security/device-management/block-untrusted-fonts-in-enterprise.md +++ b/windows/security/operating-system-security/device-management/block-untrusted-fonts-in-enterprise.md @@ -33,7 +33,7 @@ After you turn on this feature, your employees might experience reduced function - Sending a print job to a remote printer server that uses this feature and where the spooler process hasn't been excluded. In this situation, any fonts that aren't already available in the server's %windir%/Fonts folder won't be used. - Printing using fonts provided by the installed printer's graphics .dll file, outside of the %windir%/Fonts folder. For more information, see [Introduction to Printer Graphics DLLs](/windows-hardware/drivers/print/introduction-to-printer-graphics-dlls). -- Using first or third-party apps that use memory-based fonts. +- Using first or non-Microsoft apps that use memory-based fonts. - Using Internet Explorer to look at websites that use embedded fonts. In this situation, the feature blocks the embedded font, causing the website to use a default font. However, not all fonts have all of the characters, so the website might render differently. - Using desktop Office to look at documents with embedded fonts. In this situation, content shows up using a default font picked by Office. diff --git a/windows/security/operating-system-security/network-security/vpn/vpn-connection-type.md b/windows/security/operating-system-security/network-security/vpn/vpn-connection-type.md index d9b3f06811..a58cace67e 100644 --- a/windows/security/operating-system-security/network-security/vpn/vpn-connection-type.md +++ b/windows/security/operating-system-security/network-security/vpn/vpn-connection-type.md @@ -28,7 +28,7 @@ Tunneling protocols: ## Universal Windows Platform VPN plug-in -Using the UWP platform, third-party VPN providers can create app-containerized plug-ins using WinRT APIs, eliminating the complexity and problems often associated with writing to system-level drivers. +Using the UWP platform, non-Microsoft VPN providers can create app-containerized plug-ins using WinRT APIs, eliminating the complexity and problems often associated with writing to system-level drivers. There are many Universal Windows Platform VPN applications, such as Pulse Secure, Cisco AnyConnect, F5 Access, Sonicwall Mobile Connect, and Check Point Capsule. If you want to use a UWP VPN plug-in, work with your vendor for any custom settings needed to configure your VPN solution. @@ -41,7 +41,7 @@ The following image shows connection options in a VPN Profile configuration poli > [!div class="mx-imgBorder"] > ![Available connection types.](images/vpn-connection-intune.png) -In Intune, you can also include custom XML for third-party plug-in profiles: +In Intune, you can also include custom XML for non-Microsoft plug-in profiles: > [!div class="mx-imgBorder"] > ![Custom XML.](images/vpn-custom-xml-intune.png) diff --git a/windows/security/operating-system-security/network-security/vpn/vpn-security-features.md b/windows/security/operating-system-security/network-security/vpn/vpn-security-features.md index f6f19b8f96..a299f51731 100644 --- a/windows/security/operating-system-security/network-security/vpn/vpn-security-features.md +++ b/windows/security/operating-system-security/network-security/vpn/vpn-security-features.md @@ -9,7 +9,7 @@ ms.topic: concept-article ## Hyper-V based containers and VPN -Windows supports different kinds of Hyper-V based containers, like Microsoft Defender Application Guard and Windows Sandbox. When you use a third party VPN solution, the Hyper-V based containers may not be able to seamlessly connect to the internet, and configuration changes may be needed to resolve connectivity issues. +Windows supports different kinds of Hyper-V based containers, like Microsoft Defender Application Guard and Windows Sandbox. When you use a non-Microsoft VPN solution, the Hyper-V based containers may not be able to seamlessly connect to the internet, and configuration changes may be needed to resolve connectivity issues. For example, read about the workaround for Cisco AnyConnect VPN: [Cisco AnyConnect Secure Mobility Client Administrator Guide: Connectivity issues with VM-based subsystems](https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect410/administration/guide/b-anyconnect-admin-guide-4-10/troubleshoot-anyconnect.html#Cisco_Task_in_List_GUI.dita_3a9a8101-f034-4e9b-b24a-486ee47b5e9f). diff --git a/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line.md b/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line.md index bd157d28de..5abfd7f976 100644 --- a/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line.md @@ -1,6 +1,6 @@ --- title: Manage Windows Firewall with the command line -description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh. +description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh. ms.topic: how-to ms.date: 11/21/2023 --- @@ -61,7 +61,7 @@ Disabling Windows Firewall can also cause problems, including: - Activation of Windows via phone fails - Application or OS incompatibilities that depend on Windows Firewall -Microsoft recommends disabling Windows Firewall only when installing a third-party firewall, and resetting Windows Firewall back to defaults when the third-party software is disabled or removed. +Microsoft recommends disabling Windows Firewall only when installing a non-Microsoft firewall, and resetting Windows Firewall back to defaults when the non-Microsoft software is disabled or removed. If disabling Windows Firewall is required, don't disable it by stopping the Windows Firewall service (in the **Services** snap-in, the display name is Windows Firewall and the service name is MpsSvc). Stopping the Windows Firewall service isn't supported by Microsoft. Non-Microsoft firewall software can programmatically disable only the parts of Windows Firewall that need to be disabled for compatibility. diff --git a/windows/security/operating-system-security/network-security/windows-firewall/rules.md b/windows/security/operating-system-security/network-security/windows-firewall/rules.md index ec90e0fc47..10231bc2a6 100644 --- a/windows/security/operating-system-security/network-security/windows-firewall/rules.md +++ b/windows/security/operating-system-security/network-security/windows-firewall/rules.md @@ -44,7 +44,7 @@ When first installed, network applications and services issue a *listen call* sp In either of these scenarios, once the rules are added, they must be deleted to generate the prompt again. If not, the traffic continues to be blocked. > [!NOTE] -> The firewall's default settings are designed for security. Allowing all inbound connections by default introduces the network to various threats. Therefore, creating exceptions for inbound connections from third-party software should be determined by trusted app developers, the user, or the admin on behalf of the user. +> The firewall's default settings are designed for security. Allowing all inbound connections by default introduces the network to various threats. Therefore, creating exceptions for inbound connections from non-Microsoft software should be determined by trusted app developers, the user, or the admin on behalf of the user. ### WDAC tagging policies @@ -52,7 +52,7 @@ Windows Firewall supports the use of Windows Defender Application Control (WDAC) 1. Deploy *WDAC AppId tagging policies*: a Windows Defender Application Control policy must be deployed, which specifies individual applications or groups of applications to apply a *PolicyAppId tag* to the process token(s). Then, the admin can define firewall rules that are scoped to all processes tagged with the matching *PolicyAppId*. For more information, see the [WDAC AppId tagging guide](../../../application-security/application-control/windows-defender-application-control/AppIdTagging/wdac-appid-tagging-guide.md) to create, deploy, and test an AppID policy to tag applications. 1. Configure firewall rules using *PolicyAppId tags* using one of the two methods: - - Using the [PolicyAppId node of the Firewall CSP](/windows/client-management/mdm/firewall-csp#mdmstorefirewallrulesfirewallrulenamepolicyappid) with an MDM solution like Microsoft Intune. If you use Microsoft Intune, you can deploy the rules from Microsoft Intune Admin center, under the path **Endpoint security** > **Firewall** > **Create policy** > **Windows 10, Windows 11, and Windows Server** > **Windows Firewall Rules**. When creating the rules, provide the *AppId tag* in the **Policy App ID** setting + - Using the [PolicyAppId node of the Firewall CSP](/windows/client-management/mdm/firewall-csp#mdmstorefirewallrulesfirewallrulenamepolicyappid) with an MDM solution like Microsoft Intune. If you use Microsoft Intune, you can deploy the rules from Microsoft Intune Admin center, under the path **Endpoint security** > **Firewall** > **Create policy** > **Windows 10, Windows 11, and Windows Server** > **Windows Firewall Rules**. When creating the rules, provide the *AppId tag* in the **Policy App ID** setting - Create local firewall rules with PowerShell: use the [`New-NetFirewallRule`](/powershell/module/netsecurity/new-netfirewallrule) cmdlet and specify the `-PolicyAppId` parameter. You can specify one tag at a time while creating firewall rules. Multiple User Ids are supported ## Local policy merge and application rules diff --git a/windows/security/operating-system-security/system-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md b/windows/security/operating-system-security/system-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md index 90f2ed2f75..c30f214bdb 100644 --- a/windows/security/operating-system-security/system-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md +++ b/windows/security/operating-system-security/system-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md @@ -611,9 +611,9 @@ Finally, resources can be protected by denying access to endpoints that are unab Windows has an MDM client that ships as part of the operating system. This MDM client enables MDM servers to manage Windows-based devices without requiring a separate agent. -### Third-party MDM server support +### Non-Microsoft MDM server support -Third-party MDM servers can manage Windows by using the MDM protocol. The built-in management client is able to communicate with a compatible server that supports the OMA-DM protocol to perform enterprise management tasks. For more information, see [Microsoft Entra integration with MDM](/windows/client-management/mdm/azure-active-directory-integration-with-mdm). +Non-Microsoft MDM servers can manage Windows by using the MDM protocol. The built-in management client is able to communicate with a compatible server that supports the OMA-DM protocol to perform enterprise management tasks. For more information, see [Microsoft Entra integration with MDM](/windows/client-management/mdm/azure-active-directory-integration-with-mdm). > [!NOTE] > MDM servers do not need to create or download a client to manage Windows. For more information, see [Mobile device management](/windows/client-management/mdm/). diff --git a/windows/security/operating-system-security/system-security/toc.yml b/windows/security/operating-system-security/system-security/toc.yml index b9ce4be880..657b99e5df 100644 --- a/windows/security/operating-system-security/system-security/toc.yml +++ b/windows/security/operating-system-security/system-security/toc.yml @@ -13,8 +13,8 @@ items: href: ../../threat-protection/security-policy-settings/security-policy-settings.md - name: Security auditing href: ../../threat-protection/auditing/security-auditing-overview.md -- name: Assigned Access (kiosk mode) 🔗 - href: /windows/configuration/kiosk-methods +- name: Assigned Access 🔗 + href: /windows/configuration/assigned-access - name: Windows Security settings href: windows-defender-security-center/windows-defender-security-center.md items: diff --git a/windows/security/operating-system-security/system-security/windows-defender-security-center/wdsc-firewall-network-protection.md b/windows/security/operating-system-security/system-security/windows-defender-security-center/wdsc-firewall-network-protection.md index 310a26dc87..3ac877ec3f 100644 --- a/windows/security/operating-system-security/system-security/windows-defender-security-center/wdsc-firewall-network-protection.md +++ b/windows/security/operating-system-security/system-security/windows-defender-security-center/wdsc-firewall-network-protection.md @@ -7,7 +7,7 @@ ms.topic: article # Firewall and network protection -The **Firewall & network protection** section contains information about the firewalls and network connections used by the machine, including the status of Windows Defender Firewall and any other third-party firewalls. IT administrators and IT pros can get configuration guidance from the [Windows Defender Firewall with Advanced Security documentation library](../../network-security/windows-firewall/index.md). +The **Firewall & network protection** section contains information about the firewalls and network connections used by the machine, including the status of Windows Defender Firewall and any other non-Microsoft firewalls. IT administrators and IT pros can get configuration guidance from the [Windows Defender Firewall with Advanced Security documentation library](../../network-security/windows-firewall/index.md). This section can be hidden from users of the machine. This information is useful if you don't want employees in your organization to see or have access to user-configured options for the features shown in the section. diff --git a/windows/security/threat-protection/security-policy-settings/TOC.yml b/windows/security/threat-protection/security-policy-settings/TOC.yml deleted file mode 100644 index df9030461f..0000000000 --- a/windows/security/threat-protection/security-policy-settings/TOC.yml +++ /dev/null @@ -1,345 +0,0 @@ - - name: Security policy settings - href: security-policy-settings.md - items: - - name: Administer security policy settings - href: administer-security-policy-settings.md - items: - - name: Network List Manager policies - href: network-list-manager-policies.md - - name: Configure security policy settings - href: how-to-configure-security-policy-settings.md - - name: Security policy settings reference - href: security-policy-settings-reference.md - items: - - name: Account Policies - href: account-policies.md - items: - - name: Password Policy - href: password-policy.md - items: - - name: Enforce password history - href: enforce-password-history.md - - name: Maximum password age - href: maximum-password-age.md - - name: Minimum password age - href: minimum-password-age.md - - name: Minimum password length - href: minimum-password-length.md - - name: Password must meet complexity requirements - href: password-must-meet-complexity-requirements.md - - name: Store passwords using reversible encryption - href: store-passwords-using-reversible-encryption.md - - name: Account Lockout Policy - href: account-lockout-policy.md - items: - - name: Account lockout duration - href: account-lockout-duration.md - - name: Account lockout threshold - href: account-lockout-threshold.md - - name: Reset account lockout counter after - href: reset-account-lockout-counter-after.md - - name: Kerberos Policy - href: kerberos-policy.md - items: - - name: Enforce user logon restrictions - href: enforce-user-logon-restrictions.md - - name: Maximum lifetime for service ticket - href: maximum-lifetime-for-service-ticket.md - - name: Maximum lifetime for user ticket - href: maximum-lifetime-for-user-ticket.md - - name: Maximum lifetime for user ticket renewal - href: maximum-lifetime-for-user-ticket-renewal.md - - name: Maximum tolerance for computer clock synchronization - href: maximum-tolerance-for-computer-clock-synchronization.md - - name: Audit Policy - href: audit-policy.md - - name: Security Options - href: security-options.md - items: - - name: "Accounts: Administrator account status" - href: accounts-administrator-account-status.md - - name: "Accounts: Block Microsoft accounts" - href: accounts-block-microsoft-accounts.md - - name: "Accounts: Guest account status" - href: accounts-guest-account-status.md - - name: "Accounts: Limit local account use of blank passwords to console logon only" - href: accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md - - name: "Accounts: Rename administrator account" - href: accounts-rename-administrator-account.md - - name: "Accounts: Rename guest account" - href: accounts-rename-guest-account.md - - name: "Audit: Audit the access of global system objects" - href: audit-audit-the-access-of-global-system-objects.md - - name: "Audit: Audit the use of Backup and Restore privilege" - href: audit-audit-the-use-of-backup-and-restore-privilege.md - - name: "Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings" - href: audit-force-audit-policy-subcategory-settings-to-override.md - - name: "Audit: Shut down system immediately if unable to log security audits" - href: audit-shut-down-system-immediately-if-unable-to-log-security-audits.md - - name: "DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax" - href: dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md - - name: "DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax" - href: dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md - - name: "Devices: Allow undock without having to log on" - href: devices-allow-undock-without-having-to-log-on.md - - name: "Devices: Allowed to format and eject removable media" - href: devices-allowed-to-format-and-eject-removable-media.md - - name: "Devices: Prevent users from installing printer drivers" - href: devices-prevent-users-from-installing-printer-drivers.md - - name: "Devices: Restrict CD-ROM access to locally logged-on user only" - href: devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md - - name: "Devices: Restrict floppy access to locally logged-on user only" - href: devices-restrict-floppy-access-to-locally-logged-on-user-only.md - - name: "Domain controller: Allow server operators to schedule tasks" - href: domain-controller-allow-server-operators-to-schedule-tasks.md - - name: "Domain controller: LDAP server channel binding token requirements" - href: domain-controller-ldap-server-channel-binding-token-requirements.md - - name: "Domain controller: LDAP server signing requirements" - href: domain-controller-ldap-server-signing-requirements.md - - name: "Domain controller: Refuse machine account password changes" - href: domain-controller-refuse-machine-account-password-changes.md - - name: "Domain member: Digitally encrypt or sign secure channel data (always)" - href: domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md - - name: "Domain member: Digitally encrypt secure channel data (when possible)" - href: domain-member-digitally-encrypt-secure-channel-data-when-possible.md - - name: "Domain member: Digitally sign secure channel data (when possible)" - href: domain-member-digitally-sign-secure-channel-data-when-possible.md - - name: "Domain member: Disable machine account password changes" - href: domain-member-disable-machine-account-password-changes.md - - name: "Domain member: Maximum machine account password age" - href: domain-member-maximum-machine-account-password-age.md - - name: "Domain member: Require strong (Windows 2000 or later) session key" - href: domain-member-require-strong-windows-2000-or-later-session-key.md - - name: "Interactive logon: Display user information when the session is locked" - href: interactive-logon-display-user-information-when-the-session-is-locked.md - - name: "Interactive logon: Don't display last signed-in" - href: interactive-logon-do-not-display-last-user-name.md - - name: "Interactive logon: Don't display username at sign-in" - href: interactive-logon-dont-display-username-at-sign-in.md - - name: "Interactive logon: Do not require CTRL+ALT+DEL" - href: interactive-logon-do-not-require-ctrl-alt-del.md - - name: "Interactive logon: Machine account lockout threshold" - href: interactive-logon-machine-account-lockout-threshold.md - - name: "Interactive logon: Machine inactivity limit" - href: interactive-logon-machine-inactivity-limit.md - - name: "Interactive logon: Message text for users attempting to log on" - href: interactive-logon-message-text-for-users-attempting-to-log-on.md - - name: "Interactive logon: Message title for users attempting to log on" - href: interactive-logon-message-title-for-users-attempting-to-log-on.md - - name: "Interactive logon: Number of previous logons to cache (in case domain controller is not available)" - href: interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md - - name: "Interactive logon: Prompt user to change password before expiration" - href: interactive-logon-prompt-user-to-change-password-before-expiration.md - - name: "Interactive logon: Require Domain Controller authentication to unlock workstation" - href: interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md - - name: "Interactive logon: Require smart card" - href: interactive-logon-require-smart-card.md - - name: "Interactive logon: Smart card removal behavior" - href: interactive-logon-smart-card-removal-behavior.md - - name: "Microsoft network client: Digitally sign communications (always)" - href: microsoft-network-client-digitally-sign-communications-always.md - - name: "Microsoft network client: Send unencrypted password to third-party SMB servers" - href: microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md - - name: "Microsoft network server: Amount of idle time required before suspending session" - href: microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md - - name: "Microsoft network server: Attempt S4U2Self to obtain claim information" - href: microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md - - name: "Microsoft network server: Digitally sign communications (always)" - href: microsoft-network-server-digitally-sign-communications-always.md - - name: "Microsoft network server: Disconnect clients when logon hours expire" - href: microsoft-network-server-disconnect-clients-when-logon-hours-expire.md - - name: "Microsoft network server: Server SPN target name validation level" - href: microsoft-network-server-server-spn-target-name-validation-level.md - - name: "Network access: Allow anonymous SID/Name translation" - href: network-access-allow-anonymous-sidname-translation.md - - name: "Network access: Do not allow anonymous enumeration of SAM accounts" - href: network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md - - name: "Network access: Do not allow anonymous enumeration of SAM accounts and shares" - href: network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md - - name: "Network access: Do not allow storage of passwords and credentials for network authentication" - href: network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md - - name: "Network access: Let Everyone permissions apply to anonymous users" - href: network-access-let-everyone-permissions-apply-to-anonymous-users.md - - name: "Network access: Named Pipes that can be accessed anonymously" - href: network-access-named-pipes-that-can-be-accessed-anonymously.md - - name: "Network access: Remotely accessible registry paths" - href: network-access-remotely-accessible-registry-paths.md - - name: "Network access: Remotely accessible registry paths and subpaths" - href: network-access-remotely-accessible-registry-paths-and-subpaths.md - - name: "Network access: Restrict anonymous access to Named Pipes and Shares" - href: network-access-restrict-anonymous-access-to-named-pipes-and-shares.md - - name: "Network access: Restrict clients allowed to make remote calls to SAM" - href: network-access-restrict-clients-allowed-to-make-remote-sam-calls.md - - name: "Network access: Shares that can be accessed anonymously" - href: network-access-shares-that-can-be-accessed-anonymously.md - - name: "Network access: Sharing and security model for local accounts" - href: network-access-sharing-and-security-model-for-local-accounts.md - - name: "Network security: Allow Local System to use computer identity for NTLM" - href: network-security-allow-local-system-to-use-computer-identity-for-ntlm.md - - name: "Network security: Allow LocalSystem NULL session fallback" - href: network-security-allow-localsystem-null-session-fallback.md - - name: "Network security: Allow PKU2U authentication requests to this computer to use online identities" - href: network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md - - name: "Network security: Configure encryption types allowed for Kerberos" - href: network-security-configure-encryption-types-allowed-for-kerberos.md - - name: "Network security: Do not store LAN Manager hash value on next password change" - href: network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md - - name: "Network security: Force logoff when logon hours expire" - href: network-security-force-logoff-when-logon-hours-expire.md - - name: "Network security: LAN Manager authentication level" - href: network-security-lan-manager-authentication-level.md - - name: "Network security: LDAP client signing requirements" - href: network-security-ldap-client-signing-requirements.md - - name: "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients" - href: network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md - - name: "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers" - href: network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md - - name: "Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication" - href: network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md - - name: "Network security: Restrict NTLM: Add server exceptions in this domain" - href: network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md - - name: "Network security: Restrict NTLM: Audit incoming NTLM traffic" - href: network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md - - name: "Network security: Restrict NTLM: Audit NTLM authentication in this domain" - href: network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md - - name: "Network security: Restrict NTLM: Incoming NTLM traffic" - href: network-security-restrict-ntlm-incoming-ntlm-traffic.md - - name: "Network security: Restrict NTLM: NTLM authentication in this domain" - href: network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md - - name: "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers" - href: network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md - - name: "Recovery console: Allow automatic administrative logon" - href: recovery-console-allow-automatic-administrative-logon.md - - name: "Recovery console: Allow floppy copy and access to all drives and folders" - href: recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md - - name: "Shutdown: Allow system to be shut down without having to log on" - href: shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md - - name: "Shutdown: Clear virtual memory pagefile" - href: shutdown-clear-virtual-memory-pagefile.md - - name: "System cryptography: Force strong key protection for user keys stored on the computer" - href: system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md - - name: "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" - href: system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md - - name: "System objects: Require case insensitivity for non-Windows subsystems" - href: system-objects-require-case-insensitivity-for-non-windows-subsystems.md - - name: "System objects: Strengthen default permissions of internal system objects (Symbolic Links)" - href: system-objects-strengthen-default-permissions-of-internal-system-objects.md - - name: "System settings: Optional subsystems" - href: system-settings-optional-subsystems.md - - name: "System settings: Use certificate rules on Windows executables for Software Restriction Policies" - href: system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md - - name: "User Account Control: Admin Approval Mode for the Built-in Administrator account" - href: user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md - - name: "User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop" - href: user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md - - name: "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" - href: user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md - - name: "User Account Control: Behavior of the elevation prompt for standard users" - href: user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md - - name: "User Account Control: Detect application installations and prompt for elevation" - href: user-account-control-detect-application-installations-and-prompt-for-elevation.md - - name: "User Account Control: Only elevate executables that are signed and validated" - href: user-account-control-only-elevate-executables-that-are-signed-and-validated.md - - name: "User Account Control: Only elevate UIAccess applications that are installed in secure locations" - href: user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md - - name: "User Account Control: Run all administrators in Admin Approval Mode" - href: user-account-control-run-all-administrators-in-admin-approval-mode.md - - name: "User Account Control: Switch to the secure desktop when prompting for elevation" - href: user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md - - name: "User Account Control: Virtualize file and registry write failures to per-user locations" - href: user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md - - name: Advanced security audit policy settings - href: secpol-advanced-security-audit-policy-settings.md - - name: User Rights Assignment - href: user-rights-assignment.md - items: - - name: Access Credential Manager as a trusted caller - href: access-credential-manager-as-a-trusted-caller.md - - name: Access this computer from the network - href: access-this-computer-from-the-network.md - - name: Act as part of the operating system - href: act-as-part-of-the-operating-system.md - - name: Add workstations to domain - href: add-workstations-to-domain.md - - name: Adjust memory quotas for a process - href: adjust-memory-quotas-for-a-process.md - - name: Allow log on locally - href: allow-log-on-locally.md - - name: Allow log on through Remote Desktop Services - href: allow-log-on-through-remote-desktop-services.md - - name: Back up files and directories - href: back-up-files-and-directories.md - - name: Bypass traverse checking - href: bypass-traverse-checking.md - - name: Change the system time - href: change-the-system-time.md - - name: Change the time zone - href: change-the-time-zone.md - - name: Create a pagefile - href: create-a-pagefile.md - - name: Create a token object - href: create-a-token-object.md - - name: Create global objects - href: create-global-objects.md - - name: Create permanent shared objects - href: create-permanent-shared-objects.md - - name: Create symbolic links - href: create-symbolic-links.md - - name: Debug programs - href: debug-programs.md - - name: Deny access to this computer from the network - href: deny-access-to-this-computer-from-the-network.md - - name: Deny log on as a batch job - href: deny-log-on-as-a-batch-job.md - - name: Deny log on as a service - href: deny-log-on-as-a-service.md - - name: Deny log on locally - href: deny-log-on-locally.md - - name: Deny log on through Remote Desktop Services - href: deny-log-on-through-remote-desktop-services.md - - name: Enable computer and user accounts to be trusted for delegation - href: enable-computer-and-user-accounts-to-be-trusted-for-delegation.md - - name: Force shutdown from a remote system - href: force-shutdown-from-a-remote-system.md - - name: Generate security audits - href: generate-security-audits.md - - name: Impersonate a client after authentication - href: impersonate-a-client-after-authentication.md - - name: Increase a process working set - href: increase-a-process-working-set.md - - name: Increase scheduling priority - href: increase-scheduling-priority.md - - name: Load and unload device drivers - href: load-and-unload-device-drivers.md - - name: Lock pages in memory - href: lock-pages-in-memory.md - - name: Log on as a batch job - href: log-on-as-a-batch-job.md - - name: Log on as a service - href: log-on-as-a-service.md - - name: Manage auditing and security log - href: manage-auditing-and-security-log.md - - name: Modify an object label - href: modify-an-object-label.md - - name: Modify firmware environment values - href: modify-firmware-environment-values.md - - name: Perform volume maintenance tasks - href: perform-volume-maintenance-tasks.md - - name: Profile single process - href: profile-single-process.md - - name: Profile system performance - href: profile-system-performance.md - - name: Remove computer from docking station - href: remove-computer-from-docking-station.md - - name: Replace a process level token - href: replace-a-process-level-token.md - - name: Restore files and directories - href: restore-files-and-directories.md - - name: Shut down the system - href: shut-down-the-system.md - - name: Synchronize directory service data - href: synchronize-directory-service-data.md - - name: Take ownership of files or other objects - href: take-ownership-of-files-or-other-objects.md - - name: Windows security - href: /windows/security/ \ No newline at end of file diff --git a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md b/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md deleted file mode 100644 index 61b895b145..0000000000 --- a/windows/security/threat-protection/security-policy-settings/access-credential-manager-as-a-trusted-caller.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: Access Credential Manager as a trusted caller -description: Describes best practices, security considerations, and more for the security policy setting, Access Credential Manager as a trusted caller. -ms.assetid: a51820d2-ca5b-47dd-8e9b-d7008603db88 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Access Credential Manager as a trusted caller - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the recommended practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting. - -## Reference - -The **Access Credential Manager as a trusted caller** policy setting is used by Credential Manager during backup and restore. No accounts should have this privilege because it's assigned only to the Winlogon service. Saved credentials of users may be compromised if this privilege is given to other entities. - -Constant: SeTrustedCredManAccessPrivilege - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -- Don't modify this policy setting from the default. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table shows the default value for the server type or Group Policy Object (GPO). - -| Server type or GPO | Default value | -| - | - | -| Default domain policy | Not defined | -| Default domain controller policy | Not defined | -| Stand-alone server default settings | Not defined | -| Domain controller effective default settings | Not defined | -| Member server effective default settings | Not defined | -| Client computer effective default settings | Not defined | - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If an account is given this user right, the user of the account may create an application that calls into Credential Manager and is returned the credentials for another user. - -### Countermeasure - -Don't define the **Access Credential Manager as a trusted caller** policy setting for any accounts besides Credential Manager. - -### Potential impact - -None. Not defined is the default configuration. - -## Related topics -[User Rights Assignment](user-rights-assignment.md) - diff --git a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md deleted file mode 100644 index 58ab435398..0000000000 --- a/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network.md +++ /dev/null @@ -1,118 +0,0 @@ ---- -title: Access this computer from the network - security policy setting -description: Describes the best practices, location, values, policy management, and security considerations for the Access this computer from the network security policy setting. -ms.assetid: f6767bc2-83d1-45f1-847c-54f5362db022 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 06/11/2021 ---- - -# Access this computer from the network - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 -- Windows Server 2022 -- Windows Server 2019 -- Windows Server 2016 -- Azure Stack HCI - -Describes the best practices, location, values, policy management, and security considerations for the **Access this computer from the network** security policy setting. - -> [!WARNING] -> If running Windows Server or Azure Stack HCI Failover Clustering, don't remove Authenticated Users from the **Access this computer from the network** policy setting. Doing so may induce an unexpected production outage. This is due to the local user account CLIUSR that is used to run the cluster service. CLIUSR is not a member of the local Administrators group and if the Authenticated Users group is removed, the cluster service won't have sufficient rights to function or start properly. - -## Reference - -The **Access this computer from the network** policy setting determines which users can connect to the device from the network. This capability is required by many network protocols, including Server Message Block (SMB)-based protocols, NetBIOS, Common Internet File System (CIFS), and Component Object Model Plus (COM+). - -Users, devices, and service accounts gain or lose the **Access this computer from network** user right by being explicitly or implicitly added or removed from a security group that has been granted this user right. For example, a user account or a machine account may be explicitly added to a custom security group or a built-in security group, or it may be implicitly added by Windows to a computed security group such as Domain Users, Authenticated Users, or Enterprise Domain Controllers. -By default, user accounts and machine accounts are granted the **Access this computer from network** user right when computed groups such as Authenticated Users, and for domain controllers, the Enterprise Domain Controllers group, are defined in the default domain controllers Group Policy Object (GPO). - -Constant: SeNetworkLogonRight - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -- On desktop devices or member servers, grant this right only to users and administrators. -- On domain controllers, grant this right only to authenticated users, enterprise domain controllers, and administrators. -- On failover clusters, make sure this right is granted to authenticated users. -- This setting includes the **Everyone** group to ensure backward compatibility. Upon Windows upgrade, after you've verified that all users and groups are correctly migrated, you should remove the **Everyone** group and use the **Authenticated Users** group instead. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -|Server type of GPO | Default value | -| - | - | -| Default domain policy | Not defined | -| Default domain controller policy | Everyone, Administrators, Authenticated Users, Enterprise Domain Controllers, Pre-Windows 2000 Compatible Access | -| Stand-alone server default settings |Everyone, Administrators, Users, Backup Operators | -| Domain controller effective default settings | Everyone, Administrators, Authenticated Users, Enterprise Domain Controllers, Pre-Windows 2000 Compatible Access | -| Member server effective default settings | Everyone, Administrators, Users, Backup Operators | -| Client computer effective default settings |Everyone, Administrators, Users, Backup Operators | - -## Policy management - -When you modify this user right, the following actions might cause users and services to experience network access issues: - -- Removing the Enterprise Domain Controllers security group -- Removing the Authenticated Users group or an explicit group that allows users, computers, and service accounts the user right to connect to computers over the network -- Removing all user and machine accounts - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users who can connect from their device to the network can access resources on target devices for which they have permission. For example, the **Access this computer from the network** user right is required for users to connect to shared printers and folders. If this user right is assigned to the **Everyone** group, anyone in the group can read the files in those shared folders. This situation is unlikely because the groups created by a default installation of at least Windows Server 2008 R2 or Windows 7 don't include the **Everyone** group. However, if a device is upgraded and the original device includes the **Everyone** group as part of its defined users and groups, that group is transitioned as part of the upgrade process and is present on the device. - -### Countermeasure - -Restrict the **Access this computer from the network** user right to only those users and groups who require access to the computer. For example, if you configure this policy setting to the **Administrators** and **Users** groups, users who sign in to the domain can access resources that are shared -from servers in the domain if members of the **Domain Users** group are included in the local **Users** group. - -> **Note** If you are using IPsec to help secure network communications in your organization, ensure that a group that includes machine accounts is given this right. This right is required for successful computer authentication. Assigning this right to **Authenticated Users** or **Domain Computers** meets this requirement. - -### Potential impact - -If you remove the **Access this computer from the network** user right on domain controllers for all users, no one can sign in to the domain or use network resources. If you remove this user right on member servers, users can't connect to those servers through the network. If you have installed optional components such as ASP.NET or Internet Information Services (IIS), you may need to assign this user right to other accounts that are required by those components. It's important to verify that authorized users are assigned this user right for the devices that they need to access the network. - -If running Windows Server or Azure Stack HCI Failover Clustering, don't remove Authenticated Users from the Access this computer from the network policy setting. Doing so may induce an unexpected production outage. This outage is due to the local user account CLIUSR that is used to run the cluster service. CLIUSR isn't a member of the local Administrators group and if the Authenticated Users group is removed, the cluster service won't have sufficient rights to function or start properly. - -## Related topics -[User Rights Assignment](user-rights-assignment.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md b/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md deleted file mode 100644 index 23acbe9b1c..0000000000 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-duration.md +++ /dev/null @@ -1,80 +0,0 @@ ---- -title: Account lockout duration -description: Describes the best practices, location, values, and security considerations for the Account lockout duration security policy setting. -ms.assetid: a4167bf4-27c3-4a9b-8ef0-04e3c6ec3aa4 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 08/16/2021 ---- - -# Account lockout duration - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Account lockout duration** security policy setting. - -## Reference - -The **Account lockout duration** policy setting determines the number of minutes that a locked-out account remains locked out before automatically becoming unlocked. The available range is from 1 through 99,999 minutes. A value of 0 specifies that the account will be locked out until an administrator explicitly unlocks it. If **Account lockout threshold** is set to a number greater than zero, **Account lockout duration** must be greater than or equal to the value of [Reset account lockout counter after](reset-account-lockout-counter-after.md). -This policy setting is dependent on the **Account lockout threshold** policy setting that is defined, and it must be greater than or equal to the value specified for the [Reset account lockout counter after](reset-account-lockout-counter-after.md) policy setting. - -### Possible values - -- A user-defined number of minutes from 0 through 99,999 -- Not defined - -If [Account lockout threshold](account-lockout-threshold.md) is configured, after the specified number of failed attempts, the account will be locked out. If the **Account lockout duration** is set to 0, the account will remain locked until an administrator unlocks it manually. - -It's advisable to set **Account lockout duration** to approximately 15 minutes. To specify that the account will never be locked out, set the **Account lockout threshold** value to 0. - -### Location - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Account Lockout Policy** - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy's property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy | Not defined | -| Default domain controller policy | Not defined | -| Stand-alone server default settings | Not applicable | -| Domain controller effective default settings | Not defined | -| Member server effective default settings | Not defined | -| Client computer effective default settings | Not applicable | - -## Security considerations - -More than a few unsuccessful password submissions during an attempt to sign in to a computer might represent an attacker's attempts to determine an account password by trial and error. The Windows and Windows Server operating systems can track sign-in attempts, and you can configure the operating system to disable the account for a preset period of time after a specified number of failed attempts. Account lockout policy settings control the threshold for this response and what action to take after the threshold is reached. - -### Vulnerability - -A denial-of-service (DoS) condition can be created if an attacker abuses the [Account lockout threshold](account-lockout-threshold.md) policy setting and repeatedly attempts to sign in with a specific account. After you configure the Account lockout threshold policy setting, the account will be locked out after the specified number of failed attempts. If you configure the **Account lockout duration** policy setting to 0, the account remains locked until you unlock it manually. - -### Countermeasure - -Configure the **Account lockout duration** policy setting to an appropriate value for your environment. To specify that the account will remain locked until you manually unlock it, configure the value to 0. When the **Account lockout duration** policy setting is configured to a nonzero value, automated attempts to guess account passwords are delayed for this interval before resuming attempts against a specific account. Using this setting in combination with the [Account lockout threshold](account-lockout-threshold.md) policy setting makes automated password guessing attempts more difficult. - -### Potential impact - -Configuring the **Account lockout duration** policy setting to 0 so that accounts can't be automatically unlocked can increase the number of requests that your organization's Help Desk receives to unlock accounts that were locked by mistake. - -## Related topics - -[Account Lockout Policy](account-lockout-policy.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md b/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md deleted file mode 100644 index 25df645272..0000000000 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-policy.md +++ /dev/null @@ -1,47 +0,0 @@ ---- -title: Account Lockout Policy -description: Describes the Account Lockout Policy settings and links to information about each policy setting. -ms.assetid: eb968c28-17c5-405f-b413-50728cb7b724 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 10/11/2018 ---- - -# Account Lockout Policy - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the Account Lockout Policy settings and links to information about each policy setting. - -Someone who attempts to use more than a few unsuccessful passwords while trying to log on to your system might be a malicious user who is attempting to determine an account password by trial and error. Windows domain controllers keep track of logon attempts, and domain controllers can be configured to respond to this type of potential attack by disabling the account for a preset period of time. Account Lockout Policy settings control the threshold for this response and the actions to be taken after the threshold is reached. The Account Lockout Policy settings can be configured in the following location in the Group Policy Management Console: **Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Account Policies\\Account Lockout Policy**. - -The following topics provide a discussion of each policy setting's implementation and best practices considerations, policy location, default values for the server type or Group Policy Object (GPO), relevant differences in operating system versions, and security considerations (including the possible vulnerabilities of each policy setting), countermeasures that you can implement, and the potential impact of implementing the countermeasures. - ->[!NOTE] ->Account lockout settings for remote access clients can be configured separately by editing the Registry on the server that manages the remote access. For more information, see [How to configure remote access client account lockout](/troubleshoot/windows-server/networking/configure-remote-access-client-account-lockout). - -[!INCLUDE [account-lockout-policy](../../../../includes/licensing/account-lockout-policy.md)] - -## In this section - -| Topic | Description | -| - | - | -| [Account lockout threshold](account-lockout-threshold.md) | Describes the best practices, location, values, and security considerations for the **Account lockout threshold** security policy setting. | -| [Account lockout duration](account-lockout-duration.md) | Describes the best practices, location, values, and security considerations for the **Account lockout duration** security policy setting. | -| [Reset account lockout counter after](reset-account-lockout-counter-after.md) | Describes the best practices, location, values, and security considerations for the **Reset account lockout counter after** security policy setting. | - -## Related topics - -[Configure security policy settings](how-to-configure-security-policy-settings.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md deleted file mode 100644 index 7902e5d1c9..0000000000 --- a/windows/security/threat-protection/security-policy-settings/account-lockout-threshold.md +++ /dev/null @@ -1,131 +0,0 @@ ---- -title: Account lockout threshold -description: Describes the best practices, location, values, and security considerations for the Account lockout threshold security policy setting. -ms.assetid: 4904bb40-a2bd-4fef-a102-260ba8d74e30 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 11/02/2018 ---- - -# Account lockout threshold - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Account lockout threshold** security policy setting. - -## Reference - -The **Account lockout threshold** policy setting determines the number of failed sign-in attempts that will cause a user account to be locked. A locked account can't be used until you reset it or until the number of minutes specified by the [Account lockout duration](account-lockout-duration.md) policy setting expires. You can set a value from 1 through 999 failed sign-in attempts, or you can specify that the account will never be locked by setting the value to 0. If **Account lockout threshold** is set to a number greater than zero, **Account lockout duration** must be greater than or equal to the value of [Reset account lockout counter after](reset-account-lockout-counter-after.md). - -Brute force password attacks can be automated to try thousands or even millions of password combinations for any or all user accounts. Limiting the number of failed sign-ins that can be performed nearly eliminates the effectiveness of such attacks. -However, it's important to note that a denial-of-service (DoS) attack could be performed on a domain that has an account lockout threshold configured. A malicious user could programmatically attempt a series of password attacks against all users in the organization. If the number of attempts is greater than the value of **Account lockout threshold**, the attacker could potentially lock every account. - -Failed attempts to unlock a workstation can cause account lockout even if the [Interactive logon: Require Domain Controller authentication to unlock workstation](interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md) security option is disabled. Windows doesn't need to contact a domain controller for an unlock if you enter the same password that you logged on with, but if you enter a different password, Windows has to contact a domain controller in case you had changed your password from another machine. - -### Possible values - -It's possible to configure the following values for the **Account lockout threshold** policy setting: -- A user-defined number from 0 through 999 -- Not defined - -Because vulnerabilities can exist when this value is configured and when it's not, organizations should weigh their identified threats and the risks that they're trying to mitigate. For information these settings, see [Countermeasure](#bkmk-countermeasure) in this article. - -### Best practices - -The threshold that you select is a balance between operational efficiency and security, and it depends on your organization's risk level. To allow for user error and to thwart brute force attacks, [Windows security baselines](../../operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines.md) recommend a value of 10 could be an acceptable starting point for your organization. - -As with other account lockout settings, this value is more of a guideline than a rule or best practice because there's no "one size fits all." For more information, see [Configuring Account Lockout](/archive/blogs/secguide/configuring-account-lockout). - -Implementation of this policy setting is dependent on your operational environment; threat vectors, deployed operating systems, and deployed apps. For more information, see [Implementation considerations](#bkmk-impleconsiderations) in this article. - -### Location - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Account Lockout Policy** - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the property page for the policy setting. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy | 0 invalid sign-in attempts | -| Default domain controller policy | Not defined | -| Stand-alone server default settings | 0 invalid sign-in attempts | -| Domain controller effective default settings | 0 invalid sign-in attempts | -| Member server effective default settings |0 invalid sign-in attempts | -| Effective GPO default settings on client computers |0 invalid sign-in attempts | - -### Policy management - -This section describes features and tools that are available to help you manage this policy setting. - -### Restart requirements - -None. Changes to this policy setting become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Implementation considerations - -Implementation of this policy setting depends on your operational environment. Consider threat vectors, deployed operating systems, and deployed apps. For example: - -- The likelihood of an account theft or a DoS attack is based on the security design for your systems and environment. Set the account lockout threshold in consideration of the known and perceived risk of those threats. - -- When there's a negotiation of encryption types between clients, servers, and domain controllers, the Kerberos protocol can automatically retry account sign-in attempts that count toward the threshold limits that you set in this policy setting. In environments where different versions of the operating system are deployed, encryption type negotiation increases. - -- Not all apps that are used in your environment effectively manage how many times a user can attempt to sign in. For instance, if a connection drops repeatedly when a user is running the app, all subsequent failed sign-in attempts count toward the account lockout threshold. - -For more information about Windows security baseline recommendations for account lockout, see [Configuring Account Lockout](/archive/blogs/secguide/configuring-account-lockout). - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -> [!NOTE] -> A lockout threshold policy will apply to both local member computer users and domain users, in order to allow mitigation of issues as described under "Vulnerability". The built-in Administrator account, however, whilst a highly privileged account, has a different risk profile and is excluded from this policy. This ensures there is no scenario where an administrator cannot sign in to remediate an issue. As an administrator, there are additional mitigation strategies available, such as a strong password. See also [Appendix D: Securing Built-In Administrator Accounts in Active Directory](/windows-server/identity/ad-ds/plan/security-best-practices/appendix-d--securing-built-in-administrator-accounts-in-active-directory). - -### Vulnerability - -Brute force password attacks can use automated methods to try millions of password combinations for any user account. The effectiveness of such attacks can be almost eliminated if you limit the number of failed sign-in attempts that can be performed. -However, a DoS attack could be performed on a domain that has an account lockout threshold configured. An attacker could programmatically attempt a series of password attacks against all users in the organization. If the number of attempts is greater than the account lockout threshold, the attacker might be able to lock every account without needing any special privileges or being authenticated in the network. - -> [!NOTE] -> Offline password attacks are not countered by this policy setting. - - -### Countermeasure - -Because vulnerabilities can exist when this value is configured and when it's not configured, two distinct countermeasures are defined. Organizations should weigh the choice between the two, based on their identified threats and the risks that they want to mitigate. The two countermeasure options are: - -- Configure the **Account lockout threshold** setting to 0. This configuration ensures that accounts won't be locked, and it will prevent a DoS attack that intentionally attempts to lock accounts. This configuration also helps reduce Help Desk calls because users can't accidentally lock themselves out of their accounts. Because it doesn't prevent a brute force attack, this configuration should be chosen only if both of the following criteria are explicitly met: - - - The password policy setting requires all users to have complex passwords of eight or more characters. - - A robust audit mechanism is in place to alert administrators when a series of failed sign-ins occurs in the environment. - -- Configure the **Account lockout threshold** policy setting to a sufficiently high value to provide users with the ability to accidentally mistype their password several times before the account is locked, but ensure that a brute force password attack still locks the account. - - [Windows security baselines](../../operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines.md) recommend configuring a threshold of 10 invalid sign-in attempts, which prevents accidental account lockouts and reduces the number of Help Desk calls, but doesn't prevent a DoS attack. - - Using this type of policy must be accompanied by a process to unlock locked accounts. It must be possible to implement this policy whenever it's needed to help mitigate massive lockouts caused by an attack on your systems. - -### Potential impact - -If this policy setting is enabled, a locked account isn't usable until it's reset by an administrator or until the account lockout duration expires. Enabling this setting will likely generate many more Help Desk calls. - -If you configure the **Account lockout threshold** policy setting to 0, there's a possibility that a malicious user's attempt to discover passwords with a brute force password attack might go undetected if a robust audit mechanism isn't in place. - -If you configure this policy setting to a number greater than 0, an attacker can easily lock any accounts for which the account name is known. This situation is especially dangerous considering that no credentials other than access to the network are necessary to lock the accounts. - -## Related topics -[Account Lockout Policy](account-lockout-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/account-policies.md b/windows/security/threat-protection/security-policy-settings/account-policies.md deleted file mode 100644 index 979811c1da..0000000000 --- a/windows/security/threat-protection/security-policy-settings/account-policies.md +++ /dev/null @@ -1,42 +0,0 @@ ---- -title: Account Policies -description: An overview of account policies in Windows and provides links to policy descriptions. -ms.assetid: 711b3797-b87a-4cd9-a2e3-1f8ef18688fb -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Account Policies - -**Applies to** -- Windows 11 -- Windows 10 - -An overview of account policies in Windows and provides links to policy descriptions. - -All account policies settings applied by using Group Policy are applied at the domain level. Default values are present in the built-in default domain controller policy for Password Policy settings, Account Lockout Policy settings, and Kerberos Policy settings. The domain account policy becomes the default local account policy of any device that is a member of the domain. If these policies are set at any level below the domain level in Active Directory Domain Services (AD DS), they affect only local accounts on member servers. -> [!NOTE] -> Each domain can have only one account policy. The account policy must be defined in the default domain policy or in a new policy that is linked to the root of the domain and given precedence over the default domain policy, which is enforced by the domain controllers in the domain. These domain-wide account policy settings (Password Policy, Account Lockout Policy, and Kerberos Policy) are enforced by the domain controllers in the domain; therefore, domain controllers always retrieve the values of these account policy settings from the default domain policy Group Policy Object (GPO). - -The only exception is when another account policy is defined for an organizational unit (OU). The account policy settings for the OU affect the local policy on any computers that are contained in the OU. For example, if an OU policy defines a maximum password age that differs from the domain-level account policy, the OU policy will be applied and enforced only when users sign in to the local computer. The default local computer policies apply only to computers that are in a workgroup or in a domain where both an OU account policy and a domain policy don't apply. - -## In this section - -| Topic | Description | -| - | - | -| [Password Policy](password-policy.md) | An overview of password policies for Windows and links to information for each policy setting. | -| [Account Lockout Policy](account-lockout-policy.md) | Describes the Account Lockout Policy settings and links to information about each policy setting. | -| [Kerberos Policy](kerberos-policy.md) | Describes the Kerberos Policy settings and provides links to policy setting descriptions. | - -## Related topics - -[Configure security policy settings](how-to-configure-security-policy-settings.md) diff --git a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md deleted file mode 100644 index 2525359221..0000000000 --- a/windows/security/threat-protection/security-policy-settings/accounts-administrator-account-status.md +++ /dev/null @@ -1,111 +0,0 @@ ---- -title: Accounts Administrator account status -description: Describes the best practices, location, values, and security considerations for the Accounts Administrator account status security policy setting. -ms.assetid: 71a3bd48-1014-49e0-a936-bfe9433af23e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 08/01/2017 ---- - -# Accounts: Administrator account status - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Accounts: Administrator account status** security policy setting. - -## Reference - -This security setting determines whether the local Administrator account is enabled or disabled. - -The following conditions prevent disabling the Administrator account, even if this security setting is disabled. - -1. The Administrator account is currently in use -2. The Administrators group has no other members -3. All other members of the Administrators group are: - 1. Disabled - 2. Listed in the [Deny log on locally](deny-log-on-locally.md) User Rights Assignment - -If the Administrator account is disabled, you can't enable it if the password doesn't meet requirements. In this case, another member of the Administrators group must reset the password. - -### Possible values -- Enabled -- Disabled -- Not defined - -By default, this setting is **Not defined** on domain controllers and **Enabled** on stand-alone servers. - -### Best practices - -- Disabling the administrator account can become a maintenance issue under certain circumstances. For example, in a domain environment, if the secure channel that constitutes your connection fails for any reason, and there's no other local administrator account, you must restart the computer in safe mode to fix the problem that broke your connection status. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy |Not defined | -| Stand-Alone Server Default Settings | Enabled | -| DC Effective Default Settings | Enabled | -| Member Server Effective Default Settings | Enabled | -| Client Computer Effective Default Settings | Disabled | - -  -## Policy management - -Disabling the administrator account can become a maintenance issue under certain circumstances. Reasons that an organization might consider disabling the built-in administrator account include: - -- For some organizations, periodically changing the passwords for local accounts can be a daunting management challenge. -- By default, the administrator account can't be locked—no matter how many failed attempts to sign in a user accrue. This open state of the account makes it a prime target for brute-force, password-guessing attacks. -- This account has a well-known security identifier (SID). Some non-Microsoft tools allow you to authenticate over the network by specifying the SID rather than the account name. This authentication approach means that even if you rename the administrator account, a malicious user could start a brute-force attack by using the SID. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Safe mode considerations - -When you start a device in safe mode, the disabled administrator account is enabled only if the computer is non-domain joined and there are no other active local administrator accounts. In this case, you can access the computer by using safe mode with the current administrative credentials. If the computer is joined to a domain, the disabled administrator account isn't enabled. - -### How to access a disabled Administrator account - -You can use the following methods to access a disabled Administrator account: -- For non-domain joined computers: when all the local administrator accounts are disabled, start the device in safe mode (locally or over a network), and sign in by using the credentials for the default local administrator account on that computer. -- For domain-joined computers: remotely run the command **net user administrator /active: yes** by using psexec to enable the default local administrator account. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The built-in administrator account can't be locked out no matter how many failed logons it accrues, which makes it a prime target for brute-force attacks that attempt to guess passwords. Also, this account has a well-known security identifier (SID), and there are non-Microsoft tools that allow authentication by using the SID rather than the account name. Therefore, even if you rename the Administrator account, an attacker could launch a brute-force attack by using the SID to sign in. All other accounts that are members of the Administrator's group have the safeguard of locking out the account if the number of failed logons exceeds its configured maximum. - -### Countermeasure - -Disable the **Accounts: Administrator account status** setting so that the built-in Administrator account can't be used in a normal system startup. -If it's difficult to maintain a regular schedule for periodic password changes for local accounts, you can disable the built-in administrator account instead of relying on regular password changes to protect it from attack. - -### Potential impact - -Maintenance issues can arise under certain circumstances if you disable the administrator account. For example, if the secure channel between a member computer and the domain controller fails in a domain environment for any reason and there's no other local administrator account, you must restart in safe mode to fix the problem that caused the secure channel to fail. -If the current administrator password doesn't meet the password requirements, you can't enable the administrator account after it's disabled. If this situation occurs, another member of the administrators' group must set the password on the administrator account. - -## Related topics - -[Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md b/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md deleted file mode 100644 index 63a3b327b9..0000000000 --- a/windows/security/threat-protection/security-policy-settings/accounts-block-microsoft-accounts.md +++ /dev/null @@ -1,96 +0,0 @@ ---- -title: Accounts Block Microsoft accounts -description: Describes the best practices, location, values, management, and security considerations for the Accounts Block Microsoft accounts security policy setting. -ms.assetid: 94c76f45-057c-4d80-8d01-033cf28ef2f7 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 08/10/2017 ---- - -# Accounts: Block Microsoft accounts - -**Applies to** -- Windows 10, version 1607 and earlier - -Describes the best practices, location, values, management, and security considerations for the **Accounts: Block Microsoft accounts** security policy setting. - -> [!IMPORTANT] -> In Windows 10, version 1703 and later, this policy is no longer effective because the process for adding Microsoft Accounts changed. For Windows 10, version 1703 and later, instead of using this policy use the "Block all consumer Microsoft user account authentication" policy located under Computer Configuration\Administrative Templates\Windows Components\Microsoft account. - -## Reference - -This setting prevents using the **Settings** app to add a Microsoft account for single sign-on (SSO) authentication for Microsoft services and some background services, or using a Microsoft account for single sign-on to other applications or services. For more information, see [Microsoft Accounts](/windows-server/identity/ad-ds/manage/understand-microsoft-accounts). - -There are two options if this setting is enabled: - -- **Users can’t add Microsoft accounts** means that existing connected accounts can still sign in to the device (and appear on the sign-in screen). However, users can't use the **Settings** app to add new connected accounts (or connect local accounts to Microsoft accounts). - -- **Users can’t add or log on with Microsoft accounts** means that users can't add new connected accounts (or connect local accounts to Microsoft accounts) or use existing connected accounts through **Settings**. - -If you disable or don't configure this policy (recommended), users will be able to use Microsoft accounts with Windows. - -### Possible values -- This policy is disabled -- Users can’t add Microsoft accounts -- Users can’t add or sign in with Microsoft accounts - -By default, this setting isn't defined on domain controllers and disabled on stand-alone servers. - -### Best practices - -- If this policy setting is disabled or isn't configured on the client computer, users will be able to use their Microsoft account, local account, or domain account for their sign-in session to Windows. It also enables the user to connect a local or domain account to a Microsoft account. This ability to connect provides a convenient option for your users. -- If you need to limit the use of Microsoft accounts in your organization, click the **Users can’t add Microsoft accounts** setting option so that users won't be able to use the **Settings** app to add new connected accounts. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Disabled | -| DC Effective Default Settings | Disabled | -| Member Server Effective Default Settings | Disabled | -| Client Computer Effective Default Settings | Disabled | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of the countermeasure implementation. - -### Vulnerability - -Although Microsoft accounts are password-protected, they also have the potential of greater exposure outside of the enterprise. Additionally, if the owner of a Microsoft account isn't easily distinguishable, auditing and forensics become more difficult. - -### Countermeasure - -Require only domain accounts in your enterprise by limiting the use of Microsoft accounts. Click the **Users can’t add Microsoft accounts** setting option so that users won't be able to create new Microsoft accounts on a device, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. - -### Potential impact - -Establishing greater control over accounts in your organization can give you more secure management capabilities, including procedures around password resets. - -## Related topics - -[Security Options](security-options.md) - diff --git a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md b/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md deleted file mode 100644 index a61f1e0d49..0000000000 --- a/windows/security/threat-protection/security-policy-settings/accounts-guest-account-status.md +++ /dev/null @@ -1,78 +0,0 @@ ---- -title: Accounts Guest account status - security policy setting -description: Describes the best practices, location, values, and security considerations for the Accounts Guest account status security policy setting. -ms.assetid: 07e53fc5-b495-4d02-ab42-5b245d10d0ce -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Accounts: Guest account status - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Accounts: Guest account status** security policy setting. - -## Reference - -The **Accounts: Guest account status** policy setting determines whether the Guest account is enabled or disabled. -This account allows unauthenticated network users to gain access to the system by signing in as a Guest with no password. Unauthorized users can access any resources that are accessible to the Guest account over the network. This privilege means that any network shared folders with permissions that allow access to the Guest account, the Guests group, or the Everyone group will be accessible over the network. This accessibility can lead to the exposure or corruption of data. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -Set **Accounts: Guest account status** to Disabled so that the built-in Guest account is no longer usable. All network users will have to authenticate before they can access shared resources on the system. If the Guest account is disabled and [Network access: Sharing and security model for local accounts](network-access-sharing-and-security-model-for-local-accounts.md) is set to **Guest only**, network logons—such as those logons performed by the SMB Service—will fail. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Disabled | -| DC Effective Default Settings | Disabled | -| Member Server Effective Default Settings | Disabled | -| Client Computer Effective Default Settings | Disabled | - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The default Guest account allows unauthenticated network users to sign in as a Guest with no password. These unauthorized users could access any resources that are accessible to the Guest account over the network. This capability means that any shared folders with permissions that allow access to the Guest account, the Guests group, or the Everyone group are accessible over the network, which could lead to the exposure or corruption of data. - -### Countermeasure - -Disable the **Accounts: Guest account status** setting so that the built-in Guest account can't be used. - -### Potential impact - -All network users must be authenticated before they can access shared resources. If you disable the Guest account and the **Network Access: Sharing and Security Model** option is set to **Guest Only**, network logons, such as those performed by the Microsoft Network Server (SMB Service), fail. This policy setting should have little impact on most organizations because it's the default setting starting with Windows Vista and Windows Server 2003. - -## Related topics - -[Security Options](security-options.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md b/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md deleted file mode 100644 index a04536f260..0000000000 --- a/windows/security/threat-protection/security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: Accounts Limit local account use of blank passwords -description: Learn best practices, security considerations, and more for the policy setting, Accounts Limit local account use of blank passwords to console logon only. -ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Accounts: Limit local account use of blank passwords to console logon only - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Accounts: Limit local account use of blank passwords to console logon only** security policy setting. - -## Reference - -The **Accounts: Limit local account use of blank passwords to console logon only** policy setting determines whether remote interactive logons by network services such as Remote Desktop Services, Telnet, and File Transfer Protocol (FTP) are allowed for local accounts that have blank passwords. If this policy setting is enabled, a local account must have a nonblank password to be used to perform an interactive or network logon from a remote client. - -This policy setting doesn't affect interactive logons that are performed physically at the console or logons that use domain accounts. It's possible for non-Microsoft applications that use remote interactive logons to bypass this policy setting. -Blank passwords are a serious threat to computer security and they should be forbidden through both corporate policy and suitable technical measures. Nevertheless, if a user with the ability to create new accounts creates one that has bypassed your domain-based password policy settings, that account might have a blank password. For example, a user could build a stand-alone system, create one or more accounts with blank passwords, and then join the computer to the domain. The local accounts with blank passwords would still function. Anyone who knows the account name can then use accounts with blank passwords to sign in to systems. - -Devices that aren't in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the device can sign in by using a user account that doesn't have a password. This policy is especially important for portable devices. - -If you apply this security policy to the Everyone group, no one will be able to sign in through Remote Desktop Services. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- It's advisable to set **Accounts: Limit local account use of blank passwords to console logon only** to Enabled. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Enabled | -| DC Effective Default Settings | Enabled | -| Member Server Effective Default Settings | Enabled | -| Client Computer Effective Default Settings | Enabled | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -The policy as distributed through the GPO takes precedence over the locally configured policy setting on a computer joined to a domain. On the domain controller, use ADSI Edit or the dsquery command to determine effective minimum password length. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local device by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Blank passwords are a serious threat to computer security, and they should be forbidden through organizational policy and suitable technical measures. From Windows Server 2003, the default settings for Active Directory domains require complex passwords of at least seven characters, and eight characters starting with Windows Server 2008. However, if users with the ability to create new accounts bypass your domain-based password policies, they could create accounts with blank passwords. For example, a user could build a stand-alone computer, create one or more accounts with blank passwords, and then join the computer to the domain. The local accounts with blank passwords would still function. Anyone who knows the name of one of these unprotected accounts could then use it to sign in. - -### Countermeasure - -Enable the **Accounts: Limit local account use of blank passwords to console logon only** setting. - -### Potential impact - -None. This non-impact behavior is the default configuration. - -## Related topics -[Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md deleted file mode 100644 index 3740084b0b..0000000000 --- a/windows/security/threat-protection/security-policy-settings/accounts-rename-administrator-account.md +++ /dev/null @@ -1,95 +0,0 @@ ---- -title: Accounts Rename administrator account -description: This security policy reference topic for the IT professional describes the best practices, location, values, and security considerations for this policy setting. -ms.assetid: d21308eb-7c60-4e48-8747-62b8109844f9 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Accounts: Rename administrator account - -**Applies to** -- Windows 11 -- Windows 10 - -This security policy reference topic for the IT professional describes the best practices, location, values, and security considerations for this policy setting. - -## Reference - -The **Accounts: Rename administrator account** policy setting determines whether a different account name is associated with the security identifier (SID) for the administrator account. - -Because the administrator account exists on all Windows 10 for desktop editions (Home, Pro, Enterprise, and Education), renaming the account makes it slightly more difficult for attackers to guess this user name and password combination. - -Rename the Administrator account by specifying a value for the **Accounts: Rename administrator account** policy setting. - -### Possible values -- User-defined text -- Not defined - -### Best practices -- Be sure to inform users who are authorized to use this account of the new account name. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Administrator | -| DC Effective Default Settings | Administrator | -| Member Server Effective Default Settings | Administrator | -| Client Computer Effective Default Settings | Administrator | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local device by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The Administrator account exists on all versions Windows 10 for desktop editions. If you rename this account, it's slightly more difficult for unauthorized persons to guess this privileged user name and password combination. Beginning with Windows Vista, the person who installs the operating system specifies an account that is the first member of the Administrator group and has full rights to configure the computer so this countermeasure is applied by default on new installations. If a device is upgraded from a previous version of Windows, the account with the name administrator is retained with all the rights and privileges that were defined for the account in the previous installation. - -The built-in administrator account can't be locked out, regardless of how many times an attacker might use a bad password. This capability makes the administrator account a popular target for brute-force attacks that attempt to guess passwords. The value of this countermeasure is lessened because this account has a well-known SID, and there are non-Microsoft tools that allow authentication by using the SID rather than the account name. Therefore, even if you rename the Administrator account, an attacker could launch a brute-force attack by using the SID to sign in. - -### Countermeasure - -Specify a new name in the **Accounts: Rename administrator account** setting to rename the Administrator account. - -### Potential impact - -You must provide users who are authorized to use this account with the new account name. (The guidance for this setting assumes that the Administrator account wasn't disabled.) - -## Related topics - -[Security Options](security-options.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md b/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md deleted file mode 100644 index 1f3dd3b5f6..0000000000 --- a/windows/security/threat-protection/security-policy-settings/accounts-rename-guest-account.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: Accounts Rename guest account - security policy setting -description: Describes the best practices, location, values, and security considerations for the Accounts Rename guest account security policy setting. -ms.assetid: 9b8052b4-bbb9-4cc1-bfee-ce25390db707 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Accounts: Rename guest account - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Accounts: Rename guest account** security policy setting. - -## Reference - -The **Accounts: Rename guest account** policy setting determines whether a different account name is associated with the security identifier (SID) for the Guest account. - -### Possible values - -- *User-defined text* -- Guest - -### Best practices - -1. For devices in unsecured locations, renaming the account makes it more difficult for unauthorized users to guess it. -2. For computers in secured or trusted locations, keeping the name of the account as Guest provides consistency among devices - -### Location - -Computer Configuration\\Windows Settings\\Security Settings - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Guest | -| Default Domain Controller Policy | Guest | -| Stand-Alone Server Default Settings | Guest | -| DC Effective Default Settings | Guest | -| Member Server Effective Default Settings | Guest | -| Client Computer Effective Default Settings | *User-defined text* | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local device by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The guest account exists in all Windows server and client operating system versions beginning with Windows Server 2003 and Windows XP Professional. Because the account name is well known, it provides a vector for a malicious user to get access to network resources and attempt to elevate privileges -or install software that could be used for a later attack on your system. - -### Countermeasure - -Specify a new name in the **Accounts: Rename guest account** setting to rename the Guest account. If you rename this account, it's slightly more difficult for unauthorized persons to guess this privileged user name and password combination. - -### Potential impact - -There should be little impact because the Guest account is disabled by default in Windows 2000 Server, Windows Server 2003, and Windows XP. For later operating systems, the policy is enabled with **Guest** as the default. - -## Related topics - -[Security Options](security-options.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md b/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md deleted file mode 100644 index cf116b92be..0000000000 --- a/windows/security/threat-protection/security-policy-settings/act-as-part-of-the-operating-system.md +++ /dev/null @@ -1,91 +0,0 @@ ---- -title: Act as part of the operating system -description: Describes the best practices, location, values, policy management, and security considerations for the Act as part of the operating system security policy setting. -ms.assetid: c1b7e084-a9f7-4377-b678-07cc913c8b0c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Act as part of the operating system - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Act as part of the operating system** security policy setting. - -## Reference - -The **Act as part of the operating system** policy setting determines whether a process can assume the identity of any user and thereby gain access to the resources that the user is authorized to access. Typically, only low-level authentication services require this user right. Potential access isn't limited to what is associated with the user by default. The calling process may request that arbitrary extra privileges be added to the access token. The calling process may also build an access token that doesn't provide a primary identity for auditing in the system event logs. - -Constant: SeTcbPrivilege - -### Possible values -- User-defined list of accounts -- Not defined - -### Best practices -- Don't assign this right to any user accounts. Only assign this user right to trusted users. -- If a service requires this user right, configure the service to sign in by using the local System account, which inherently includes this user right. Don't create a separate account and assign this user right to it. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default domain policy | Not defined | -| Default domain controller policy| Not defined | -| Stand-alone server default settings | Not defined | -| Domain controller effective default settings | Not defined | -| Member server effective default settings | Not defined | -| Client computer effective default settings | Not defined | - -## Policy management - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The **Act as part of the operating system** user right is powerful. Users with this user right can take complete control of the device and erase evidence of their activities. - -### Countermeasure - -Restrict the **Act as part of the operating system** user right to as few accounts as possible—it shouldn't even be assigned to the Administrators group under typical circumstances. When a service requires this user right, configure the service to sign in with the Local System account, which inherently includes this privilege. Don't create a separate account and assign this user right to it. - -### Potential impact - -There should be little or no impact because the **Act as part of the operating system** user right is rarely needed by any accounts other than the Local System account. - -## Related topics -[User Rights Assignment](user-rights-assignment.md) - diff --git a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md b/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md deleted file mode 100644 index f73cdd251d..0000000000 --- a/windows/security/threat-protection/security-policy-settings/add-workstations-to-domain.md +++ /dev/null @@ -1,96 +0,0 @@ ---- -title: Add workstations to domain -description: Describes the best practices, location, values, policy management and security considerations for the Add workstations to domain security policy setting. -ms.reviewer: -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Add workstations to domain - -**Applies to** -- Windows Server - -Describes the best practices, location, values, policy management and security considerations for the **Add workstations to domain** security policy setting. - -## Reference - -This policy setting determines which users can add a device to a specific domain. For it to take effect, it must be assigned so that it applies to at least one domain controller. A user who is assigned this user right can add up to 10 workstations to the domain. -Adding a machine account to the domain allows the device to participate in Active Directory-based networking. - -Constant: SeMachineAccountPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- Configure this setting so that only authorized members of the IT team are allowed to add devices to the domain. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\User Rights Assignment\\ - -### Default values - -By default, this setting allows access for Authenticated Users on domain controllers, and it isn't defined on stand-alone servers. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not Defined | -| Default Domain Controller Policy | Not Defined | -| Stand-Alone Server Default Settings | Not Defined | -| Domain Controller Effective Default Settings | Authenticated Users | -| Member Server Effective Default Settings | Not Defined | -| Client Computer Effective Default Settings | Not Defined | - -## Policy management - -Users can also join a computer to a domain if they've the Create Computer Objects permission for an organizational unit (OU) or for the Computers container in the directory. Users who are assigned this permission can add an unlimited number of devices to the domain regardless of whether they've the **Add workstations to domain** user right. - -Furthermore, machine accounts that are created through the **Add workstations to domain** user right have Domain Administrators as the owner of the machine account. Machine accounts that are created through permissions on the computer’s container use the creator as the owner of the machine account. If a user has permissions on the container and also has the **Add workstation to domain** user right, the device is added based on the computer container permissions rather than the user right. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This policy has the following security considerations: - -### Vulnerability - -The **Add workstations to domain** user right presents a moderate vulnerability. Users with this right could add a device to the domain that is configured in a way that violates organizational security policies. For example, if your organization doesn't want its users to have administrative -privileges on their devices, users could install Windows on their computers and then add the computers to the domain. The user would know the password for the local administrator account, could sign in with that account, and then add a personal domain account to the local Administrators group. - -### Countermeasure - -Configure this setting so that only authorized members of the IT team are allowed to add computers to the domain. - -### Potential impact - -For organizations that have never allowed users to set up their own computers and add them to the domain, this countermeasure has no impact. For those organizations that have allowed some or all users to configure their own devices, this countermeasure forces the organization to establish a formal process for these procedures going forward. It doesn't affect existing computers unless they're removed from and then added to the domain. - -## Related topics -- [User Rights Assignment](user-rights-assignment.md) -  -  diff --git a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md b/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md deleted file mode 100644 index 6a963f20cf..0000000000 --- a/windows/security/threat-protection/security-policy-settings/adjust-memory-quotas-for-a-process.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Adjust memory quotas for a process -description: Describes the best practices, location, values, policy management, and security considerations for the Adjust memory quotas for a process security policy setting. -ms.assetid: 6754a2c8-6d07-4567-9af3-335fd8dd7626 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Adjust memory quotas for a process - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Adjust memory quotas for a process** security policy setting. - -## Reference - -This privilege determines who can change the maximum memory that can be consumed by a process. This privilege is useful for system tuning on a group or user basis. - -This user right is defined in the Default Domain Controller Group Policy Object (GPO) and in the local security policy of workstations and servers. - -Constant: SeIncreaseQuotaPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -1. Restrict the **Adjust memory quotas for a process** user right to only users who require the ability to adjust memory quotas to perform their jobs. -2. If this user right is necessary for a user account, it can be assigned to a local machine account instead of to a domain account. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\User Rights Assignment\\ - -### Default values - -By default, members of the Administrators, Local Service, and Network Service groups have this right. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Administrators
    Local Service
    Network Service | -| Default Domain Controller Policy | Administrators
    Local Service
    Network Service | -| Stand-Alone Server Default Settings | Administrators
    Local Service
    Network Service | -| Domain Controller Effective Default Settings | Administrators
    Local Service
    Network Service | -| Member Server Effective Default Settings | Administrators
    Local Service
    Network Service | -| Client Computer Effective Default Settings | Administrators
    Local Service
    Network Service | - -## Policy management - -A restart of the device is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -A user with the **Adjust memory quotas for a process** privilege can reduce the amount of memory that is available to any process, which could cause business-critical network applications to become slow or to fail. This privilege could be used by a malicious user to start a denial-of-service (DoS) attack. - -### Countermeasure - -Restrict the **Adjust memory quotas for a process** user right to users who require it to perform their jobs, such as application administrators who maintain database management systems or domain administrators who manage the organization's directory and its supporting infrastructure. - -### Potential impact - -Organizations that have not restricted users to roles with limited privileges may find it difficult to impose this countermeasure. Also, if you have installed optional components such as ASP.NET or IIS, you may need to assign the **Adjust memory quotas for a process** user right to additional accounts that are required by those components. IIS requires that this privilege be explicitly assigned to the IWAM\_<ComputerName>, Network Service, and Service accounts. Otherwise, this countermeasure should have no impact on most computers. If this user right is necessary for a user account, it can be assigned to a local computer account instead of to a domain account. - -## Related topics -- [User Rights Assignment](user-rights-assignment.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md deleted file mode 100644 index be7eb4d379..0000000000 --- a/windows/security/threat-protection/security-policy-settings/administer-security-policy-settings.md +++ /dev/null @@ -1,314 +0,0 @@ ---- -title: Administer security policy settings -description: This article discusses different methods to administer security policy settings on a local device or throughout a small- or medium-sized organization. -ms.assetid: 7617d885-9d28-437a-9371-171197407599 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Administer security policy settings - -**Applies to** - -- Windows 11 -- Windows 10 - -This article discusses different methods to administer security policy settings on a local device or throughout a small- or medium-sized organization. - -Security policy settings should be used as part of your overall security implementation to help secure domain controllers, servers, client devices, and other resources in your organization. - -Security settings policies are rules that you can configure on a device, or multiple devices, for protecting resources on a device or network. The Security Settings extension of the Local Group Policy Editor snap-in (Gpedit.msc) allows you to define security configurations as part of a Group Policy Object (GPO). The GPOs are linked to Active Directory containers such as sites, domains, and organizational units, and they enable administrators to manage security settings for multiple computers from any device joined to the domain. - -Security settings can control: - -- User authentication to a network or device. -- The resources that users are permitted to access. -- Whether to record a user's or group's actions in the event log. -- Membership in a group. - -For info about each setting, including descriptions, default settings, and management and security considerations, see [Security policy settings reference](security-policy-settings-reference.md). - -To manage security configurations for multiple computers, you can use one of the following options: - -- Edit specific security settings in a GPO. -- Use the Security Templates snap-in to create a security template that contains the security policies you want to apply, and then import the security template into a Group Policy Object. A security template is a file that represents a security configuration, and it can be imported to a GPO, or applied to a local device, or it can be used to analyze security. - -## What's changed in how settings are administered - -Over time, new ways to manage security policy settings have been introduced, which include new operating system features and the addition of new settings. The following table lists different means by which security policy settings can be administered. - -|Tool or feature |Description and use | -|---------|---------| -|[Security Policy snap-in](#using-the-local-security-policy-snap-in)|Secpol.msc
    MMC snap-in designed to manage only security policy settings.| -|[Security editor command line tool](#using-the-secedit-command-line-tool) |Secedit.exe
    Configures and analyzes system security by comparing your current configuration to specified security templates.| -|[Security Compliance Manager](#using-the-security-compliance-manager)|Tool download
    A Solution Accelerator that helps you plan, deploy, operate, and manage your security baselines for Windows client and server operating systems, and Microsoft applications.| -|[Security Configuration Wizard](#using-the-security-configuration-wizard)|Scw.exe
    SCW is a role-based tool available on servers only: You can use it to create a policy that enables services, firewall rules, and settings that are required for a selected server to perform specific roles.| -|[Security Configuration Manager tool](#working-with-the-security-configuration-manager)|This tool set allows you to create, apply, and edit the security for your local device, organizational unit, or domain.| -|[Group Policy](#working-with-group-policy-tools)|Gpmc.msc and Gpedit.msc
    The Group Policy Management Console uses the Group Policy Object editor to expose the local Security options, which can then be incorporated into Group Policy Objects for distribution throughout the domain. The Local Group Policy Editor performs similar functions on the local device.| -|Software Restriction Policies
    See [Administer Software Restriction Policies](/windows-server/identity/software-restriction-policies/administer-software-restriction-policies)|Gpedit.msc
    Software Restriction Policies (SRP) is a Group Policy-based feature that identifies software programs running on computers in a domain, and it controls the ability of those programs to run.| -|Administer AppLocker
    See [Administer AppLocker](/windows/device-security/applocker/administer-applocker)|Gpedit.msc
    Prevents malicious software (malware) and unsupported applications from affecting computers in your environment, and it prevents users in your organization from installing and using unauthorized applications.| - -## Using the Local Security Policy snap-in - -The Local Security Policy snap-in (Secpol.msc) restricts the view of local policy objects to the following policies and features: - -- Account Policies -- Local Policies -- Windows Firewall with Advanced Security -- Network List Manager Policies -- Public Key Policies -- Software Restriction Policies -- Application Control Policies -- IP Security Policies on Local Computer -- Advanced Audit Policy Configuration - -Policies set locally might be overwritten if the computer is joined to the domain. - -The Local Security Policy snap-in is part of the Security Configuration Manager tool set. For info about other tools in this tool set, see [Working with the Security Configuration Manager](#bkmk-scmtool) in this topic. - -## Using the secedit command-line tool - -The secedit command-line tool works with security templates and provides six primary functions: - -- The **Configure** parameter helps you resolve security discrepancies between devices by applying the correct security template to the errant server. -- The **Analyze** parameter compares the server's security configuration with the selected template. -- The **Import** parameter allows you to create a database from an existing template. The Security Configuration and Analysis tool does this cloning also. -- The **Export** parameter allows you to export the settings from a database into a security settings template. -- The **Validate** parameter allows you to validate the syntax of each or any lines of text that you created or added to a security template. This validation ensures that if the template fails to apply syntax, the template won't be the issue. -- The **Generate Rollback** parameter saves the server's current security settings into a security template so it can be used to restore most of the server's security settings to a known state. The exceptions are that, when applied, the rollback template won't change access control list entries on files or registry entries that were changed by the most recently applied template. - -## Using the Security Compliance Manager - -The Security Compliance Manager is a downloadable tool that helps you plan, deploy, operate, and manage your security baselines for Windows client and server operating systems, and for Microsoft applications. It contains a complete database of recommended security settings, methods to customize your baselines, and the option to implement those settings in multiple formats—including XLS, GPOs, Desired Configuration Management (DCM) packs, or Security Content Automation Protocol (SCAP). The Security Compliance Manager is used to export the baselines to your environment to automate the security baseline deployment and compliance verification process. - -**To administer security policies by using the Security Compliance Manager** - -1. Download the most recent version. You can find more info on the [Microsoft Security Baselines](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines) blog. -1. Read the relevant security baseline documentation that is included in this tool. -1. Download and import the relevant security baselines. The installation process steps you through baseline selection. -1. Open the Help and follow instructions how to customize, compare, or merge your security baselines before deploying those baselines. - -## Using the Security Configuration Wizard - -The Security Configuration Wizard (SCW) guides you through the process of creating, editing, applying, or rolling back a security policy. A security policy that you create with SCW is an .xml file that, when applied, configures services, network security, specific registry values, and audit policy. -SCW is a role-based tool: You can use it to create a policy that enables services, firewall rules, and settings that are required for a selected server to perform specific roles. For example, a server might be a file server, a print server, or a domain controller. - -The following are considerations for using SCW: - -- SCW disables unnecessary services and provides Windows Firewall with Advanced Security support. -- Security policies that are created with SCW aren't the same as security templates, which are files with an .inf extension. Security templates contain more security settings than those settings that can be set with SCW. However, it's possible to include a security template in an SCW security policy file. -- You can deploy security policies that you create with SCW by using Group Policy. -- SCW doesn't install or uninstall the features necessary for the server to perform a role. You can install server role-specific features through Server Manager. -- SCW detects server role dependencies. If you select a server role, it automatically selects dependent server roles. -- All apps that use the IP protocol and ports must be running on the server when you run SCW. -- In some cases, you must be connected to the Internet to use the links in the SCW help. - > [!NOTE] - > The SCW is available only on Windows Server and only applicable to server installations. - -The SCW can be accessed through Server Manager or by running scw.exe. The wizard steps you through server security configuration to: - -- Create a security policy that can be applied to any server on your network. -- Edit an existing security policy. -- Apply an existing security policy. -- Roll back the last applied security policy. - -The Security Policy Wizard configures services and network security based on the server's role, as well as configures auditing and registry settings. - -For more information about SCW, including procedures, see [Security Configuration Wizard](/previous-versions/orphan-topics/ws.11/cc754997(v=ws.11)). - -## Working with the Security Configuration Manager - -The Security Configuration Manager tool set allows you to create, apply, and edit the security for your local device, organizational unit, or domain. - -For procedures on how to use the Security Configuration Manager, see [Security Configuration Manager](/previous-versions/windows/it-pro/windows-server-2003/cc758219(v=ws.10)). - -The following table lists the features of the Security Configuration Manager. - -|Security Configuration Manager tools |Description | -|---------|---------| -|[Security Configuration and Analysis](#security-configuration-and-analysis) |Defines a security policy in a template. These templates can be applied to Group Policy or to your local computer.| -|[Security templates](#security-templates) |Defines a security policy in a template. These templates can be applied to Group Policy or to your local computer.| -|[Security Settings extension to Group Policy](#security-settings-extension-to-group-policy) |Edits individual security settings on a domain, site, or organizational unit.| -|[Local Security Policy](#local-security-policy)|Edits individual security settings on your local computer.| -|Secedit |Automates security configuration tasks at a command prompt.| - -### Security Configuration and Analysis - -Security Configuration and Analysis is an MMC snap-in for analyzing and configuring local system security. - -### Security analysis - -The state of the operating system and apps on a device is dynamic. For example, you may need to temporarily change security levels so that you can immediately resolve an administration or network issue. However, this change can often go unreversed. This unreversed state of the changes means that a computer may no longer meet the requirements for enterprise security. - -Regular analysis enables you to track and ensure an adequate level of security on each computer as part of an enterprise risk management program. You can tune the security levels and, most importantly, detect any security flaws that may occur in the system over time. - -Security Configuration and Analysis enables you to quickly review security analysis results. It presents recommendations alongside of current system settings and uses visual flags or remarks to highlight any areas where the current settings don't match the proposed level of security. Security Configuration and Analysis also offers the ability to resolve any discrepancies that analysis reveals. - -### Security configuration - -Security Configuration and Analysis can also be used to directly configure local system security. Through its use of personal databases, you can import security templates that have been created with Security Templates and apply these templates to the local computer. These security templates immediately configure the system security with the levels specified in the template. - -### Security templates - -With the Security Templates snap-in for Microsoft Management Console, you can create a security policy for your device or for your network. It's a single point of entry where the full range of system security can be taken into account. The Security Templates snap-in doesn't introduce new security parameters, it simply organizes all existing security attributes into one place to ease security administration. - -Importing a security template to a Group Policy Object eases domain administration by configuring security for a domain or organizational unit at once. - -To apply a security template to your local device, you can use Security Configuration and Analysis or the secedit command-line tool. - -Security templates can be used to define: - -- Account Policies - - Password Policy - - Account Lockout Policy - - Kerberos Policy -- Local Policies - - Audit Policy - - User Rights Assignment - - Security Options -- Event Log: Application, system, and security Event Log settings -- Restricted Groups: Membership of security-sensitive groups -- System Services: Startup and permissions for system services -- Registry: Permissions for registry keys -- File System: Permissions for folders and files - -Each template is saved as a text-based .inf file. This file enables you to copy, paste, import, or export some or all of the template attributes. With the exceptions of Internet Protocol security and public key policies, all security attributes can be contained in a security template. - -### Security settings extension to Group Policy - -Organizational units, domains, and sites are linked to Group Policy Objects. The security settings tool allows you to change the security configuration of the Group Policy Object, in turn, affecting multiple computers. With security settings, you can modify the security settings of many devices, depending on the Group Policy Object you modify, from just one device joined to a domain. - -Security settings or security policies are rules that are configured on a device or multiple devices for protecting resources on a device or network. Security settings can control: - -- How users are authenticated to a network or device -- What resources users are authorized to use -- Whether or not a user's or group's actions are recorded in the event log -- Group membership - -You can change the security configuration on multiple computers in two ways: - -- Create a security policy by using a security template with Security Templates, and then import the template through security settings to a Group Policy Object. -- Change a few select settings with security settings. - -### Local Security Policy - -A security policy is a combination of security settings that affect the security on a device. You can use your local security policy to edit account policies and local policies on your local device - -With the local security policy, you can control: - -- Who accesses your device -- What resources users are authorized to use on your device -- Whether or not a user's or group's actions are recorded in the event log - -If your local device is joined to a domain, you're subject to obtaining a security policy from the domain's policy or from the policy of any organizational unit that you're a member of. If you're getting a policy from more than one source, conflicts are resolved in the following order of precedence. - -1. Organizational unit policy -1. Domain policy -1. Site policy -1. Local computer policy - -If you modify the security settings on your local device by using the local security policy, then you're directly modifying the settings on your device. Therefore, the settings take effect immediately, but this effect may only be temporary. The settings will actually remain in effect on your local device until the next refresh of Group Policy security settings, when the security settings that are received from Group Policy will override your local settings wherever there are conflicts. - -### Using the Security Configuration Manager - -For procedures on how to use the Security Configuration Manager, see [Security Configuration Manager How To](/previous-versions/windows/it-pro/windows-server-2003/cc784762(v=ws.10)). This section contains information in this topic about: - -- [Applying security settings](#applying-security-settings) -- [Importing and exporting security templates](#importing-and-exporting-security-templates) -- [Analyzing security and viewing results](#analyzing-security-and-viewing-results) -- [Resolving security discrepancies](#resolving-security-discrepancies) -- [Automating security configuration tasks](#automating-security-configuration-tasks) - -### Applying security settings - -Once you've edited the security settings, the settings are refreshed on the computers in the organizational unit linked to your Group Policy Object: - -- When a device is restarted, the settings on that device will be refreshed. -- To force a device to refresh its security settings and all Group Policy settings, use gpupdate.exe. - -**Precedence of a policy when more than one policy is applied to a computer** - -For security settings that are defined by more than one policy, the following order of precedence is observed: - -1. Organizational Unit Policy -1. Domain Policy -1. Site Policy -1. Local computer Policy - -For example, a workstation that is joined to a domain will have its local security settings overridden by the domain policy wherever there's a conflict. Likewise, if the same workstation is a member of an Organizational Unit, the settings applied from the Organizational Unit's policy will override -both the domain and local settings. If the workstation is a member of more than one Organizational Unit, then the Organizational Unit that immediately contains the workstation has the highest order of precedence. - -> [!NOTE] -> Use gpresult.exe to find out what policies are applied to a device and in what order. -For domain accounts, there can be only one account policy that includes password policies, account lockout policies, and Kerberos policies. - -**Persistence in security settings** - -Security settings may still persist even if a setting is no longer defined in the policy that originally applied it. - -Persistence in security settings occurs when: - -- The setting hasn't been previously defined for the device. -- The setting is for a registry object. -- The setting is for a file system object. - -All settings applied through local policy or a Group Policy Object are stored in a local database on your device. Whenever a security setting is modified, the computer saves the security setting value to the local database, which retains a history of all the settings that have been applied to the device. If a policy first defines a security setting and then no longer defines that setting, then the setting takes on the previous value in the database. If a previous value doesn't exist in the database, then the setting doesn't revert to anything and remains defined as is. This behavior is sometimes called "tattooing." - -Registry and file settings will maintain the values applied through policy until that setting is set to other values. - -**Filtering security settings based on group membership** - -You can also decide what users or groups will or won't have a Group Policy Object applied to them regardless of what computer they've signed into by denying them either the Apply Group Policy or Read permission on that Group Policy Object. Both of these permissions are needed to apply Group Policy. - -### Importing and exporting security templates - -Security Configuration and Analysis enables import and export of security templates into or from a database. - -If you have made any changes to the analysis database, you can save those settings by exporting them into a template. The export feature enables saving the analysis database settings as a new template file. This template file can then be used to analyze or configure a system, or it can be imported to a Group Policy Object. - -### Analyzing security and viewing results - -Security Configuration and Analysis performs security analysis by comparing the current state of system security against an *analysis database*. During creation, the analysis database uses at least one security template. If you choose to import more than one security template, the database will merge the various templates and create one composite template. It resolves conflicts in order of import; the last template that is imported takes precedence. - -Security Configuration and Analysis displays the analysis results by security area, using visual flags to indicate problems. It displays the current system and base configuration settings for each security attribute in the security areas. To change the analysis database settings, right-click the entry, and then click **Properties**. - -|Visual flag |Meaning | -|---------|---------| -|Red X |The entry is defined in the analysis database and on the system, but the security setting values don't match.| -|Green check mark |The entry is defined in the analysis database and on the system and the setting values match.| -|Question mark |The entry isn't defined in the analysis database and, therefore, wasn't analyzed.
    If an entry isn't analyzed, it may be that it wasn't defined in the analysis database or that the user who is running the analysis may not have sufficient permission to perform analysis on a specific object or area.| -|Exclamation point |This item is defined in the analysis database, but doesn't exist on the actual system. For example, there may be a restricted group that is defined in the analysis database but doesn't actually exist on the analyzed system.| -|No highlight |The item isn't defined in the analysis database or on the system.| - -If you choose to accept the current settings, the corresponding value in the base configuration is modified to match them. If you change the system setting to match the base configuration, the change will be reflected when you configure the system with Security Configuration and Analysis. - -To avoid continued flagging of settings that you've investigated and determined to be reasonable, you can modify the base configuration. The changes are made to a copy of the template. - -### Resolving security discrepancies - -You can resolve discrepancies between analysis database and system settings by: - -- Accepting or changing some or all of the values that are flagged or not included in the configuration, if you determine that the local system security levels are valid due to the context (or role) of that computer. These attribute values are then updated in the database and applied to the system when you click **Configure Computer Now**. -- Configuring the system to the analysis database values, if you determine the system isn't in compliance with valid security levels. -- Importing a more appropriate template for the role of that computer into the database as the new base configuration and applying it to the system. -Changes to the analysis database are made to the stored template in the database, not to the security template file. The security template file will only be modified if you either return to Security Templates and edit that template or export the stored configuration to the same template file. -You should use **Configure Computer Now** only to modify security areas *not* affected by Group Policy settings, such as security on local files and folders, registry keys, and system services. Otherwise, when the Group Policy settings are applied, it will take precedence over local settings—such as account policies. -In general, don't use **Configure Computer Now** when you're analyzing security for domain-based clients, since you'll have to configure each client individually. In this case, you should return to Security Templates, modify the template, and reapply it to the appropriate Group Policy Object. - -### Automating security configuration tasks - -By calling the secedit.exe tool at a command prompt from a batch file or automatic task scheduler, you can use it to automatically create and apply templates, and analyze system security. You can also run it dynamically from a command prompt. -Secedit.exe is useful when you have multiple devices on which security must be analyzed or configured, and you need to perform these tasks during off-hours. - -## Working with Group Policy tools - -Group Policy is an infrastructure that allows you to specify managed configurations for users and computers through Group Policy settings and Group Policy Preferences. For Group Policy settings that affect only a local device or user, you can use the Local Group Policy Editor. You can manage Group Policy settings and Group Policy Preferences in an Active Directory Domain Services (AD DS) environment through the Group Policy Management Console (GPMC). Group Policy management tools also are included in the Remote Server Administration Tools pack to provide a way for you to administer Group Policy settings from your desktop. diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md deleted file mode 100644 index 0bb7fa0b5a..0000000000 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-locally.md +++ /dev/null @@ -1,115 +0,0 @@ ---- -title: Allow log on locally - security policy setting -description: Describes the best practices, location, values, policy management, and security considerations for the Allow log on locally security policy setting. -ms.assetid: d9e5e1f3-3bff-4da7-a9a2-4bb3e0c79055 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Allow log on locally - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Allow log on locally** security policy setting. - -## Reference - -This policy setting determines which users can start an interactive session on the device. Users must have this user right to log on over a Remote Desktop Services session that is running on a Windows-based member device or domain controller. -> **Note:**  Users who do not have this right are still able to start a remote interactive session on the device if they have the **Allow logon through Remote Desktop Services** right. - -Constant: SeInteractiveLogonRight - -### Possible values - -- User-defined list of accounts -- Not Defined - -By default, the members of the following groups have this right on workstations and servers: - -- Administrators -- Backup Operators -- Users - -By default, the members of the following groups have this right on domain controllers: - -- Account Operators -- Administrators -- Backup Operators -- Enterprise Domain Controllers -- Print Operators -- Server Operators - -### Best practices - -1. Restrict this user right to legitimate users who must log on to the console of the device. -2. If you selectively remove default groups, you can limit the abilities of users who are assigned to specific administrative roles in your organization. - -### Location - -Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not Defined | -| Default Domain Controller Policy | Account Operators
    Administrators
    Backup Operators
    Enterprise Domain Controllers
    Print Operators
    Server Operators | -| Stand-Alone Server Default Settings| Administrators
    Backup Operators
    Users | -| Domain Controller Effective Default Settings | Account Operators
    Administrators
    Backup Operators
    Enterprise Domain Controllers
    Print Operators
    Server Operators | -| Member Server Effective Default Settings | Administrators
    Backup Operators
    Users | -| Client Computer Effective Default Settings | Administrators
    Backup Operators
    Users | - -## Policy management - -Restarting the device is not required to implement this change. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -Modifying this setting might affect compatibility with clients, services, and applications. Use caution when removing service accounts that are used by components and by programs on member devices and on domain controllers in the domain from the default domain controller's policy. Also use caution when removing users or security groups that log on to the console of member devices in the domain, or removing service accounts that are defined in the local Security Accounts Manager (SAM) database of member devices or of workgroup devices. -If you want to grant a user account the ability to log on locally to a domain controller, you must make that user a member of a group that already has the **Allowed logon locally** system right or grant the right to that user account. -The domain controllers in the domain share the Default Domain Controllers Group Policy Object (GPO). When you grant an account the **Allow logon locally** right, you are allowing that account to log on locally to all domain controllers in the domain. -If the Users group is listed in the **Allow log on locally** setting for a GPO, all domain users can log on locally. The Users built-in group contains Domain Users as a member. - -### Group Policy - -Group Policy settings are applied through GPOs in the following order, which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Any account with the **Allow log on locally** user right can log on to the console of the device. If you do not restrict this user right to legitimate users who must log on to the console of the computer, unauthorized users could download and run malicious software to elevate their privileges. - -### Countermeasure - -For domain controllers, assign the **Allow log on locally** user right only to the Administrators group. For other server roles, you may choose to add Backup Operators in addition to Administrators. For end-user computers, you should also assign this right to the Users group. -Alternatively, you can assign groups such as Account Operators, Server Operators, and Guests to the **Deny log on locally** user right. - -### Potential impact - -If you remove these default groups, you could limit the abilities of users who are assigned to specific administrative roles in your environment. If you have installed optional components such as ASP.NET or IIS, you may need to assign the **Allow log on locally** user right to additional accounts that are required by those components. IIS requires that this user right be assigned to the IUSR\_*<ComputerName>* account. You should confirm that delegated activities are not adversely affected by any changes that you make to the **Allow log on locally** user rights assignments. - -## Related topics -- [User Rights Assignment](user-rights-assignment.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md deleted file mode 100644 index 1d44efc4b3..0000000000 --- a/windows/security/threat-protection/security-policy-settings/allow-log-on-through-remote-desktop-services.md +++ /dev/null @@ -1,108 +0,0 @@ ---- -title: Allow log on through Remote Desktop Services -description: Best practices, location, values, policy management, and security considerations for the security policy setting. Allow a sign-in through Remote Desktop Services. -ms.assetid: 6267c376-8199-4f2b-ae56-9c5424e76798 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Allow log on through Remote Desktop Services - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Allow log on through Remote Desktop Services** security policy setting. - -## Reference - -This policy setting determines which users or groups can access the sign-in screen of a remote device through a Remote Desktop Services connection. It's possible for a user to establish a Remote Desktop Services connection to a particular server but not be able to sign in to the console of that same server. - -Constant: SeRemoteInteractiveLogonRight - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- To control who can open a Remote Desktop Services connection and sign in to the device, add users to or remove users from the Remote Desktop Users group. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, members of the Administrators group have this right on domain controllers, workstations, and servers. The Remote Desktops Users group also has this right on workstations and servers. -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not Defined | -| Default Domain Controller Policy | Not Defined | -| Domain Controller Local Security Policy | Administrators | -| Stand-Alone Server Default Settings | Administrators
    Remote Desktop Users | -| Domain Controller Effective Default Settings | Administrators | -| Member Server Effective Default Settings | Administrators
    Remote Desktop Users | -| Client Computer Effective Default Settings | Administrators
    Remote Desktop Users | - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -### Group Policy - -To use Remote Desktop Services to successfully sign in to a remote device, the user or group must be a member of the Remote Desktop Users or Administrators group and be granted the **Allow log on through Remote Desktop Services** right. It's possible for a user to establish a Remote Desktop Services session to a particular server, but not be able to sign in to the console of that same server. - -To exclude users or groups, you can assign the **Deny log on through Remote Desktop Services** user right to those users or groups. However, be careful when you use this method because you could create conflicts for legitimate users or groups that have been allowed access through the **Allow log on through Remote Desktop Services** user right. - -For more information, see [Deny log on through Remote Desktop Services](deny-log-on-through-remote-desktop-services.md). - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -Group Policy settings are applied through GPOs in the following order, which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Any account with the **Allow log on through Remote Desktop Services** user right can sign in to the remote console of the device. If you don't restrict this user right to legitimate users who must sign in to the console of the computer, unauthorized users could download and run malicious software to elevate their privileges. - -### Countermeasure - -For domain controllers, assign the **Allow log on through Remote Desktop Services** user right only to the Administrators group. For other server roles and devices, add the Remote Desktop Users group. For servers that have the Remote Desktop (RD) Session Host role service enabled and don't run in Application Server mode, ensure that only authorized IT personnel who must manage the computers remotely belong to these groups. - -> **Caution:**  For RD Session Host servers that run in Application Server mode, ensure that only users who require access to the server have accounts that belong to the Remote Desktop Users group because this built-in group has this logon right by default. - -Alternatively, you can assign the **Deny log on through Remote Desktop Services** user right to groups such as Account Operators, Server Operators, and Guests. However, be careful when you use this method because you could block access to legitimate administrators who also belong to a group that has the **Deny log on through Remote Desktop Services** user right. - -### Potential impact - -Removal of the **Allow log on through Remote Desktop Services** user right from other groups (or membership changes in these default groups) could limit the abilities of users who perform specific administrative roles in your environment. You should confirm that delegated activities aren't adversely affected. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md b/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md deleted file mode 100644 index 179941bc1c..0000000000 --- a/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects.md +++ /dev/null @@ -1,124 +0,0 @@ ---- -title: Audit the access of global system objects -description: Describes the best practices, location, values, and security considerations for the audit of the access to global system objects security policy setting. -ms.assetid: 20d40a79-ce89-45e6-9bb4-148f83958460 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Audit: Audit the access of global system objects - -**Applies to** -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Audit: Audit the access of global system objects** security policy setting. - -## Reference - -If you enable this policy setting, a default system access control list (SACL) is applied when the device creates system objects such as mutexes, events, semaphores, and MS-DOS® devices. If you also enable the [Audit object access](../auditing/basic-audit-object-access.md) audit setting, access to these system objects is audited. - -Global system objects, also known as "base system objects" or "base named objects", are temporary kernel objects that have had names assigned to them by the application or system component that created them. These objects are most commonly used to synchronize multiple applications or multiple parts of a complex application. Because they have names, these objects are global in scope and, therefore, visible to all processes on the device. These objects all have a security descriptor; but typically, they don't have a NULL SACL. If you enable this policy setting and it takes effect at startup time, the kernel assigns a SACL to these objects when they're created. - -The threat is that a globally visible-named object, if incorrectly secured, might be acted on by a malicious program that knows the name of the object. For instance, if a synchronization object such as a mutex has a poorly constructed discretionary access control list (DACL), a malicious program can access that mutex by name and cause the program that created it to malfunction. However, the risk of this occurring is very low. - -Enabling this policy setting can generate a large number of security events, especially on busy domain controllers and application servers. This might cause servers to respond slowly and force the security log to record numerous events of little significance. Auditing for access to global system objects is an all-or-nothing affair; there's no way to filter which events get recorded and which don't. Even if an organization has the resources to analyze events generated when this policy setting is enabled, it's unlikely to have the source code or a description of what each named object is used for; therefore, it's unlikely that many organizations could benefit from enabling this policy setting. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Use the advanced security audit policy option, [Audit Kernel Object](../auditing/audit-kernel-object.md) in Advanced Security Audit Policy Settings\\Object Access, to reduce the number of unrelated audit events that you generate. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Disabled | -| DC Effective Default Settings | Disabled | -| Member Server Effective Default Settings | Disabled | -| Client Computer Effective Default Settings | Disabled | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -A restart of the computer is required before this policy will be effective when changes to this policy are saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console (GPMC) or Local Security Policy snap-in for a domain, site, or organizational unit (OU). - -### Auditing - -To audit the attempts to access global system objects, you can use one of the two security audit policy settings: - -- [Audit Kernel Object](../auditing/audit-kernel-object.md) in Advanced Security Audit Policy Settings\\Object Access -- [Audit Object Access](../auditing/basic-audit-object-access.md) under Security Settings\\Local Policies\\Audit Policy - -If possible, use the Advanced Security Audit Policy option to reduce the number of unrelated audit events that you generate. - -If the [Audit Kernel Object](../auditing/audit-kernel-object.md) setting is configured, the following events are generated: - -| Event ID | Event message | -| - | - | -| 4659 | A handle to an object was requested with intent to delete. | -| 4660 | An object was deleted. | -| 4661 | A handle to an object was requested. | -| 4663 | An attempt was made to access an object. | - -If the [Audit Object Access](../auditing/basic-audit-object-access.md) setting is configured, the following events are generated: - -| Event ID | Event message | -| - | - | -| 560 | Access was granted to an already existing object. | -| 562 | A handle to an object was closed. | -| 563 | An attempt was made to open an object with the intent to delete it.
    **Note:** This is used by file systems when the FILE_DELETE_ON_CLOSE flag is specified in Createfile() | -| 564 | A protected object was deleted. | -| 565 | Access was granted to an already existing object type. | -| 567 | A permission associated with a handle was used.
    **Note:** A handle is created with certain granted permissions (Read, Write, and so on). When the handle is used, up to one audit is generated for each of the permissions that was used. | -| 569 | The resource manager in Authorization Manager attempted to create a client context. | -| 570 | A client attempted to access an object.
    **Note:** An event will be generated for every attempted operation on the object. | - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -A globally visible named object, if incorrectly secured, could be acted upon by malicious software by using the name of the object. For instance, if a synchronization object such as a mutex had a poorly chosen discretionary access control list (DACL), malicious software could access that mutex by name and cause the program that created it to malfunction. However, the risk of such an occurrence is very low. - -### Countermeasure - -Enable the **Audit: Audit the access of global system objects** setting. - -### Potential impact - -If you enable the **Audit: Audit the access of global system objects** setting, a large number of security events could be generated, especially on busy domain controllers and application servers. Such an occurrence could cause servers to respond slowly and force the Security log to record numerous events of little significance. This policy setting can only be enabled or disabled, and there's no way to choose which events are recorded from this setting. Even organizations that have the resources to analyze events that are generated by this policy setting aren't likely to have the source code or a description of what each named object is used for. Therefore, it's unlikely that most organizations would benefit by enabling this policy setting. -To reduce the number of audit events generated, use the advanced audit policy. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md b/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md deleted file mode 100644 index 05c570e013..0000000000 --- a/windows/security/threat-protection/security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: "Audit: Audit the use of Backup and Restore privilege (Windows 10)" -description: "Describes the best practices, location, values, and security considerations for the 'Audit: Audit the use of Backup and Restore privilege' security policy setting." -ms.assetid: f656a2bb-e8d6-447b-8902-53df3a7756c5 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/01/2019 ---- - -# Audit: Audit the use of Backup and Restore privilege - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Audit: Audit the use of Backup and Restore privilege** security policy setting. - -## Reference - -The **Audit: Audit the use of Backup and Restore privilege** policy setting determines whether to audit the use of all user rights, including Backup and Restore, when the **Audit privilege use** policy setting is configured. Enabling both policy settings generates an audit event for every file that is backed up or restored. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Set **Audit: Audit the use of Backup and Restore privilege** to Disabled. Enabling this policy setting can generate a large number of security events, which might cause servers to respond slowly and force the security event log to record numerous events of little significance. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Disabled | -| DC Effective Default Settings | Disabled | -| Member Server Effective Default Settings | Disabled | -| Client Computer Effective Default Settings | Disabled | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Auditing - -Enabling this policy setting in conjunction with the **Audit privilege use** policy setting records any instance of user rights that are being exercised in the security log. If **Audit privilege use** is enabled but **Audit: Audit the use of Backup and Restore privilege** is disabled, when users back up or restore user rights, those events won't be audited. - -Enabling this policy setting when the **Audit privilege use** policy setting is also enabled generates an audit event for every file that is backed up or restored. This setup can help you to track down an administrator who is accidentally or maliciously restoring data in an unauthorized manner. - -Alternately, you can use the advanced audit policy, [Audit Sensitive Privilege Use](../auditing/audit-sensitive-privilege-use.md), which can help you manage the number of events generated. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -When the backup and restore function is used, it creates a copy of the file system that is identical to the target of the backup. Making regular backup and restore volumes is an important part of your incident response plan. However, a malicious user could use a legitimate backup copy to gain access to information or to impersonate a legitimate network resource to compromise your enterprise. - -### Countermeasure - -Enable the **Audit: Audit the use of Backup and Restore privilege** setting. Alternatively, implement automatic log backup by configuring the **AutoBackupLogFiles** registry key. If you enable this option when the [Audit privilege use](../auditing/basic-audit-privilege-use.md) setting is also enabled, an audit event is generated for every file that is backed up or restored. This information could help you to identify an account that was used to accidentally or maliciously restore data in an unauthorized manner. -For more information about configuring this key, see [Eventlog Key](/windows/desktop/EventLog/eventlog-key). - -### Potential impact - -If you enable this policy setting, a large number of security events could be generated, which could cause servers to respond slowly and force the security event log to record numerous events of little significance. If you increase the security event log size to reduce the chances of a system shutdown, an excessively large log file may affect system performance. - -## Related topics - -- [Security Options](security-options.md) - diff --git a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md b/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md deleted file mode 100644 index 1d81955c37..0000000000 --- a/windows/security/threat-protection/security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md +++ /dev/null @@ -1,102 +0,0 @@ ---- -title: Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings -description: Learn more about the security policy setting, Audit Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings. -ms.assetid: 8ddc06bc-b6d6-4bac-9051-e0d77035bd4e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings** security policy setting. - -## Reference - -You can manage your audit policy in a more precise way by using audit policy subcategories. - -There are over 40 auditing subcategories that provide precise details about activities on a device. For info about these subcategories, see the [Advanced security audit policy settings](../auditing/advanced-security-audit-policy-settings.md). - -### Possible values - -- Enabled -- Disabled - -### Best practices - -- Leave the setting enabled. This "enabled" state helps audit events at the category level without revising a policy. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Enabled | -| DC Effective Default Settings | Enabled | -| Member Server Effective Default Settings | Enabled | -| Client Computer Effective Default Settings | Enabled | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console (GPMC) or Local Security Policy snap-in for a domain, site, or organizational unit (OU). - -### Auditing - -To manage an audit policy by using subcategories without requiring a change to Group Policy, the SCENoApplyLegacyAuditPolicy registry value prevents the application of category-level audit policy from Group Policy and from the Local Security Policy administrative tool. - -If the category level audit policy that is set here isn't consistent with the events that are currently being generated, the cause might be that this registry key is set. - -### Command-line tools - -You can use auditpol.exe to display and manage audit policies from a command prompt. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Prior to the introduction of auditing subcategories in Windows Vista, it was difficult to track events at a per-system or per-user level. The larger event categories created too many events, and the key information that needed to be audited was difficult to find. - -### Countermeasure - -Enable audit policy subcategories as needed to track specific events. - -### Potential impacts - -If you attempt to modify an audit setting by using Group Policy after enabling this setting through the command-line tools, the Group Policy audit setting is ignored in favor of the custom policy setting. To modify audit settings by using Group Policy, you must first disable the -**SCENoApplyLegacyAuditPolicy** key. -> **Important:**  Be very cautious about audit settings that can generate a large volume of traffic. For example, if you enable success or failure auditing for all of the Privilege Use subcategories, the high volume of audit events that are generated can make it difficult to find other types of entries in the security event log. Such a configuration could also have a significant impact on system performance. - -## Related topics - -- [Security Options](security-options.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/audit-policy.md b/windows/security/threat-protection/security-policy-settings/audit-policy.md deleted file mode 100644 index 72c1169cf3..0000000000 --- a/windows/security/threat-protection/security-policy-settings/audit-policy.md +++ /dev/null @@ -1,44 +0,0 @@ ---- -title: Audit Policy -description: Provides information about basic audit policies that are available in Windows and links to information about each setting. -ms.assetid: 2e8ea400-e555-43e5-89d6-0898cb89da90 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Audit Policy - -**Applies to** -- Windows 11 -- Windows 10 - -Provides information about basic audit policies that are available in Windows and links to information about each setting. - -The security audit policy settings under **Security Settings\\Local Policies\\Audit Policy** provide broad security audit capabilities for client devices and servers that can't use advanced security audit policy settings. - -The basic audit policy settings under **Security Settings\\Local Policies\\Audit Policy** are: -- [Audit account logon events](../auditing/basic-audit-account-logon-events.md) -- [Audit account management](../auditing/basic-audit-account-management.md) -- [Audit directory service access](../auditing/basic-audit-directory-service-access.md) -- [Audit logon events](../auditing/basic-audit-logon-events.md) -- [Audit object access](../auditing/basic-audit-object-access.md) -- [Audit policy change](../auditing/basic-audit-policy-change.md) -- [Audit privilege use](../auditing/basic-audit-privilege-use.md) -- [Audit process tracking](../auditing/basic-audit-process-tracking.md) -- [Audit system events](../auditing/basic-audit-system-events.md) - -## Related topics - -- [Configure security policy settings](how-to-configure-security-policy-settings.md) -- [Security auditing](../auditing/security-auditing-overview.md) -  -  diff --git a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md b/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md deleted file mode 100644 index 4d0ab7c979..0000000000 --- a/windows/security/threat-protection/security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md +++ /dev/null @@ -1,98 +0,0 @@ ---- -title: Audit Shut down system immediately if unable to log security audits -description: Best practices, security considerations, and more for the security policy setting, Audit Shut down system immediately if unable to log security audits. -ms.assetid: 2cd23cd9-0e44-4d0b-a1f1-39fc29303826 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Audit: Shut down system immediately if unable to log security audits - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management practices, and security considerations for the **Audit: Shut down system immediately if unable to log security audits** security policy setting. - -## Reference - -The **Audit: Shut down system immediately if unable to log security audits** policy setting determines whether the system shuts down if it's unable to log security events. This policy setting is a requirement for Trusted Computer System Evaluation Criteria (TCSEC)-C2 and Common Criteria certification to prevent auditable events from occurring if the audit system is unable to log those events. Microsoft has chosen to meet this requirement by halting the system and displaying a Stop message if there's a failure of the auditing system. Enabling this policy setting stops the system if a security audit can't be logged for any reason. Typically, an event fails to be logged when the security audit log is full and the value of **Retention method for security log** is **Do not overwrite events (clear log manually)** or **Overwrite events by days**. - -With **Audit: Shut down system immediately if unable to log security audits** set to **Enabled**, if the security log is full and an existing entry can't be overwritten, the following Stop message appears: - -**STOP: C0000244 {Audit Failed}**: An attempt to generate a security audit failed. - -To recover, you must sign in, archive the log (optional), clear the log, and reset this option as desired. - -If the computer is unable to record events to the security log, critical evidence or important troubleshooting information might not be available for review after a security incident. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Depending on your security audit requirements, you can enable the **Audit: Shut down system immediately if unable to log security audits** setting to ensure that security auditing information is captured for review. However, enabling this setting will increase the number of events logged. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined -| Default Domain Controller Policy | Not defined -| Stand-Alone Server Default Settings | Disabled -| DC Effective Default Settings | Disabled -| Member Server Effective Default Settings | Disabled -| Client Computer Effective Default Settings | Disabled - -## Policy management - -This section describes features and tools that are available to help you manage this policy. -The administrative burden of enabling this policy setting can be high, especially if you also set the **Retention method for security log** to **Do not overwrite events (clear log manually)**. This setting turns a repudiation threat (a backup operator could deny that they backed up or restored data) into a denial-of-service threat, because a server can be forced to shut down if it's overwhelmed with sign-in events and other security events that are written to the security log. Additionally, because the shutdown isn't graceful, it's possible that irreparable damage to the operating system, applications, or data could result. Although the NTFS file system will guarantee that the file system's integrity will be maintained during a sudden system shutdown, it can't guarantee that every data file for every application will still be in a usable form when the system is restarted. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Modifying this setting may affect compatibility with clients, services, and applications. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If the computer is unable to record events to the security event log, critical evidence or important troubleshooting information may not be available for review after a security incident. Also, an attacker could potentially generate a large volume of security event log events to purposely force a shutdown. - -### Countermeasure - -Enable the **Audit: Shut down system immediately if unable to log security audits** setting to ensure that security auditing information is captured for review. - -### Potential impact - -If you enable this policy setting, the administrative burden can be significant, especially if you also configure the **Retention method for the Security log** to **Do not overwrite events** (clear log manually). This configuration causes a repudiation threat (a backup operator could deny that they backed up or restored data) to become a denial of service (DoS) vulnerability because a server could be forced to shut down if it's overwhelmed with sign-in events and other security events that are written to the security event log. Also, because the shutdown is abrupt, it's possible that irreparable damage to the operating system, applications, or data could result. Although the NTFS file system maintains its integrity when this type of computer shutdown occurs, there's no guarantee that every data file for every application will still be in a usable form when the device restarts. - -## Related topics - -- [Security Options](security-options.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md deleted file mode 100644 index 1ba7777a2b..0000000000 --- a/windows/security/threat-protection/security-policy-settings/back-up-files-and-directories.md +++ /dev/null @@ -1,117 +0,0 @@ ---- -title: Back up files and directories - security policy setting -description: Describes the recommended practices, location, values, policy management, and security considerations for the Back up files and directories security policy setting. -ms.assetid: 1cd6bdd5-1501-41f4-98b9-acf29ac173ae -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Back up files and directories - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the recommended practices, location, values, policy management, and security considerations for the **Back up files and directories** security policy setting. - -## Reference - -This user right determines which users can bypass file and directory, registry, and other persistent object permissions for the purposes of backing up the system. This user right is effective only when an application attempts access through the NTFS backup application programming interface (API) through a tool such as NTBACKUP.EXE. Otherwise, standard file and directory permissions apply. - -This user right is similar to granting the following permissions to the user or group you selected on all files and folders on the system: - -- Traverse Folder/Execute File -- List Folder/Read Data -- Read Attributes -- Read Extended Attributes -- Read Permissions - -Default on workstations and servers: - -- Administrators -- Backup Operators - -Default on domain controllers: - -- Administrators -- Backup Operators -- Server Operators - -Constant: SeBackupPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -1. Restrict the **Back up files and directories** user right to members of the IT team who must back up organizational data as part of their daily job responsibilities. Because there's no way to be sure that a user is backing up data, stealing data, or copying data to be distributed, only assign this user right to trusted users. -2. If your backup software runs under specific service accounts, only these accounts (and not the IT staff) should have the user right to back up files and directories. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, this right is granted to Administrators and Backup Operators on workstations and servers. On domain controllers, Administrators, Backup Operators, and Server Operators have this right. - -The following table lists the actual and effective default policy values for the server type or Group Policy Object (GPO). Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not Defined | -| Default Domain Controller Policy | Administrators
    Backup Operators
    Server Operators| -| Stand-Alone Server Default Settings | Administrators
    Backup Operators| -| Domain Controller Effective Default Settings | Administrators
    Backup Operators
    Server Operators| -| Member Server Effective Default Settings | Administrators
    Backup Operators| -| Client Computer Effective Default Settings | Administrators
    Backup Operators| - -## Policy management - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a GPO, which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users who can back up data from a device to separate media could take the media to a non-domain computer on which they have administrative privileges, and then restore the data. They could take ownership of the files and view any unencrypted data that is contained within the data set. - -### Countermeasure - -Restrict the **Back up files and directories** user right to members of the IT team who must back up organizational data as part of their daily job responsibilities. If you use software that backs up data under specific service accounts, only these accounts (and not the IT staff) should have the right to back up files and directories. - -### Potential impact - -Changes in the membership of the groups that have the user right to back up files and directories could limit the abilities of users who are assigned to specific administrative roles in your environment. Confirm that authorized administrators can still back up files and directories. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md b/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md deleted file mode 100644 index 153da82af0..0000000000 --- a/windows/security/threat-protection/security-policy-settings/bypass-traverse-checking.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Bypass traverse checking -description: Describes the best practices, location, values, policy management, and security considerations for the Bypass traverse checking security policy setting. -ms.assetid: 1c828655-68d3-4140-aa0f-caa903a7087e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Bypass traverse checking - -**Applies to** -- Windows 11 -- Windows 10 - ->Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare). - -Describes the best practices, location, values, policy management, and security considerations for the **Bypass traverse checking** security policy setting. - -## Reference - -This policy setting determines which users (or a process that acts on behalf of the user’s account) have permission to navigate an object path in the NTFS file system or in the registry without being checked for the Traverse Folder special access permission. This user right doesn't allow the user to list the contents of a folder. It only allows the user to traverse folders to access permitted files or subfolders. - -Constant: SeChangeNotifyPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -1. Use access–based enumeration when you want to prevent users from seeing any folder or file to which they don't have access. -2. Use the default settings of this policy in most cases. If you change the settings, verify your intent through testing. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not Defined | -| Default Domain Controller Policy | Administrators
    Authenticated Users
    Everyone
    Local Service
    Network Service
    Pre-Windows 2000 Compatible Access| -| Stand-Alone Server Default Settings | Administrators
    Backup Operators
    Users
    Everyone
    Local Service
    Network Service| -| Domain Controller Effective Default Settings | Administrators
    Authenticated Users
    Everyone
    Local Service
    Network Service
    Pre-Windows 2000 Compatible Access| -| Member Server Effective Default Settings | Administrators
    Backup Operators
    Users
    Everyone
    Local Service
    Network Service| -| Client Computer Effective Default Settings | Administrators
    Backup Operators
    Users
    Everyone
    Local Service
    Network Service| - -## Policy management - -Permissions to files and folders are controlled through the appropriate configuration of file system access control lists (ACLs). The ability to traverse the folder doesn't provide any Read or Write permissions to the user. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The default configuration for the **Bypass traverse checking** setting is to allow all users to bypass traverse checking. Permissions to files and folders are controlled through the appropriate configuration of file system access control lists (ACLs) because the ability to traverse the folder doesn't provide any Read or Write permissions to the user. The only scenario in which the default configuration could lead to a mishap would be if the administrator who configures permissions doesn't understand how this policy setting works. For example, the administrator might expect that users who are unable to access a folder are unable to access the contents of any child folders. Such a situation is unlikely, and, therefore, this vulnerability presents little risk. - -### Countermeasure - -Organizations that are concerned about security may want to remove the Everyone group from the list of groups that have the **Bypass traverse checking** user right. Taking explicit control over traversal assignments can be an effective way to limit access to sensitive information. Access–based enumeration can also be used. If you use access–based enumeration, users can't see any folder or file to which they don't have access. For more info about this feature, see [Access-based Enumeration](/previous-versions/windows/it-pro/windows-server-2003/cc784710(v=ws.10)). - -### Potential impact - -The Windows operating systems and many applications were designed with the expectation that anyone who can legitimately access the computer will have this user right. Therefore, we recommend that you thoroughly test any changes to assignments of the **Bypass traverse checking** user right before you make such changes to production systems. In particular, IIS requires this user right to be assigned to the Network Service, Local Service, IIS\_WPG, IUSR\_*<ComputerName>*, and IWAM\_*<ComputerName>* accounts. (It must also be assigned to the ASPNET account through its membership in the Users group.) We recommend that you leave this policy setting at its default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) - diff --git a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md b/windows/security/threat-protection/security-policy-settings/change-the-system-time.md deleted file mode 100644 index 7c3ac55c23..0000000000 --- a/windows/security/threat-protection/security-policy-settings/change-the-system-time.md +++ /dev/null @@ -1,113 +0,0 @@ ---- -title: Change the system time - security policy setting -description: Describes the best practices, location, values, policy management, and security considerations for the Change the system time security policy setting. -ms.assetid: f2f6637d-acbc-4352-8ca3-ec563f918e65 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Change the system time - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Change the system time** security policy setting. - -## Reference - -This policy setting determines which users can adjust the time on the device's internal clock. This right allows the computer user to change the date and time associated with records in the event logs, database transactions, and the file system. This right is also required by the process that performs time synchronization. This setting doesn't impact the user’s ability to change the time zone or other display characteristics of the system time. For info about assigning the right to change the time zone, see [Change the time zone](change-the-time-zone.md). - -Constant: SeSystemtimePrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- Restrict the **Change the system time** user right to users with a legitimate need to change the system time. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, members of the Administrators and Local Service groups have this right on workstations and servers. Members of the Administrators, Server Operators, and Local Service groups have this right on domain controllers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not Defined | -| Default Domain Controller Policy | Administrators
    Server Operators
    Local Service| -| Stand-Alone Server Default Settings | Administrators
    Local Service| -| DC Effective Default Settings | Administrators
    Server Operators
    Local Service| -| Member Server Effective Default Settings | Administrators
    Local Service| -| Client Computer Effective Default Settings | Administrators
    Local Service| - -## Policy management - -This section describes features, tools and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users who can change the time on a computer could cause several problems. For example: - -- Time stamps on event log entries could be made inaccurate -- Time stamps on files and folders that are created or modified could be incorrect -- Computers that belong to a domain might not be able to authenticate themselves -- Users who try to sign in to the domain from devices with inaccurate time might not be able to authenticate. - -Also, because the Kerberos authentication protocol requires that the requester and authenticator have their clocks synchronized within an administrator-defined skew period, an attacker who changes a device's time may cause that computer to be unable to obtain or grant Kerberos protocol tickets. - -The risk from these types of events is mitigated on most domain controllers, member servers, and end-user computers because the Windows Time Service automatically synchronizes time with domain controllers in the following ways: - -- All desktop client devices and member servers use the authenticating domain controller as their inbound time partner. -- All domain controllers in a domain nominate the primary domain controller (PDC) emulator operations master as their inbound time partner. -- All PDC emulator operations masters follow the hierarchy of domains in the selection of their inbound time partner. -- The PDC emulator operations master at the root of the domain is authoritative for the organization. Therefore, we recommend that you configure this computer to synchronize with a reliable external time server. - -This vulnerability becomes much more serious if an attacker is able to change the system time and then stop the Windows Time Service or reconfigure it to synchronize with a time server that isn't accurate. - -### Countermeasure - -Restrict the **Change the system time** user right to users with a legitimate need to change the system time, such as members of the IT team. - -### Potential impact - -There should be no impact because time synchronization for most organizations should be fully automated for all computers that belong to the domain. Computers that don't belong to the domain should be configured to synchronize with an external source, such as a web service. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md b/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md deleted file mode 100644 index 0c3b2e17fd..0000000000 --- a/windows/security/threat-protection/security-policy-settings/change-the-time-zone.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: Change the time zone - security policy setting -description: Describes the best practices, location, values, policy management, and security considerations for the Change the time zone security policy setting. -ms.assetid: 3b1afae4-68bb-472f-a43e-49e300d73e50 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Change the time zone - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Change the time zone** security policy setting. - -## Reference - -This policy setting determines which users can adjust the time zone that is used by the device for displaying the local time, which includes the device's system time plus the time zone offset. - -Constant: SeTimeZonePrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -None. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not Defined| -| Default Domain Controller Policy | Administrators
    Users| -| Stand-Alone Server Default Settings | Administrators
    Users| -| Domain Controller Effective Default Settings | Administrators
    Users| -| Member Server Effective Default Settings | Administrators
    Users| -| Client Computer Effective Default Settings | Administrators
    Users| - -## Policy management - -A restart of the device is not required for this policy setting to be effective. - -Any change to the account for this user right assignment becomes effective the next time the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Changing the time zone represents little vulnerability because the system time is not affected. This setting merely enables users to display their preferred time zone while being synchronized with domain controllers in different time zones. - -### Countermeasure - -Countermeasures are not required because system time is not affected by this setting. - -### Potential impact - -None. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md b/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md deleted file mode 100644 index 4b5f9a7ed6..0000000000 --- a/windows/security/threat-protection/security-policy-settings/create-a-pagefile.md +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: Create a pagefile - security policy setting -description: Describes the best practices, location, values, policy management, and security considerations for the Create a pagefile security policy setting. -ms.assetid: dc087897-459d-414b-abe0-cd86c8dccdea -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Create a pagefile - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Create a pagefile** security policy setting. - -## Reference - -Windows designates a section of the hard drive as virtual memory known as the page file, or more specifically, as pagefile.sys. It's used to supplement the computer’s Random Access Memory (RAM) to improve performance for frequently used programs and data. Although the file is hidden from browsing, you can manage it using the system settings. - -This policy setting determines which users can create and change the size of a page file. It determines whether users can specify a page file size for a particular drive in the **Performance Options** box located on the **Advanced** tab of the **System Properties** dialog box or through using internal application interfaces (APIs). - -Constant: SeCreatePagefilePrivilege - -### Possible values - -- User-defined list of accounts -- Administrators - -### Best practices - -- Restrict the **Create a pagefile** user right to Administrators, which is the default. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, members of the Administrators group have this right. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Administrators | -| Default Domain Controller Policy | Administrators | -| Stand-Alone Server Default Settings | Administrators | -| Domain Controller Effective Default Settings | Administrators | -| Member Server Effective Default Settings | Administrators | -| Client Computer Effective Default Settings | Administrators | - -## Policy management - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users who can change the page file size could make it small or move the file to a highly fragmented storage volume, which could cause reduced device performance. - -### Countermeasure - -Restrict the **Create a pagefile** user right to members of the Administrators group. - -### Potential impact - -None. Restricting this right to members of the Administrators group is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md b/windows/security/threat-protection/security-policy-settings/create-a-token-object.md deleted file mode 100644 index e45a81f726..0000000000 --- a/windows/security/threat-protection/security-policy-settings/create-a-token-object.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Create a token object -description: Describes the best practices, location, values, policy management, and security considerations for the Create a token object security policy setting. -ms.assetid: bfbf52fc-6ba4-442a-9df7-bd277e55729c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Create a token object - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Create a token object** security policy setting. - -## Reference - -This policy setting determines which accounts a process can use to create a token, and which accounts it can then use to gain access to local resources when the process uses NtCreateToken() or other token-creation APIs. - -When a user signs in to the local device or connects to a remote device through a network, Windows builds the user’s access token. Then the system examines the token to determine the level of the user's privileges. When you revoke a privilege, the change is immediately recorded, but the change isn't reflected in the user's access token until the next time the user logs on or connects. - -Constant: SeCreateTokenPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- This user right is used internally by the operating system. Unless it's necessary, don't assign this user right to a user, group, or process other than Local System. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -This user right is used internally by the operating system. By default, it isn't assigned to any user groups. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not Defined | -| Default Domain Controller Policy | Not Defined | -| Stand-Alone Server Default Settings | Not Defined | -| Domain Controller Effective Default Settings | Local System | -| Member Server Effective Default Settings | Local System | -| Client Computer Effective Default Settings | Local System | - -## Policy management - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - ->**Caution:**  A user account that is given this user right has complete control over the system, and it can lead to the system being compromised. We highly recommend that you do not assign this right to any user accounts. - -Windows examines a user's access token to determine the level of the user's privileges. Access tokens are built when users sign in to the local device or connect to a remote device over a network. When you revoke a privilege, the change is immediately recorded, but the change isn't reflected in the user's access token until the next time the user logs on or connects. Users with the ability to create or modify tokens can change the level of access for any account on a computer if they're currently logged on. They could escalate their privileges or create a DoS condition. - -### Countermeasure - -Don't assign the **Create a token object** user right to any users. Processes that require this user right should use the Local System account, which already includes it, instead of a separate user account that has this user right assigned. - -### Potential impact - -None. Not Defined is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/create-global-objects.md b/windows/security/threat-protection/security-policy-settings/create-global-objects.md deleted file mode 100644 index e20df384f0..0000000000 --- a/windows/security/threat-protection/security-policy-settings/create-global-objects.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Create global objects -description: Describes the best practices, location, values, policy management, and security considerations for the Create global objects security policy setting. -ms.assetid: 9cb6247b-44fc-4815-86f2-cb59b6f0221e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Create global objects - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Create global objects** security policy setting. - -## Reference - -This policy setting determines which users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they don't have this user right. - -A global object is an object that can be used by any number of processes or threads, even those processes or threads not started within the user’s session. Remote Desktop Services uses global objects in its processes to facilitate connections and access. - -Constant: SeCreateGlobalPrivilege - -### Possible values - -- User-defined list of accounts -- Default accounts listed below - -### Best practices - -- Don't assign any user accounts this right. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, members of the Administrators group have this right, as do Local Service and Network Service accounts on the supported versions of Windows. Service is included for backwards compatibility with earlier versions of Windows. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not Defined | -| Default Domain Controller Policy | Administrators
    Local Service
    Network Service
    Service| -| Stand-Alone Server Default Settings | Administrators
    Local Service
    Network Service
    Service| -| Domain Controller Effective Default Settings | Administrators
    Local Service
    Network Service
    Service| -| Member Server Effective Default Settings | Administrators
    Local Service
    Network Service
    Service| -| Client Computer Effective Default Settings | Administrators
    Local Service
    Network Service
    Service| - -## Policy management - -A restart of the device isn't required for this policy setting to take effect. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The **Create global objects** user right is required for a user account to create global file mapping and symbolic link objects. Users can still create session-specfic objects without being assigned this user right. Assigning this right can be a security risk. - -By default, members of the **Administrators** group, the System account, and services that are started by the Service Control Manager are assigned the **Create global objects** user right. Users who are added to the **Remote Desktop Users** group also have this user right. - -### Countermeasure - -When non-administrators need to access a server using Remote Desktop, add the users to the **Remote Desktop Users** group rather than assigning them this user right. - -### Potential impact - -None. Not Defined is the default domain policy configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md b/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md deleted file mode 100644 index 8e28020f73..0000000000 --- a/windows/security/threat-protection/security-policy-settings/create-permanent-shared-objects.md +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: Create permanent shared objects -description: Describes the best practices, location, values, policy management, and security considerations for the Create permanent shared objects security policy setting. -ms.assetid: 6a58438d-65ca-4c4a-a584-450eed976649 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Create permanent shared objects - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Create permanent shared objects** security policy setting. - -## Reference - -This user right determines which accounts can be used by processes to create a directory object by using the object manager. Directory objects include Active Directory objects, files and folders, printers, registry keys, processes, and threads. Users who have this capability can create permanent shared objects, including devices, semaphores, and mutexes. This user right is useful to kernel-mode components that extend the object namespace. Because components that are running in kernel-mode inherently have this user right assigned to them, it is not necessary to specifically assign it. - -Constant: SeCreatePermanentPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- Users who have the **Create permanent shared objects** user right could create new shared objects and expose sensitive data to the network. Therefore, do not assign this right to any users. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, **LocalSystem** is the only account that has this right. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not Defined| -| Default Domain Controller Policy | Not Defined | -| Stand-Alone Server Default Settings | Not Defined| -| Domain Controller Effective Default Settings | **LocalSystem**| -| Member Server Effective Default Settings | **LocalSystem**| -| Client Computer Effective Default Settings | **LocalSystem**| - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -A restart of the device is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users who have the **Create permanent shared objects** user right could create new shared objects and expose sensitive data to the network. - -### Countermeasure - -Do not assign the **Create permanent shared objects** user right to any users. Processes that require this user right should use the System account, which already includes this user right, instead of a separate user account. - -### Potential impact - -None. Not Defined is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md b/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md deleted file mode 100644 index d0a05e5cde..0000000000 --- a/windows/security/threat-protection/security-policy-settings/create-symbolic-links.md +++ /dev/null @@ -1,106 +0,0 @@ ---- -title: Create symbolic links -description: Describes the best practices, location, values, policy management, and security considerations for the Create symbolic links security policy setting. -ms.assetid: 882922b9-0ff8-4ee9-8afc-4475515ee3fd -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Create symbolic links - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Create symbolic links** security policy setting. - -## Reference - -This user right determines if users can create a symbolic link from the device they're logged on to. - -A symbolic link is a file system object that points to another file system object that is called the target. Symbolic links are transparent to users. The links appear as normal files or directories, and they can be acted upon by the user or application in exactly the same manner. Symbolic links are designed to aid in migration and application compatibility with UNIX operating systems. Microsoft has implemented symbolic links to function just like UNIX links. - -> [!WARNING] -> This privilege should only be given to trusted users. Symbolic links can expose security vulnerabilities in applications that aren't designed to handle them. - -Constant: SeCreateSymbolicLinkPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- Only trusted users should get this user right. Symbolic links can expose security vulnerabilities in applications that aren't designed to handle them. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, members of the Administrators group have this right. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not Defined| -| Default Domain Controller Policy | Not Defined| -| Stand-Alone Server Default Settings | Not Defined| -| Domain Controller Effective Default Settings | Administrators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings | Administrators| - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -- Local policy settings -- Site policy settings -- Domain policy settings -- OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -### Command-line tools - -This setting can be used in conjunction with a symbolic link file system setting that can be manipulated with the command-line tool to control the kinds of symlinks that are allowed on the device. For more info, type `fsutil behavior set symlinkevaluation /?` at the command prompt. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users who have the **Create symbolic links** user right could inadvertently or maliciously expose your system to symbolic link attacks. Symbolic link attacks can be used to change the permissions on a file, to corrupt data, to destroy data, or as a DoS attack. - -### Countermeasure - -Don't assign the **Create symbolic links** user right to standard users. Restrict this right to trusted administrators. You can use the **fsutil** command to establish a symbolic link file system setting that controls the kind of symbolic links that can be created on a computer. - -### Potential impact - -None. Not defined is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md deleted file mode 100644 index 784e63d190..0000000000 --- a/windows/security/threat-protection/security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md +++ /dev/null @@ -1,98 +0,0 @@ ---- -title: DCOM Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax -description: Learn about best practices and more for the syntax policy setting, DCOM Machine Access Restrictions in Security Descriptor Definition Language (SDDL). -ms.assetid: 0fe3521a-5252-44df-8a47-8d92cf936e7c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax - -**Applies to** -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax** policy setting. - -## Reference - -This policy setting allows you to define other computer-wide controls that govern access to all Distributed Component Object Model (DCOM)–based applications on a device. These controls restrict call, activation, or launch requests on the device. A simple way to think about these access controls is as an extra access check that is performed against a device-wide access control list (ACL) on each call, activation, or launch of any COM-based server. If the access check fails, the call, activation, or launch request is denied. (This check is in addition to any access check that is run against the server-specific ACLs.) In effect, it provides a minimum authorization standard that must be passed to access any COM-based server. This policy setting controls access permissions to cover call rights. - -These device-wide ACLs provide a way to override weak security settings that are specified by an application through the CoInitializeSecurity function or application-specific security settings. They provide a minimum security standard that must be passed, regardless of the settings of the specific server. - -These ACLs also provide a centralized location for an administrator to set a general authorization policy that applies to all COM-based servers on the device. - -This policy setting allows you to specify an ACL in two different ways. You can type the security descriptor in SDDL, or you can grant or deny Local Access and Remote Access permissions to users and groups. We recommend that you use the built-in user interface to specify the ACL contents that you want to apply with this setting. The default ACL settings vary, depending on the version of Windows you're running. - -### Possible values - -- *User-defined input* of the SDDL representation of the groups and privileges - - When you specify the users or groups that are to be given permissions, the security descriptor field is populated with the Security Descriptor Definition Language representation of those groups and privileges. Users and groups can be given explicit Allow or Deny privileges for local access and remote access. - -- Blank - - This value represents how the local security policy deletes the policy enforcement key. This value deletes the policy and then sets it as Not defined. To set a blank value, select "Define this policy setting" and leave the Security descriptor empty, and then select OK. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value -| - | - | -| Default Domain Policy | Blank | -| Default Domain Controller Policy | Blank | -| Stand-Alone Server Default Settings | Blank | -| DC Effective Default Settings | Not defined | -| Member Server Effective Default Settings | Not defined | -| Client Computer Effective Default Settings | Not defined | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -The registry settings that are created as a result of enabling the **DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax** policy setting take precedence over the previous registry settings when this policy setting was configured. The Remote Procedure Call (RPC) service checks the new registry keys in the Policies section for the computer restrictions, and these registry entries take precedence over the existing registry keys under OLE. This precedence means that previously existing registry settings are no longer effective, and if you make changes to the existing settings, device access permissions for users aren't changed. Use care in configuring the list of users and groups. - -If the administrator is denied permission to access DCOM applications due to the changes made to DCOM in the Windows operating system, the administrator can use the **DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax** policy setting to manage DCOM access to the computer. The administrator can use this setting to specify which users and groups can access the DCOM application on the computer locally and remotely. This setting will restore control of the DCOM application to the administrator and users. To define this setting, open the **DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax** setting, and click -**Edit Security**. Specify the users or groups you want to include and the computer access permissions for those users or groups. This information defines the setting and sets the appropriate SDDL value. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Many COM applications include some security-specific code (for example, to call CoInitializeSecurity), but they use weak settings that allow unauthenticated access to the process. Administrators can't override these settings to force stronger security in earlier versions of Windows without modifying the application. An attacker could attempt to exploit weak security in an individual application by attacking it through COM calls. - -Also, the COM infrastructure includes the Remote Procedure Call Services (RPCSS), a system service that runs during and after computer startup. This service manages activation of COM objects and the running object table and provides helper services to DCOM remoting. It exposes RPC interfaces that can be called remotely. Because some COM-based servers allow unauthenticated remote access, these interfaces can be called by anyone, including unauthenticated users. As a result, RPCSS can be attacked by malicious users who use remote, unauthenticated computers. - -### Countermeasure - -To protect individual COM-based applications or services, set the **DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax** setting to an appropriate device-wide ACL. - -### Potential impact - -Windows implements default COM ACLs when they're installed. Modifying these ACLs from the default may cause some applications or components that communicate by using DCOM to fail. If you implement a COM-based server and you override the default security settings, confirm that the application-specific call permissions that ACL assigns are the correct permissions for appropriate users. If it doesn't, you must change your application-specific permission ACL to provide appropriate users with activation rights so that applications and Windows components that use DCOM don't fail. - -## Related topics - -- [Security Options](security-options.md) - - diff --git a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md b/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md deleted file mode 100644 index 6f20c35a59..0000000000 --- a/windows/security/threat-protection/security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: DCOM Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax -description: Best practices and more for the security policy setting, DCOM Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax. -ms.assetid: 4b95d45f-dd62-4c34-ba32-43954528dabe -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax** security policy setting. - -## Reference - -This policy setting is similar to the [DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax](dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md) setting in that it allows you to define more computer-wide controls that govern access to all DCOM–based applications on a device. However, the ACLs that are specified in this policy setting control local and remote COM launch requests (not access requests) on the device. A simple way to think about this access control is as an extra access check that is performed against a device-wide ACL on each launch of any COM-based server. If the access check fails, the call, activation, or launch request is denied. (This check is in addition to any access check that is run against the server-specific ACLs.) In effect, it provides a minimum authorization standard that must be passed to launch any COM-based server. The DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax policy setting differs in that it provides a minimum access check that is applied to attempts to access an already launched COM-based server. - -These device-wide ACLs provide a way to override weak security settings that are specified by an application through CoInitializeSecurity or application-specific security settings. They provide a minimum security standard that must be passed, regardless of the settings of the specific COM-based server. These ACLs provide a centralized location for an administrator to set a general authorization policy that applies to all COM-based servers. -The **DCOM: Machine Launch Restrictions in the Security Descriptor Definition Language (SDDL) syntax** setting allows you to specify an ACL in two ways. You can type the security descriptor in SDDL, or you can grant or deny Local -Access and Remote Access permissions to users and groups. We recommend that you use the built-in user interface to specify the ACL contents that you want to apply with this setting. The default ACL settings vary, depending on the version of Windows you're running. - -### Possible values - -- Blank - - This value represents how the local security policy deletes the policy enforcement key. This value deletes the policy and then sets it as Not defined. To set a blank value, select "Define this policy setting" and leave the Security descriptor empty, then select OK. - -- *User-defined input* of the SDDL representation of the groups and privileges - - When you specify the users or groups that are to be given permission, the security descriptor field is populated with the Security Descriptor Definition Language representation of those groups and privileges. Users and groups can be given explicit Allow or Deny privileges on both local access and remote access. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Blank | -| Default Domain Controller Policy | Blank| -| Stand-Alone Server Default Settings |Blank | -| DC Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined | -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -The registry settings that are created as a result of this policy take precedence over the previous registry settings in this area. The Remote Procedure Call (RPC) service (RpcSs) checks the new registry keys in the Policies section for the computer restrictions; these entries take precedence over the existing registry keys under OLE. - -If you're denied access to activate and launch DCOM applications due to the changes made to DCOM in the Windows operating system, this policy setting can be used to control the DCOM activation and launch to the device. - -You can specify which users and groups can launch and activate DCOM applications on the device locally and remotely by using the **DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax** policy setting. This setting restores control of the DCOM application to the administrator and specified users. To define this setting, open the **DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax** setting, and click **Edit Security**. Specify the groups that you want to include and the device launch permissions for those groups. This information defines the setting and sets the appropriate SDDL value. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Many COM applications include some security-specific code (for example, to call CoInitializeSecurity), but they use weak settings that allow unauthenticated access to the process. You can't override these settings to force stronger security in earlier versions of Windows without modifying the application. An attacker could attempt to exploit weak security in an individual application by attacking it through COM calls. - -Also, the COM infrastructure includes the Remote Procedure Call Service (RPCSS), a system service that runs during computer startup and always runs after the startup. This service manages activation of COM objects and the running object table and provides helper services to DCOM remoting. It exposes RPC interfaces that can be called remotely. Because some COM-based servers allow unauthenticated remote component activation, these interfaces can be called by anyone, including unauthenticated users. As a result, RPCSS can be attacked by malicious users using remote, unauthenticated computers. - -### Countermeasure - -To protect individual COM-based applications or services, set this policy setting to an appropriate computer-wide ACL. - -### Potential impact - -Windows implements default COM ACLs when they're installed. Modifying these ACLs from the default may cause some applications or components that communicate by using DCOM to fail. If you implement a COM-based server and you override the default security settings, confirm that the application-specific launch permissions ACL assigns include activation permissions to appropriate users. If it doesn't, you must change your application-specific launch permission ACL to provide appropriate users with activation rights so that applications and Windows components that use DCOM don't fail. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/debug-programs.md b/windows/security/threat-protection/security-policy-settings/debug-programs.md deleted file mode 100644 index f0d787d7a9..0000000000 --- a/windows/security/threat-protection/security-policy-settings/debug-programs.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Debug programs -description: Describes the best practices, location, values, policy management, and security considerations for the Debug programs security policy setting. -ms.assetid: 594d9f2c-8ffc-444b-9522-75615ec87786 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Debug programs - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Debug programs** security policy setting. - -## Reference - -This policy setting determines which users can attach to or open any process, even a process they do not own. Developers who are debugging their own applications do not need this user right. Developers who are debugging new system components need this user right. This user right provides access to sensitive and critical operating-system components. - -Constant: SeDebugPrivilege - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -- Assign this user right only to trusted users to reduce security vulnerabilities. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, members of the Administrators group have this right. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Administrators | -| Stand-Alone Server Default Settings | Administrators | -| Domain Controller Effective Default Settings | Administrators | -| Member Server Effective Default Settings | Administrators | -| Client Computer Effective Default Settings | Administrators | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -A restart of the device is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The **Debug programs** user right can be exploited to capture sensitive device information from system memory or to access and modify kernel or application structures. Some attack tools exploit this user right to extract hashed passwords and other private security information or to insert malware. -By default, the **Debug programs** user right is assigned only to administrators, which helps mitigate risk from this vulnerability. - -### Countermeasure - -Remove the accounts of all users and groups that do not require the **Debug programs** user right. - -### Potential impact - -If you revoke this user right, no one can debug programs. However, typical circumstances rarely require this capability on production devices. If an issue arises that requires an application to be debugged on a production server, you can move the server to a different organizational unit (OU) -temporarily and assign the **Debug programs** user right to a separate Group Policy for that OU. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md b/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md deleted file mode 100644 index 446fad10ca..0000000000 --- a/windows/security/threat-protection/security-policy-settings/deny-access-to-this-computer-from-the-network.md +++ /dev/null @@ -1,110 +0,0 @@ ---- -title: Deny access to this computer from the network -description: Best practices, location, values, policy management, and security considerations for the Deny access to this computer from the network security policy setting. -ms.assetid: 935e9f89-951b-4163-b186-fc325682bb0b -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 05/19/2021 ---- - -# Deny access to this computer from the network - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Deny access to this computer from the network** security policy setting. - -## Reference - -This security setting determines which users are prevented from accessing a device over the network. - -Constant: SeDenyNetworkLogonRight - -### Possible values - -- User-defined list of accounts -- Guest - -### Best practices - -- Because all Active Directory Domain Services programs use a network logon for access, use caution when you assign this user right on domain controllers. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, this setting is Guest on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Guest | -| Stand-Alone Server Default Settings | Guest | -| Domain Controller Effective Default Settings | Guest | -| Member Server Effective Default Settings | Guest | -| Client Computer Effective Default Settings | Guest | - -## Policy management - -This section describes features and tools available to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -This policy setting supersedes the **Access this computer from the network** policy setting if a user account is subject to both policies. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users who can sign in to the device over the network can enumerate lists of account names, group names, and shared resources. Users with permission to access shared folders and files can connect over the network and possibly view or modify data. - -### Countermeasure - -Assign the **Deny access to this computer from the network** user right to the following accounts: - -- Anonymous sign in -- Built-in local Administrator account -- Local Guest account -- All service accounts - -An important exception to this list is any service accounts that are used to start services that must connect to the device over the network. For example, let’s say you've configured a shared folder for web servers to access, and you present content within that folder through a website. You may need to allow the account that runs IIS to sign in to the server with the shared folder from the network. This user right is effective when you must configure servers and workstations on which sensitive information is handled because of regulatory compliance concerns. - -> [!NOTE] -> If the service account is configured in the logon properties of a Windows service, it requires network logon rights to the domain controllers to start properly. - -### Potential impact - -If you configure the **Deny access to this computer from the network** user right for other accounts, you could limit the abilities of users who are assigned to specific administrative roles in your environment. You should verify that delegated tasks aren't negatively affected. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md deleted file mode 100644 index 49ad4d216d..0000000000 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-batch-job.md +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: Deny log on as a batch job -description: Describes the best practices, location, values, policy management, and security considerations for the Deny log on as a batch job security policy setting. -ms.assetid: 0ac36ebd-5e28-4b6a-9b4e-8924c6ecf44b -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Deny log on as a batch job - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a batch job** security policy setting. - -## Reference - -This policy setting determines which accounts are prevented from logging on by using a batch-queue tool to schedule and start jobs automatically in the future. The ability to sign in by using a batch-queue tool is needed for any account that is used to start scheduled jobs with the Task Scheduler. - -Constant: SeDenyBatchLogonRight - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -1. When you assign this user right, thoroughly test that the effect is what you intended. -2. Within a domain, modify this setting on the applicable Group Policy Object (GPO). -3. **Deny log on as a batch job** prevents administrators or operators from using their personal accounts to schedule tasks. This restriction helps with business continuity when that person transitions to other positions or responsibilities. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Not defined | -| Domain Controller Effective Default Settings | Not defined | -| Member Server Effective Default Settings | Not defined | -| Client Computer Effective Default Settings | Not defined | - -## Policy management - -This section describes features and tools available to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -This policy setting might conflict with and negate the **Log on as a batch job** setting. - -### Group Policy - -On a domain-joined device, including the domain controller, this policy can be overwritten by a domain policy, which will prevent you from modifying the local policy setting. - -For example, to configure Task Scheduler on your domain controller, check the Settings tab of your two domain controller policy and domain policy GPOs in the Group Policy Management Console (GPMC). Verify the targeted account isn't present in the **Deny log on as a batch job** setting. - -User Rights Assignment and also correctly configured in the **Log on as a batch job** setting. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Accounts that have the **Log on as a batch job** user right could be used to schedule jobs that could consume excessive computer resources and cause a denial-of-service condition. - -### Countermeasure - -Assign the **Deny log on as a batch job** user right to the local Guest account. - -### Potential impact - -If you assign the **Deny log on as a batch job** user right to other accounts, you could deny the ability to perform required job activities to users who are assigned specific administrative roles. Confirm that delegated tasks aren't affected adversely. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md deleted file mode 100644 index d2a042c022..0000000000 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-as-a-service.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: Deny log on as a service -description: Describes the best practices, location, values, policy management, and security considerations for the Deny log on as a service security policy setting. -ms.assetid: f1114964-df86-4278-9b11-e35c66949794 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Deny log on as a service - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the recommended practices, location, values, policy management, and security considerations for the **Deny log on as a service** security policy setting. - -## Reference - -This policy setting determines which users are prevented from logging on to the service applications on a device. - -A service is an application type that runs in the system background without a user interface. It provides core operating system features, such as web serving, event logging, file serving, printing, cryptography, and error reporting. - -Constant: SeDenyServiceLogonRight - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -1. When you assign this user right, thoroughly test that the effect is what you intended. -2. Within a domain, modify this setting on the applicable Group Policy Object (GPO). - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined | -| Domain Controller Effective Default Settings | Not defined | -| Member Server Effective Default Settings | Not defined | -| Client Computer Effective Default Settings | Not defined | - -## Policy management - -This section describes features and tools available to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -On a domain-joined device, including the domain controller, this policy can be overwritten by a domain policy, which will prevent you from modifying the local policy setting. - -This policy setting might conflict with and negate the **Log on as a service** setting. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Accounts that can sign in to a service application could be used to configure and start new unauthorized services, such as a keylogger or other malware. The benefit of the specified countermeasure is reduced by the fact that only users with administrative rights can install and configure -services, and an attacker who already has that level of access could configure the service to run by using the System account. - -### Countermeasure - -We recommend that you don't assign the **Deny log on as a service** user right to any accounts. This configuration is the default. Organizations that have strong concerns about security might assign this user right to groups and accounts when they're certain that they'll never need to sign in to a service application. - -### Potential impact - -If you assign the **Deny log on as a service** user right to specific accounts, services may not start and a denial-of-service condition could result. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md deleted file mode 100644 index 709c72bee4..0000000000 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-locally.md +++ /dev/null @@ -1,100 +0,0 @@ ---- -title: Deny log on locally -description: Describes the best practices, location, values, policy management, and security considerations for the Deny log on locally security policy setting. -ms.assetid: 00150e88-ec9c-43e1-a70d-33bfe10434db -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Deny log on locally - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Deny log on locally** security policy setting. - -## Reference - -This policy setting determines which users are prevented from logging on directly at the device's console. - -Constant: SeDenyInteractiveLogonRight - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -1. Assign the **Deny log on locally** user right to the local guest account to restrict access by potentially unauthorized users. -2. Test your modifications to this policy setting in conjunction with the **Allow log on locally** policy setting to determine if the user account is subject to both policies. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| Domain Controller Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -If you apply this policy setting to the Everyone group, no one will be able to sign in locally. - -### Group Policy - -This policy setting supersedes the **Allow log on locally** policy setting if a user account is subject to both policies. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Any account with the ability to sign in locally could be used to sign in at the console of the device. If this user right isn't restricted to legitimate users who must sign in to the console of the device, unauthorized users might download and run malicious software that elevates their user rights. - -### Countermeasure - -Assign the **Deny log on locally** user right to the local Guest account. If you have installed optional components such as ASP.NET, you may want to assign this user right to other accounts that are required by those components. - -### Potential impact - -If you assign the **Deny log on locally** user right to other accounts, you could limit the abilities of users who are assigned to specific roles in your environment. However, this user right should explicitly be assigned to the ASPNET account on devices that are configured with the Web Server role. You should confirm that delegated activities aren't adversely affected. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md b/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md deleted file mode 100644 index c6dfb97ab1..0000000000 --- a/windows/security/threat-protection/security-policy-settings/deny-log-on-through-remote-desktop-services.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Deny log on through Remote Desktop Services -description: Best practices, location, values, policy management, and security considerations for the security policy setting, Deny log on through Remote Desktop Services. -ms.assetid: 84bbb807-287c-4acc-a094-cf0ffdcbca67 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Deny log on through Remote Desktop Services - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Deny log on through Remote Desktop Services** security policy setting. - -## Reference - -This policy setting determines which users are prevented from logging on to the device through a Remote Desktop connection through Remote Desktop Services. It's possible for a user to establish a Remote Desktop connection to a particular server, but not be able to sign in to the console of that server. - -Constant: SeDenyRemoteInteractiveLogonRight - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -- To control who can open a Remote Desktop connection and sign in to the device, add the user account to or remove user accounts from the Remote Desktop Users group. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| Domain Controller Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -The **Remote System** property controls settings for Remote Desktop Services (**Allow or prevent remote connections to the computer**) and for Remote Assistance (**Allow Remote Assistance connections to this computer**). - -### Group Policy - -This policy setting supersedes the [Allow log on through Remote Desktop Services](allow-log-on-through-remote-desktop-services.md) policy setting if a user account is subject to both policies. - -Group Policy settings are applied in the following order. They overwrite settings on the local device at the next Group Policy update. - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. Organizational unit policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Any account with the right to sign in through Remote Desktop Services could be used to sign in to the remote console of the device. If this user right isn't restricted to legitimate users who need to sign in to the console of the computer, malicious users might download and run software that elevates their user rights. - -### Countermeasure - -Assign the **Deny log on through Remote Desktop Services** user right to the built-in local guest account and all service accounts. If you have installed optional components, such as ASP.NET, you may want to assign this user right to other accounts that are required by those components. - -### Potential impact - -If you assign the **Deny log on through Remote Desktop Services** user right to other groups, you could limit the abilities of users who are assigned to specific administrative roles in your environment. Accounts that have this user right can't connect to the device through Remote Desktop Services or Remote Assistance. You should confirm that delegated tasks aren't negatively affected. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md deleted file mode 100644 index a2514e41a3..0000000000 --- a/windows/security/threat-protection/security-policy-settings/devices-allow-undock-without-having-to-log-on.md +++ /dev/null @@ -1,87 +0,0 @@ ---- -title: Devices Allow undock without having to log on -description: Describes the best practices, location, values, and security considerations for the Devices Allow undock without having to sign in security policy setting. -ms.assetid: 1d403f5d-ad41-4bb4-9f4a-0779c1c14b8c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Devices: Allow undock without having to log on - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Devices: Allow undock without having to log on** security policy setting. - -## Reference - -This policy setting enables or disables the ability of a user to remove a portable device from a docking station without logging on. If you enable this policy setting, users can press a docked portable device's physical eject button to safely undock the device. If you disable this policy setting, the user must sign in to receive permission to undock the device. Only users who have the **Remove Computer from Docking Station** privilege can obtain this permission. - ->**Note:**  Disabling this policy setting only reduces theft risk for portable devices that cannot be mechanically undocked. Devices that can be mechanically undocked can be physically removed by the user whether or not they use the Windows undocking functionality. - -Enabling this policy setting means that anyone with physical access to a device that has been placed in its docking station can remove the computer and possibly tamper with it. For devices that don't have docking stations, this policy setting has no impact. However, for users with a mobile computer that is normally docked while they are in the office, this policy setting will help lower the risk of equipment theft or a malicious user gaining physical access to these devices - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -It's advisable to disable the **Devices: Allow undock without having to log on** policy setting. Users who have docked their devices will have to sign in to the local console before they can undock their systems. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings | Enabled| -| Client Computer Effective Default Settings| Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If this policy setting is enabled, anyone with physical access to portable computers in docking stations could remove them and possibly tamper with them. - -### Countermeasure - -Disable the **Devices: Allow undock without having to log on** setting. - -### Potential impact - -Users who have docked their device must sign in to the local console before they can undock their computers. For devices that don't have docking stations, this policy setting has no impact. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md b/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md deleted file mode 100644 index 515856c7f7..0000000000 --- a/windows/security/threat-protection/security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md +++ /dev/null @@ -1,87 +0,0 @@ ---- -title: Devices Allowed to format and eject removable media -description: Describes the best practices, location, values, and security considerations for the Devices Allowed to format and eject removable media security policy setting. -ms.assetid: d1b42425-7244-4ab1-9d46-d68de823459c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Devices: Allowed to format and eject removable media - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Devices: Allowed to format and eject removable media** security policy setting. - -## Reference - -This policy setting determines who is allowed to format and eject removable media. - -Users can move removable disks to a different device where they have administrative user rights and then take ownership of any file, assign themselves full control, and view or modify any file. The advantage of configuring this policy setting is diminished by the fact that most removable storage devices will eject media with the press of a button. - -### Possible values - -- Administrators -- Administrators and Power Users -- Administrators and Interactive Users (not applicable to Windows Server 2008 R2 or Windows 7 and later) -- Not defined - -### Best practices - -- It's advisable to set **Allowed to format and eject removable media** to **Administrators**. Only administrators will be able to eject NTFS-formatted removable media. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Administrators| -| DC Effective Default Settings | Administrators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users could move data on removable disks to a different computer where they have administrative privileges. The user could then take ownership of any file, grant themselves full control, and view or modify any file. The fact that most removable storage devices eject media when a mechanical button -is pressed diminishes the advantage of this policy setting. - -### Countermeasure - -Configure the **Devices: Allowed to format and eject removable media** setting to **Administrators**. - -### Potential impact - -Only administrators can format and eject removable media. If users are in the habit of using removable media for file transfers and storage, they must be informed of the change in policy. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md b/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md deleted file mode 100644 index 9590fbf54b..0000000000 --- a/windows/security/threat-protection/security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md +++ /dev/null @@ -1,91 +0,0 @@ ---- -title: Devices Prevent users from installing printer drivers -description: Describes the best practices, location, values, and security considerations for the Devices Prevent users from installing printer drivers security policy setting. -ms.assetid: ab70a122-f7f9-47e0-ad8c-541f30a27ec3 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 01/05/2022 ---- - -# Devices: Prevent users from installing printer drivers - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Devices: Prevent users from installing printer drivers** security policy setting. - -## Reference - -For a device to print to a network printer, the driver for that network printer must be installed locally. The **Devices: Prevent users from installing printer drivers** policy setting determines who can install a printer driver as part of adding a network printer. When you set the value to **Enabled**, only Administrators and Power Users can install a printer driver as part of adding a network printer. Setting the value to **Disabled** allows any user to install a printer driver as part of adding a network printer. This setting prevents unprivileged users from downloading and installing an untrusted printer driver. - -This setting has no impact if you've configured a trusted path for downloading drivers. If trusted paths are being used, the print subsystem attempts to use the trusted path to download the driver. If the trusted path download succeeds, the driver is installed on behalf of any user. If the trusted path download fails, the driver isn't installed and the network printer isn't added. - -Although it might be appropriate in some organizations to allow users to install printer drivers on their own workstations, this idea isn't suitable for servers. Installing a printer driver on a server can cause the system to become less stable. Only administrators should have this user right on servers. A malicious user might deliberately try to damage the system by installing inappropriate printer drivers. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- It's advisable to set **Devices: Prevent users from installing printer drivers** to Enabled. Only users in the Administrative, Power User, or Server Operator groups will be able to install printers on servers. If this policy setting is enabled, but the driver for a network printer already exists on the local computer, users can still add the network printer. This policy setting doesn't affect a user's ability to add a local printer. - -> [!NOTE] -> After applying the [July 6, 2021 updates](https://support.microsoft.com/topic/kb5005010-restricting-installation-of-new-printer-drivers-after-applying-the-july-6-2021-updates-31b91c02-05bc-4ada-a7ea-183b129578a7), non-administrators, including delegated admin groups like printer operators, cannot install signed and unsigned printer drivers to a print server. By default, only administrators can install both signed and unsigned printer drivers to a print server. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings | Enabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -It may be appropriate in some organizations to allow users to install printer drivers on their own workstations. However, you should allow only administrators, not users, to do so on servers because printer driver installation on a server may unintentionally cause the computer to become less -stable. A malicious user could install inappropriate printer drivers in a deliberate attempt to damage the computer, or a user might accidentally install malicious software that masquerades as a printer driver. - -### Countermeasure - -Enable the **Devices: Prevent users from installing printer drivers** setting. - -### Potential impact - -Only members of the Administrator, Power Users, or Server Operator groups can install printers on the servers. If this policy setting is enabled but the driver for a network printer already exists on the local computer, users can still add the network printer. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md deleted file mode 100644 index 5ccf446d9e..0000000000 --- a/windows/security/threat-protection/security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md +++ /dev/null @@ -1,87 +0,0 @@ ---- -title: Restrict CD-ROM access to locally logged-on user -description: Describes the best practices, location, values, and security considerations for the Devices Restrict CD-ROM access to locally logged-on user only security policy setting. -ms.assetid: 8b8f44bb-84ce-4f18-af30-ab89910e234d -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Devices: Restrict CD-ROM access to locally logged-on user only - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Devices: Restrict CD-ROM access to locally logged-on user only** security policy setting. - -## Reference - -This policy setting determines whether a CD is accessible to local and remote users simultaneously. If you enable this policy setting, only the interactively logged-on user is allowed to access removable CDs. If this policy setting is enabled and no one is logged on interactively, the CD can be accessed over the network. - -The security benefit of enabling this policy setting is small because it only prevents network users from accessing the drive when someone is logged on to the local console of the system at the same time. Additionally, CD drives aren't automatically made available as network shared drives; you must deliberately choose to share the drive. This setting to share is important when administrators are installing software or copying data from a CD-ROM, and they don't want network users to be able to execute the applications or view the data. - -If this policy setting is enabled, users who connect to the server over the network won't be able to use any CD drives that are installed on the server when anyone is logged on to the local console of the server. Enabling this policy setting isn't suitable for a system that serves as a CD jukebox for network users. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Best practices are dependent on your security and user accessibility requirements for CD drives. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Disabled | -| DC Effective Default Settings | Disabled | -| Member Server Effective Default Settings | Disabled | -| Client Computer Effective Default Settings | Disabled | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -A remote user could potentially access a mounted CD that contains sensitive information. This risk is small because CD drives aren't automatically made available as shared drives; you must deliberately choose to share the drive. However, you can deny network users the ability to view data or run -applications from removable media on the server. - -### Countermeasure -Enable the **Devices: Restrict CD-ROM drive access to locally logged-on user only** setting. - -### Potential impact -Users who connect to the server over the network can't use any CD drives that are installed on the server when anyone is logged on to the local console of the server. System tools that require access to the CD drive will fail. For example, the Volume Shadow Copy service attempts to access all CD and floppy disk drives that are present on the computer when it initializes, and if the service can't access one of these drives, it fails. This condition causes the Windows Backup tool to fail if volume shadow copies were specified for the backup job. Any non-Microsoft backup products that use volume shadow copies also fail. This policy setting wouldn't be suitable for a computer that serves as a CD jukebox for network users. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md b/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md deleted file mode 100644 index b4a13d2337..0000000000 --- a/windows/security/threat-protection/security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md +++ /dev/null @@ -1,87 +0,0 @@ ---- -title: Devices Restrict floppy access to locally logged-on user only -description: Describes the best practices, location, values, and security considerations for the Devices Restrict floppy access to locally logged-on user only security policy setting. -ms.assetid: 92997910-da95-4c03-ae6f-832915423898 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Devices: Restrict floppy access to locally logged-on user only - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Devices: Restrict floppy access to locally logged-on user only** security policy setting. - -## Reference - -This policy setting determines whether removable floppy disks are accessible to local and remote users simultaneously. Enabling this policy setting allows only the interactively logged-on user to access removable floppy disks. If this policy setting is enabled and no one is logged on interactively, the floppy disk can be accessed over the network. - -The security benefit of enabling this policy setting is small because it only prevents network users from accessing the floppy disk drive when someone is logged on to the local console of the system at the same time. Additionally, floppy disk drives aren't automatically made available as network shared drives; you must deliberately choose to share the drive. This setting to share becomes important when you're installing software or copying data from a floppy disk and they don't want network users to be able to execute the applications or view the data. - -If this policy setting is enabled, users who connect to the server over the network won't be able to use any floppy disk drives that are installed on the server when anyone is logged on to the local console of the server. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Best practices are dependent on your security and user accessibility requirements for CD drives. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -A remote user could potentially access a mounted floppy disk that contains sensitive information. This risk is small because floppy disk drives aren't automatically shared; administrators must deliberately choose to share the drive. However, you can deny network users the ability to view data or run applications from removable media on the server. - -### Countermeasure - -Enable the **Devices: Restrict floppy access to locally logged-on user only** setting. - -### Potential impact - -Users who connect to the server over the network can't use any floppy disk drives that are installed on the device when anyone is logged on to the local console of the server. System tools that require access to floppy disk drives fail. For example, the Volume Shadow Copy service attempts to access all CD-ROM and floppy disk drives that are present on the computer when it initializes, and if the service can't access one of these drives, it fails. This condition causes the Windows Backup tool to fail if volume shadow copies were specified for the backup job. Any non-Microsoft backup products that use volume shadow copies also fail. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md b/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md deleted file mode 100644 index 2757a09e31..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md +++ /dev/null @@ -1,87 +0,0 @@ ---- -title: Domain controller Allow server operators to schedule tasks -description: Describes the best practices, location, values, and security considerations for the Domain controller Allow server operators to schedule tasks security policy setting. -ms.reviewer: -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Domain controller: Allow server operators to schedule tasks - -**Applies to** -- Windows Server - -Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting. - -## Reference - -This policy setting determines whether server operators can use the **at** command to submit jobs. If you enable this policy setting, jobs that are created by server operators by means of the **at** command run in the context of the account that runs the Task Scheduler service. By default, that account is the Local System account. - ->**Note:**  This security option setting affects only the scheduler tool for the **at** command. It does not affect the Task Scheduler tool. - -Enabling this policy setting means jobs that are created by server operators through the **at** command will be executed in the context of the account that is running that service—by default, that is, the Local System account. This synchronization with the local account means that server operators can perform tasks that the Local System account is able to do, but server operators would normally not be able to do, such as add their account to the local Administrators group. - -The impact of enabling this policy setting should be small for most organizations. Users, including those users in the Server Operators group, will still be able to create jobs by using the Task Scheduler Wizard, but those jobs will run in the context of the account that the user authenticates with when setting up the job. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Best practices for this policy are dependent on your security and operational requirements for task scheduling. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Not defined| -| DC Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Command-line tools - -The **at** command schedules commands and programs to run on a computer at a specified time and date. The Schedule service must be running to use the **at** command. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Tasks that run under the context of the Local System account can affect resources that are at a higher privilege level than the user account that scheduled the task. - -### Countermeasure - -Disable the **Domain controller: Allow server operators to schedule tasks** setting. - -### Potential impact - -The impact should be small for most organizations. Users (including those users in the Server Operators group) can still create jobs through the Task Scheduler snap-in. However, those jobs run in the context of the account that the user authenticates with when setting up the job. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-channel-binding-token-requirements.md b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-channel-binding-token-requirements.md deleted file mode 100644 index ecf16ca65c..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-channel-binding-token-requirements.md +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: Domain controller LDAP server channel binding token requirements -description: Describes the best practices, location, values, and security considerations for the Domain controller LDAP server channel binding token requirements security policy setting. -ms.reviewer: waynmc -ms.author: waynmc -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.topic: reference -ms.date: 04/26/2023 ---- - -# Domain controller: LDAP server channel binding token requirements - -**Applies to**: - -- Windows Server - -This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server channel binding token requirements** security policy setting. - -## Reference - -This policy setting determines whether the Lightweight Directory Access Protocol (LDAP) server requires LDAP clients to negotiate channel bindings (EPA). - -Unsigned/Unprotected network traffic is susceptible to man-in-the-middle attacks, where an intruder captures packets between the server and the client device and modifies them before forwarding them to the client device. In the example of an LDAP server, a malicious user can cause a client device to make decisions based on false records from the LDAP directory. You can lower this risk in a corporate network by implementing strong physical security measures to protect the network infrastructure. Furthermore, implementing Internet Protocol security (IPsec) Authentication Header mode, which provides mutual authentication and packet integrity for IP traffic, can make all types of man-in-the-middle attacks difficult. - -- If channel binding is set to Always, LDAP clients who don't support channel bindings will be rejected. -- If channel binding is set to when supported, only incorrect channel bindings will be blocked, and clients who don't support channel binding can continue to connect via LDAP over TLS. - -CBT or EPA is used with TLS sessions when a SASL authentication method is used to authenticate the user. SASL means you use NTLM or Kerberos for user authentication. LDAP Simple Bind over TLS doesn't offer channel binding token protection and is therefore not recommended. - -### Possible values - -- **Never**: No channel binding validation is performed. This is the behavior of all servers that haven't been updated. -- **When Supported**: Clients that advertise support for Channel Binding Tokens must provide the correct token when authenticating over TLS/SSL connections; clients that don't advertise such support and/or don't use TLS/SSL connections aren't impacted. This is an intermediate option that allows for application compatibility. -- **Always**: All clients must provide channel binding information over LDAPS. The server rejects LDAPS authentication requests from clients that don't do so. - -### Best practices - -We recommend that you set **Domain controller: LDAP server channel binding token requirements** to **Always**. Clients that don't support LDAP channel binding will be unable to execute LDAP queries against the domain controllers. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -|--------------------------------------------|---------------| -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Not defined | -| DC Effective Default Settings | None | -| Member Server Effective Default Settings | None | -| Client Computer Effective Default Settings | None | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Unsigned/Unprotected network traffic is susceptible to man-in-the-middle attacks. In such attacks, an intruder captures packets between the server and the client device, modifies them, and then forwards them to the client device. Regarding LDAP servers, an attacker could cause a client device to make decisions that are based on false records from the LDAP directory. To lower the risk of such an intrusion in an organization's network, you can implement strong physical security measures to protect the network infrastructure. You could also implement Internet Protocol security (IPsec) Authentication Header mode, which performs mutual authentication and packet integrity for IP traffic to make all types of man-in-the-middle attacks difficult. - -### Countermeasure - -Configure the **Domain controller: LDAP server channel binding token requirements** setting to **Always**. - -### Potential impact - -Client devices that don't support LDAP channel binding can't run LDAP queries against the domain controllers. - -## Related articles - -- [Security Options](security-options.md) -- [LDAP session security settings and requirements after ADV190023 is installed](/troubleshoot/windows-server/identity/ldap-session-security-settings-requirements-adv190023) -- [2020 LDAP channel binding and LDAP signing requirements for Windows (KB4520412)](https://support.microsoft.com/topic/2020-ldap-channel-binding-and-ldap-signing-requirements-for-windows-kb4520412-ef185fb8-00f7-167d-744c-f299a66fc00a) -- [KB4034879: Use the LdapEnforceChannelBinding registry entry to make LDAP authentication over SSL/TLS more secure](https://support.microsoft.com/topic/kb4034879-use-the-ldapenforcechannelbinding-registry-entry-to-make-ldap-authentication-over-ssl-tls-more-secure-e9ecfa27-5e57-8519-6ba3-d2c06b21812e) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md deleted file mode 100644 index b46d83e1d6..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements.md +++ /dev/null @@ -1,85 +0,0 @@ ---- -title: Domain controller LDAP server signing requirements -description: Describes the best practices, location, values, and security considerations for the Domain controller LDAP server signing requirements security policy setting. -ms.reviewer: -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Domain controller: LDAP server signing requirements - -**Applies to** -- Windows Server - -This article describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting. - -## Reference - -This policy setting determines whether the Lightweight Directory Access Protocol (LDAP) server requires LDAP clients to negotiate data signing. - -Unsigned network traffic is susceptible to man-in-the-middle attacks, where an intruder captures packets between the server and the client device and modifies them before forwarding them to the client device. In the example of an LDAP server, a malicious user can cause a client device to make decisions based on false records from the LDAP directory. You can lower this risk in a corporate network by implementing strong physical security measures to protect the network infrastructure. Furthermore, implementing Internet Protocol security (IPsec) Authentication Header mode, which provides mutual authentication and packet integrity for IP traffic, can make all types of man-in-the-middle attacks difficult. - -This setting doesn't have any impact on LDAP simple bind through SSL (LDAP TCP/636). - -If signing is required, then LDAP simple binds not using SSL are rejected (LDAP TCP/389). - ->**Caution:**  If you set the server to Require signature, you must also set the client device. Not setting the client device results in loss of connection with the server. - -### Possible values - -- None. Data signatures aren't required to bind with the server. If the client computer requests data signing, the server supports it. -- Require signature. The LDAP data-signing option must be negotiated unless Transport Layer Security/Secure Sockets Layer (TLS/SSL) is in use. -- Not defined. - -### Best practices - -- We recommend that you set **Domain controller: LDAP server signing requirements** to **Require signature**. Clients that don't support LDAP signing will be unable to execute LDAP queries against the domain controllers. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| DC Effective Default Settings | None| -| Member Server Effective Default Settings | None| -| Client Computer Effective Default Settings | None| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Unsigned network traffic is susceptible to man-in-the-middle attacks. In such attacks, an intruder captures packets between the server and the client device, modifies them, and then forwards them to the client device. Regarding LDAP servers, an attacker could cause a client device to make decisions that are based on false records from the LDAP directory. To lower the risk of such an intrusion in an organization's network, you can implement strong physical security measures to protect the network infrastructure. You could also implement Internet Protocol security (IPsec) Authentication Header mode, which performs mutual authentication and packet integrity for IP traffic to make all types of man-in-the-middle attacks difficult. - -### Countermeasure - -Configure the **Domain controller: LDAP server signing requirements** setting to **Require signature**. - -### Potential impact - -Client devices that don't support LDAP signing can't run LDAP queries against the domain controllers. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md deleted file mode 100644 index 453dae2c04..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-controller-refuse-machine-account-password-changes.md +++ /dev/null @@ -1,86 +0,0 @@ ---- -title: Refuse machine account password changes policy -description: Describes the best practices, location, values, and security considerations for the Domain controller Refuse machine account password changes security policy setting. -ms.reviewer: -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.topic: reference -ms.date: 12/31/2017 ---- - -# Domain controller: Refuse machine account password changes - -**Applies to** -- Windows Server - -Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting. - -## Reference - -This policy setting enables or disables blocking a domain controller from accepting password change requests for machine accounts. By default, devices joined to the domain change their machine account passwords every 30 days. If enabled, the domain controller will refuse machine account password change requests. - -### Possible values - -- **Enabled** When enabled, this setting doesn't allow a domain controller to accept any changes to a machine account's password. - -- **Disabled** When disabled, this setting allows a domain controller to accept any changes to a machine account's password. - -- **Not defined** Same as Disabled. - -### Best practices - -- Enabling this policy setting on all domain controllers in a domain prevents domain members from changing their machine account passwords. This prevention, in turn, leaves those passwords susceptible to attack. Ensure that this setting conforms to your overall security policy for the domain. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -The policy referenced configures the following registry value: - -Registry Hive: HKEY_LOCAL_MACHINE -Registry Path: \System\CurrentControlSet\Services\Netlogon\Parameters\ - -Value Name: RefusePasswordChange - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -|---|---| -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Not defined | -| DC Effective Default Settings | Disabled | -| Member Server Effective Default Settings | Disabled | -| Client Computer Effective Default Settings | Not applicable | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If you enable this policy setting on all domain controllers in a domain, domain members can't change their machine account passwords, and those passwords are more susceptible to attack. - -### Countermeasure - -Disable the **Domain controller: Refuse machine account password changes** setting. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md deleted file mode 100644 index 00874bb080..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md +++ /dev/null @@ -1,121 +0,0 @@ ---- -title: Domain member Digitally encrypt or sign secure channel data (always) -description: Best practices, location, values, and security considerations for the policy setting, Domain member Digitally encrypt or sign secure channel data (always). -ms.assetid: 4480c7cb-adca-4f29-b4b8-06eb68d272bf -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Domain member: Digitally encrypt or sign secure channel data (always) - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Domain member: Digitally encrypt or sign secure channel data (always)** security policy setting. - -## Reference - -This setting determines whether all secure channel traffic that is initiated by the domain member meets minimum security requirements. Specifically, it determines whether all secure channel traffic that is initiated by the domain member must be signed or encrypted. Sign-in information that is transmitted over the secure channel is always encrypted regardless of whether the encryption of all other secure channel traffic is negotiated. - -The following policy settings determine whether a secure channel can be established with a domain controller that isn't capable of signing or encrypting secure channel traffic: - -- Domain member: Digitally encrypt or sign secure channel data (always) -- [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md) -- [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) - -Setting **Domain member: Digitally encrypt or sign secure channel data (always)** to **Enabled** prevents establishing a secure channel with any domain controller that can't sign or encrypt all secure channel data. - -To protect authentication traffic from man-in-the-middle, replay, and other types of network attacks, Windows-based computers create a communication channel through NetLogon called secure channels. These channels authenticate machine accounts. They also authenticate user accounts when a remote user connects to a network resource and the user account exists in a trusted domain. This authentication is called pass-through authentication, and it allows a device running Windows that has joined a domain to have access to the user account database in its domain and in any trusted domains. - -To enable the **Domain member: Digitally encrypt or sign secure channel data (always)** policy setting on a member workstation or server, all domain controllers in the domain that the member belongs to must be capable of signing or encrypting all secure-channel data. - -Enabling the **Domain member: Digitally encrypt or sign secure channel data (always)** policy setting automatically enables the [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) policy setting. - -When a device joins a domain, a machine account is created. After being connected to the domain, the device uses the password for that account to create a secure channel with the domain controller for its domain every time it restarts. This secure channel is used to perform operations such as NTLM pass-through authentication and LSA SID/name Lookup. Requests that are sent on the secure channel are authenticated—and sensitive information such as passwords are encrypted—but the integrity of the channel isn't checked, and not all information is encrypted. If a system is set to always encrypt or sign secure channel data, a secure channel can't be established with a domain controller that isn't capable of signing or encrypting all secure channel traffic. If the computer is configured to encrypt or sign secure channel data when possible, a secure channel can be established, but the level of encryption and signing is negotiated. - -### Possible values - -- Enabled - - The policy [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) is assumed to be enabled regardless of its current setting. This enablement ensures that the domain member attempts to negotiate at least signing of the secure - channel traffic. - -- Disabled - - The encryption and signing of all secure channel traffic is negotiated with the domain controller, in which case the level of signing and encryption depends on the version of the domain controller and the settings of the following policies: - - 1. [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md) - 2. [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) - -- Not defined - ### Best practices - -- Set **Domain member: Digitally encrypt or sign secure channel data (always)** to **Enabled**. -- Set [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md) to **Enabled**. -- Set [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) to **Enabled**. - ->**Note:**  You can enable the policy settings [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md) and [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) on all devices in the domain that support these policy settings without affecting earlier-version clients and applications. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Enabled | -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings | Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Distribution of this policy through Group Policy overrides the Local Security Policy setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -When a device joins a domain, a machine account is created. After the device is joined with the domain, it uses the password for that account to create a secure channel with the domain controller for its domain every time it restarts. Requests that are sent on the secure channel are authenticated—and -sensitive information such as passwords are encrypted—but the channel isn't integrity-checked, and not all information is encrypted. If a device is configured to always encrypt or sign secure channel data but the domain controller can't sign or encrypt any portion of the secure channel data, the computer and domain controller can't establish a secure channel. If the device is configured to encrypt or sign secure channel data, when possible, a secure channel can be established, but the level of encryption and signing is negotiated. - -### Countermeasure - -Select one of the following settings as appropriate for your environment to configure the computers in your domain to encrypt or sign secure channel data. - -- **Domain member: Digitally encrypt or sign secure channel data (always)** -- [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md) -- [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) - -### Potential impact - -Digital encryption and signing of the secure channel is a good idea because the secure channel protects domain credentials as they're sent to the domain controller. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md deleted file mode 100644 index d66e753fe4..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md +++ /dev/null @@ -1,115 +0,0 @@ ---- -title: Domain member Digitally encrypt secure channel data (when possible) -description: Best practices, security considerations, and more for the security policy setting, Domain member Digitally encrypt secure channel data (when possible). -ms.assetid: 73e6023e-0af3-4531-8238-82f0f0e4965b -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Domain member: Digitally encrypt secure channel data (when possible) - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Domain member: Digitally encrypt secure channel data (when possible)** security policy setting. - -## Reference - -This setting determines whether all secure channel traffic that is initiated by the domain member meets minimum security requirements. Specifically, it determines whether all secure channel traffic that is initiated by the domain member must be encrypted. Sign-in information that is transmitted over -the secure channel is always encrypted regardless of whether the encryption of all other secure channel traffic is negotiated. - -In addition to this policy setting, the following policy settings determine whether a secure channel can be established with a domain controller that isn't capable of signing or encrypting secure channel traffic: - -- [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) -- [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) - -Setting **Domain member: Digitally encrypt or sign secure channel data (always)** to **Enabled** prevents establishing a secure channel with any domain controller that can't sign or encrypt all secure channel data. - -To protect authentication traffic from man-in-the-middle, replay, and other types of network attacks, Windows-based computers create a communication channel through NetLogon called secure channels. These channels authenticate machine accounts. They also authenticate user accounts when a remote user connects to a network resource and the user account exists in a trusted domain. This authentication is called pass-through authentication, and it allows a computer running the Windows operating system that has joined a domain to have access to the user account database in its domain and in any trusted domains. - -Enabling the [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) policy setting automatically enables the **Domain member: Digitally sign secure channel data (when possible)** policy setting. - -When a device joins a domain, a machine account is created. After the device is joined with the domain, it uses the password for that account to create a secure channel with the domain controller for its domain every time it restarts. This secure channel is used to perform operations such as NTLM pass through authentication and LSA SID/name Lookup. Requests that are sent on the secure channel are authenticated—and sensitive information such as passwords are encrypted—but the integrity of the channel isn't checked, and not all information is encrypted. If a system is set to always encrypt or sign secure channel data, a secure channel can't be established with a domain controller that isn't capable of signing or encrypting all secure channel traffic. If the computer is configured to encrypt or sign secure channel data when possible, a secure channel can be established, but the level of encryption and signing is negotiated. - -### Possible values - -- Enabled - - The domain member will request encryption of all secure channel traffic. If the domain controller supports encryption of all secure channel traffic, then all secure channel traffic will be encrypted. Otherwise, only sign-in information that is transmitted over the secure channel will be encrypted. - -- Disabled - - The domain member won't attempt to negotiate secure channel encryption. - - >**Note:**  If the security policy setting [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) is enabled, this setting will be overwritten. - -- Not defined - -### Best practices - -- Set [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) to **Enabled**. -- Set **Domain member: Digitally encrypt secure channel data (when possible)** to **Enabled**. -- Set [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) to **Enabled**. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Enabled| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Distribution of this policy through Group Policy doesn't override the Local Security Policy setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -When a device joins a domain, a machine account is created. After it joins the domain, the device uses the password for that account to create a secure channel with the domain controller for its domain every time it restarts. Requests that are sent on the secure channel are authenticated—and sensitive information such as passwords are encrypted—but the channel isn't integrity-checked, and not all information is encrypted. If a device is configured to always encrypt or sign secure channel data but the domain controller can't sign or encrypt any portion of the secure channel data, the computer and domain controller can't establish a secure channel. If the computer is configured to encrypt or sign secure channel data when possible, a secure channel can be established, but the level of encryption and signing is negotiated. - -### Countermeasure - -Select one of the following settings as appropriate for your environment to configure the computers in your domain to encrypt or sign secure channel data: - -- [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) -- **Domain member: Digitally encrypt secure channel data (when possible)** -- [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md) - -### Potential impact - -Digital signing of the secure channel is a good idea because it protects domain credentials as they're sent to the domain controller. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md b/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md deleted file mode 100644 index 07861eeed3..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md +++ /dev/null @@ -1,113 +0,0 @@ ---- -title: Domain member Digitally sign secure channel data (when possible) -description: Best practices, location, values, and security considerations for the security policy setting, Domain member Digitally sign secure channel data (when possible). -ms.assetid: a643e491-4f45-40ea-b12c-4dbe47e54f34 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Domain member: Digitally sign secure channel data (when possible) - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Domain member: Digitally sign secure channel data (when possible)** security policy setting. - -## Reference - -This setting determines whether all secure channel traffic that is initiated by the domain member meets minimum security requirements. Specifically, it determines whether all secure channel traffic that is initiated by the domain member must be signed. Sign-in information that is transmitted over the -secure channel is always encrypted regardless of whether the encryption of all other secure channel traffic is negotiated. - -The following policy settings determine whether a secure channel can be established with a domain controller that isn't capable of signing or encrypting secure channel traffic: -- [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) -- [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md) -- Domain member: Digitally sign secure channel data (when possible) - -Setting [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) to **Enabled** prevents establishing a secure channel with any domain controller that can't sign or encrypt all secure channel data. - -To protect authentication traffic from man-in-the-middle, replay, and other types of network attacks, Windows-based computers create a communication channel through NetLogon called secure channels. These channels authenticate computer accounts. They also authenticate user accounts when a remote user connects to a network resource and the user account exists in a trusted domain. This authentication is called pass-through authentication, and it allows a computer running the Windows operating system that has joined a domain to have access to the user account database in its domain and in any trusted domains. - -Enabling the [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) policy setting automatically enables the **Domain member: Digitally sign secure channel data (when possible)** policy setting. -When a device joins a domain, a machine account is created. After the device is joined with the domain, it uses the password for that account to create a secure channel with the domain controller for its domain every time it restarts. This secure channel is used to perform operations such as NTLM pass through authentication and LSA SID/name Lookup. Requests that are sent on the secure channel are authenticated—and sensitive information such as passwords are encrypted—but the integrity of the channel isn't checked, and not all information is encrypted. If a system is set to always encrypt or sign secure channel data, a secure channel can't be established with a domain controller that isn't capable of signing or encrypting all secure channel traffic. If the computer is configured to encrypt or sign secure channel data when possible, a secure channel can be established, but the level of encryption and signing is negotiated. - -### Possible values - -- Enabled - - The domain member will request to sign all secure channel traffic. If the domain controller supports signing of all secure channel traffic, then all secure channel traffic will be signed which ensures that it can't be tampered with in transit. - -- Disabled - - Signing won't be negotiated unless the policy [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) is enabled. - -- Not defined - -### Best practices - -- Set [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) to **Enabled**. -- Set [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md) to **Enabled**. -- Set **Domain member: Digitally sign secure channel data (when possible)** to **Enabled**. - >**Note:** You can enable the other two policy settings, Domain member: [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md) and **Domain member: Digitally sign secure channel data (when possible)**, on all devices joined to the domain that support these policy settings without affecting earlier-version clients and applications. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Enabled | -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Distribution of this policy through Group Policy doesn't override the Local Security Policy setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -When a device joins a domain, a machine account is created. After it joins the domain, the device uses the password for that account to create a secure channel with the domain controller for its domain every time it restarts. Requests that are sent on the secure channel are authenticated—and sensitive information such as passwords are encrypted—but the channel isn't integrity-checked, and not all information is encrypted. If a device is configured to always encrypt or sign secure channel data but the domain controller can't sign or encrypt any portion of the secure channel data, the computer and domain controller can't establish a secure channel. If the computer is configured to encrypt or sign secure channel data when possible, a secure channel can be established, but the level of encryption and signing is negotiated. - -### Countermeasure - -Because these policies are closely related and useful depending on your environment, select one of the following settings as appropriate to configure the devices in your domain to encrypt or sign secure channel data when possible. - -- [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) -- [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md) -- **Domain member: Digitally sign secure channel data (when possible)** - -### Potential impact - -Digital signing of the secure channel is a good idea because the secure channel protects domain credentials as they're sent to the domain controller. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md b/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md deleted file mode 100644 index 83bc426b58..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-member-disable-machine-account-password-changes.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Domain member Disable machine account password changes -description: Describes the best practices, location, values, and security considerations for the Domain member Disable machine account password changes security policy setting. -ms.assetid: 1f660300-a07a-4243-a09f-140aa1ab8867 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 06/27/2019 ---- - -# Domain member: Disable machine account password changes - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Domain member: Disable machine account password changes** security policy setting. - -## Reference - -The **Domain member: Disable machine account password changes** policy setting determines whether a domain member periodically changes its machine account password. Setting its value to **Enabled** prevents the domain member from changing the machine account password. Setting it to **Disabled** allows the domain member to change the machine account password as specified by the value of the [Domain member: Maximum machine account password age](domain-member-maximum-machine-account-password-age.md) policy setting, which is every 30 days by default. - -By default, devices that belong to a domain are automatically required to change the passwords for their accounts every 30 days. Devices that are no longer able to automatically change their machine password are at risk of a malicious user determining the password for the system's domain account. -Verify that the **Domain member: Disable machine account password changes** option is set to **Disabled**. - -### Possible values - -- Enabled -- Disabled - -### Best practices - -1. Don't enable this policy setting. Machine account passwords are used to establish secure channel communications between members and domain controllers and between the domain controllers within the domain. After it's established, the secure channel transmits sensitive information that is necessary for making authentication and authorization decisions. -2. Don't use this policy setting to try to support dual-boot scenarios that use the same machine account. If you want to configure dual-boot installations that are joined to the same domain, give the two installations different computer names. This policy setting was added to the Windows operating system to help organizations that stockpile pre-built computers that are put into production months later. Those devices don't have to be rejoined to the domain. -3. You may want to consider using this policy setting in specific environments, such as the following ones: - - - Non-persistent Virtual Desktop Infrastructure implementations. In such implementations, each session starts from a read-only base image. - - Embedded devices that don't have write access to the OS volume. - - In either case, a password change that was made during normal operations would be lost as soon as the session ends. We strongly recommend that you plan password changes for maintenance windows. Add the password changes to the updates and modifications that Windows performs during maintenance windows. To trigger a password update on a specific OS volume, run the following command: - - ``` - Nltest /sc_change_pwd: - ``` - - In this command, \ represents the domain of the local computer. For more information about maintenance windows and non-persistent VDI implementations, see [Optimizing Windows 10, version 1803, for a Virtual Desktop Infrastructure (VDI) role: VDI optimization principles: Non-Persistent VDI](/windows-server/remote/remote-desktop-services/rds-vdi-recommendations-1803#vdi-optimization-principles). - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Disabled | -| Default Domain Controller Policy | Disabled| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -By default, devices running Windows Server that belong to a domain automatically change their passwords for their accounts every certain number of days, typically 30. If you disable this policy setting, devices that run Windows Server retain the same passwords as their machine accounts. Devices -that can't automatically change their account password are at risk from an attacker who could determine the password for the machine's domain account. - -### Countermeasure - -Verify that the **Domain member: Disable machine account password changes** setting is configured to **Disabled**. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md b/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md deleted file mode 100644 index b5f6a01f3e..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-member-maximum-machine-account-password-age.md +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: Domain member Maximum machine account password age -description: Describes the best practices, location, values, and security considerations for the Domain member Maximum machine account password age security policy setting. -ms.assetid: 0ec6f7c1-4d82-4339-94c0-debb2d1ac109 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 05/29/2020 ---- - -# Domain member: Maximum machine account password age - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Domain member: Maximum machine account password age** security policy setting. - -## Reference - -The **Domain member: Maximum machine account password age** policy setting determines when a domain member submits a password change. - -In Active Directory–based domains, each device has an account and password. By default, the domain members submit a password change every 30 days. You can extend or reduce this interval. Additionally, you can use the **Domain member: Disable machine account password changes** policy to disable the password change requirement completely. However, before you consider this option, review the implications as described in [Domain member: Disable machine account password changes](domain-member-disable-machine-account-password-changes.md). - -> [!IMPORTANT] -> Significantly increasing the password change interval (or disabling password changes) gives an attacker more time to undertake a brute-force password-guessing attack against one of the machine accounts. - -For more information, see [Machine Account Password Process](https://techcommunity.microsoft.com/t5/Ask-the-Directory-Services-Team/Machine-Account-Password-Process/ba-p/396026). - -### Possible values - -- User-defined number of days between 1 and 999, inclusive -- Not defined - -### Best practices - -We recommend that you set **Domain member: Maximum machine account password age** to about 30 days. Setting the value to fewer days can increase replication and affect domain controllers. For example, in Windows NT domains, machine passwords were changed every 7 days. The extra replication churn would affect domain controllers in large organizations that have many computers or slow links between sites. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | 30 days| -| DC Effective Default Settings | 30 days| -| Member Server Effective Default Settings|30 days| -| Client Computer Effective Default Settings | 30 days| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -By default, the domain members submit a password change every 30 days. If you increase this interval so that the computers no longer submit a password change, an attacker has more time to undertake a brute-force attack to guess the password of one or more computer accounts. - -### Countermeasure - -Configure the **Domain member: Maximum machine account password age** setting to 30 days. - -### Potential impact - -None. This non-impact state is the default configuration. -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md b/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md deleted file mode 100644 index e0b22d6cf2..0000000000 --- a/windows/security/threat-protection/security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md +++ /dev/null @@ -1,104 +0,0 @@ ---- -title: Domain member Require strong (Windows 2000 or later) session key -description: Best practices, location, values, and security considerations for the security policy setting, Domain member Require strong (Windows 2000 or later) session key. -ms.assetid: 5ab8993c-5086-4f09-bc88-1b27454526bd -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Domain member: Require strong (Windows 2000 or later) session key - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Domain member: Require strong (Windows 2000 or later) session key** security policy setting. - -## Reference - -The **Domain member: Require strong (Windows 2000 or later) session key** policy setting determines whether a secure channel can be established with a domain controller that isn't capable of encrypting secure channel traffic with a strong, 128-bit session key. Enabling this policy setting prevents establishing a secure channel with any domain controller that can't encrypt secure channel data with a strong key. Disabling this policy setting allows 64-bit session keys. - -Whenever possible, you should take advantage of these stronger session keys to help protect secure channel communications from eavesdropping and session-hijacking network attacks. Eavesdropping is a form of hacking in which network data is read or altered in transit. The data can be modified to hide or change the name of the sender, or it can be redirected. - -### Possible values - -- Enabled - - When enabled on a member workstation or server, all domain controllers in the domain that the member belongs to must be capable of encrypting secure channel data with a strong, 128-bit key. This capability means that all such domain controllers must be running at least Windows 2000 Server. - -- Disabled - - Allows 64-bit session keys to be used. - -- Not defined. - -### Best practices - -- It's advisable to set **Domain member: Require strong (Windows 2000 or later) session key** to Enabled. Enabling this policy setting ensures that all outgoing secure channel traffic will require a strong encryption key. Disabling this policy setting requires that key strength be negotiated. Only enable this option if the domain controllers in all trusted domains support strong keys. By default, this value is disabled. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO - -| Default value | -|--------------------------------------------| -| Default Domain Policy | -| Default Domain Controller Policy | -| Stand-Alone Server Default Settings | -| DC Effective Default Settings | -| Member Server Effective Default Settings | -| Client Computer Effective Default Settings | - -## Policy management - - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Misuse of this policy setting is a common error that can cause data loss or problems with data access or security. - -You'll you be able to join devices that don't support this policy setting to domains where the domain controllers have this policy setting enabled. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Session keys that are used to establish secure channel communications between domain controllers and member computers are much stronger starting with Windows 2000. - -Whenever possible, you should take advantage of these stronger session keys to help protect secure channel communications from attacks that attempt to hijack network sessions and eavesdrop. (Eavesdropping is a form of hacking in which network data is read or altered in transit. The data can be modified to hide or change the sender, or be redirected.) - -### Countermeasure - -Enable the **Domain member: Require strong (Windows 2000 or later) session key** setting. - -If you enable this policy setting, all outgoing secure channel traffic requires a strong encryption key. If you disable this policy setting, the key strength is negotiated. You should enable this policy setting only if the domain controllers in all trusted domains support strong keys. By default, this policy setting is disabled. - -### Potential impact - -Devices that don't support this policy setting can't join domains in which the domain controllers have this policy setting enabled. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md b/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md deleted file mode 100644 index ca2112846d..0000000000 --- a/windows/security/threat-protection/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md +++ /dev/null @@ -1,110 +0,0 @@ ---- -title: Trust computer and user accounts for delegation -description: Learn about best practices, security considerations and more for the security policy setting, Enable computer and user accounts to be trusted for delegation. -ms.assetid: 524062d4-1595-41f3-8ce1-9c85fd21497b -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Enable computer and user accounts to be trusted for delegation - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Enable computer and user accounts to be trusted for delegation** security policy setting. - -## Reference - -This policy setting determines which users can set the **Trusted for Delegation** setting on a user or computer object. -Security account delegation enables connection to multiple servers, and each server change retains the authentication credentials of the original client. Delegation of authentication is a capability that client and server applications use when they have multiple tiers. It allows a public-facing service to use client credentials to authenticate to an application or database service. For this configuration to be possible, the client and the server must run under accounts that are trusted for delegation. - -Only administrators who have the **Enable computer and user accounts to be trusted for delegation** credential can set up delegation. Domain admins and Enterprise admins have this credential. The procedure to allow a user to be trusted for delegation depends on the functionality level of the domain. - -The user or machine object that is granted this right must have write access to the account control flags. A server process running on a device (or under a user context) that is trusted for delegation can access resources on another computer by using the delegated credentials of a client. However, the client account must have Write access to the account control flags on the object. - -Constant: SeEnableDelegationPrivilege - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -- There's no reason to assign this user right to anyone on member servers and workstations that belong to a domain because it has no meaning in those contexts. It's only relevant on domain controllers and stand-alone devices. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| Domain Controller Effective Default Settings | Administrators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings | Administrators| - -## Policy management - -This section describes features, tools and guidance to help you manage this policy. - -Modifying this setting might affect compatibility with clients, services, and applications. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -This user right is defined in the Default Domain Controller Group Policy Object (GPO) and in the local security policy of workstations and servers. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -> [!NOTE] -> More information about configuring the policy can be found [here](how-to-configure-security-policy-settings.md). - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Misuse of the **Enable computer and user accounts to be trusted for delegation** user right could allow unauthorized users to impersonate other users on the network. An attacker could exploit this privilege to gain access to network resources and make it difficult to determine what has happened -after a security incident. - -### Countermeasure - -The **Enable computer and user accounts to be trusted for delegation** user right should be assigned only if there's a clear need for its functionality. When you assign this right, you should investigate the use of constrained delegation to control what the delegated accounts can do. On domain controllers, this right is assigned to the Administrators group by default. - ->**Note:**  There is no reason to assign this user right to anyone on member servers and workstations that belong to a domain because it has no meaning in those contexts. It is only relevant on domain controllers and stand-alone computers. - -### Potential impact - -None. Not defined is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md b/windows/security/threat-protection/security-policy-settings/enforce-password-history.md deleted file mode 100644 index ed174c38a8..0000000000 --- a/windows/security/threat-protection/security-policy-settings/enforce-password-history.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: Enforce password history -description: Describes the best practices, location, values, policy management, and security considerations for the Enforce password history security policy setting. -ms.assetid: 8b2ab871-3e52-4dd1-9776-68bb1e935442 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Enforce password history - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Enforce password history** security policy setting. - -## Reference - -The **Enforce password history** policy setting determines the number of unique new passwords that must be associated with a user account before an old password can be reused. -Password reuse is an important concern in any organization. Many users want to reuse the same password for their account over a long period of time. The longer the same password is used for a particular account, the greater the chance that an attacker will be able to determine the password through brute force attacks. If users are required to change their password, but they can reuse an old password, the effectiveness of a good password policy is greatly reduced. - -Specifying a low number for **Enforce password history** allows users to continually use the same small number of passwords repeatedly. If you don't also set [Minimum password age](minimum-password-age.md), users can change their password as many times in a row as necessary to reuse their original password. - -### Possible values - -- User-specified number from 0 through 24 -- Not defined - -### Best practices - -- Set **Enforce password history** to 24. This setting will help mitigate vulnerabilities that are caused by password reuse. -- Set [Maximum password age](maximum-password-age.md) to expire passwords between 60 and 90 days. Try to expire the passwords between major business cycles to prevent work loss. -- Configure [Minimum password age](minimum-password-age.md) so that you don't allow passwords to be changed immediately. - -### Location - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy** - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default domain policy | 24 passwords remembered| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | 0 passwords remembered| -| Domain controller effective default settings | 24 passwords remembered| -| Member server effective default settings | 24 passwords remembered| -| Effective GPO default settings on client computers | 24 passwords remembered| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The longer a user uses the same password, the greater the chance that an attacker can determine the password through brute force attacks. Also, any accounts that may have been compromised remain exploitable for as long as the password is left unchanged. If password changes are required but password reuse isn't prevented, or if users continually reuse a few passwords, the effectiveness of a good password policy is greatly reduced. - -If you specify a low number for this policy setting, users can use the same small number of passwords repeatedly. If you don't also configure the [Minimum password age](minimum-password-age.md) policy setting, users might repeatedly change their passwords until they can reuse their original password. - ->**Note:**  After an account has been compromised, a simple password reset might not be enough to restrict a malicious user because the malicious user might have modified the user's environment so that the password is changed back to a known value automatically at a certain time. If an account has been compromised, it is best to delete the account and assign the user a new account after all affected systems have been restored to normal operations and verified that they are no longer compromised. - -### Countermeasure - -Configure the **Enforce password history** policy setting to 24 (the maximum setting) to help minimize the number of vulnerabilities that are caused by password reuse. - -For this policy setting to be effective, you should also configure effective values for the [Minimum password age](minimum-password-age.md) and [Maximum password age](maximum-password-age.md) policy settings. - -### Potential impact - -The major impact of configuring the **Enforce password history** setting to 24 is that users must create a new password every time they're required to change their old one. If users are required to change their passwords to new unique values, there's an increased risk of users who write their passwords somewhere so that they don't forget them. Another risk is that users may create passwords that change incrementally (for example, password01, password02, and so on) to facilitate memorization, but these passwords make it easier for an attacker to guess. Also, an excessively low value for the [Maximum password age](maximum-password-age.md) policy setting is likely to increase administrative overhead because users who forget their passwords might ask the Help Desk to reset them frequently. - -## Related topics - -- [Password Policy](password-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md b/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md deleted file mode 100644 index 5879883e45..0000000000 --- a/windows/security/threat-protection/security-policy-settings/enforce-user-logon-restrictions.md +++ /dev/null @@ -1,95 +0,0 @@ ---- -title: Enforce user logon restrictions -description: Describes the best practices, location, values, policy management, and security considerations for the Enforce user logon restrictions security policy setting. -ms.assetid: 5891cb73-f1ec-48b9-b703-39249e48a29f -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Enforce user logon restrictions - -**Applies to** -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Enforce user logon restrictions** security policy setting. - -## Reference - -The **Enforce user logon restrictions** policy setting determines whether the Kerberos V5 Key Distribution Center (KDC) validates every request for a session ticket against the user rights policy of the user account. Validating each request for a session ticket is optional because the extra step takes time, and that can slow network access to services. - -The possible values for this Group Policy setting are: - -- Enabled -- Disabled -- Not defined - -### Best practices - -- If this policy setting is disabled, users might be granted session tickets for services that they don't have the right to use. - - We recommend setting **Enforce user logon restrictions** to Enabled. - -### Location - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Kerberos Policy** - -### Default Values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server Type or GPO | Default Value | -| - | - | -| Default Domain Policy | Enabled| -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings| Not applicable | -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Not applicable| -| Client Computer Effective Default Settings | Not applicable| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -### Group Policy - -Client devices will get the new setting during the next scheduled and successful Group Policy refresh. But for domain controllers to assign these new settings immediately, a gpupdate.exe /force is required. On the local device, the Security Configuration Engine will refresh this setting in about five minutes. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If you disable this policy setting, users could receive session tickets for services that they no longer have the right to use because the right was removed after they logged on. - -### Countermeasure - -Enable the **Enforce user logon restrictions** setting. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Kerberos Policy](kerberos-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md b/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md deleted file mode 100644 index e2e2fbba6b..0000000000 --- a/windows/security/threat-protection/security-policy-settings/force-shutdown-from-a-remote-system.md +++ /dev/null @@ -1,101 +0,0 @@ ---- -title: Force shutdown from a remote system -description: Describes the best practices, location, values, policy management, and security considerations for the Force shutdown from a remote system security policy setting. -ms.assetid: 63129243-31ea-42a4-a598-c7064f48a3df -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Force shutdown from a remote system - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Force shutdown from a remote system** security policy setting. - -## Reference - -This security setting determines which users are allowed to shut down a device from a remote location on the network. This setting allows members of the Administrators group or specific users to manage computers (for tasks such as a restart) from a remote location. - -Constant: SeRemoteShutdownPrivilege - -### Possible values - -- User-defined list of accounts -- Administrators - -### Best practices - -- Explicitly restrict this user right to members of the Administrators group or other assigned roles that require this capability, such as non-administrative operations staff. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Administrators and Server Operators on domain controllers and Administrators on stand-alone servers. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Administrators
    Server Operators| -| Stand-Alone Server Default Settings | Administrators| -| Domain Controller Effective Default Settings | Administrators
    Server Operators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings | Administrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -This policy setting must be applied on the computer that is being accessed remotely. - -### Group Policy - -This user right is defined in the Default Domain Controller Group Policy Object (GPO) and in the local security policy of workstations and servers. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Any user who can shut down a device could cause a denial-of-service condition to occur. Therefore, this user right should be tightly restricted. - -### Countermeasure - -Restrict the **Force shutdown from a remote system** user right to members of the Administrators group or other assigned roles that require this capability, such as non-administrative operations staff. - -### Potential impact - -On a domain controller, if you remove the **Force shutdown from a remote system** user right from the Server Operator group, you could limit the abilities of users who are assigned to specific administrative roles in your environment. Confirm that delegated activities are not adversely affected. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md b/windows/security/threat-protection/security-policy-settings/generate-security-audits.md deleted file mode 100644 index a9c54c538d..0000000000 --- a/windows/security/threat-protection/security-policy-settings/generate-security-audits.md +++ /dev/null @@ -1,100 +0,0 @@ ---- -title: Generate security audits -description: Describes the best practices, location, values, policy management, and security considerations for the Generate security audits security policy setting. -ms.assetid: c0e1cd80-840e-4c74-917c-5c2349de885f -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Generate security audits - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Generate security audits** security policy setting. - -## Reference - -This policy setting determines which accounts can be used by a process to generate audit records in the security event log. The Local Security Authority Subsystem Service (LSASS) writes events to the log. You can use the information in the security event log to trace unauthorized device access. - -Constant: SeAuditPrivilege - -### Possible values - -- User-defined list of accounts -- Local Service -- Network Service - -### Best practices - -- Because the audit log can potentially be an attack vector if an account is compromised, ensure that only the Local Service and Network Service accounts have the **Generate security audits** user right assigned to them. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, this setting is Local Service and Network Service on domain controllers and stand-alone servers. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Local Service
    Network Service| -| Stand-Alone Server Default Settings | Local Service
    Network Service| -| Domain Controller Effective Default Settings | Local Service
    Network Service| -| Member Server Effective Default Settings | Local Service
    Network Service| -| Client Computer Effective Default Settings | Local Service
    Network Service| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -Misuse of this user right can result in the generation of many auditing events, potentially hiding evidence of an attack or causing a denial-of-service (DoS) if the [Audit: Shut down system immediately if unable to log security audits](audit-shut-down-system-immediately-if-unable-to-log-security-audits.md) security policy setting is enabled. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -A malicious user could use accounts that can write to the Security log to fill that log with meaningless events. If the computer is configured to overwrite events as needed, malicious users could use this method to remove evidence of their unauthorized activities. If the computer is configured to shut down when it is unable to write to the Security log, and it is not configured to automatically back up the log files, this method could be used to create a DoS condition. - -### Countermeasure - -Ensure that only the Local Service and Network Service accounts have the **Generate security audits** user right assigned to them. - -### Potential impact - -None. Restricting the **Generate security audits** user right to the Local Service and Network Service accounts is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md deleted file mode 100644 index 37573dfb33..0000000000 --- a/windows/security/threat-protection/security-policy-settings/how-to-configure-security-policy-settings.md +++ /dev/null @@ -1,81 +0,0 @@ ---- -title: Configure security policy settings -description: Describes steps to configure a security policy setting on the local device, on a domain-joined device, and on a domain controller. -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.collection: -- highpri -- tier3 -ms.topic: reference -ms.date: 06/07/2023 -appliesto: -- ✅ Windows 11 -- ✅ Windows 10 ---- - -# Configure security policy settings - -This article describes steps to configure a security policy setting on the local device, on a domain-joined device, and on a domain controller. You must have Administrators rights on the local device, or you must have the appropriate permissions to update a Group Policy Object (GPO) on the domain controller to perform these procedures. - -When a local setting is inaccessible, it indicates that a GPO currently controls that setting. - -## To configure a setting using the Local Security Policy console - -1. To open Local Security Policy, on the **Start** screen, type **secpol.msc**, and then press ENTER. -1. Under **Security Settings** of the console tree, do one of the following: - - Select **Account Policies** to edit the **Password Policy** or **Account Lockout Policy**. - - Select **Local Policies** to edit an **Audit Policy**, a **User Rights Assignment**, or **Security Options**. -1. When you find the policy setting in the details pane, double-click the security policy that you want to modify. -1. Modify the security policy setting, and then select **OK**. - -> [!NOTE] -> -> - Some security policy settings require that the device be restarted before the setting takes effect. -> - Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -## To configure a security policy setting using the Local Group Policy Editor console - -You must have the appropriate permissions to install and use the Microsoft Management Console (MMC), and to update a Group Policy Object (GPO) on the domain controller to perform these procedures. - -1. Open the Local Group Policy Editor (gpedit.msc). -1. In the console tree, click **Computer Configuration**, select **Windows Settings**, and then select **Security Settings**. -1. Do one of the following: - - Select **Account Policies** to edit the **Password Policy** or **Account Lockout Policy**. - - Select **Local Policies** to edit an **Audit Policy**, a **User Rights Assignment**, or **Security Options**. -1. In the details pane, double-click the security policy setting that you want to modify. - - > [!NOTE] - > If this security policy has not yet been defined, select the **Define these policy settings** check box. - -1. Modify the security policy setting, and then select **OK**. - -> [!NOTE] -> If you want to configure security settings for many devices on your network, you can use the Group Policy Management Console. - -## To configure a setting for a domain controller - -The following procedure describes how to configure a security policy setting for only a domain controller (from the domain controller). - -1. To open the domain controller security policy, in the console tree, locate *GroupPolicyObject \[ComputerName\]* Policy, click **Computer Configuration**, click **Windows Settings**, and then click **Security Settings**. -1. Do one of the following: - - - Double-click **Account Policies** to edit the **Password Policy**, **Account Lockout Policy**, or **Kerberos Policy**. - - Select **Local Policies** to edit the **Audit Policy**, a **User Rights Assignment**, or **Security Options**. - -1. In the details pane, double-click the security policy that you want to modify. - - > [!NOTE] - > If this security policy has not yet been defined, select the **Define these policy settings** check box. - -1. Modify the security policy setting, and then select **OK**. - -> [!IMPORTANT] -> -> - Always test a newly created policy in a test organizational unit before you apply it to your network. -> - When you change a security setting through a GPO and click **OK**, that setting will take effect the next time you refresh the settings. - -## Related articles - -- [Security policy settings reference](security-policy-settings-reference.md) diff --git a/windows/security/threat-protection/security-policy-settings/images/privacy-setting-in-sign-in-options.png b/windows/security/threat-protection/security-policy-settings/images/privacy-setting-in-sign-in-options.png deleted file mode 100644 index cf2e499e04..0000000000 Binary files a/windows/security/threat-protection/security-policy-settings/images/privacy-setting-in-sign-in-options.png and /dev/null differ diff --git a/windows/security/threat-protection/security-policy-settings/images/secpol-architecture.gif b/windows/security/threat-protection/security-policy-settings/images/secpol-architecture.gif deleted file mode 100644 index aa7f16b61a..0000000000 Binary files a/windows/security/threat-protection/security-policy-settings/images/secpol-architecture.gif and /dev/null differ diff --git a/windows/security/threat-protection/security-policy-settings/images/secpol-components.gif b/windows/security/threat-protection/security-policy-settings/images/secpol-components.gif deleted file mode 100644 index df39c95345..0000000000 Binary files a/windows/security/threat-protection/security-policy-settings/images/secpol-components.gif and /dev/null differ diff --git a/windows/security/threat-protection/security-policy-settings/images/secpol-multigpomerge.gif b/windows/security/threat-protection/security-policy-settings/images/secpol-multigpomerge.gif deleted file mode 100644 index 8a637c8319..0000000000 Binary files a/windows/security/threat-protection/security-policy-settings/images/secpol-multigpomerge.gif and /dev/null differ diff --git a/windows/security/threat-protection/security-policy-settings/images/secpol-processes.gif b/windows/security/threat-protection/security-policy-settings/images/secpol-processes.gif deleted file mode 100644 index a1fc126115..0000000000 Binary files a/windows/security/threat-protection/security-policy-settings/images/secpol-processes.gif and /dev/null differ diff --git a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md b/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md deleted file mode 100644 index 59a5523281..0000000000 --- a/windows/security/threat-protection/security-policy-settings/impersonate-a-client-after-authentication.md +++ /dev/null @@ -1,111 +0,0 @@ ---- -title: Impersonate a client after authentication -description: Describes the best practices, location, values, policy management, and security considerations for the Impersonate a client after authentication security policy setting. -ms.assetid: 4cd241e2-c680-4b43-8ed0-3b391925cec5 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Impersonate a client after authentication - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Impersonate a client after authentication** security policy setting. - -## Reference - -This policy setting determines which programs are allowed to impersonate a user or another specified account and act on behalf of the user. If this user right is required for this type of impersonation, an unauthorized user cannot cause a client to connect (for example, by remote procedure call (RPC) or named pipes) to a service that they have created to impersonate that client. (Such an action could elevate the unauthorized user's permissions to administrative or system levels.) - -Impersonation is the ability of a thread to run in a security context that is different from the context of the process that owns the thread. Impersonation is designed to meet the security requirements of client/server applications. When running in a client's security context, a service "is" the client, to some degree. One of the service's threads uses an access token representing the client's credentials to obtain access to the objects to which the client has access. -The primary reason for impersonation is to cause access checks to be performed against the client's identity. Using the client's identity for access checks can cause access to be either restricted or expanded, depending on what the client has permission to do. - -Services that are started by the Service Control Manager have the built-in Service group added by default to their access tokens. COM servers that are started by the COM infrastructure and configured to run under a specific account also have the Service group added to their access tokens. As a result, these processes are assigned this user right when they are started. - -Constant: SeImpersonatePrivilege - -### Possible values - -- User-defined list of accounts -- Default values -- Not defined - -### Best practices - -- A user can impersonate an access token if any of the following conditions exist: - - - The access token that is being impersonated is for this user. - - The user in this session logged on to the network with explicit credentials to create the access token. - - The requested level is less than Impersonate, such as Anonymous or Identify. - - Because of these factors, users do not usually need to have this user right assigned. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, this setting is Administrators, Local Service, Network Service, and Service on domain controllers and stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined | -| Default Domain Controller Policy| Administrators
    Local Service
    Network Service
    Service| -| Stand-Alone Server Default Settings | Administrators
    Local Service
    Network Service
    Service| -| Domain Controller Effective Default Settings | Administrators
    Local Service
    Network Service
    Service| -| Member Server Effective Default Settings | Administrators
    Local Service
    Network Service
    Service| -| Client Computer Effective Default Settings | Administrators
    Local Service
    Network Service
    Service| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An attacker with the **Impersonate a client after authentication** user right could create a service, mislead a client into connecting to the service, and then impersonate that computer to elevate the attacker's level of access to that of the device. - -### Countermeasure - -On member servers, ensure that only the Administrators and Service groups (Local Service, Network Service, and Service) have the **Impersonate a client after authentication** user right assigned to them. - -### Potential impact - -In most cases, this configuration has no impact. If you have installed optional components such as ASP.NET or IIS, you may need to assign the **Impersonate a client after authentication** user right to additional accounts that are required by those components, such as IUSR\_*<ComputerName>*, IIS\_WPG, ASP.NET, or IWAM\_*<ComputerName>*. - -In IIS 7.0 and later, a built-in account (IUSR) replaces the IUSR_MachineName account. Additionally, a group that is named IIS_IUSRS replaces the IIS_WPG group. Because the IUSR account is a built-in account, the IUSR account no longer requires a password. The IUSR account resembles a network or local service account. For more details, see [Default permissions and user rights for IIS 7.0 and later](/troubleshoot/iis/default-permissions-user-rights). - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md b/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md deleted file mode 100644 index f65a5700dd..0000000000 --- a/windows/security/threat-protection/security-policy-settings/increase-a-process-working-set.md +++ /dev/null @@ -1,95 +0,0 @@ ---- -title: Increase a process working set -description: Describes the best practices, location, values, policy management, and security considerations for the Increase a process working set security policy setting. -ms.assetid: b742ad96-37f3-4686-b8f7-f2b48367105b -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Increase a process working set - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Increase a process working set** security policy setting. - -## Reference - -This policy setting determines which users can increase or decrease the size of the working set of a process. The working set of a process is the set of memory pages currently visible to the process in physical RAM. These pages are resident, and they're available for an application to use without triggering a page fault. The minimum and maximum working set sizes affect the virtual memory paging behavior of a process. - -Constant: SeIncreaseWorkingSetPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- You should make users aware that adverse performance issues may occur if they modify this security setting. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, standard users have this right. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not Defined| -| Default Domain Controller Policy | Users| -| Stand-Alone Server Default Settings| Users| -| Domain Controller Effective Default Settings| Users| -| Member Server Effective Default Settings | Users| -| Client Computer Effective Default Settings | Users| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Increasing the working set size for a process decreases the amount of physical memory that is available to the rest of the system. - -### Countermeasure - -Increase user’s awareness about the impact of increasing the working set of a process and how to recognize that their system is adversely affected if they change this setting. - -### Potential impact -None. Allowing standard users to increase the working set of a process is the default configuration. -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md b/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md deleted file mode 100644 index 156b06d265..0000000000 --- a/windows/security/threat-protection/security-policy-settings/increase-scheduling-priority.md +++ /dev/null @@ -1,91 +0,0 @@ ---- -title: Increase scheduling priority -description: Describes the best practices, location, values, policy management, and security considerations for the Increase scheduling priority security policy setting. -ms.assetid: fbec5973-d35e-4797-9626-d0d56061527f -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 2/6/2020 ---- - -# Increase scheduling priority - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Increase scheduling priority** security policy setting. - -## Reference - -This policy setting determines which user accounts can increase the base priority class of a process. It is not a privileged operation to increase relative priority within a priority class. This user right is not required by administrative tools that are supplied with the operating system, but it might be required by software development tools. - -Specifically, this security setting determines which accounts can use a process with Write Property access to another process to increase the run priority that is assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. - -Constant: SeIncreaseBasePriorityPrivilege - -### Possible values - -- User-defined list of accounts -- Not defined -- Administrators - -### Best practices - -- Retain the default value as the only accounts responsible for controlling process scheduling priorities. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -A user who is assigned this user right could increase the scheduling priority of a process to Real-Time, which would leave little processing time for all other processes and could lead to a denial-of-service condition. - -### Countermeasure - -Verify that only Administrators and Window Manager\Window Manager Group have the **Increase scheduling priority** user right assigned to them. - -### Potential impact - -None. Restricting the **Increase scheduling priority** user right to members of the Administrators group and Window Manager\Window Manager Group is the default configuration. - -> [!Warning] -> If you remove **Window Manager\Window Manager Group** from the **Increase scheduling priority** user right, certain applications and computers do not function correctly. In particular, the INK workspace does not function correctly on unified memory architecture (UMA) laptop and desktop computers that run Windows 10, version 1903 (or later) and that use the Intel GFX driver. -> -> On affected computers, the display blinks when users draw on INK workspaces such as those that are used by Microsoft Edge, Microsoft PowerPoint, or Microsoft OneNote. The blinking occurs because the inking-related processes repeatedly try to use the Real-Time priority, but are denied permission. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) -- [Increase scheduling priority for Windows Server 2012 and earlier](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn221960(v%3dws.11)) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md deleted file mode 100644 index 2f420b21cf..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md +++ /dev/null @@ -1,155 +0,0 @@ ---- -title: Interactive logon Display user information when the session is locked -description: Best practices, security considerations, and more for the security policy setting, Interactive logon Display user information when the session is locked. -ms.assetid: 9146aa3d-9b2f-47ba-ac03-ff43efb10530 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Interactive logon: Display user information when the session is locked - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Interactive logon: Display user information when the session is locked** security policy setting. - -## Reference -This security setting controls whether details such as email address or domain\username appear with the username on the sign-in screen. -For clients that run Windows 10 version 1511 and 1507 (RTM), this setting works similarly to previous versions of Windows. -However, because of a new **Privacy** setting introduced in Windows 10 version 1607, this security setting affects those clients differently. - -### Changes beginning with Windows 10 version 1607 - -Beginning with Windows 10 version 1607, new functionality was added to Windows 10 to hide username details such as email address by default, with the ability to change the default to show the details. -This functionality is controlled by a new **Privacy** setting in **Settings** > **Accounts** > **Sign-in options**. -The Privacy setting is off by default, which hides the details. - -![Privacy setting.](images/privacy-setting-in-sign-in-options.png) - -The **Interactive logon: Display user information when the session is locked** Group Policy setting controls the same functionality. - -This setting has these possible values: - -- **User display name, domain and user names** - - For a local sign in, the user's full name is displayed. - If the user signed in using a Microsoft account, the user's email address is displayed. - For a domain sign in, the domain\username is displayed. - This setting has the same effect as turning on the **Privacy** setting. - -- **User display name only** - - The full name of the user who locked the session is displayed. - This setting has the same effect as turning off the **Privacy** setting. - -- **Do not display user information** - - No names are displayed. - Beginning with Windows 10 version 1607, this option isn't supported. - If this option is chosen, the full name of the user who locked the session is displayed instead. - This change makes this setting consistent with the functionality of the new **Privacy** setting. - To display no user information, enable the Group Policy setting **Interactive logon: Don't display last signed-in**. - -- **Domain and user names only** - - For a domain sign in only, the domain\username is displayed. - The **Privacy** setting is automatically on and grayed out. - -- **Blank** - - Default setting. - This setting translates to “Not defined,” but it will display the user's full name in the same manner as the option **User display name only**. - When an option is set, you can't reset this policy to blank, or not defined. - -### Hotfix for Windows 10 version 1607 - -Clients that run Windows 10 version 1607 won't show details on the sign-in screen even if the **User display name, domain and user names** option is chosen because the **Privacy** setting is off. -If the **Privacy** setting is turned on, details will show. - -The **Privacy** setting can't be changed for clients in bulk. -Instead, apply [KB 4013429](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4013429) to clients that run Windows 10 version 1607 so they behave similarly to previous versions of Windows. -Clients that run later versions of Windows 10 don't require a hotfix. - -There are related Group Policy settings: - -- **Computer Configuration\Policies\Administrative Templates\System\Logon\Block user from showing account details on sign-in** prevents users from showing account details on the sign-in screen. -- **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Don’t display last signed-in** prevents the username of the last user to sign in from being shown. -- **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Don’t display username at sign-in** prevents the username from being shown at Windows sign-in and immediately after credentials are entered and before the desktop appears. - -### Interaction with related Group Policy settings - -For all versions of Windows 10, only the user display name is shown by default. - -If **Block user from showing account details on sign-in** is enabled, then only the user display name is shown regardless of any other Group Policy settings. -Users won't be able to show details. - -If **Block user from showing account details on sign-in** isn't enabled, then you can set **Interactive logon: Display user information when the session is locked** to **User display name, domain and user names** or **Domain and user names only** to show other details such as domain\username. -In this case, clients that run Windows 10 version 1607 need [KB 4013429](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4013429) applied. -Users won't be able to hide other details. - -If **Block user from showing account details on sign-in** isn't enabled and **Don’t display last signed-in** is enabled, the username won't be shown. - -### Best practices - -Your implementation of this policy depends on your security requirements for displayed sign-in information. If you run computers that store sensitive data, with monitors displayed in unsecured locations, or if you have computers with sensitive data that are remotely accessed, revealing logged on user’s full names or domain account names might contradict your overall security policy. - -Depending on your security policy, you might also want to enable the [Interactive logon: Don't display last user name](interactive-logon-do-not-display-last-user-name.md) policy. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or Group Policy object (GPO) | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | **User display name, domain and user names**| -| Member server effective default settings | **User display name, domain and user names**| -| Effective GPO default settings on client computers | **User display name, domain and user names**| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -When a computer displays the Secure Desktop in an unsecured area, certain user information can be readily available to anyone looking at the monitor, either physically or through a remote connection. The displayed user information could include the domain user account name or the full name of the user who locked the session or who had logged on last. - -### Countermeasure - -Enabling this policy setting allows the operating system to hide certain user information from being displayed on the Secure Desktop (after the device has been booted or when the session has been locked by using CTRL+ALT+DEL). However, user information is displayed if the **Switch user** feature is used so that the sign-in tiles are displayed for each signed-in user. - -You might also want to enable the [Interactive logon: Don't display last signed-in](interactive-logon-do-not-display-last-user-name.md) policy, which will prevent the Windows operating system from displaying the sign-in name and sign-in tile of the last user to sign in. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md deleted file mode 100644 index 66d276bacf..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-display-last-user-name.md +++ /dev/null @@ -1,95 +0,0 @@ ---- -title: Interactive logon Don't display last signed-in -description: Describes the best practices, location, values, and security considerations for the Interactive logon Don't display last user name security policy setting. -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 -ms.reviewer: -ms.author: vinpa ---- - -# Interactive logon: Don't display last signed-in - -**Applies to** -- Windows 11 -- Windows 10 -- Windows Server 2022 -- Windows Server 2019 -- Windows Server 2016 - -Describes the best practices, location, values, and security considerations for the **Interactive logon: Don't display last signed-in** security policy setting. Before Windows 10 version 1703, this policy setting was named **Interactive logon:Do not display last user name.** - -## Reference - -This security policy setting determines whether the name of the last user to sign in to the device is displayed on the Secure Desktop. - -If this policy is enabled, the full name of the last user to successfully sign in isn't displayed on the Secure Desktop, nor is the user’s sign-in tile displayed. Additionally, if the **Switch user** feature is used, the full name and sign-in tile aren't displayed. The sign-in screen requests a qualified domain account name (or local user name) and password. - -If this policy is disabled, the full name of the last user to sign in is displayed, and the user’s sign-in tile is displayed. This behavior is the same when the **Switch user** feature is used. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -Your implementation of this policy depends on your security requirements for displayed sign-in information. If you have devices that store sensitive data, with monitors displayed in unsecured locations, or if you have devices with sensitive data that are remotely accessed, revealing logged on user’s full names or domain account names might contradict your overall security policy. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or Group Policy object (GPO) | Default value| -| - | - | -| Default domain policy| Disabled| -| Default domain controller policy| Disabled| -| Stand-alone server default settings | Disabled| -| Domain controller effective default settings | Disabled| -| Member server effective default settings | Disabled| -| Effective GPO default settings on client computers | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An attacker with access to the console (for example, someone with physical access or someone who can connect to the device through Remote Desktop Session Host) could view the name of the last user who logged on. The attacker could then try to guess the password, use a dictionary, or use a brute-force attack to try to sign in. - -### Countermeasure - -Enable the **Interactive logon: Do not display last user name** setting. - -### Potential impact - -Users must always type their user names and passwords when they sign in locally or to the domain. The sign-in tiles of all logged on users aren't displayed. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md deleted file mode 100644 index ab27093a1c..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: Interactive logon Do not require CTRL+ALT+DEL -description: Describes the best practices, location, values, and security considerations for the Interactive logon Do not require CTRL+ALT+DEL security policy setting. -ms.assetid: 04e2c000-2eb2-4d4b-8179-1e2cb4793e18 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- -# Interactive logon: Do not require CTRL+ALT+DEL - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Interactive logon: Do not require CTRL+ALT+DEL** security policy setting. - -## Reference - -This security setting determines whether pressing CTRL+ALT+DEL is required before a user can sign in. - -If this policy setting is enabled on a device, a user isn't required to press CTRL+ALT+DEL to sign in. - -If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to the Windows operating system (unless they're using a smart card for signing in). - -Microsoft developed this feature to make it easier for users with certain types of physical impairments to sign in to a device running the Windows operating system; however, not having to press the CTRL+ALT+DELETE key combination leaves users susceptible to attacks that attempt to intercept their passwords. Requiring CTRL+ALT+DELETE before users sign in ensures that users are communicating through a trusted path when entering their passwords. - -A malicious user might install malware that looks like the standard sign-in dialog box for the Windows operating system, and capture a user's password. The attacker can then sign in to the compromised account with whatever level of user rights that user has. - -> [!NOTE] -> When the policy is defined, registry value **DisableCAD** located in **HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System** is created. To revert the changes made by this policy, it is not enough to set its value to **Not defined**, this registry value needs to be removed as well. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- We recommend that you set **Disable CTRL+ALT+DEL requirement for logon** to **Not configured**. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -Beginning with Windows Server 2008 and Windows Vista, the CTRL+ALT+DELETE key combination is required to authenticate if this policy is disabled. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -This setting makes it easier for users with certain types of physical impairments to sign in to devices that run the Windows operating system. However, if users aren't required to press CTRL+ALT+DEL, they're susceptible to attacks that attempt to intercept their passwords. If CTRL+ALT+DEL is required before signing in, user passwords are communicated through a trusted path. - -If this setting is enabled, an attacker could install malware that looks like the standard sign-in dialog box in the Windows operating system, and capture the user's password. The attacker would then be able to sign in to the compromised account with whatever level of privilege that user has. - -### Countermeasure - -Disable the **Interactive logon: Do not require CTRL+ALT+DEL** setting. - -### Potential impact - -Unless they use a smart card to sign in, users must simultaneously press the three keys before the sign-in dialog box is displayed. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md deleted file mode 100644 index 05151970da..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md +++ /dev/null @@ -1,96 +0,0 @@ ---- -title: Interactive logon Don't display username at sign-in -description: Describes the best practices, location, values, and security considerations for the Interactive logon Don't display username at sign-in security policy setting. -ms.assetid: 98b24b03-95fe-4edc-8e97-cbdaa8e314fd -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Interactive logon: Don't display username at sign-in - -**Applies to** -- Windows 11 -- Windows 10 -- Windows Server 2022 -- Windows Server 2019 -- Windows Server 2016 - -Describes the best practices, location, values, and security considerations for the **Interactive logon: Don't display username at sign-in** security policy setting. - -## Reference - -A new policy setting has been introduced in Windows 10 starting with Windows 10 version 1703. This security policy setting determines whether the username is displayed during sign in. This setting only affects the **Other user** tile. - -If the policy is enabled and a user signs in as **Other user**, the full name of the user isn't displayed during sign-in. In the same context, if users type their email address and password at the sign-in screen and press **Enter**, the displayed text “Other user” remains unchanged, and is no longer replaced by the user’s first and last name, as in previous versions of Windows 10. Additionally,if users enter their domain user name and password and click **Submit**, their full name isn't shown until the Start screen displays. - -If the policy is disabled and a user signs in as **Other user**, the “Other user” text is replaced by the user’s first and last name during sign-in. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -Your implementation of this policy depends on your security requirements for displayed logon information. If you have devices that store sensitive data, with monitors displayed in unsecured locations, or if you have devices with sensitive data that are remotely accessed, revealing logged on user’s full names or domain account names might contradict your overall security policy. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or Group Policy object (GPO) | Default value| -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy| Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not defined| -| Member server effective default settings | Not defined| -| Effective GPO default settings on client computers | Not defined| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An attacker with access to the console (for example, someone with physical access or someone who can connect to the device through Remote Desktop Session Host) could view the name of the last user who logged on. The attacker could then try to guess the password, use a dictionary, or use a brute-force attack to try to sign in. - -### Countermeasure - -Enable the **Interactive logon: Don't display user name at sign-in** setting. - -### Potential impact - -Users must always type their usernames and passwords when they log on locally or to the domain. The sign in tiles of all logged on users aren't displayed. When this policy is enabled, you will be unable to change the default credential provider to anything other than username/password. In addition, this policy may be incompatible with autologon and multi-factor unlock. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md deleted file mode 100644 index fba7a86ac4..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-account-lockout-threshold.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: Interactive logon Machine account lockout threshold -description: Best practices, location, values, management, and security considerations for the security policy setting, Interactive logon Machine account lockout threshold. -ms.assetid: ebbd8e22-2611-4ebe-9db9-d49344e631e4 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Interactive logon: Machine account lockout threshold - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management, and security considerations for the **Interactive logon: Machine account lockout threshold** security policy setting. - -## Reference - -Beginning with Windows Server 2012 and Windows 8, the **Interactive logon: Machine account threshold** security policy setting enforces the lockout policy on those computers that have BitLocker enabled to protect operating system volumes. - -The security setting allows you to set a threshold for the number of failed sign-in attempts that causes the device to be locked by using BitLocker. This threshold means, if the specified maximum number of failed sign-in attempts is exceeded, the device will invalidate the Trusted Platform Module (TPM) protector and any other protector except the 48-digit recovery password, and then reboot. During Device Lockout mode, the computer or device only boots into the touch-enabled Windows Recovery Environment (WinRE) until an authorized user enters the recovery password to restore full access. - -Failed password attempts on workstations or member servers that have been locked by using either Ctrl+Alt+Delete or password-protected screen savers count as failed sign-in attempts. - -### Possible values - -You can set the **invalid logon attempts** value between 1 and 999. Values from 1 to 3 are interpreted as 4. If you set the value to 0, or leave blank, the computer or device will never be locked as a result of this policy setting. - -### Best practices - -Use this policy setting in conjunction with your other failed account sign-in attempts policy. For example, if the [Account lockout threshold](account-lockout-threshold.md) policy setting is set at 4, then setting **Interactive logon: Machine account lockout threshold** at 6 allows the user to restore access to resources without having to restore access to the device resulting from a BitLocker lock out. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings| Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled | -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -A restart is required for changes to this policy to become effective when they're saved locally or distributed through Group Policy. - -### Group Policy - -Because this policy setting was introduced in Windows Server 2012 and Windows 8, it can only be set locally on those devices that contain this policy setting, but it can be set and distributed through Group Policy to any computer running the Windows operating system that supports Group Policy and is BitLocker-enabled. - -When setting this policy, consider the [Account lockout threshold](account-lockout-threshold.md) policy setting, which determines the number of failed sign-in attempts that will cause a user account to be locked out. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -This policy setting helps protect a BitLocker-encrypted device from attackers attempting to brute-force guess the Windows sign-in password. If not set, then attackers can attempt innumerable passwords, if no other account protection mechanisms are in place. - -### Countermeasure - -Use this policy setting in conjunction with your other failed account sign-in attempts policy. For example, if the [Account lockout threshold](account-lockout-threshold.md) policy setting is set at 4, then setting **Interactive logon: Machine account lockout threshold** at 6 allows the user to restore access to resources without having to restore access to the device resulting from a BitLocker lock out. - -### Potential impact - -If not set, the device could be compromised by an attacker using brute-force password cracking software. - -If set too low, productivity might be hindered because users who become locked out will be unable to access the device without providing the 48-digit BitLocker recovery password. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md deleted file mode 100644 index 93e24a9961..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-machine-inactivity-limit.md +++ /dev/null @@ -1,95 +0,0 @@ ---- -title: Interactive logon Machine inactivity limit -description: Describes the best practices, location, values, management, and security considerations for the Interactive logon Machine inactivity limit security policy setting. -ms.assetid: 7065b4a9-0d52-41d5-afc4-5aedfc4162b5 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 09/18/2018 ---- - -# Interactive logon: Machine inactivity limit - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management, and security considerations for the **Interactive logon: Machine inactivity limit** security policy setting. - -## Reference - -Beginning with Windows Server 2012 and Windows 8, Windows detects user-input inactivity of a sign-in (logon) session by using the security policy setting **Interactive logon: Machine inactivity limit**. If the amount of inactive time exceeds the inactivity limit set by this policy, then the user's session locks by invoking the screen saver (screen saver should be active on the destination machine). You can activate the screen saver by enabling the Group Policy **User Configuration\Administrative Templates\Control Panel\Personalization\Enable screen saver**. This policy setting allows you to control the locking time by using Group Policy. - -> [!NOTE] -> If the **Interactive logon: Machine inactivity limit** security policy setting is configured, the device locks not only when inactive time exceeds the inactivity limit, but also when the screensaver activates or when the display turns off because of power settings. - -### Possible values - -The automatic lock of the device is set in elapsed seconds of inactivity, which can range from zero (0) to 599,940 seconds (166.65 hours). - -If **Machine will be locked after** is set to zero (0) or has no value (blank), the policy setting is disabled and a user sign-in session is never locked after any inactivity. - -### Best practices - -Set the time for elapsed user-input inactivity based on the device's usage and location requirements. For example, if the device or device is in a public area, you might want to have the device automatically lock after a short period of inactivity to prevent unauthorized access. However, if the device is used by an individual or group of trusted individuals, such as in a restricted manufacturing area, automatically locking the device might hinder productivity. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Local Policies\\Security Options (While creating and linking group policy on server) - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -Restart is required for changes to this policy to become effective when they're saved locally or distributed through Group Policy. - -### Group Policy - -Because this policy setting was introduced in Windows Server 2012 and Windows 8, it can only be set locally on those computers that contain this policy setting, but it can be set and distributed through Group Policy to any computer running the Windows operating system that supports Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -This policy setting helps you prevent unauthorized access to devices under your control when the currently signed-in user leaves without deliberately locking the desktop. In versions earlier than Windows Server 2012 and Windows 8, the desktop-locking mechanism was set on individual computers in Personalization in Control Panel. - -### Countermeasure - -Set the time for elapsed user-input inactivity time by using the security policy setting **Interactive logon: Machine inactivity limit** based on the device's usage and location requirements. - -### Potential impact - -This security policy setting can limit unauthorized access to unsecured computers; however, that requirement must be balanced with the productivity requirements of the intended user. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md deleted file mode 100644 index cc406c3e45..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: Interactive Logon Message text -description: Learn about best practices, security considerations and more for the security policy setting, Interactive logon Message text for users attempting to log on. -ms.assetid: fcfe8a6d-ca65-4403-b9e6-2fa017a31c2e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Interactive logon: Message text for users attempting to log on - -**Applies to:** - -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management, and security considerations for the **Interactive logon: Message text for users attempting to log on** security policy setting. - -## Reference - -The **Interactive logon: Message text for users attempting to log on** and [Interactive logon: Message title for users attempting to log on](interactive-logon-message-title-for-users-attempting-to-log-on.md) policy settings are closely related. - -**Interactive logon: Message text for users attempting to log on** specifies a text message to be displayed to users when they sign in. - -**Interactive logon: Message title for users attempting to log on** specifies a title to appear in the title bar of the window that contains the text message. This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited. - -When these policy settings are configured, users will see a dialog box before they can sign in to the server console. - -### Possible values - -The possible values for this setting are: - -- User-defined text -- Not defined - -### Best practices - -- It's advisable to set **Interactive logon: Message text for users attempting to log on** to a value similar to one of the following: - - 1. IT IS AN OFFENSE TO CONTINUE WITHOUT PROPER AUTHORIZATION. - 2. This system is restricted to authorized users. Individuals who attempt unauthorized access will be prosecuted. If you're unauthorized, terminate access now. Click OK to indicate your acceptance of this information. - > [!IMPORTANT] - > Any warning that you display in the title or text should be approved by representatives from your organization's legal and human resources departments. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| DC Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes different requirements to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -There are two policy settings that relate to sign-in displays: - -- **Interactive logon: Message text for users attempting to log on** -- [Interactive logon: Message title for users attempting to log on](interactive-logon-message-title-for-users-attempting-to-log-on.md) - -The first policy setting specifies a text message that displays to users when they sign in, and the second policy setting specifies a title for the title bar of the text message window. Many organizations use this text for legal purposes; for example, to warn users about the ramifications of misuse of company information, or to warn them that their actions may be audited. - -### Vulnerability - -Users often don't understand the importance of security practices. However, the display of a warning message before signing in may help prevent an attack by warning malicious or uninformed users about the consequences of their misconduct before it happens. It may also help reinforce corporate policies by notifying employees of appropriate policies during the sign-in process. - -### Countermeasure - -Configure the **Interactive logon: Message text for users attempting to log on** and [Interactive logon: Message title for users attempting to log on](interactive-logon-message-title-for-users-attempting-to-log-on.md) settings to an appropriate value for your organization. - -### Potential impact - -Users see a message in a dialog box before they can sign in to the server console. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md deleted file mode 100644 index 20776c7140..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: Interactive logon Message title for users attempting to log on -description: Best practices, security considerations, and more for the security policy setting, Interactive logon Message title for users attempting to log on. -ms.assetid: f2596470-4cc0-4ef1-849c-bef9dc3533c6 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Interactive logon: Message title for users attempting to log on - -**Applies to** - -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Interactive logon: Message title for users attempting to log on** security policy setting. - -## Reference - -This security setting allows you to specify a title that appears in the title bar of the window that contains the **Interactive logon: Message title for users attempting to log on**. This text is often used for legal reasons—for example, to warn users about the ramifications of misusing company information, or to warn them that their actions might be audited. - -The **Interactive logon: Message title for users attempting to log on** and [Interactive logon: Message text for users attempting to log on](interactive-logon-message-text-for-users-attempting-to-log-on.md) policy settings are closely related. **Interactive logon: Message title for users attempting to log on** specifies a message title to be displayed to users when they log on. This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited. - -When these policy settings are configured, users will see a dialog box before they can sign in the server console. - -### Possible values - -- *User-defined title* -- Not defined - -### Best practices - -1. It is advisable to set **Interactive logon: Message title for users attempting to log on** to a value similar to one the following: - - - RESTRICTED SYSTEM - - or - - - WARNING: This system is restricted to authorized users. - -2. Set the policy [Interactive logon: Message text for users attempting to log on](interactive-logon-message-text-for-users-attempting-to-log-on.md) to reinforce the meaning of the message’s title. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -|Server type or GPO | Default value| -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| DC Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -There are two policy settings that relate to sign-in displays: - -- [Interactive logon: Message text for users attempting to log on](interactive-logon-message-text-for-users-attempting-to-log-on.md) -- **Interactive logon: Message title for users attempting to log on** - -The first policy setting specifies a text message that displays to users when they sign in, and the second policy setting specifies a title for the title bar of the text message window. Many organizations use this text for legal purposes; for example, to warn users about the ramifications of misuse of company information, or to warn them that their actions may be audited. - -### Vulnerability - -Users often don't understand the importance of security practices. However, the display of a warning message with an appropriate title before signing in may help prevent an attack by warning malicious or uninformed users about the consequences of their misconduct before it happens. It may also help reinforce corporate policies by notifying employees of appropriate policies during the sign-in process. - -### Countermeasure - -Configure the [Interactive logon: Message text for users attempting to log on](interactive-logon-message-text-for-users-attempting-to-log-on.md) and **Interactive logon: Message title for users attempting to log on** settings to an appropriate value for your organization. - -> [!NOTE] -> Any warning message that displays should be approved by your organization's legal and human resources representatives. - -### Potential impact - -Users see a message in a dialog box before they can sign in to the server console. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md deleted file mode 100644 index 3817c2a334..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md +++ /dev/null @@ -1,111 +0,0 @@ ---- -title: Interactive logon Number of previous logons to cache (in case domain controller is not available) -description: Best practices and more for the security policy setting, Interactive logon Number of previous logons to cache (in case domain controller is not available). -ms.assetid: 660e925e-cc3e-4098-a41e-eb8db8062d8d -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 08/27/2018 ---- - -# Interactive logon: Number of previous logons to cache (in case domain controller is not available) - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Number of previous logons to cache (in case domain controller is not available)** security policy setting. - -## Reference - -The **Interactive logon: Number of previous logons to cache (in case domain controller is not available**) policy setting determines whether a user can sign in to a Windows domain by using cached account information. Sign-in information for domain accounts can be cached locally so that, if a domain controller can't be contacted on subsequent logons, a user can still sign in. This policy setting determines the number of unique users whose sign-in information is cached locally. - -If a domain controller is unavailable and a user's sign-in information is cached, the user is prompted with the following message: - -A domain controller for your domain couldn't be contacted. You've been logged on using cached account information. Changes to your profile since you last logged on might not be available. - -If a domain controller is unavailable and a user's sign-in information isn't cached, the user is prompted with this message: - -The system can't log you on now because the domain *DOMAIN NAME* isn't available. - -The value of this policy setting indicates the number of users whose sign-in information the server caches locally. If the value is 10, the server caches sign-in information for 10 users. When an 11th user signs in to the device, the server overwrites the oldest cached sign-in session. - -Users who access the server console will have their sign-in credentials cached on that server. A malicious user who is able to access the file system of the server can locate this cached information and use a brute-force attack to determine user passwords. Windows mitigates this type of attack by -encrypting the information and keeping the cached credentials in the system's registries, which are spread across numerous physical locations. - -> [!NOTE] -> The cached account information does not expire, but can get overwritten, as previously described. - -### Possible values - -- A user-defined number from 0 through 50 -- Not defined - -### Best practices - -The [Windows security baselines](../../operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines.md) don't recommend configuring this setting. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | 10 logons| -| DC Effective Default Settings | No effect| -| Member Server Effective Default Settings | 10 logons| -| Client Computer Effective Default Settings| 10 logons| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The number that is assigned to this policy setting indicates the number of users whose sign-in information is cached locally by the servers. If the number is set to 10, the server caches sign-in information for 10 users. When an 11th user signs in to the device, the server overwrites the oldest cached sign-in session. - -Users who access the server console have their sign-in credentials cached on that server. An attacker who is able to access the file system of the server could locate this cached information and use a brute force attack to attempt to determine user passwords. - -To mitigate this type of attack, Windows encrypts the information and obscures its physical location. - -### Countermeasure - -Configure the **Interactive logon: Number of previous logons to cache (in case domain controller is not available)** setting to 0, which disables the local caching of sign-in information. Other countermeasures include enforcement of strong password policies and physically secure locations for the computers. - -### Potential impact - -Users can't sign in to any devices if there's no domain controller available to authenticate them. Organizations can configure this value to 2 for end-user computers, especially for mobile users. A configuration value of 2 means that the user's sign-in information is still in the cache, even if a -member of the IT department has recently logged on to the device to perform system maintenance. This method allows users to sign in to their computers when they aren't connected to the organization's network. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md deleted file mode 100644 index 14eb3e7e3a..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md +++ /dev/null @@ -1,92 +0,0 @@ ---- -title: Interactive log-on prompt user to change password before expiration -description: Best practices and security considerations for an interactive log-on prompt for users to change passwords before expiration. -ms.assetid: 8fe94781-40f7-4fbe-8cfd-5e116e6833e9 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Interactive log on: Prompt the user to change passwords before expiration - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Prompt user to change password before expiration** security policy setting. - -## Reference - -This policy setting determines when users are warned that their passwords are about to expire. This warning gives users time to select a strong password before their current password expires to avoid losing system access. - -### Possible values - -- A user-defined number of days from 0 through 999 -- Not defined - -### Best practices - -- Configure user passwords to expire periodically. Users need warning that their password is going to expire, or they might get locked out of the system. -- Set **Interactive logon: Prompt user to change password before expiration** to five days. When their password expiration date is five or fewer days away, users will see a dialog box each time that they log on to the domain. -- When you set the policy to zero, there is no password expiration warning when the user logs on. During a long-running logon session, you would get the warning on the day the password expires or when it already has expired. - -### Location - -*Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Local Policies\\Security Options* - -### Default values - -The following table lists the default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Five days| -| DC Effective Default Settings | Five days | -| Member Server Effective Default Settings| Five days | -| Client Computer Effective Default Settings | Five days| - -## Policy management - -This section describes features and tools that you can use to manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None. - -### Group Policy - -Configure this policy setting by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, it can be configured on the local computer through the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and possible negative consequences of the countermeasure. - -### Vulnerability - -If user passwords are configured to expire periodically in your organization, users need to be warned before expiration. Otherwise, they may get locked out of the devices inadvertently. - -### Countermeasure - -Configure the **Interactive logon: Prompt user to change password before expiration** setting to five days. - -### Potential impact - -Users see a dialog-box that prompts them to change their password each time that they log on to the domain when their password is configured to expire in 5 or fewer days. - -## Related topics - -- [Security options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md deleted file mode 100644 index 2249b7889f..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: Interactive logon Require Domain Controller authentication to unlock workstation -description: Best practices security considerations, and more for the policy setting, Interactive logon Require Domain Controller authentication to unlock workstation. -ms.assetid: 97618ed3-e946-47db-a212-b5e7a4fc6ffc -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Interactive logon: Require Domain Controller authentication to unlock workstation - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Require Domain Controller authentication to unlock workstation** security policy setting. - -## Reference - -Unlocking a locked device requires sign-in information. For domain accounts, the **Interactive logon: Require Domain Controller authentication to unlock workstation** policy setting determines whether it's necessary to contact a domain controller to unlock a device. Enabling this policy setting requires a domain controller to authenticate the domain account that is being used to unlock the device. Disabling this policy setting allows a user to unlock the device without the computer verifying the sign-in information with a domain controller. However, if [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) is set to a value greater than zero, the user's cached credentials will be used to unlock the system. - -The device caches (locally in memory) the credentials of any users who have been authenticated. The device uses these cached credentials to authenticate anyone who attempts to unlock the console. - -When cached credentials are used, any changes that have recently been made to the account (such as user rights assignments, account lockout, or the account being disabled) aren't considered or applied after this authentication process. This result means not only that user rights aren't updated, but more importantly that disabled accounts are still able to unlock the console of the system. - -It's advisable to set **Interactive logon: Require Domain Controller authentication to unlock workstation** to Enabled and set [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) to 0. When the console of a device is locked by a user or automatically by a screen saver time-out, the console can only be unlocked if the user is able to reauthenticate to the domain controller. If no domain controller is available, users can't unlock their devices. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Set **Interactive logon: Require Domain Controller authentication to unlock workstation** to Enabled and set [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) to 0. When the console of a device is locked by a user or automatically by a screen saver time-out, the console can only be unlocked if the user is able to reauthenticate to the domain controller. If no domain controller is available, users can't unlock their devices. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -By default, the device caches locally in memory the credentials of any users who are authenticated. The device uses these cached credentials to authenticate anyone who attempts to unlock the console. When cached credentials are used, any changes that have recently been made to the account—such as user rights assignments, account lockout, or the account being disabled—aren't considered or applied after the account is authenticated. User privileges aren't updated, and disabled accounts are still able to unlock the console of the device - -### Countermeasure - -Configure the **Interactive logon: Require Domain Controller authentication to unlock workstation** setting to Enabled and configure the [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) setting to 0. - -### Potential impact - -When the console on a device is locked by a user or automatically by a screen-saver timeout, the console can be unlocked only if the user can reauthenticate to the domain controller. If no domain controller is available, users can't unlock their workstations. If you configure the [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md) setting to 0, users whose domain controllers are unavailable (such as mobile or remote users) can't sign in. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md deleted file mode 100644 index fab0a761f3..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-require-smart-card.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: "Interactive logon: Require Windows Hello for Business or smart card" -description: "Describes the best practices, location, values, policy management, and security considerations for the 'Interactive logon: Require Windows Hello for Business or smart card' security policy setting." -author: vinaypamnani-msft -ms.author: vinpa -manager: aaroncz -ms.reviewer: -ms.localizationpriority: medium -ms.topic: reference -ms.date: 01/13/2023 ---- - -# Interactive logon: Require Windows Hello for Business or smart card - -**Applies to** - -- Windows 11 -- Windows 10, version 1703 or later - -Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Require Windows Hello for Business or smart card** security policy setting. - -> [!NOTE] -> You may need to download the ADMX template for your version of Windows to apply this policy. - -## Reference - -The **Interactive logon: Require Windows Hello for Business or smart card** policy setting requires users to sign in to a device by using a smart card or Windows Hello for Business method. - -Requiring users to use long, complex passwords for authentication enhances network security, especially if the users must change their passwords regularly. This requirement reduces the chance that a malicious user will be able to guess a user's password through a brute-force attack. Using smart cards rather than passwords for authentication dramatically increases security because, with today's technology, it's nearly impossible for a malicious user to impersonate another user. Smart cards that require personal identification numbers (PINs) provide two-factor authentication: the user who attempts to sign in must possess the smart card and know its PIN. A malicious user who captures the authentication traffic between the user's device and the domain controller will find it difficult to decrypt the traffic: even if they do, the next time the user signs in to the network, a new session key will be generated for encrypting traffic between the user and the domain controller. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Set **Interactive logon: Require Windows Hello for Business or smart card** to Enabled. All users will have to use smart cards to sign in to the network, or a Windows Hello for Business method. This requirement means that the organization must have a reliable public key infrastructure (PKI) in place, and provide smart cards and smart card readers for all users. For more information about password-less authentication, see [Windows Hello for Business overview](../../identity-protection/hello-for-business/index.md). - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy, by server type or group policy object (GPO). Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through group policy. - -### Policy conflict considerations - -None. - -### Group policy - -This policy setting can be configured by using the group policy management console (GPMC) to be distributed through GPOs. If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the local security policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -It can be difficult to make users choose strong passwords, and even strong passwords are vulnerable to brute-force attacks if an attacker has sufficient time and computing resources. - -### Countermeasure - -For users with access to computers that contain sensitive data, issue smart cards to users or configure Windows Hello for Business. Then configure the **Interactive logon: Require Windows Hello for Business or smart card** setting to Enabled. - -### Potential effect - -All users of a device with this setting enabled must use smart cards or a Windows Hello for Business method to sign in locally. The organization must have a reliable public key infrastructure (PKI), smart cards, and smart card readers for these users, or have enabled Windows Hello for Business. These requirements are significant challenges because expertise and resources are required to plan for and deploy these technologies. Active Directory Certificate Services can be used to implement and manage certificates. You can use automatic user and device enrollment and renewal on the client. - -## Related articles - -- [Security Options](security-options.md) -- [Windows Hello for Business overview](../../identity-protection/hello-for-business/index.md) diff --git a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md b/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md deleted file mode 100644 index 3101ddf604..0000000000 --- a/windows/security/threat-protection/security-policy-settings/interactive-logon-smart-card-removal-behavior.md +++ /dev/null @@ -1,113 +0,0 @@ ---- -title: Interactive logon Smart card removal behavior -description: Best practices, location, values, policy management, and security considerations for the security policy setting, Interactive logon Smart card removal behavior. -ms.assetid: 61487820-9d49-4979-b15d-c7e735999460 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Interactive logon: Smart card removal behavior - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the recommended practices, location, values, policy management, and security considerations for the **Interactive logon: Smart card removal behavior** security policy setting. - -## Reference - -This policy setting determines what happens when the smart card for a logged-on user is removed from the smart card reader. - -If smart cards are used for authentication, the device should automatically lock itself when the card is removed. So if users forget to manually lock their devices when they leave, malicious users cannot gain access. - -If you select **Force Logoff** in the property sheet for this policy setting, the user is automatically logged off when the smart card is removed. Users will have to reinsert their smart cards and reenter their PINs when they return to their workstations. - -> [!NOTE] -> This policy depends on **Smart Card Removal Policy** service. The service must be running for the policy to take effect, so it is recommended to set the startup type of the service to **Automatic**. - -### Possible values - -- No Action -- Lock Workstation - - If you use this setting, the workstation is locked when the smart card is removed. So users can leave the area, take their smart card with them, and still maintain a protected session. - -- Force Logoff - - If you use this setting, the user is automatically logged off when the smart card is removed. - -- Disconnect if a remote Remote Desktop Services session - - If you use this setting, removal of the smart card disconnects the session without logging off the user. So the user can insert the smart card and resume the session later, or at another smart card reader-equipped computer, without having to log on again. If the session is local, this policy functions identically to Lock Workstation. - -- Not Defined - -### Best practices - -- Set **Interactive logon: Smart card removal behavior** to **Lock Workstation**. If you select **Lock Workstation** in the property sheet for this policy setting, the workstation is locked when the smart card is removed. So users can leave the area, take their smart card with them, and still maintain a protected session. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy, by server type or Group Policy Object (GPO). Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | No Action| -| DC Effective Default Settings | No Action| -| Member Server Effective Default Settings | No Action| -| Client Computer Effective Default Settings | No Action| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through GPOs. If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users sometimes forget to lock their workstations when they're away from them, allowing the possibility for malicious users to access their devices. If smart cards are used for authentication, the device should automatically lock itself when the card is removed to ensure that only the user with the smart card is accessing resources by using those credentials. - -### Countermeasure - -Configure the **Interactive logon: Smart card removal behavior** setting to **Lock Workstation**. - -If you select **Lock Workstation** for this policy setting, the device locks when the smart card is removed. Users can leave the area, take their smart card with them, and still maintain a protected session. This behavior is similar to the setting that requires users to log on when resuming work on the device after the screen saver has started. - -If you select **Force Logoff** for this policy setting, the user is automatically logged off when the smart card is removed. This setting is useful when a device is deployed as a public access point, such as a kiosk or other type of shared device - -### Potential impact - -If you select **Force Logoff**, users must insert their smart cards and enter their PINs when they return to their workstations. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md b/windows/security/threat-protection/security-policy-settings/kerberos-policy.md deleted file mode 100644 index b2d778abd6..0000000000 --- a/windows/security/threat-protection/security-policy-settings/kerberos-policy.md +++ /dev/null @@ -1,44 +0,0 @@ ---- -title: Kerberos Policy -description: Describes the Kerberos Policy settings and provides links to policy setting descriptions. -ms.assetid: 94017dd9-b1a3-4624-af9f-b29161b4bf38 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Kerberos Policy - -**Applies to** -- Windows 10 - -Describes the Kerberos Policy settings and provides links to policy setting descriptions. - -The Kerberos version 5 authentication protocol provides the default mechanism for authentication services and the authorization data necessary for a user to access a resource and perform a task on that resource. By reducing the lifetime of Kerberos tickets, you reduce the risk of a legitimate user's credentials being stolen and successfully used by an attacker. However, this ticket lifetime reduction also increases the authorization overhead. In most environments, these settings shouldn't need to be changed. - -These policy settings are located in **\\Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Kerberos Policy**. - -The following topics provide a discussion of implementation and best practices considerations, policy location, default values for the server type or GPO, relevant differences in operating system versions, security considerations (including the possible settings vulnerabilities of each setting), -countermeasures you can take, and the potential impact for each setting. - -## In this section - -| Topic | Description | -|-----------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| [Enforce user logon restrictions](enforce-user-logon-restrictions.md) | Describes the best practices, location, values, policy management, and security considerations for the **Enforce user logon restrictions** security policy setting. | -| [Maximum lifetime for service ticket](maximum-lifetime-for-service-ticket.md) | Describes the best practices, location, values, policy management, and security considerations for the **Maximum lifetime for service ticket** security policy setting. | -| [Maximum lifetime for user ticket](maximum-lifetime-for-user-ticket.md) | Describes the best practices, location, values, policy management, and security considerations for the **Maximum lifetime for user ticket** policy setting. | -| [Maximum lifetime for user ticket renewal](maximum-lifetime-for-user-ticket-renewal.md) | Describes the best practices, location, values, policy management, and security considerations for the **Maximum lifetime for user ticket renewal** security policy setting. | -| [Maximum tolerance for computer clock synchronization](maximum-tolerance-for-computer-clock-synchronization.md) | Describes the best practices, location, values, policy management, and security considerations for the **Maximum tolerance for computer clock synchronization** security | - -## Related topics - -- [Configure security policy settings](how-to-configure-security-policy-settings.md) diff --git a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md b/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md deleted file mode 100644 index f51292c134..0000000000 --- a/windows/security/threat-protection/security-policy-settings/load-and-unload-device-drivers.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: Load and unload device drivers -description: Describes the best practices, location, values, policy management, and security considerations for the Load and unload device drivers security policy setting. -ms.assetid: 66262532-c610-470c-9792-35ff4389430f -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Load and unload device drivers - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Load and unload device drivers** security policy setting. - -## Reference - -This policy setting determines which users can dynamically load and unload device drivers. This user right isn't required if a signed driver for the new hardware already exists in the driver.cab file on the device. Device drivers run as highly privileged code. -Windows supports the Plug and Play specifications that define how a computer can detect and configure newly added hardware, and then automatically install the device driver. Prior to Plug and Play, users needed to manually configure devices before attaching them to the device. This model allows a user to plug in the hardware, then Windows searches for an appropriate device driver package and automatically configures it to work without interfering with other devices. - -Because device driver software runs as if it's a part of the operating system with unrestricted access to the entire computer, it's critical that only known and authorized device drivers be permitted. - -Constant: SeLoadDriverPrivilege - -### Possible values - -- User-defined list of accounts -- Default values -- Not Defined - -### Best practices - -- Because of the potential security risk, don't assign this user right to any user, group, or process that you don't want to take over the system. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Administrators and Print Operators on domain controllers and Administrators on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Administrators
    Print Operators| -| Stand-Alone Server Default Settings | Administrators| -| Domain Controller Effective Default Settings | Administrators
    Print Operators | -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings | Administrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Device drivers run as highly privileged code. A user who has the **Load and unload device drivers** user right could unintentionally install malware that masquerades as a device driver. Administrators should exercise care and install only drivers with verified digital signatures. - ->**Note:**  You must have this user right or be a member of the local Administrators group to install a new driver for a local printer or to manage a local printer and configure defaults for options such as duplex printing. - -### Countermeasure - -Don't assign the **Load and unload device drivers** user right to any user or group other than Administrators on member servers. On domain controllers, don't assign this user right to any user or group other than Domain Admins. - -### Potential impact - -If you remove the **Load and unload device drivers** user right from the Print Operators group or other accounts, you could limit the abilities of users who are assigned to specific administrative roles in your environment. You should ensure that delegated tasks aren't negatively affected. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md b/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md deleted file mode 100644 index 8efc6d6d5e..0000000000 --- a/windows/security/threat-protection/security-policy-settings/lock-pages-in-memory.md +++ /dev/null @@ -1,102 +0,0 @@ ---- -title: Lock pages in memory -description: Describes the best practices, location, values, policy management, and security considerations for the Lock pages in memory security policy setting. -ms.assetid: cc724979-aec0-496d-be4e-7009aef660a3 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Lock pages in memory - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Lock pages in memory** security policy setting. - -## Reference - -This policy setting determines which accounts can use a process to keep data in physical memory, which prevents the computer from paging the data to virtual memory on a disk. - -Normally, an application running on Windows can negotiate for more physical memory, and in response to the request, the application begins to move the data from RAM (such as the data cache) to a disk. When the pageable memory is moved to a disk, more RAM is free for the operating system to use. - -Enabling this policy setting for a specific account (a user account or a process account for an application) prevents paging of the data. Thereby, the amount of memory that Windows can reclaim under pressure is limited. This limitation could lead to performance degradation. - -> [!NOTE] -> By configuring this policy setting, the performance of the Windows operating system will differ depending on if applications are running on 32-bit or 64-bit systems, and if they are virtualized images. Performance will also differ between earlier and later versions of the Windows operating system. - -Constant: SeLockMemoryPrivilege - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -Best practices are dependent on the platform architecture and the applications running on those platforms. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| Domain Controller Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users with the **Lock pages in memory** user right could assign physical memory to several processes, which could leave little or no RAM for other processes and result in a denial-of-service condition. - -### Countermeasure - -Don't assign the **Lock pages in memory** user right to any accounts. - -### Potential impact - -None. Not defined is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md deleted file mode 100644 index 9be27bb7d6..0000000000 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-batch-job.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: Log on as a batch job -description: Describes the best practices, location, values, policy management, and security considerations for the Log on as a batch job security policy setting. -ms.assetid: 4eaddb51-0a18-470e-9d3d-5e7cd7970b41 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Log on as a batch job - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a batch job** security policy setting. - -## Reference - -This policy setting determines which accounts can sign in by using a batch-queue tool such as the Task Scheduler service. When you use the Add Scheduled Task Wizard to schedule a task to run under a particular user name and password, that user is automatically assigned the **Log on as a batch job** user right. When the scheduled time arrives, the Task Scheduler service logs on the user as a batch job instead of as an interactive user, and the task runs in the user's security context. - -Constant: SeBatchLogonRight - -### Possible values - -- User-defined list of accounts -- Default values -- Not Defined - -### Best practices - -- Use discretion when assigning this right to specific users for security reasons. The default settings are sufficient in most cases. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, this setting is for Administrators, Backup Operators, and Performance Log Users on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Administrators
    Backup Operators
    Performance Log Users| -| Stand-Alone Server Default Settings | Administrators
    Backup Operators
    Performance Log Users| -| Domain Controller Effective Default Settings | Administrators
    Backup Operators
    Performance Log Users| -| Member Server Effective Default Settings | Administrators
    Backup Operators
    Performance Log Users| -| Client Computer Effective Default Settings | Administrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Task Scheduler automatically grants this right when a user schedules a task. To override this behavior, use the [Deny log on as a batch job](deny-log-on-as-a-batch-job.md) User Rights Assignment setting. - -Group Policy settings are applied in the following order, which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration. It describes how to apply the countermeasure and the possible negative consequences of countermeasure. - -### Vulnerability - -The **Log on as a batch job** user right presents a low-risk vulnerability that allows non-administrators to perform administrator-like functions. If not assessed, understood, and restricted accordingly, attackers can easily exploit this potential attack vector to compromise systems, credentials, and data. For most organizations, the default settings are sufficient. Members of the local Administrators group have this right by default. - -### Countermeasure - -Allow the computer to manage this user right automatically if you want to allow scheduled tasks to run for specific user accounts. If you don't want to use the Task Scheduler in this manner, configure the **Log on as a batch job** user right for only the Local Service account. - -For IIS servers, configure this policy locally instead of through domain–based Group Policy settings so that you can ensure the local IUSR\_*<ComputerName>* and IWAM\_*<ComputerName>* accounts have this user right. - -### Potential impact - -If you configure the **Log on as a batch job** setting by using domain-based Group Policy settings, the computer can't assign the user right to accounts that are used for scheduled jobs in the Task Scheduler. If you install optional components such as ASP.NET or IIS, you might need to assign this user right to other accounts that those components require. For example, IIS requires assignment of this user right to the IIS\_WPG group and the IUSR\_*<ComputerName>*, ASPNET, and IWAM\_*<ComputerName>* accounts. If this user right isn't assigned to this group and these accounts, IIS can't run some COM objects that are necessary for proper functionality. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md b/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md deleted file mode 100644 index b9d7dcc0af..0000000000 --- a/windows/security/threat-protection/security-policy-settings/log-on-as-a-service.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Log on as a service -description: Describes the best practices, location, values, policy management, and security considerations for the Log on as a service security policy setting. -ms.assetid: acc9a9e0-fd88-4cda-ab54-503120ba1f42 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Log on as a service - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the recommended practices, location, values, policy management, and security considerations for the **Log on as a service** security policy setting. - -## Reference - -This policy setting determines which service accounts can register a process as a service. Running a process under a service account circumvents the need for human intervention. - -Constant: SeServiceLogonRight - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- Minimize the number of accounts that are granted this user right. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Network Service on domain controllers and Network Service on stand-alone servers. - -The following table lists the actual and effective default policy values. The policy's property page also lists default values. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| Domain Controller Effective Default Settings | Network Service| -| Member Server Effective Default Settings| Network Service| -| Client Computer Effective Default Settings | Network Service| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -The policy setting **Deny logon as a service** supersedes this policy setting if a user account is subject to both policies. - -Group Policy settings are applied in the following order, which will overwrite settings on the local device at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration. It explains the countermeasure. And it addresses the possible negative consequences of the countermeasure. - -### Vulnerability - -The **Log on as a service** user right allows accounts to start network services or services that run continuously on a computer, even when no one is logged on to the console. The risk is reduced because only users who have administrative privileges can install and configure services. An -attacker who has already reached that level of access could configure the service to run with the Local System account. - -### Countermeasure - -By definition, the Network Service account has the **Log on as a service** user right. This right isn't granted through the Group Policy setting. Minimize the number of other accounts that are granted this user right. - -### Potential impact - -On most computers, the **Log on as a service** user right is restricted to the Local System, Local Service, and Network Service built-in accounts by default, and there's no negative impact. But if you have optional components such as ASP.NET or IIS, you might need to -assign the user right to the additional accounts that those components require. IIS requires this user right to be explicitly granted to the ASPNET user account. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md b/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md deleted file mode 100644 index eae4a7c4b6..0000000000 --- a/windows/security/threat-protection/security-policy-settings/manage-auditing-and-security-log.md +++ /dev/null @@ -1,104 +0,0 @@ ---- -title: Manage auditing and security log -description: Describes the best practices, location, values, policy management, and security considerations for the Manage auditing and security log security policy setting. -ms.assetid: 4b946c0d-f904-43db-b2d5-7f0917575347 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Manage auditing and security log - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Manage auditing and security log** security policy setting. - -## Reference - -This policy setting determines which users can specify object access audit options for individual resources such as files, Active Directory objects, and registry keys. These objects specify their system access control lists (SACL). A user who is assigned this user right can also view and clear the Security log in Event Viewer. For more information about the Object Access audit policy, see [Audit object access](../auditing/basic-audit-object-access.md). - -Constant: SeSecurityPrivilege - -### Possible values -- User-defined list of accounts -- Administrators -- Not Defined - -### Best practices - -1. Before removing this right from a group, investigate whether applications are dependent on this right. -2. Generally, assigning this user right to groups other than Administrators isn't necessary. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Administrators on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Administrators| -| Stand-Alone Server Default Settings | Administrators| -| Domain Controller Effective Default Settings | Administrators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings| Administrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -Audits for object access aren't performed unless you enable them by using the Local Group Policy Editor, the Group Policy Management Console (GPMC), or the Auditpol command-line tool. - -For more information about the Object Access audit policy, see [Audit object access](../auditing/basic-audit-object-access.md). - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Anyone with the **Manage auditing and security log** user right can clear the Security log to erase important evidence of unauthorized activity. - -### Countermeasure - -Ensure that only the local Administrators group has the **Manage auditing and security log** user right. - -### Potential impact - -Restricting the **Manage auditing and security log** user right to the local Administrators group is the default configuration. - ->**Warning:**  If groups other than the local Administrators group have been assigned this user right, removing this user right might cause performance issues with other applications. Before removing this right from a group, investigate whether applications are dependent on this right. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md deleted file mode 100644 index e7ac39b82a..0000000000 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-service-ticket.md +++ /dev/null @@ -1,98 +0,0 @@ ---- -title: Maximum lifetime for service ticket -description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for service ticket security policy setting. -ms.assetid: 484bf05a-3858-47fc-bc02-6599ca860247 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Maximum lifetime for service ticket - -**Applies to** -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Maximum lifetime for service ticket** security policy setting. - -## Reference - -The **Maximum lifetime for service ticket** policy setting determines the maximum number of minutes that a granted session ticket can be used to access a particular service. The value must be 10 minutes or greater, and it must be less than or equal to the value of the **Maximum lifetime for service ticket** policy setting. - -The possible values for this Group Policy setting are: - -- A user-defined number of minutes from 10 through 99,999, or 0 (in which case service tickets don't expire). -- Not defined. - -If a client presents an expired session ticket when it requests a connection to a server, the server returns an error message. The client must request a new session ticket from the Kerberos V5 KDC. After a connection is authenticated, however, it no longer matters whether the session ticket remains valid. Session tickets are used only to authenticate new connections with servers. Ongoing operations aren't interrupted if the session ticket that authenticated the connection expires during the connection. - -If the value for this policy setting is too high, users might be able to access network resources outside of their sign-in hours. In addition, users whose accounts have been disabled might be able to continue accessing network services by using valid service tickets that were issued before their account was disabled. If the value is set to 0, service tickets never expire. - -### Best practices - -- It's advisable to set **Maximum lifetime for service ticket** to **600** minutes. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Kerberos Policy - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server Type or GPO | Default Value | -| - | - | -| Default Domain Policy| 600 minutes| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not applicable| -| DC Effective Default Settings | 600 minutes| -| Member Server Effective Default Settings | Not applicable| -| Client Computer Effective Default Settings | Not applicable| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -This policy setting is configured on the domain controller. - -### Group Policy - -Client computers will get the new setting during the next scheduled and successful Group Policy refresh. But for domain controllers to assign these new settings immediately, a gpupdate.exe /force is required. On the local device, the Security Configuration Engine will refresh this setting in about five minutes. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If you configure the value for the **Maximum lifetime for service ticket** setting too high, users might be able to access network resources outside of their sign-in hours. Also, users whose accounts were disabled might continue to have access to network services with valid service tickets that were issued before their accounts were disabled. - -### Countermeasure - -Configure the **Maximum lifetime for service ticket** setting to 600 minutes. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Kerberos Policy](kerberos-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md deleted file mode 100644 index 6d0137547d..0000000000 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md +++ /dev/null @@ -1,96 +0,0 @@ ---- -title: Maximum lifetime for user ticket renewal -description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for user ticket renewal security policy setting. -ms.assetid: f88cd819-3dd1-4e38-b560-13fe6881b609 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Maximum lifetime for user ticket renewal - -**Applies to** -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Maximum lifetime for user ticket renewal** security policy setting. - -## Reference - -The **Maximum lifetime for user ticket renewal** policy setting determines the period of time (in days) during which a user’s ticket-granting ticket can be renewed. - -The possible values for this Group Policy setting are: - -- A user-defined number of days from 0 through 99,999 -- Not defined - -### Best practices - -- If the value for this policy setting is too high, users may be able to renew old user ticket-granting tickets. If the value is 0, ticket-granting tickets never expire. - - It's advisable to set **Maximum lifetime for user ticket renewal** to **7** days. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Kerberos Policy - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| 7 days| -| Default Domain Controller Policy| Not defined| -| Stand-Alone Server Default Settings | Not applicable| -| Domain Controller Effective Default Settings | 7 days| -| Member Server Effective Default Settings | Not applicable| -| Client Computer Effective Default Settings | Not applicable| - -### Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -This policy setting is configured on the domain controller. - -### Group Policy - -Client devices will get the new setting during the next scheduled and successful Group Policy refresh. But for domain controllers to assign these new settings immediately, a gpupdate.exe /force is required. On the local device, the Security Configuration Engine will refresh this setting in about five minutes. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If the value for the **Maximum lifetime for user ticket renewal** setting is too high, users might be able to renew old user tickets. - -### Countermeasure - -Configure the **Maximum lifetime for user ticket renewal** setting to 7 days. - -### Potential impact - -Seven (7) days is the default configuration. Changing the default configuration is a tradeoff between user convenience and security. A shorter time period requires users to authenticate with a DC more often, but remote users who authenticate with a DC infrequently can be locked out of services until they reauthenticate. - -## Related topics - -- [Kerberos Policy](kerberos-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md b/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md deleted file mode 100644 index 3cc212c913..0000000000 --- a/windows/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket.md +++ /dev/null @@ -1,96 +0,0 @@ ---- -title: Maximum lifetime for user ticket -description: Describes the best practices, location, values, policy management, and security considerations for the Maximum lifetime for user ticket policy setting. -ms.assetid: bcb4ff59-334d-4c2f-99af-eca2b64011dc -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Maximum lifetime for user ticket - -**Applies to** -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Maximum lifetime for user ticket** policy setting. - -## Reference - -The **Maximum lifetime for user ticket** policy setting determines the maximum amount of time (in hours) that a user’s ticket-granting ticket can be used. When a user’s ticket-granting ticket expires, a new one must be requested or the existing one must be renewed. - -The possible values for this Group Policy setting are: - -- A user-defined number of hours from 0 through 99,999 -- Not defined - -If the value for this policy setting is too high, users might be able to access network resources outside of their sign-in hours, or users whose accounts have been disabled might be able to continue to access network services by using valid service tickets that were issued before their account was disabled. If the value is set to 0, ticket-granting tickets never expire. - -### Best practices - -- We recommend that you set the **Maximum lifetime for user ticket** to 10 hours. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Kerberos Policy - -### Default Values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server Type or GPO | Default Value | -| - | - | -| Default Domain Policy| 10 hours| -| Default Domain Controller Policy| Not defined| -| Stand-Alone Server Default Settings | Not applicable| -| Domain Controller Effective Default Settings | 10 hours| -| Member Server Effective Default Settings | Not applicable| -| Client Computer Effective Default Settings | Not applicable| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -This policy setting is configured on the domain controller. - -### Group Policy - -Client devices will get the new setting during the next scheduled and successful Group Policy refresh. But for domain controllers to assign these new settings immediately, a gpupdate.exe /force is required. On the local computer, the Security Configuration Engine will refresh this setting in about five minutes. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If you configure the value for the **Maximum lifetime for user ticket** setting too high, users might be able to access network resources outside of their sign-in hours. Also, users whose accounts were disabled might continue to have access to network services with valid user tickets that were issued before their accounts were disabled. If you configure this value too low, ticket requests to the KDC may affect the performance of your KDC and present an opportunity for a DoS attack. - -### Countermeasure - -Configure the **Maximum lifetime for user ticket** setting with a value between 4 and 10 hours. - -### Potential impact - -Reducing this setting from the default value reduces the likelihood that the ticket-granting ticket will be used to access resources that the user doesn't have rights to. However, it requires more frequent requests to the KDC for ticket-granting tickets on behalf of users. Most KDCs can support a value of 4 hours without any extra burden. - -## Related topics - -- [Kerberos Policy](kerberos-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md b/windows/security/threat-protection/security-policy-settings/maximum-password-age.md deleted file mode 100644 index 2bd4c4aa31..0000000000 --- a/windows/security/threat-protection/security-policy-settings/maximum-password-age.md +++ /dev/null @@ -1,89 +0,0 @@ ---- -title: Maximum password age -description: Describes the best practices, location, values, policy management, and security considerations for the Maximum password age security policy setting. -ms.assetid: 2d6e70e7-c8b0-44fb-8113-870c6120871d -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Maximum password age - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Maximum password age** security policy setting. - -## Reference - -The **Maximum password age** policy setting determines the period of time (in days) that a password can be used before the system requires the user to change it. You can set passwords to expire after a certain number of days between 1 and 999, or you can specify that passwords never expire by setting the number of days to 0. If **Maximum password age** is between 1 and 999 days, the minimum password age must be less than the maximum password age. If **Maximum password age** is set to 0, [Minimum password age](minimum-password-age.md) can be any value between 0 and 998 days. - ->**Note:**  Setting **Maximum password age** to -1 is equivalent to 0, which means it never expires. Setting it to any other negative number is equivalent to setting it to **Not Defined**. - -### Possible values - -- User-specified number of days between 0 and 999 -- Not defined - -### Best practices - -Set **Maximum password age** to a value between 30 and 90 days, depending on your environment. This way, an attacker has a limited amount of time in which to compromise a user's password and have access to your network resources. - -> [!NOTE] -> The security baseline recommended by Microsoft doesn't contain the password-expiration policy, as it is less effective than modern mitigations. However, companies that didn't implement Microsoft Entra Password Protection, multifactor authentication, or other modern mitigations of password-guessing attacks, should leave this policy in effect. - -### Location - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy** - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy| 42 days| -| Default domain controller policy| Not defined| -| Stand-alone server default settings | 42 days| -| Domain controller effective default settings | 42 days| -| Member server effective default settings | 42 days| -| Effective GPO default settings on client computers| 42 days| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of implementation. - -### Vulnerability - -The longer a password exists, the higher the likelihood that it will be compromised by a brute force attack, by an attacker gaining general knowledge about the user, or by the user sharing the password. Configuring the **Maximum password age** policy setting to 0 so that users are never required to change their passwords allows a compromised password to be used by the malicious user for as long as the valid user is authorized access. - -### Considerations - -Mandated password changes are a long-standing security practice, but current research strongly indicates that password expiration has a negative effect. For more information, see [Microsoft Password Guidance](https://www.microsoft.com/research/publication/password-guidance/). - -Configure the **Maximum password age** policy setting to a value that is suitable for your organization's business requirements. For example, many organizations have compliance or insurance mandates requiring a short lifespan on passwords. Where such a requirement exists, the **Maximum password age** policy setting can be used to meet business requirements. - -### Potential impact - -If the **Maximum password age** policy setting is too low, users are required to change their passwords often. Such a configuration can reduce security in the organization because users might keep their passwords in an unsecured location or lose them. If the value for this policy setting is too high, the level of security within an organization is reduced because it allows potential attackers more time in which to discover user passwords or to use compromised accounts. - -## Related topics - -- [Password Policy](password-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md b/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md deleted file mode 100644 index 164df232e6..0000000000 --- a/windows/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: Maximum tolerance for computer clock synchronization -description: Best practices, location, values, policy management, and security considerations for the policy setting, Maximum tolerance for computer clock synchronization. -ms.assetid: ba2cf59e-d69d-469e-95e3-8e6a0ba643af -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Maximum tolerance for computer clock synchronization - -**Applies to** -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Maximum tolerance for computer clock synchronization** security policy setting. - -## Reference - -This security setting determines the maximum time difference (in minutes) that Kerberos V5 tolerates between the time on the client clock and the time on the domain controller that provides Kerberos authentication. - -To prevent "replay attacks," the Kerberos v5 protocol uses time stamps as part of its protocol definition. For time stamps to work properly, the clocks of the client and the domain controller need to be in sync as much as possible. In other words, both devices must be set to the same time and date. -Because the clocks of two computers are often out of sync, you can use this policy setting to establish the maximum acceptable difference to the Kerberos protocol between a client clock and domain controller clock. If the difference between a client computer clock and the domain controller clock is less than the maximum time difference that is specified in this policy, any timestamp that's used in a session between the two devices is considered to be authentic. - -The possible values for this Group Policy setting are: - -- A user-defined number of minutes from 1 through 99,999 -- Not defined - -### Best practices - -- It's advisable to set **Maximum tolerance for computer clock synchronization** to a value of 5 minutes. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Kerberos Policy - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| 5 minutes| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not applicable| -| Domain Controller Effective Default Settings| 5 minutes| -| Member Server Effective Default Settings | Not applicable| -| Client Computer Effective Default Settings | Not applicable| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -This policy setting is configured on the domain controller. - -### Group Policy - -Client devices will get the new setting during the next scheduled and successful Group Policy refresh. But for domain controllers to assign these new settings immediately, a gpupdate.exe /force is required. On the local device, the Security Configuration Engine will refresh this setting in about five minutes. - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -To prevent "replay attacks" (which are attacks in which an authentication credential is resubmitted by a malicious user or program to gain access to a protected resource), the Kerberos protocol uses time stamps as part of its definition. For time stamps to work properly, the clocks of the client computer and the domain controller need to be closely synchronized. Because the clocks of two computers are often not synchronized, administrators can use this policy to establish the maximum acceptable difference to the Kerberos protocol between a client computer clock and a domain controller clock. If the difference between the client computer clock and the domain controller clock is less than the maximum time difference specified in this setting, any timestamp that's used in a session between the two computers is considered to be authentic. - -### Countermeasure - -Configure the **Maximum tolerance for computer clock synchronization** setting to 5 minutes. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Kerberos Policy](kerberos-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md deleted file mode 100644 index 658dc72de2..0000000000 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md +++ /dev/null @@ -1,115 +0,0 @@ ---- -title: Microsoft network client Digitally sign communications (always) -description: Best practices and security considerations for the Microsoft network client Digitally sign communications (always) security policy setting. -ms.reviewer: -manager: aaroncz -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -ms.date: 01/13/2023 -ms.topic: reference ---- - -# Microsoft network client: Digitally sign communications (always) - -**Applies to** - -- Windows 11 -- Windows 10 -- Windows Server - -This article describes the best practices, location, values, policy management, and security considerations for the **Microsoft network client: Digitally sign communications (always)** security policy setting for SMBv3 and SMBv2. - -> [!NOTE] -> This article is about the server message block (SMB) v2 and v3 protocols. SMBv1 isn't secure and has been deprecated in Windows. Starting with Windows 10, version 1709, and Windows Server, version 1709, [SMBv1 isn't installed by default](/windows-server/storage/file-server/troubleshoot/smbv1-not-installed-by-default-in-windows). - -> [!IMPORTANT] -> Microsoft doesn't recommend using the following group policy settings: -> -> - **Microsoft network server: Digitally sign communications (if client agrees)** -> - **Microsoft network client: Digitally sign communications (if server agrees)** -> -> Also don't use the **EnableSecuritySignature** registry settings. -> -> These options only affect the SMBv1 behavior. They can be effectively replaced by the **Digitally sign communications (always)** group policy setting or the **RequireSecuritySignature** registry setting. - -## Reference - -The Server Message Block (SMB) protocol provides the basis for file and print sharing and many other networking operations, such as remote Windows administration. To prevent "man-in-the-middle" attacks that modify SMB packets in transit, the SMB protocol supports digital signing of SMB packets. - -Implementation of digital signatures in high-security networks helps prevent the impersonation of client computers and servers, which is known as "session hijacking." Misuse of these policy settings is a common error that can cause data access failure. - -Beginning with SMBv2 clients and servers, signing can be either *required* or *not required*. If this policy setting is enabled, SMBv2 clients will digitally sign all packets. Another policy setting determines whether signing is required for SMBv3 and SMBv2 server communications: [Microsoft network server: Digitally sign communications (always)](microsoft-network-server-digitally-sign-communications-always.md). - -Negotiation occurs between the SMB client and the SMB server to decide whether signing will be used. The following table shows the effective behavior for SMBv3 and SMBv2. - -| Client | Server - required | Server - not required | -|---------------------------|---------------------|------------------------| -| **Client - required** | Signed | Signed | -| **Client - not required** | Signed 1 | Not signed2 | - -
    -1 Default for domain controller SMB traffic
    -2 Default for all other SMB traffic - -Performance of SMB signing is improved in SMBv2. For more information, see [Potential effect](#potential-effect). - -### Possible values - -- Enabled -- Disabled - -### Best practice - -Enable **Microsoft network client: Digitally sign communications (always)**. - -### Location - -*Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options* - -### Default values - -The following table lists the default values for this policy. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Disabled| -| Default Domain Controller Policy | Disabled| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that you can use to manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of the countermeasure. - -### Vulnerability - -Session hijacking uses tools that allow attackers who have access to the same network as the client device or server to interrupt, end, or steal a session in progress. Attackers can potentially intercept and modify unsigned SMB packets and then modify the traffic and forward it to make the server perform objectionable actions. Alternatively, the attacker could pose as the server or client computer after legitimate authentication and gain unauthorized access to data. - -SMB is the resource-sharing protocol that's supported by many versions of the Windows operating system. It's the basis of many modern features like Storage Spaces Direct, Storage Replica, and SMB Direct, as well as many legacy protocols and tools. SMB signatures authenticate users and the servers that host the data. If either side fails the authentication process, data transmission doesn't happen. - -### Countermeasure - -Enable **Microsoft network client: Digitally sign communications (always)**. - -> [!NOTE] -> An alternative countermeasure that could protect all network traffic is to implement digital signatures through IPsec. There are hardware-based accelerators for IPsec encryption and signing that can be used to minimize the performance impact on servers. No such accelerators are available for SMB signing. - -### Potential effect - -Storage speeds affect performance. A faster drive on the source and destination allows more throughput, which causes more CPU usage for signing. If you're using a 1-Gb Ethernet network or slower storage speed with a modern CPU, there's limited degradation in performance. If you're using a faster network (such as 10 Gb), the performance impact of signing may be greater. - -## Related articles - -- [Security options](security-options.md) -- [Microsoft network server: Digitally sign communications (always)](microsoft-network-server-digitally-sign-communications-always.md) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md deleted file mode 100644 index de1a65cacc..0000000000 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md +++ /dev/null @@ -1,90 +0,0 @@ ---- -title: Microsoft network client Send unencrypted password -description: Learn about best practices and more for the security policy setting, Microsoft network client Send unencrypted password to third-party SMB servers. -ms.assetid: 97a76b93-afa7-4dd9-bb52-7c9e289b6017 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - - -# Microsoft network client: Send unencrypted password to third-party SMB servers - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Microsoft network client: Send unencrypted password to third-party SMB servers** security policy setting. - -## Reference - -The Server Message Block (SMB) protocol provides the basis for file and print sharing and many other networking operations, such as remote Windows administration. This policy setting allows or prevents the SMB redirector to send plaintext passwords to a non-Microsoft server service that doesn't support password encryption during authentication. - -### Possible values - -- Enabled - - The Server Message Block (SMB) redirector is allowed to send plaintext passwords to a non-Microsoft server service that doesn't support password encryption during authentication. - -- Disabled - - The Server Message Block (SMB) redirector only sends encrypted passwords to non-Microsoft SMB server services. If those server services don't support password encryption, the authentication request will fail. - -- Not defined - -### Best practices - -- It's advisable to set **Microsoft network client: Send unencrypted password to connect to third-party SMB servers** to Disabled. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings| Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If you enable this policy setting, the server can transmit plaintext passwords across the network to other computers that offer SMB services. These other devices might not use any of the SMB security mechanisms that are included with Windows Server 2003 or later. - -### Countermeasure - -Disable the **Microsoft network client: Send unencrypted password to connect to third-party SMB servers** setting. - -### Potential impact - -Some older applications may not be able to communicate with the servers in your organization through the SMB protocol. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md deleted file mode 100644 index 7add3c22bb..0000000000 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: Microsoft network server Amount of idle time required before suspending session -description: Best practices, security considerations, and more for the policy setting, Microsoft network server Amount of idle time required before suspending session. -ms.assetid: 8227842a-569d-480f-b43c-43450bbaa722 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Microsoft network server: Amount of idle time required before suspending session - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Microsoft network server: Amount of idle time required before suspending session** security policy setting. - -## Reference - -Each Server Message Block (SMB) session consumes server resources. Establishing numerous null sessions will cause the server to slow down or possibly fail. A malicious user might repeatedly establish SMB sessions until the server stops responding; at this point, SMB services will become slow or unresponsive. - -The **Microsoft network server: Amount of idle time required before suspending session** policy setting determines the amount of continuous idle time that must pass in an SMB session before the session is suspended due to inactivity. You can use this policy setting to control when a device suspends an inactive SMB session. The session is automatically reestablished when client device activity resumes. - -### Possible values - -- A user-defined number of minutes from 0 through 99,999. - - For this policy setting, a value of 0 means to disconnect an idle session as quickly as is reasonably possible. The maximum value is 99999 (8 business hours per day), which is 208 days. In effect, this value disables the policy. - -- Not defined - -### Best practices - -- It's advisable to set this policy to 15 minutes. There will be little impact because SMB sessions will be reestablished automatically if the client resumes activity. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - - -| Server type or GPO Default value | -|--------------------------------------------| -| Default Domain Policy | -| Default Domain Controller Policy | -| Stand-Alone Server Default Settings | -| DC Effective Default Settings | -| Member Server Effective Default Settings | -| Client Computer Effective Default Settings | - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Each SMB session consumes server resources, and numerous null sessions slow the server or possibly cause it to fail. An attacker could repeatedly establish SMB sessions until the server's SMB services become slow or unresponsive. - -### Countermeasure - -The default behavior on a server mitigates this threat by design. - -### Potential impact - -There's little impact because SMB sessions are reestablished automatically if the client computer resumes activity. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md deleted file mode 100644 index e9667f8aeb..0000000000 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: Microsoft network server Attempt S4U2Self -description: Learn about the security policy setting, Microsoft network server Attempt S4U2Self to obtain claim information. -ms.assetid: e4508387-35ed-4a3f-a47c-27f8396adbba -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Microsoft network server: Attempt S4U2Self to obtain claim information - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management, and security considerations for the **Microsoft network server: Attempt S4U2Self to obtain claim information** security policy setting. - -## Reference - -This security setting supports client devices running a version of Windows prior to Windows 8 that are trying to access a file share that requires user claims. This setting determines whether the local file server will attempt to use Kerberos Service-for-User-to-Self (S4U2Self) functionality to obtain a network client principal’s claims from the client’s account domain. This setting should only be enabled if the file server is using user claims to control access to files, and if the file server will support client principals whose accounts might be in a domain that has client computers -and domain controllers running a version of Windows prior to Windows 8 or Windows Server 2012. - -When enabled, this security setting causes the Windows file server to examine the access token of an authenticated network client principal and determines if claim information is present. If claims aren't present, the file server will then use the Kerberos S4U2Self feature to attempt to contact a Windows Server 2012 domain controller in the client’s account domain and obtain a claims-enabled access token for the client principal. A claims-enabled token might be needed to access files or folders that have claim-based access control policy applied. - -If this setting is disabled, the Windows file server won't attempt to obtain a claim-enabled access token for the client principal. - -### Possible values - -- **Default** - - The Windows file server will examine the access token of an authenticated network client principal and determine if claim information is present. - -- **Enabled** - - Same as **Default**. - -- **Disabled** - -- **Not defined** - - Same as **Disabled**. - -### Best practices - -This setting should be set to **Default** so that the file server can automatically evaluate whether claims are needed for the user. You should explicitly configure this setting to **Enabled** only if there are local file access policies that include user claims. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings| Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -This setting should only be enabled if the file server is using user claims to control access to files, and if the file server will support client principals whose accounts might be in a domain that has client computers and domain controllers running a version of Windows prior to Windows 8 or Windows Server 2012. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -None. Enabling this policy setting allows you to take advantage of features in Windows Server 2012 and Windows 8 and later for specific scenarios to use claims-enabled tokens to access files or folders that have claim-based access control policy applied on Windows operating systems prior to Windows Server 2012 -and Windows 8. - -### Countermeasure - -Not applicable. - -### Potential impact - -None. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md deleted file mode 100644 index afe2dc3cac..0000000000 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md +++ /dev/null @@ -1,115 +0,0 @@ ---- -title: Microsoft network server Digitally sign communications (always) -description: Best practices, security considerations, and more for the security policy setting, Microsoft network server Digitally sign communications (always). -author: vinaypamnani-msft -ms.author: vinpa -ms.reviewer: -manager: aaroncz -ms.localizationpriority: medium -ms.topic: reference -ms.date: 01/13/2023 ---- - -# Microsoft network server: Digitally sign communications (always) - -**Applies to** - -- Windows 11 -- Windows 10 -- Windows Server - -Describes the best practices, location, values, policy management and security considerations for the **Microsoft network server: Digitally sign communications (always)** security policy setting for SMBv3 and SMBv2. - -> [!NOTE] -> This article is about the server message block (SMB) v2 and v3 protocols. SMBv1 isn't secure and has been deprecated in Windows. Starting with Windows 10, version 1709, and Windows Server, version 1709, [SMBv1 isn't installed by default](/windows-server/storage/file-server/troubleshoot/smbv1-not-installed-by-default-in-windows). - -> [!IMPORTANT] -> Microsoft doesn't recommend using the following group policy settings: -> -> - **Microsoft network server: Digitally sign communications (if client agrees)** -> - **Microsoft network client: Digitally sign communications (if server agrees)** -> -> Also don't use the **EnableSecuritySignature** registry settings. -> -> These options only affect the SMBv1 behavior. They can be effectively replaced by the **Digitally sign communications (always)** group policy setting or the **RequireSecuritySignature** registry setting. - -## Reference - -The Server Message Block (SMB) protocol provides the basis for file and print sharing and many other networking operations, such as remote Windows administration. To prevent man-in-the-middle attacks that modify SMB packets in transit, the SMB protocol supports the digital signing of SMB packets. - -Implementation of digital signatures in high-security networks helps prevent the impersonation of client computers and servers, which is known as "session hijacking." But misuse of these policy settings can cause data access failure. - -Beginning with SMBv2 clients and servers, signing can be either required or not required. If this policy setting is enabled, SMBv2 clients will digitally sign all packets. Another policy setting determines whether signing is required for SMBv3 and SMBv2 server communications: [Microsoft network client: Digitally sign communications (always)](microsoft-network-client-digitally-sign-communications-always.md). - -There's a negotiation done between the SMB client and the SMB server to decide whether signing will effectively be used. The following table has the effective behavior for SMBv3 and SMBv2. - -| Client | Server - Required | Server - Not Required | -|---------------------------|---------------------|------------------------| -| **Client - Required** | Signed | Signed | -| **Client - Not Required** | Signed 1 | Not Signed2 | - -
    -1 Default for domain controller SMB traffic
    -2 Default for all other SMB traffic - -Performance of SMB signing is improved in SMBv2. For more information, see [Potential effect](#potential-effect). - -### Possible values - -- Enabled -- Disabled - -### Best practices - -Enable **Microsoft network server: Digitally sign communications (always)**. - -### Location - -*Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options* - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Disabled| -| Default Domain Controller Policy | Enabled| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Session hijacking uses tools that allow attackers who have access to the same network as the client device or server to interrupt, end, or steal a session in progress. Attackers can potentially intercept and modify unsigned Server Message Block (SMB) packets and then modify the traffic and forward it so that the server might perform objectionable actions. Alternatively, the attacker could pose as the server or client device after legitimate authentication and gain unauthorized access to data. - -SMB is the resource-sharing protocol that is supported by many Windows operating systems. It's the basis of many modern features like Storage Spaces Direct, Storage Replica, and SMB Direct, as well as many legacy protocols and tools. If either side fails the authentication process, data transmission doesn't take place. - -### Countermeasure - -Enable **Microsoft network server: Digitally sign communications (always)**. - -> [!NOTE] -> An alternative countermeasure that could protect all network traffic is to implement digital signatures with IPsec. There are hardware-based accelerators for IPsec encryption and signing that could be used to minimize the performance impact on the servers' CPUs. No such accelerators are available for SMB signing. - -### Potential effect - -Storage speeds impact performance. A faster drive on the source and destination allows more throughput, which causes more CPU usage of signing. If you're using a 1-GB Ethernet network or slower storage speed with a modern CPU, there's limited degradation in performance. If you're using a faster network (such as 10 Gb), the performance impact of signing may be greater. - -## Related articles - -- [Security Options](security-options.md) -- [Microsoft network client: Digitally sign communications (always)](microsoft-network-client-digitally-sign-communications-always.md) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md deleted file mode 100644 index f502ed6336..0000000000 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: Microsoft network server Disconnect clients when sign-in hours expire -description: Best practices, location, values, and security considerations for the policy setting, Microsoft network server Disconnect clients when sign-in hours expire. -ms.assetid: 48b5c424-9ba8-416d-be7d-ccaabb3f49af -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Microsoft network server: Disconnect clients when sign-in hours expire - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Microsoft network server: Disconnect clients when logon hours expire** security policy setting. - -## Reference - -This policy setting enables or disables the forced disconnection of users who are connected to the local device outside their user account's valid sign-in hours. It affects the SMB component. If you enable this policy setting, client computer sessions with the SMB service are forcibly disconnected when the client's sign-in hours expire. If you disable this policy setting, established client device sessions are maintained after the client device's sign-in hours expire. - -### Possible values - -- Enabled - - Client device sessions with the SMB service are forcibly disconnected when the client device's sign-in hours expire. If sign-in hours aren't used in your organization, enabling this policy setting will have no impact. - -- Disabled - - The system maintains an established client device session after the client device's sign-in hours have expired. - -- Not defined - -### Best practices - -- If you enable this policy setting, you should also enable [Network security: Force logoff when logon hours expire](network-security-force-logoff-when-logon-hours-expire.md). - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings| Enabled | -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If your organization configures sign-in hours for users, it makes sense to enable this policy setting. Otherwise, users who shouldn't have access to network resources outside of their sign-in hours can continue to use those resources with sessions that were established during allowed hours. - -### Countermeasure - -Enable the **Microsoft network server: Disconnect clients when logon hours expire** setting. - -### Potential impact - -If sign-in hours aren't used in your organization, this policy setting has no impact. If sign-in hours are used, existing user sessions are forcibly terminated when their sign-in hours expire. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md b/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md deleted file mode 100644 index 2d618461c5..0000000000 --- a/windows/security/threat-protection/security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md +++ /dev/null @@ -1,109 +0,0 @@ ---- -title: Microsoft network server Server SPN target name validation level -description: Best practices, security considerations, and more for the security policy setting, Microsoft network server Server SPN target name validation level. -ms.assetid: 18337f78-eb45-42fd-bdbd-f8cd02c3e154 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Microsoft network server: Server SPN target name validation level - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, and values, policy management and security considerations for the **Microsoft network server: Server SPN target name validation level** security policy setting. - -## Reference - -This policy setting controls the level of validation that a server with shared folders or printers performs on the service principal name (SPN) that is provided by the client device when the client device establishes a session by using the Server Message Block (SMB) protocol. The level of validation can help prevent a class of attacks against SMB services (referred to as SMB relay attacks). This setting affects both SMB1 and SMB2. - -Servers that use SMB provide availability to their file systems and other resources, such as printers, to networked client devices. Most servers that use SMB validate user access to resources by using NT Domain authentication (NTLMv1 and NTLMv2) and the Kerberos protocol. - -### Possible values - -The options for validation levels are: - -- **Off** - - The SPN from an SMB client isn't required or validated by the SMB server. - -- **Accept if provided by client** - - The SMB server will accept and validate the SPN provided by the SMB client and allow a session to be established if it matches the SMB server’s list of SPNs. If the SPN doesn't match, the session request for that SMB client will be denied. - -- **Required from client** - - The SMB client must send an SPN name in session setup, and the SPN name provided must match the SMB server that is being requested to establish a connection. If no SPN is provided by the client device, or the SPN provided doesn't match, the session is denied. - -The default setting is Off. - -### Best practices - -This setting affects the server SMB behavior, and its implementation should be carefully evaluated and tested to prevent disruptions to file and print serving capabilities. - ->**Note:**  All Windows operating systems support a client-side SMB component and a server-side SMB component. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or Group Policy object (GPO) | Default value | -| - | - | -| Default domain policy | Off | -| Default domain controller policy| Off| -| Stand-alone server default settings | Off| -| Domain controller effective default settings| Validation level check not implemented| -| Member server effective default settings | Validation level check not implemented| -| Effective GPO default settings on client computers | Validation level check not implemented| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -None. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -This policy setting controls the level of validation that a server with shared folders or printers performs on the service principal name (SPN) that is provided by the client device when the client device establishes a session by using the SMB protocol. The level of validation can help prevent a class of attacks against SMB servers (referred to as SMB relay attacks). This setting will affect both SMB1 and SMB2. - -### Countermeasure - -For countermeasures that are appropriate to your environment, see **Possible values** above. - -### Potential impact - -All Windows operating systems support a client-side SMB component and a server-side SMB component. This setting affects the server SMB behavior, and its implementation should be carefully evaluated and tested to prevent disruptions to file and print serving capabilities. - -Because the SMB protocol is widely deployed, setting the options to **Accept if provided by client** or **Required from client** will prevent some clients from successfully authenticating to some servers in your environment. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md b/windows/security/threat-protection/security-policy-settings/minimum-password-age.md deleted file mode 100644 index 4922c645e8..0000000000 --- a/windows/security/threat-protection/security-policy-settings/minimum-password-age.md +++ /dev/null @@ -1,92 +0,0 @@ ---- -title: Minimum password age -description: Describes the best practices, location, values, policy management, and security considerations for the Minimum password age security policy setting. -ms.assetid: 91915cb2-1b3f-4fb7-afa0-d03df95e8161 -ms.reviewer: -manager: aaroncz -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -ms.date: 11/13/2018 -ms.topic: reference ---- - -# Minimum password age - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Minimum password age** security policy setting. - -## Reference - -The **Minimum password age** policy setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow password changes immediately by setting the number of days to 0. The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. - -### Possible values - -- User-specified number of days between 0 and 998 -- Not defined - -### Best practices - -[Windows security baselines](../../operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines.md) recommend setting **Minimum password age** to one day. - -Setting the number of days to 0 allows immediate password changes. This setting isn't recommended. -Combining immediate password changes with password history allows someone to change a password repeatedly until the password history requirement is met and re-establish the original password again. -For example, suppose a password is "Ra1ny day!" and the history requirement is 24. -If the minimum password age is 0, the password can be changed 24 times in a row until finally changed back to "Ra1ny day!". -The minimum password age of 1 day prevents that. - -If you set a password for a user and you want that user to change the administrator-defined password, you must select the **User must change password at next logon** check box. -Otherwise, the user won't be able to change the password until the number of days specified by **Minimum password age**. - -### Location - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy** - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy| 1 day| -| Default domain controller policy| Not defined| -| Stand-alone server default settings | 0 days| -| Domain controller effective default settings | 1 day| -| Member server effective default settings | 1 day| -| Effective GPO default settings on client computers| 1 day| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users may have favorite passwords that they like to use because they're easy to remember and they believe that their password choice is secure from compromise. Unfortunately, passwords can be compromised and if an attacker is targeting a specific individual user account, with knowledge of data about that user, reuse of old passwords can cause a security breach. - -To address password reuse, you must use a combination of security settings. Using this policy setting with the [Enforce password history](enforce-password-history.md) policy setting prevents the easy reuse of old passwords. For example, if you configure the Enforce password history policy setting to ensure that users can't reuse any of their last 12 passwords, but you don't configure the **Minimum password age** policy setting to a number that is greater than 0, users could change their password 13 times in a few minutes and reuse their original password. Configure this policy setting to a number that is greater than 0 for the Enforce password history policy setting to be effective. - -### Countermeasure - -Configure the **Minimum password age** policy setting to a value of 1 day. Users should know about this limitation and contact the Help Desk to change a password sooner. If you configure the number of days to 0, immediate password changes would be allowed, which we don't recommend. - -### Potential impact - -If you set a password for a user but want that user to change the password when the user first logs on, the administrator must select the **User must change password at next logon** check box, or the user can't change the password until the next day. - -## Related topics - -- [Password Policy](password-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md deleted file mode 100644 index f6edea308a..0000000000 --- a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: Minimum password length -description: Describes the best practices, location, values, policy management, and security considerations for the Minimum password length security policy setting. -ms.assetid: 3d22eb9a-859a-4b6f-82f5-c270c427e17e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 03/30/2022 ---- - -# Minimum password length - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the recommended practices, location, values, policy management, and security considerations for the **Minimum password length** security policy setting. - -## Reference - -The **Minimum password length** policy setting determines the least number of characters that can make up a password for a user account. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0. - -### Possible values - -- User-specified number of characters between 0 and 14 -- Not defined - -### Best practices - -Set minimum password length to at least a value of 8. If the number of characters is set to 0, no password is required. In most environments, an eight-character password is recommended because it's long enough to provide adequate security and still short enough for users to easily remember. A minimum password length greater than 14 isn't supported at this time. This value will help provide adequate defense against a brute force attack. Adding complexity requirements will help reduce the possibility of a dictionary attack. For more info, see [Password must meet complexity requirements](password-must-meet-complexity-requirements.md). - -Permitting short passwords reduces security because short passwords can be easily broken with tools that do dictionary or brute force attacks against the passwords. Requiring long passwords can result in mistyped passwords that might cause account lockouts and might increase the volume of Help Desk calls. - -In addition, requiring long passwords can actually decrease the security of an organization because users might be more likely to write down their passwords to avoid forgetting them. However, if users are taught that they can use passphrases (sentences such as "I want to drink a $5 milkshake"), they should be much more likely to remember. - -### Location - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy** - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy's property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy| Seven characters| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Zero characters| -| Domain controller effective default settings | Seven characters| -| Member server effective default settings | Seven characters| -| Effective GPO default settings on client computers | Zero characters| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Types of password attacks include dictionary attacks (which attempt to use common words and phrases) and brute force attacks (which try every possible combination of characters). Also, attackers sometimes try to obtain the account database so they can use tools to discover the accounts and passwords. - -### Countermeasure - -Configure the **Minimum password length** policy setting to a value of 8 or more. If the number of characters is set to 0, no password will be required. - -In most environments, we recommend an eight-character password because it's long enough to provide adequate security, but not too difficult for users to easily remember. This configuration provides adequate defense against a brute force attack. Using the [Password must meet complexity requirements](password-must-meet-complexity-requirements.md) policy setting in addition to the **Minimum password length** setting helps reduce the possibility of a dictionary attack. - -> [!NOTE] -> Some jurisdictions have established legal requirements for password length as part of establishing security regulations. - -### Potential impact - -Requirements for long passwords can actually decrease the security of an organization because users might leave the information in an unsecured location or lose it. If long passwords are required, mistyped passwords could cause account lockouts and increase the volume of Help Desk calls. If your organization has issues with forgotten passwords because of password length requirements, consider teaching your users about passphrases, which are often easier to remember and, because of the larger number of character combinations, much harder to discover. - -## Related topics - -- [Password Policy](password-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md b/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md deleted file mode 100644 index dbd4f943f7..0000000000 --- a/windows/security/threat-protection/security-policy-settings/modify-an-object-label.md +++ /dev/null @@ -1,110 +0,0 @@ ---- -title: Modify an object label -description: Describes the best practices, location, values, policy management, and security considerations for the Modify an object label security policy setting. -ms.assetid: 3e5a97dd-d363-43a8-ae80-452e866ebfd5 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Modify an object label - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Modify an object label** security policy setting. - -## Reference - -This privilege determines which user accounts can modify the integrity label of objects, such as files, registry keys, or processes owned by other users. Processes running under a user account can modify the label of an object owned by that user to a lower level without this privilege. - -The integrity label is used by the Windows Integrity Controls (WIC) feature, which was introduced in Windows Server 2008 and Windows Vista. WIC keeps lower integrity processes from modifying higher integrity processes by assigning one of six possible labels to objects on the system. Although -similar to NTFS file and folder permissions, which are discretionary controls on objects, the WIC integrity levels are mandatory controls that are put in place and enforced by the operating system. The following list describes the integrity levels from lowest to highest: - -- **Untrusted**   Default assignment for processes that are logged on anonymously. -- **Low**   Default assignment for processes that interact with the Internet. -- **Medium**   Default assignment for standard user accounts and any object that isn't explicitly designated with a lower or higher integrity level. -- **High**  Default assignment for administrator accounts and processes that request to run using administrative rights. -- **System**   Default assignment for Windows kernel and core services. -- **Installer**   Used by setup programs to install software. It's important that only trusted software is installed on computers because objects that are assigned the Installer integrity level can install, modify, and uninstall all other objects. - -Constant: SeRelabelPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- Don't give any group this user right. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Not defined on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| Domain Controller Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Anyone with the **Modify an object label** user right can change the integrity level of a file or process so that it becomes elevated or decreased to a point where it can be deleted by lower integrity processes. Either of these states effectively circumvents the protection that is offered by -Windows Integrity Controls and makes your system vulnerable to attacks by malicious software. - -If malicious software is set with an elevated integrity level such as Trusted Installer or System, administrator accounts don't have sufficient integrity levels to delete the program from the system. In that case, use of the **Modify an object label** right is mandated so that the object can be relabeled. However, the relabeling must occur by using a process that is at the same or a higher level of integrity than the object that you're attempting to relabel. - -### Countermeasure - -Don't give any group this right. If necessary, implement it for a constrained period of time to a trusted individual to respond to a specific organizational need. - -### Potential impact - -None. Not defined is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md b/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md deleted file mode 100644 index 58d6be0e68..0000000000 --- a/windows/security/threat-protection/security-policy-settings/modify-firmware-environment-values.md +++ /dev/null @@ -1,108 +0,0 @@ ---- -title: Modify firmware environment values -description: Describes the best practices, location, values, policy management, and security considerations for the Modify firmware environment values security policy setting. -ms.assetid: 80bad5c4-d9eb-4e3a-a5dc-dcb742b83fca -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Modify firmware environment values - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Modify firmware environment values** security policy setting. - -## Reference - -This security setting determines who can modify firmware environment values. Firmware environment values are settings that are stored in the nonvolatile RAM of non-x86-based computers. The effect of the setting depends on the processor. - -On x86-based computers, the only firmware environment value that can be modified by assigning this user right is the **Last Known Good Configuration** setting, which should only be modified by the system. - -On Itanium-based computers, boot information is stored in nonvolatile RAM. Users must be assigned this user right to run bootcfg.exe and to change the **Default Operating System** setting using the **Startup and Recovery** feature on the **Advanced** tab of **System Properties**. - -The exact setting for firmware environment values is determined by the boot firmware. The location of these values is also specified by the firmware. For example, on a UEFI-based system, NVRAM contains firmware environment values that specify system boot settings. - -On all computers, this user right is required to install or upgrade Windows. - -Constant: SeSystemEnvironmentPrivilege - -### Possible values - -- User-defined list of accounts -- Administrators -- Not Defined - -### Best practices - -- Ensure that only the local Administrators group is assigned the **Modify firmware environment values** user right. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Administrators on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO |Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Adminstrators| -| Stand-Alone Server Default Settings | Adminstrators| -| Domain Controller Effective Default Settings | Adminstrators| -| Member Server Effective Default Settings | Adminstrators| -| Client Computer Effective Default Settings | Adminstrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -This security setting does not affect who can modify the system environment values and user environment values that are displayed on the **Advanced** tab of **System Properties**. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Anyone who is assigned the **Modify firmware environment values** user right could configure the settings of a hardware component to cause it to fail, which could lead to data corruption or a denial-of-service condition. - -### Countermeasure - -Ensure that only the local Administrators group is assigned the **Modify firmware environment values** user right. - -### Potential impact - -Removing the local Administrators group from the **Modify firmware environment values** user right could cause inoperability of the BitLocker Drive Encryption feature. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md b/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md deleted file mode 100644 index e0d4fc62d5..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-allow-anonymous-sidname-translation.md +++ /dev/null @@ -1,104 +0,0 @@ ---- -title: Network access Allow anonymous SID/Name translation -description: Best practices, location, values, policy management and security considerations for the policy setting, Network access Allow anonymous SID/Name translation. -ms.assetid: 0144477f-22a6-4d06-b70a-9c9c2196e99e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Allow anonymous SID/Name translation - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting. - -## Reference - -This policy setting enables or disables the ability of an anonymous user to request security identifier (SID) attributes for another user. - -If this policy setting is enabled, a user might use the well-known Administrators SID to get the real name of the built-in Administrator account, even if the account has been renamed. That person might then use the account name to initiate a brute-force password-guessing attack. - -Misuse of this policy setting is a common error that can cause data loss or problems with data access or security. - -### Possible values - -- Enabled - - An anonymous user can request the SID attribute for another user. An anonymous user with knowledge of an administrator's SID could contact a computer that has this policy enabled and use the SID to get the administrator's name. This setting affects the SID-to-name translation and the name-to-SID translation. - -- Disabled - - Prevents an anonymous user from requesting the SID attribute for another user. - -- Not defined - -### Best practices - -- Set this policy to Disabled, which is the default value on member computers; therefore, it will have no impact on them. The default value for domain controllers is Enabled. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Disabled| -| Client Computer Effective Default Settings | Disabled| - -### Operating system version differences - -The default value of this setting has changed between operating systems as follows: - -- The default on domain controllers running Windows Server 2003 R2 or earlier was set to Enabled. -- The default on domain controllers running Windows Server 2008 and later is set to Disabled. - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Modifying this setting may affect compatibility with client computers, services, and applications. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If this policy setting is enabled, a user with local access could use the well-known Administrator's SID to learn the real name of the built-in Administrator account, even if it has been renamed. That person could then use the account name to initiate a password-guessing attack. - -### Countermeasure - -Disable the **Network access: Allow anonymous SID/Name translation** setting. - -### Potential impact - -Disabled is the default configuration for this policy setting on member devices; therefore, it has no impact on them. The default configuration for domain controllers is Enabled. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md deleted file mode 100644 index 50e1eddf2c..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: Network access Do not allow anonymous enumeration -description: Learn about best practices and more for the security policy setting, Network access Do not allow anonymous enumeration of SAM accounts and shares. -ms.assetid: 3686788d-4cc7-4222-9163-cbc7c3362d73 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Do not allow anonymous enumeration of SAM accounts and shares - -**Applies to** -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts and shares** security policy setting. - -## Reference - -This policy setting determines which other permissions will be assigned for anonymous connections to the device. Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This permission is convenient, for example, when an administrator wants to give access to users in a trusted domain that doesn't maintain a reciprocal trust. However, even with this policy setting enabled, anonymous users will have access to resources with permissions that explicitly include the built-in group, ANONYMOUS LOGON. - -This policy setting has no impact on domain controllers. -Misuse of this policy setting is a common error that can cause data loss or problems with data access or security. - -### Possible values - -- Enabled - -- Disabled - - No other permissions can be assigned by the administrator for anonymous connections to the device. Anonymous connections will rely on default permissions. However, an unauthorized user could anonymously list account names and use the information to attempt to guess passwords or perform social-engineering attacks. - -- Not defined - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflicts - -Even with this policy setting enabled, anonymous users will have access to resources with permissions that explicitly include the built-in group, ANONYMOUS LOGON (on systems earlier than Windows Server 2008 and Windows Vista). - -### Group Policy - -This policy has no impact on domain controllers. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An unauthorized user could anonymously list account names and shared resources and use the information to attempt to guess passwords or perform social-engineering attacks. - -### Countermeasure - -Enable the **Network access: Do not allow anonymous enumeration of SAM accounts and shares** setting. - -### Potential impact - -It's impossible to grant access to users of another domain across a one-way trust because administrators in the trusting domain are unable to enumerate lists of accounts in the other domain. Users who access file and print servers anonymously are unable to list the shared network resources on those servers; the users must be authenticated before they can view the lists of shared folders and printers. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md deleted file mode 100644 index 4eb9c91bd1..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md +++ /dev/null @@ -1,95 +0,0 @@ ---- -title: Network access Do not allow anonymous enumeration of SAM accounts -description: Describes the best practices, location, values, and security considerations for the Network access Do not allow anonymous enumeration of SAM accounts security policy setting. -ms.assetid: 6ee25b33-ad43-4097-b031-7be680f64c7c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Do not allow anonymous enumeration of SAM accounts - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts** security policy setting. - -## Reference - -This policy setting determines which other permissions will be assigned for anonymous connections to the device. Windows allows anonymous users to perform certain activities, such as enumerating the names of domain accounts and network shares. This permission is convenient, for example, when an administrator wants to give access to users in a trusted domain that doesn't maintain a reciprocal trust. - -This policy setting has no impact on domain controllers. - -Misuse of this policy setting is a common error that can cause data loss or problems with data access or security. - -### Possible values - -- Enabled - -- Disabled - - No other permissions can be assigned by the administrator for anonymous connections to the device. Anonymous connections will rely on default permissions. - -- Not defined - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflicts - -Even with this policy setting enabled, anonymous users will have access to resources with permissions that explicitly include the built-in group, ANONYMOUS LOGON (on systems earlier than Windows Server 2008 and Windows Vista). - -### Group Policy - -This policy has no impact on domain controllers. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An unauthorized user could anonymously list account names and use the information to perform social engineering attacks or attempt to guess passwords. Social engineering attackers try to deceive users in some way to obtain passwords or some form of security information. - -### Countermeasure - -Enable the **Network access: Do not allow anonymous enumeration of SAM accounts** setting. - -### Potential impact - -It's impossible to grant access to users of another domain across a one-way trust because administrators in the trusting domain are unable to enumerate lists of accounts in the other domain. Users who access file and print servers anonymously are unable to list the shared network resources on those servers; the users must be authenticated before they can view the lists of shared folders and printers. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md b/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md deleted file mode 100644 index 2787a6af79..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: Network access Do not allow storage of passwords and credentials for network authentication -description: Learn about best practices and more for the security policy setting, Network access Do not allow storage of passwords and credentials for network authentication -ms.assetid: b9b64360-36ea-40fa-b795-2d6558c46563 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 07/01/2021 ---- - -# Network access: Do not allow storage of passwords and credentials for network authentication - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network access: Do not allow storage of passwords and credentials for network authentication** security policy setting. - -## Reference - -This security setting determines whether Credential Manager saves passwords and credentials for later use when it gains domain authentication. - -### Possible values - -- Enabled - - Credential Manager doesn't store passwords and credentials on the device - -- Disabled - - Credential Manager will store passwords and credentials on this computer for later use for domain authentication. - -- Not defined - -### Best practices - -It's a recommended practice to disable the ability of the Windows operating system to cache credentials on any device where credentials aren't needed. Evaluate your servers and workstations to determine the requirements. Cached credentials are designed primarily to be used on laptops that require domain credentials when disconnected from the domain. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy| Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings| Disabled| -| Member server effective default settings | Disabled| -| Effective GPO default settings on client computers |Disabled| - -### Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -A restart of the device is required before this policy will be effective when changes to this policy are saved locally or distributed through Group Policy. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Passwords that are cached can be accessed by the user when logged on to the device. Although this information may sound obvious, a problem can arise if the user unknowingly runs malicious software that reads the passwords and forwards them to another, unauthorized user. - ->**Note:**  The chances of success for this exploit and others that involve malicious software are reduced significantly for organizations that effectively implement and manage an enterprise antivirus solution combined with sensible software restriction policies. - -Regardless of what encryption algorithm is used to encrypt the password verifier, a password verifier can be overwritten so that an attacker can authenticate as the user to whom the verifier belongs. Therefore, the administrator's password may be overwritten. This procedure requires physical access to the device. Utilities exist that can help overwrite the cached verifier. With the help of one of these utilities, an attacker can authenticate by using the overwritten value. - -Overwriting the administrator's password doesn't help the attacker access data that is encrypted by using that password. Also, overwriting the password doesn't help the attacker access any Encrypting File System (EFS) data that belongs to other users on that device. Overwriting the password doesn't help an attacker replace the verifier, because the base keying material is incorrect. Therefore, data that is encrypted by using Encrypting File System or by using the Data Protection API (DPAPI) won't decrypt. - -### Countermeasure - -Enable the **Network access: Do not allow storage of passwords and credentials for network authentication** setting. - -To limit the number of cached domain credentials that are stored on the computer, set the **cachedlogonscount** registry entry. By default, the operating system caches the verifier for each unique user's 10 most recent valid logons. This value can be set to any value between 0 and 50. By default, all versions of the Windows operating system remember 10 cached logons, except Windows Server 2008 and later, which are set at 25. - -When you try to sign in to a domain from a Windows-based client device, and a domain controller is unavailable, you don't receive an error message. Therefore, you may not notice that you logged on with cached domain credentials. You can set a notification of a sign in that uses cached domain credentials with the ReportDC registry entry. - -### Potential impact - -Users are forced to type passwords whenever they sign in to their Microsoft Account or other network resources that aren't accessible to their domain account. This policy setting should have no impact on users who access network resources that are configured to allow access with their Active Directory–based domain account. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md b/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md deleted file mode 100644 index eba40fa8db..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md +++ /dev/null @@ -1,91 +0,0 @@ ---- -title: Let Everyone permissions apply to anonymous users -description: Learn about best practices, security considerations and more for the security policy setting, Network access Let Everyone permissions apply to anonymous users. -ms.assetid: cdbc5159-9173-497e-b46b-7325f4256353 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Let Everyone permissions apply to anonymous users - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network access: Let Everyone permissions apply to anonymous users** security policy setting. - -## Reference - -This policy setting determines what other permissions are granted for anonymous connections to the device. If you enable this policy setting, anonymous users can enumerate the names of domain accounts and shared folders and perform certain other activities. This capability is convenient, for example, when an administrator wants to grant access to users in a trusted domain that doesn't maintain a reciprocal trust. - -By default, the token that is created for anonymous connections doesn't include the Everyone SID. Therefore, permissions that are assigned to the Everyone group don't apply to anonymous users. - -### Possible values - -- Enabled - - The Everyone SID is added to the token that is created for anonymous connections, and anonymous users can access any resource for which the Everyone group has been assigned permissions. - -- Disabled - - The Everyone SID is removed from the token that is created for anonymous connections. - -- Not defined - -### Best practices - -- Set this policy to **Disabled**. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Polices\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An unauthorized user could anonymously list account names and shared resources and use the information to attempt to guess passwords, perform social engineering attacks, or launch DoS attacks. - -### Countermeasure - -Disable the **Network access: Let Everyone permissions apply to anonymous users** setting. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md deleted file mode 100644 index c43a8bc781..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Network access Named Pipes that can be accessed anonymously -description: Describes best practices, security considerations and more for the security policy setting, Network access Named Pipes that can be accessed anonymously. -ms.assetid: 8897d2a4-813e-4d2b-8518-fcee71e1cf2c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Named Pipes that can be accessed anonymously - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network access: Named Pipes that can be accessed anonymously** security policy setting. - -## Reference - -This policy setting determines which communication sessions, or pipes, have attributes and permissions that allow anonymous access. - -Restricting access over named pipes such as COMNAP and LOCATOR helps prevent unauthorized access to the network. - -### Possible values - -- User-defined list of shared folders -- Not defined - -### Best practices - -- Set this policy to a null value; that is, enable the policy setting, but don't enter named pipes in the text box. This setting will disable null session access over named pipes, and applications that rely on this feature or on unauthenticated access to named pipes will no longer function. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined | -| Default Domain Controller Policy | Netlogon, samr, lsarpc| -| Stand-Alone Server Default Settings | Null| -| DC Effective Default Settings | Netlogon, samr, lsarpc| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -For this policy setting to take effect, you must also enable the [Network access: Restrict anonymous access to Named Pipes and Shares](network-access-restrict-anonymous-access-to-named-pipes-and-shares.md) setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -You can restrict access over named pipes such as COMNAP and LOCATOR to help prevent unauthorized access to the network. The following list describes available named pipes and their purpose. These pipes were granted anonymous access in earlier versions of Windows and some legacy applications may still use them. - -| Named pipe | Purpose | -| - | - | -| COMNAP | SNABase named pipe. Systems network Architecture (SNA) is a collection of network protocols that were originally developed for IBM mainframe computers.| -| COMNODE| SNA Server named pipe.| -| SQL\QUERY | Default named pipe for SQL Server.| -| SPOOLSS | Named pipe for the Print Spooler service.| -| EPMAPPER | End Point Mapper named pipe.| -| LOCATOR | Remote Procedure Call Locator service named pipe.| -| TrlWks | Distributed Link Tracking Client named pipe.| -| TrkSvr | Distributed Link Tracking Server named pipe.| - -### Countermeasure - -Configure the **Network access: Named Pipes that can be accessed anonymously** setting to a null value (enable the setting but don't specify named pipes in the text box). - -### Potential impact - -This configuration disables null-session access over named pipes, and applications that rely on this feature or on unauthenticated access to named pipes no longer function. This result may break trust between Windows Server 2003 domains in a mixed mode environment. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md deleted file mode 100644 index ca04da80eb..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: Network access Remotely accessible registry paths and subpaths -description: Describes best practices, location, values, and security considerations for the policy setting, Network access Remotely accessible registry paths and subpaths. -ms.assetid: 3fcbbf70-a002-4f85-8e86-8dabad21928e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Remotely accessible registry paths and subpaths - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting. - -## Reference - -This policy setting determines which registry paths and subpaths are accessible when an application or process references the WinReg key to determine access permissions. - -The registry is a database for device configuration information, much of which is sensitive. A malicious user can use it to facilitate unauthorized activities. The chance of this happening is reduced by the fact that the default ACLs that are assigned throughout the registry are fairly restrictive, -and they help protect it from access by unauthorized users. - -To allow remote access, you must also enable the Remote Registry service. - -### Possible values - -- User-defined list of paths -- Not Defined - -### Best practices - -- Set this policy to a null value; that is, enable the policy setting, but don't enter any paths in the text box. Remote management tools, such as the Microsoft Baseline Security Analyzer and Configuration Manager, require remote access to the registry. Removing the default registry paths from the list of accessible paths might cause these and other management tools to fail. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | See the following registry key combination| -| DC Effective Default Settings | See the following registry key combination| -| Member Server Effective Default Settings | See the following registry key combination| -| Client Computer Effective Default Settings | See the following registry key combination| - -The combination of all the following registry keys apply to the previous settings: - -1. System\\CurrentControlSet\\Control\\Print\\Printers -2. System\\CurrentControlSet\\Services\\Eventlog -3. Software\\Microsoft\\OLAP Server -4. Software\\Microsoft\\Windows NT\\CurrentVersion\\Print -5. Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows -6. System\\CurrentControlSet\\Control\\ContentIndex -7. System\\CurrentControlSet\\Control\\Terminal Server -8. System\\CurrentControlSet\\Control\\Terminal Server\\UserConfig -9. System\\CurrentControlSet\\Control\\Terminal Server\\DefaultUserConfiguration -10. Software\\Microsoft\\Windows NT\\CurrentVersion\\Perflib -11. System\\CurrentControlSet\\Services\\SysmonLog - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The registry contains sensitive device configuration information that could be used by an attacker to facilitate unauthorized activities. The fact that the default ACLs that are assigned throughout the registry are fairly restrictive and help to protect the registry from access by unauthorized users reduces the risk of such an attack. - -### Countermeasure - -Configure the **Network access: Remotely accessible registry paths and sub-paths** setting to a null value (enable the setting but don't enter any paths in the text box). - -### Potential impact - -Remote management tools such as MBSA and Configuration Manager require remote access to the registry to properly monitor and manage those computers. If you remove the default registry paths from the list of accessible ones, such remote management tools could fail. - ->**Note:**  If you want to allow remote access, you must also enable the Remote Registry service. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md b/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md deleted file mode 100644 index b7cd9c9122..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-remotely-accessible-registry-paths.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: Network access Remotely accessible registry paths -description: Best practices, location, values, policy management and security considerations for the policy setting, Network access Remotely accessible registry paths. -ms.assetid: 977f86ea-864f-4f1b-9756-22220efce0bd -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Remotely accessible registry paths - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network access: Remotely accessible registry paths** security policy setting. - -## Reference - -This policy setting determines which registry paths are accessible when an application or process references the WinReg key to determine access permissions. - -The registry is a database for device configuration information, much of which is sensitive. A malicious user can use the registry to facilitate unauthorized activities. To reduce the risk of this happening, suitable access control lists (ACLs) are assigned throughout the registry to help protect it from access by unauthorized users. - -To allow remote access, you must also enable the Remote Registry service. - -### Possible values - -- User-defined list of paths -- Not Defined - -### Best practices - -- Set this policy to a null value; that is, enable the policy setting but don't enter any paths in the text box. Remote management tools, such as the Microsoft Baseline Security Analyzer and Configuration Manager, require remote access to the registry. Removing the default registry paths from the list of accessible paths might cause these and other management tools to fail. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | See the following registry key combination| -| DC Effective Default Settings | See the following registry key combination| -| Member Server Effective Default Settings | See the following registry key combination| -| Client Computer Effective Default Settings | See the following registry key combination| - -The combination of all the following registry keys apply to the previous settings: - -1. System\\CurrentControlSet\\Control\\ProductOptions -2. System\\CurrentControlSet\\Control\\Server Applications -3. Software\\Microsoft\\Windows NT\\CurrentVersion - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An attacker could use information in the registry to facilitate unauthorized activities. To reduce the risk of such an attack, suitable ACLs are assigned throughout the registry to help protect it from access by unauthorized users. - -### Countermeasure - -Configure the **Network access: Remotely accessible registry paths** setting to a null value (enable the setting, but don't enter any paths in the text box). - -### Potential impact - -Remote management tools such as the Microsoft Baseline Security Analyzer (MBSA) and Configuration Manager require remote access to the registry to properly monitor and manage those computers. If you remove the default registry paths from the list of accessible ones, such remote management tools could fail. - ->**Note:**  If you want to allow remote access, you must also enable the Remote Registry service. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md deleted file mode 100644 index 048ad3f0b8..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md +++ /dev/null @@ -1,91 +0,0 @@ ---- -title: Network access Restrict anonymous access to Named Pipes and Shares -description: Best practices, security considerations, and more for the security policy setting, Network access Restrict anonymous access to Named Pipes and Shares. -ms.assetid: e66cd708-7322-4d49-9b57-1bf8ec7a4c10 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Restrict anonymous access to Named Pipes and Shares - -**Applies to** -- Windows 11 -- Windows 10 -- Windows 8.1 -- Windows Server 2022 -- Windows Server 2019 -- Windows Server 2016 -- Windows Server 2012 R2 - -Describes the best practices, location, values, policy management and security considerations for the **Network access: Restrict anonymous access to Named Pipes and Shares** security policy setting. - -## Reference - -This policy setting enables or disables the restriction of anonymous access to only those shared folders and pipes that are named in the **Network access: Named pipes that can be accessed anonymously** and [Network access: Shares that can be accessed anonymously](network-access-shares-that-can-be-accessed-anonymously.md) settings. The setting controls null session access to shared folders on your computers by adding RestrictNullSessAccess with the value 1 in the registry key -**HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Services\\LanManServer\\Parameters**. This registry value toggles null session shared folders on or off to control whether the Server service restricts unauthenticated clients' access to named resources. - -Null sessions are a weakness that can be exploited through the various shared folders on the devices in your environment. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Set this policy to Enabled. Enabling this policy setting restricts null session access to unauthenticated users to all server pipes and shared folders except those server pipes and shared folders listed in the **NullSessionPipes** and **NullSessionShares** registry entries. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings | Enabled| -| Client Computer Effective Default Settings| Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Null sessions are a weakness that can be exploited through shared folders (including the default shared folders) on devices in your environment. - -### Countermeasure - -Enable the **Network access: Restrict anonymous access to Named Pipes and Shares** setting. - -### Potential impact - -You can enable this policy setting to restrict null-session access for unauthenticated users to all server pipes and shared folders except those server pipes and shared folders that are listed in the NullSessionPipes and NullSessionShares entries. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md deleted file mode 100644 index cf13b74c2e..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md +++ /dev/null @@ -1,173 +0,0 @@ ---- -title: Network access - Restrict clients allowed to make remote calls to SAM -description: Security policy setting that controls which users can enumerate users and groups in the local Security Accounts Manager (SAM) database. -ms.localizationpriority: medium -ms.date: 09/17/2018 -author: vinaypamnani-msft -ms.author: vinpa -ms.reviewer: -manager: aaroncz -ms.collection: - - highpri - - tier3 -ms.topic: reference ---- - -# Network access: Restrict clients allowed to make remote calls to SAM - -**Applies to** - -- Windows 10 -- Windows 8.1 -- Windows Server 2019 -- Windows Server 2016 -- Windows Server 2012 R2 - -The **Network access: Restrict clients allowed to make remote calls to SAM** security policy setting controls which users can enumerate users and groups in the local Security Accounts Manager (SAM) database and Active Directory. -The setting was first supported by Windows 10 version 1607 and Windows Server 2016 (RTM) and can be configured on earlier Windows client and server operating systems. - -This article describes the default values for this security policy setting in different versions of Windows. -By default, computers beginning with Windows 10 version 1607 and Windows Server 2016 are more restrictive than earlier versions of Windows. -This restrictive characteristic means that if you have a mix of computers, such as member servers that run both Windows Server 2016 and Windows Server 2012 R2, the servers that run Windows Server 2016 may fail to enumerate accounts by default where the servers that run Windows Server 2012 R2 succeed. - -This article also covers related events, and how to enable audit mode before constraining the security principals that are allowed to remotely enumerate users and groups so that your environment remains secure without impacting application compatibility. - -> [!NOTE] -> Implementation of this policy [could affect offline address book generation](/troubleshoot/windows-server/group-policy/authz-fails-access-denied-error-application-access-check) on servers running Microsoft Exchange 2016 or Microsoft Exchange 2013. - -## Reference - -The SAMRPC protocol makes it possible for a low privileged user to query a machine on a network for data. -For example, a user can use SAMRPC to enumerate users, including privileged accounts such as local or domain administrators, or to enumerate groups and group memberships from the local SAM and Active Directory. -This information can provide important context and serve as a starting point for an attacker to compromise a domain or networking environment. - -To mitigate this risk, you can configure the **Network access: Restrict clients allowed to make remote calls to SAM** security policy setting to force the security accounts manager (SAM) to do an access check against remote calls. -The access check allows or denies remote RPC connections to SAM and Active Directory for users and groups that you define. - -By default, the **Network access: Restrict clients allowed to make remote calls to SAM** security policy setting isn't defined. -If you define it, you can edit the default Security Descriptor Definition Language (SDDL) string to explicitly allow or deny users and groups to make remote calls to the SAM. -If the policy setting is left blank after the policy is defined, the policy isn't enforced. - -The default security descriptor on computers beginning with Windows 10 version 1607 and Windows Server 2016 allows only the local (built-in) Administrators group remote access to SAM on non-domain controllers, and allows Everyone access on domain controllers. -You can edit the default security descriptor to allow or deny other users and groups, including the built-in Administrators. - -The default security descriptor on computers that run earlier versions of Windows doesn't restrict any remote calls to SAM, but an administrator can edit the security descriptor to enforce restrictions. -This less restrictive default allows for testing the affect of enabling restrictions on existing applications. - -## Policy and Registry Names - -| | Description | -|:---|:---| -| **Policy Name** | Network access: Restrict clients allowed to make remote calls to SAM | -| **Location** | Computer Configuration\|Windows Settings\|Security Settings\|Local Policies\|Security Options | -| **Possible values** |
    - Not defined
    - Defined, along with the security descriptor for users and groups who are allowed or denied to use SAMRPC to remotely access either the local SAM or Active Directory. | -| **Registry location** | `HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\RestrictRemoteSam` | -| **Registry type** | REG_SZ | -| **Registry value** | A string that will contain the SDDL of the security descriptor to be deployed. | - -The Group Policy setting is only available on computers that run Windows Server 2016 or Windows 10, version 1607 and later. -These computers are the only option to configure this setting by using a user interface (UI). - -On computers that run earlier versions of Windows, you need to edit the registry setting directly or use Group Policy Preferences. -To avoid setting it manually in this case, you can configure the GPO itself on a computer that runs Windows Server 2016 or Windows 10, version 1607 or later and have it apply to all computers within the scope of the GPO because the same registry key exists on every computer after the corresponding KB is installed. - -> [!NOTE] -> This policy is implemented similarly to other "Network access" policies in that there is a single policy element at the registry path listed. There is no notion of a local policy versus an enterprise policy; there is just one policy setting and whichever writes last wins. -> -> For example, suppose a local administrator configures this setting as part of a local policy using the Local Security Policy snap-in (Secpol.msc), which edits that same registry path. If an enterprise administrator configures this setting as part of an enterprise GPO, that enterprise GPO will overwrite the same registry path. - -## Default values - -Beginning with Windows 10, version 1607 and Windows Server 2016, computers have hard-coded and more restrictive default values than earlier versions of Windows. -The different default values help strike a balance where recent Windows versions are more secure by default and older versions don't undergo any disruptive behavior changes. -Administrators can test whether applying the same restriction earlier versions of Windows will cause compatibility problems for existing applications before implementing this security policy setting in a production environment. - -In other words, the hotfix in each KB article provides the necessary code and functionality, but you need to configure the restriction after you install the hotfix—no restrictions are enabled by default after the hotfix is installed on earlier versions of Windows. - -| |Default SDDL |Translated SDDL| Comments | -|---|---|---|---| -|**Windows Server 2016 (or later) domain controller (reading Active Directory)**|""|-|Everyone has read permissions to preserve compatibility.| -|**Earlier domain controller** |-|-|No access check is performed by default.| -|**Windows 10, version 1607 (or later) non-domain controller**|`O:SYG:SYD:(A;;RC;;;BA)`| Owner: NTAUTHORITY/SYSTEM (WellKnownGroup) (S-1-5-18)
    Primary group: NTAUTHORITY/SYSTEM (WellKnownGroup) (S-1-5-18)
    DACL:
    - Revision: 0x02
    - Size: 0x0020
    - Ace Count: 0x001
    - Ace[00]-------------------------
      AceType:0x00
      (ACCESS\_ALLOWED_ACE_TYPE)
      AceSize:0x0018
      InheritFlags:0x00
      Access Mask:0x00020000
      AceSid: BUILTIN\Administrators (Alias) (S-1-5-32-544)

      SACL: Not present |Grants RC access (READ_CONTROL, also known as STANDARD_RIGHTS_READ) only to members of the local (built-in) Administrators group. | -|**Earlier non-domain controller** |-|-|No access check is performed by default.| - -## Policy management - -This section explains how to configure audit-only mode, how to analyze related events that are logged when the **Network access: Restrict clients allowed to make remote calls to SAM** security policy setting is enabled, and how to configure event throttling to prevent flooding the event log. - -### Audit only mode - -Audit-only mode configures the SAMRPC protocol to do the access check against the currently configured security descriptor but won't fail the call if the access check fails. Instead, the call will be allowed, but SAMRPC will log an event describing what would have happened if the feature had been enabled. This mode provides administrators a way to test their applications before enabling the policy in production. Audit only mode isn't configured by default. To configure it, add the following registry setting. - -|Registry|Details| -|---|---| -|Path|HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa| -|Setting|RestrictRemoteSamAuditOnlyMode| -|Data Type|REG_DWORD| -|Value|1| -|Notes|This setting can't be added or removed by using predefined Group Policy settings. Administrators may create a custom policy to set the registry value if needed. SAM responds dynamically to changes in this registry value without a reboot. | - -### Related events - -There are corresponding events that indicate when remote calls to the SAM are restricted, what accounts attempted to read from the SAM database, and more. The following workflow is recommended to identify applications that may be affected by restricting remote calls to SAM: - -1. Dump event logs to a common share. -1. Right click the System log, select **Filter Current Log**, and specify `16962-16969` in the Event IDs field. -1. Review Event IDs 16962 to 16969, as listed in the following table, with event source **Directory-Service-SAM**. -1. Identify which security contexts are enumerating users or groups in the SAM database. -1. Prioritize the callers, determine if they should be allowed or not, then include the allowed callers in the SDDL string. - -|Event ID|Event Message Text|Explanation | -|---|---|---| -|16962|"Remote calls to the SAM database are being restricted using the default security descriptor: %1.%n "

    %2- "Default SD String:" |Emit event when registry SDDL is absent, causing fallback to default hard-coded SDDL (event should include a copy of the default SDDL).| -|16963|Message Text: "Remote calls to the SAM database are being restricted using the configured registry security descriptor: %1.%n"

    %1 - "Registry SD String:" |Emit event when a new SDDL is read from the registry (either on startup or change) and is considered valid. The event includes the source and a copy of the queried SDDL. -|16964|"The registry security descriptor is malformed: %1.%n Remote calls to the SAM database are being restricted using the default security descriptor: %2.%n"

    %1- "Malformed SD String:"
    %2- "Default SD String:"|Emit event when registry SDDL is mal-formed, causing fallback to default hard-coded SDDL (event should include a copy of the default SDDL). -|16965|Message Text: "A remote call to the SAM database has been denied.%nClient SID: %1%n Network address: %2%n"

    %1- "Client SID:" %2- "Client Network Address | Emit event when access is denied to a remote client. Event should include identity and network address of the client. -|16966|Audit Mode is enabled-

    Message Text: "Audit only mode is now enabled for remote calls to the SAM database. SAM will log an event for clients who would have been denied access in normal mode. %n"|Emit event whenever training mode (see 16968) is enabled or disabled. -|16967|Audit Mode is disabled-

    Message Text: "Audit only mode is now disabled for remote calls to the SAM database.%n For more information"|Emit event whenever training mode (see 16968) is enabled or disabled. -|16968| Message Text: "Audit only mode is currently enabled for remote calls to the SAM database.%n The following client would have been normally denied access:%nClient SID: %1 from network address: %2. %n"
    %1- "Client SID:"
    %2- "Client Network Address:"|Emit event when access would have been denied to a remote client, but was allowed through due to training mode being enabled. Event should include identity and network address of the client.| -|16969|Message Text: "%2 remote calls to the SAM database have been denied in the past %1-seconds throttling window.%n
    "%1- "Throttle window:"
    %2- "Suppressed Message Count:"| Throttling may be necessary for some events due to expected high volume on some servers causing the event log to wrap.

    Note: There's no throttling of events when audit mode is enabled. Environments with a large number of low-privilege and anonymous querying of the remote database may see large numbers of events logged to the System log. For more info, see the [Event Throttling](#event-throttling) section. - -Compare the security context attempting to remotely enumerate accounts with the default security descriptor. Then edit the security descriptor to add accounts that require remote access. - -### Event throttling - -A busy server can flood event logs with events related to the remote enumeration access check. To prevent this, access-denied events are logged once every 15 minutes by default. The length of this period is controlled by the following registry value. - -|Registry Path|HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\ | -|---|---| -Setting |RestrictRemoteSamEventThrottlingWindow| -Data Type |DWORD| -|Value|seconds| -|Reboot Required?|No| -|Notes|**Default** is 900 seconds (15 minutes).
    The throttling uses a suppressed events counter that starts at 0 and gets incremented during the throttling window.
    For example, X events were suppressed in the last 15 minutes.
    The counter is restarted after the event 16969 is logged. - -### Restart requirement - -Restarts aren't required to enable, disable or modify the **Network access: Restrict clients allowed to make remote calls to SAM security** policy setting, including audit only mode. Changes become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The SAMRPC protocol has a default security posture that makes it possible for low-privileged attackers to query a machine on the network for data that is critical to their further hacking and penetration plans. - -The following example illustrates how an attacker might exploit remote SAM enumeration: - -1. A low-privileged attacker gains a foothold on a network. -2. The attacker then queries all machines on the network to determine which ones have a highly privileged domain user configured as a local administrator on that machine. -3. If the attacker can, then find any other vulnerability on that machine that allows taking it over, the attacker can then squat on the machine waiting for the high-privileged user to sign in and then steal or impersonate those credentials. - -### Countermeasure - -You can mitigate this vulnerability by enabling the **Network access: Restrict clients allowed to make remote calls** to SAM security policy setting and configuring the SDDL for only those accounts that are explicitly allowed access. - -### Potential affect - -If the policy is defined, admin tools, scripts and software that formerly enumerated users, groups and group membership may fail. To identify accounts that may be affected, test this setting in [audit only mode](#audit-only-mode). - -## Next steps - -[Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md b/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md deleted file mode 100644 index d4d2161114..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md +++ /dev/null @@ -1,82 +0,0 @@ ---- -title: Network access Shares that can be accessed anonymously -description: Learn about best practices, security considerations, and more for the security policy setting, Network access Shares that can be accessed anonymously. -ms.assetid: f3e4b919-8279-4972-b415-5f815e2f0a1a -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Shares that can be accessed anonymously - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting. - -## Reference - -This policy setting determines which shared folders can be accessed by anonymous users. - -### Possible values - -- User-defined list of shared folders -- Not Defined - -### Best practices - -- Set this policy to a null value. There should be little impact because this null value is the default one. All users will have to be authenticated before they can access shared resources on the server. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| DC Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Any shared folders that are listed can be accessed by any network user, which could lead to the exposure or corruption of sensitive data. - -### Countermeasure - -Configure the **Network access: Shares that can be accessed anonymously** setting to a null value. - -### Potential impact - -There should be little impact because this state is the default configuration. Only authenticated users have access to shared resources on the server. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md b/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md deleted file mode 100644 index 3e5ed1f57e..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: Network access Sharing and security model for local accounts -description: Best practices, security considerations, and more for the security policy setting, Network access Sharing and security model for local accounts. -ms.assetid: 0b3d703c-ea27-488f-8f59-b345af75b994 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network access: Sharing and security model for local accounts - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting. - -## Reference - -This policy setting determines how network logons that use local accounts are authenticated. If you configure this policy setting to Classic, network logons that use local account credentials authenticate with those credentials. If you configure this policy setting to Guest only, network logons that use local accounts are automatically mapped to the Guest account. The Classic model provides precise control over access to resources, and it enables you to grant different types of access to different users for the same resource. Conversely, the Guest only model treats all users equally, and they all receive the same level of access to a given resource, which can be either Read Only or Modify. - ->**Note:**  This policy setting does not affect network logons that use domain accounts. Nor does this policy setting affect interactive logons that are performed remotely through services such as Telnet or Remote Desktop Services. -When the device is not joined to a domain, this policy setting also tailors the **Sharing** and **Security** tabs in Windows Explorer to correspond to the sharing and security model that is being used. - -When the value of this policy setting is **Guest only - local users authenticate as Guest**, any user who can access your device over the network does so with Guest user rights. This privilege means that they'll probably be unable to write to shared folders. Although this restriction does increase security, it makes it impossible for authorized users to access shared resources on those systems. When the value is **Classic - local users authenticate as themselves**, local accounts must be password-protected; otherwise, anyone can use those user accounts to access shared system resources. - -### Possible values - -- Classic - Local users authenticate as themselves -- Guest only - Local users authenticate as Guest -- Not defined - -### Best practices - -1. For network servers, set this policy to **Classic - local users authenticate as themselves**. -2. On end-user systems, set this policy to **Guest only - local users authenticate as Guest**. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Classic (local users authenticate as themselves)| -| DC Effective Default Settings | Classic (local users authenticate as themselves)| -| Member Server Effective Default Settings | Classic (local users authenticate as themselves)| -| Client Computer Effective Default Settings | Classic (local users authenticate as themselves)| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -With the Guest only model, any user who can authenticate to your device over the network does so with Guest privileges, which probably means that they don't have Write access to shared resources on that device. Although this restriction does increase security, it makes it more difficult for authorized users to access shared resources on those computers because ACLs on those resources must include access control entries (ACEs) for the Guest account. With the Classic model, local accounts should be password protected. Otherwise, if Guest access is enabled, anyone can use those user accounts to access shared system resources. - -### Countermeasure - -For network servers, configure the **Network access: Sharing and security model for local accounts setting** to **Classic – local users authenticate as themselves**. On end-user computers, configure this policy setting to **Guest only – local users authenticate as guest**. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md b/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md deleted file mode 100644 index 36e4ff299e..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-list-manager-policies.md +++ /dev/null @@ -1,83 +0,0 @@ ---- -title: Network List Manager policies -description: Network List Manager policies are security settings that configure different aspects of how networks are listed and displayed on one device or on many devices. -ms.assetid: bd8109d4-b07c-4beb-a9a6-affae2ba2fda -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network List Manager policies - -**Applies to** -- Windows 11 -- Windows 10 - -Network List Manager policies are security settings that you can use to configure different aspects of how networks are listed and displayed on one device or on many devices. - -To configure Network List Manager Policies for one device, you can use the Microsoft Management Console (MMC) with the Group Policy Object Editor snap-in, and edit the local computer policy. The Network List Manager Policies are located at the following path in Group Policy Object Editor: -**Computer Configuration | Windows Settings | Security Settings | Network List Manager Policies** - -To configure Network List Manager Policies for many computers, such as for all of the Domain Computers in an Active Directory domain, follow Group Policy documentation to learn how to edit the policies for the object that you require. The path to the Network List Manager Policies is the same as the path listed above. - -### Policy settings for Network List Manager Policies - -The following policy settings are provided for Network List Manager Policies. These policy settings are located in the details pane of the Group Policy Object Editor, in **Network Name**. - -### Unidentified Networks - -This policy setting allows you to configure the **Network Location**, including the location type and the user permissions, for networks that Windows cannot identify due to a network issue or a lack of identifiable characters in the network information received by the operating system from the -network. A network location identifies the type of network that a computer is connected to and automatically sets the appropriate firewall settings for that location. You can configure the following items for this policy setting: - -- **Location type**. For this item, the following options are available: - - - **Not configured**. If you select this option, this policy setting does not apply a location type to unidentified network connections. - - **Private**. If you select this option, this policy setting applies a location type of Private to unidentified network connections. A private network, such as a home or work network, is a location type that assumes that you trust the other computers on the network. Do not select this item if there is a possibility that an active, unidentified network is in a public place. - - - **Public**. If you select this option, this policy setting applies a location type of Public to unidentified network connections. A public network, such as a wireless network at an airport or coffee shop, is a location type that assumes that you do not trust the other computers on the network. - -- **User permissions**. For this item, the following options are available: - - - **Not configured**. If you select this option, this policy setting does not specify whether users can change the location for unidentified network connections. - - **User can change location**. If you select this option, this policy setting allows users to change an unidentified network connection location from Private to Public or from Public to Private. - - **User cannot change location**. If you select this option, this policy setting does not allow users to change the location of an unidentified network connection. - -### Identifying Networks - -This policy setting allows you to configure the **Network Location** for networks that are in a temporary state while Windows works to identify the network and location type. A network location identifies the type of network that a computer is connected to and automatically sets the appropriate firewall settings for that location. You can configure the following items for this policy setting: - -- **Location type**. For this item, the following options are available: - - - **Not configured**. If you select this option, this policy setting does not apply a location type to network connections that are in the process of being identified by Windows. - - **Private**. If you select this option, this policy setting applies a location type of Private to network connections that are in the process of being identified. A private network, such as a home or work network, is a location type that assumes that you trust the other devices on the network. Do not select this item if there is a possibility that an active, unidentified network is in a public place. - - **Public**. If you select this option, this policy setting applies a location type of Public to network connections that are in the process of being identified by Windows. A public network, such as a wireless network at an airport or coffee shop, is a location type that assumes that you do not trust the other devices on the network. - -### All Networks - -This policy setting allows you to specify the **User Permissions** that control whether users can change the network name, location, or icon, for all networks to which the user connects. You can configure the following items for this policy setting: - -- **Network name**. For this item, the following options are available: - - - **Not configured**. If you select this option, this policy setting does not specify whether users can change the network name for all network connections. - - **User can change name**. If you select this option, users can change the network name for all networks to which they connect. - - **User cannot change name**. If you select this option, users cannot change the network name for any networks to which they connect. - -- **Network location**. For this item, the following options are available: - - - **Not configured**. If you select this option, this policy setting does not specify whether users can change the location for all network connections. - - **User can change location**. If you select this option, this policy setting allows users to change all network locations from Private to Public or from Public to Private. - - **User cannot change location**. If you select this option, this policy setting does not allow users to change the location for any networks to which they connect. - -- **Network icon**. For this item, the following options are available: - - - **Not configured**. If you select this option, this policy setting does not specify whether users can change the network icon for all network connections. - - **User can change icon**. If you select this option, this policy setting allows users to change the network icon for all networks to which the user connects. - - **User cannot change icon**. If you select this option, this policy setting does not allow users to change the network icon for any networks to which the user connects. diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md deleted file mode 100644 index 9d920c4925..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md +++ /dev/null @@ -1,95 +0,0 @@ ---- -title: "Network security: Allow Local System to use computer identity for NTLM (Windows 10)" -description: Location, values, policy management, and security considerations for the policy setting, Network security Allow Local System to use computer identity for NTLM. -ms.assetid: c46a658d-b7a4-4139-b7ea-b9268c240053 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 10/04/2021 ---- - -# Network security: Allow Local System to use computer identity for NTLM - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting. - -## Reference - -When services connect to devices that are running versions of the Windows operating system earlier than Windows Vista or Windows Server 2008, services that run as Local System and use SPNEGO (Negotiate) that revert to NTLM will authenticate anonymously. In Windows Server 2008 R2 and Windows 7 and later, if a service connects to a computer running Windows Server 2008 or Windows Vista, the system service uses the computer identity. - -When a service connects with the device identity, signing and encryption are supported to provide data protection. (When a service connects anonymously, a system-generated session key is created, which provides no protection, but it allows applications to sign and encrypt data without errors. Anonymous authentication uses a NULL session, which is a session with a server in which no user authentication is performed; and therefore, anonymous access is allowed.) - -### Possible values - -| Setting | Windows Server 2008 and Windows Vista | At least Windows Server 2008 R2 and Windows 7 | -| - | - | - | -| Enabled | Services running as Local System that use Negotiate will use the computer identity. This value might cause some authentication requests between Windows operating systems to fail and log an error.| Services running as Local System that use Negotiate will use the computer identity. This behavior is the default behavior. | -| Disabled| Services running as Local System that uses Negotiate when reverting to NTLM authentication will authenticate anonymously. This behavior is the default behavior.| Services running as Local System that uses Negotiate when reverting to NTLM authentication will authenticate anonymously.| -|Neither|Services running as Local System that uses Negotiate when reverting to NTLM authentication will authenticate anonymously. | Services running as Local System that uses Negotiate will use the computer identity. This behavior might cause some authentication requests between Windows operating systems to fail and log an error.| - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or Group Policy object (GPO) | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not applicable| -| Member server effective default settings | Not applicable| -| Effective GPO default settings on client computers | Not defined| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy conflict considerations - -The policy [Network security: Allow LocalSystem NULL session fallback](network-security-allow-localsystem-null-session-fallback.md), if enabled, will allow NTLM or Kerberos authentication to be used when a system service attempts authentication. This privilege will increase the success of interoperability at the expense of security. - -The anonymous authentication behavior is different for Windows Server 2008 and Windows Vista than later versions of Windows. Configuring and applying this policy setting on those systems might not produce the same results. - -### Group Policy - -This policy setting can be configured by using the Group Policy Management Console (GPMC) to be distributed through Group Policy Objects (GPOs). If this policy isn't contained in a distributed GPO, this policy can be configured on the local computer by using the Local Security Policy snap-in. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -When a service connects to computers running versions of Windows earlier than Windows Vista or Windows Server 2008, services that run as Local System and use SPNEGO (Negotiate) that revert to NTLM will use NULL session. In Windows Server 2008 R2 and Windows 7 and later, if a service connects to a computer running Windows Server 2008 or Windows Vista, the system service uses the computer identity. - -When a service connects with the computer identity, signing and encryption are supported to provide data protection. When a service connects with a NULL session, a system-generated session key is created, which provides no protection, but it allows applications to sign and encrypt data without errors. - -### Countermeasure - -You can configure the **Network security: Allow Local System to use computer identity for NTLM** security policy setting to allow Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication. - -### Potential impact - -If you don't configure this policy setting on Windows Server 2008 and Windows Vista, services running as Local System that uses the default credentials will use the NULL session and revert to NTLM authentication for Windows operating systems earlier than Windows Vista or Windows Server 2008. -Beginning with Windows Server 2008 R2 and Windows 7, the system allows Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication. - -## Related articles - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md deleted file mode 100644 index db63f8cfbc..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-localsystem-null-session-fallback.md +++ /dev/null @@ -1,83 +0,0 @@ ---- -title: Network security Allow LocalSystem NULL session fallback -description: Describes the best practices, location, values, and security considerations for the Network security Allow LocalSystem NULL session fallback security policy setting. -ms.assetid: 5b72edaa-bec7-4572-b6f0-648fc38f5395 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Allow LocalSystem NULL session fallback - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Network security: Allow LocalSystem NULL session fallback** security policy setting. - -## Reference - -This policy affects session security during the authentication process between devices running Windows Server 2008 R2 and Windows 7 and later and those devices running earlier versions of the Windows operating system. For computers running Windows Server 2008 R2 and Windows 7 and later, services running as Local System require a service principal name (SPN) to generate the session key. However, if [Network security: Allow Local System to use computer identity for NTLM](network-security-allow-local-system-to-use-computer-identity-for-ntlm.md) is set to disabled, services running as Local -System will fall back to using NULL session authentication when they transmit data to servers running versions of Windows earlier than Windows Vista or Windows Server 2008. NULL session doesn't establish a unique session key for each authentication; and thus, it can't provide integrity or confidentiality protection. The setting **Network security: Allow LocalSystem NULL session fallback** determines whether services that request the use of session security are allowed to perform signature or encryption functions with a well-known key for application compatibility. - -### Possible values - -- **Enabled** - - When a service running as Local System connects with a NULL session, a system-generated session key is created, which provides no protection but allows applications to sign and encrypt data without errors. This increases application compatibility, but it degrades the level of security. - -- **Disabled** - - When a service running as Local System connects with a NULL session, session security will be unavailable. Calls seeking encryption or signing will fail. This setting is more secure, but at the risk of degrading application incompatibility. Calls that are using the device identity instead of a - NULL session will still have full use of session security. - -- Not defined. When this policy isn't defined, the default takes effect. This policy is Enabled for versions of the Windows operating system earlier than Windows Server 2008 R2 and Windows 7, and it's Disabled otherwise. - -### Best practices - -When services connect with the device identity, signing and encryption are supported to provide data protection. When services connect with a NULL session, this level of data protection isn't provided. However, you'll need to evaluate your environment to determine the Windows operating system versions that you support. If this policy is enabled, some services may not be able to authenticate. - -This policy applies to Windows Server 2008 and Windows Vista (SP1 and later). When your environment no longer requires support for Windows NT 4, this policy should be disabled. By default, it's disabled in Windows 7 and Windows Server 2008 R2 and later. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not applicable| -| Member server effective default settings | Not applicable | -| Effective GPO default settings on client computers | Not applicable| - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If this setting is Enabled, when a service connects with a NULL session, a system-generated session key is created, which provides no protection but allows applications to sign and encrypt data without errors. Data that is intended to be protected might be exposed. - -### Countermeasure - -You can configure the computer to use the computer identity for Local System with the policy **Network security: Allow Local System to use computer identity for NTLM**. If that isn't possible, this policy can be used to prevent data from being exposed in transit if it was protected with a well-known key. - -### Potential impact - -If you enable this policy, services that use NULL session with Local System could fail to authenticate because they'll be prohibited from using signing and encryption. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md deleted file mode 100644 index 9ebd32dab8..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: Network security Allow PKU2U authentication requests to this computer to use online identities -description: Best practices for the Network Security Allow PKU2U authentication requests to this computer to use online identities security setting. -ms.assetid: e04a854e-d94d-4306-9fb3-56e9bd7bb926 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 01/03/2022 ---- - -# Network security: Allow PKU2U authentication requests to this computer to use online identities - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the best practices, location, and values for the **Network Security: Allow PKU2U authentication requests to this computer to use online identities** security policy setting. - -## Reference - -From Windows Server 2008 R2 and Windows 7, the Negotiate Security Support Provider (SSP) supports an extension SSP, Negoexts.dll. This extension SSP is treated as an authentication protocol by the Windows operating system. It supports SSPs from Microsoft, including PKU2U. You can also develop or add other SSPs. - -When devices are configured to accept authentication requests by using online IDs, Negoexts.dll calls the PKU2U SSP on the computer that's used to sign in. The PKU2U SSP obtains a local certificate and exchanges the policy between the peer computers. When it's validated on the peer computer, the certificate within the metadata is sent to the sign-in peer for validation. It associates the user's certificate to a security token, and then the sign-in process completes. - -> [!NOTE] -> Linking online IDs can be performed by anyone who has an account that has standard user’s credentials through Credential Manager. - -This policy isn't configured by default on domain-joined devices. This disablement would disallow the online identities to authenticate to domain-joined computers from Windows 7 up to Windows 10, Version 1607. This policy is enabled by default in Windows 10, Version 1607, and later. - -### Possible values - -- **Enabled**: This setting allows authentication to successfully complete between the two (or more) computers that have established a peer relationship by using online IDs. The PKU2U SSP obtains a local certificate and exchanges the policy between the peer devices. When validated on the peer computer, the certificate within the metadata is sent to the sign-in peer for validation. It associates the user's certificate to a security token, and then the sign-in process completes. - - > [!NOTE] - > PKU2U is disabled by default on Windows Server. If PKU2U is disabled, Remote Desktop connections from a Microsoft Entra hybrid joined server to a Microsoft Entra joined Windows 10 device or a Microsoft Entra hybrid joined domain member Windows 10 device fail. To resolve this, enable PKU2U on the server and the client. - -- **Disabled**: This setting prevents online IDs from being used to authenticate the user to another computer in a peer-to-peer relationship. - -- ***Not set***: Not configuring this policy prevents online IDs from being used to authenticate the user. This option is the default on domain-joined devices. - -### Best practices - -Within a domain, domain accounts should be used for authentication. Set this policy to **Disabled** or don't configure this policy to exclude online identities from being used to authenticate for on-premises only environments. Set this policy to **Enabled** for hybrid and Microsoft Entra joined environments. - -### Location - -*Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options* - -### Default values - -The following table lists the effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Disabled| -| Member server effective default settings | Disabled| -| Effective GPO default settings on client computers prior to Windows 10, Version 1607 | Disabled| -| Effective GPO default settings on client computers Windows 10, Version 1607 and later| Enabled| - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of the countermeasure. - -### Vulnerability - -Enabling this policy setting allows a user’s account on one computer to be associated with an online identity, such as Microsoft account or a Microsoft Entra account. That account can then sign in to a peer device (if the peer device is likewise configured) without the use of a Windows sign-in account (domain or local). This setup isn't only beneficial, but required for Microsoft Entra joined devices, where they're signed in with an online identity and are issued certificates by Microsoft Entra ID. This policy may not be relevant for an *on-premises only* environment and might circumvent established security policies. However, it doesn't pose any threats in a hybrid environment where Microsoft Entra ID is used as it relies on the user's online identity and Microsoft Entra ID to authenticate. - -### Countermeasure - -Set this policy to *Disabled* or don't configure this security policy for *on-premises only* environments. - -### Potential impact - -If you don't set or you disable this policy, the PKU2U protocol won't be used to authenticate between peer devices, which forces users to follow domain-defined access control policies. This disablement is a valid configuration in *on-premises only* environments. Some roles/features (such as Failover Clustering) don't utilize a domain account for its PKU2U authentication and will cease to function properly when disabling this policy. - -If you enable this policy in a hybrid environment, you allow your users to authenticate by using certificates issued by Microsoft Entra ID and their online identity between the corresponding devices. This configuration allows users to share resources between such devices. If this policy isn't enabled, remote connections to a Microsoft Entra joined device won't work. - -### Fix/Remediation - -This vulnerability was fixed on February 9, 2021, in the [CVE-2021-25195](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-25195) Security Update. - -## Related topics - -- [Security options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md b/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md deleted file mode 100644 index dddf04ec16..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Network security Configure encryption types allowed for Kerberos -description: Best practices, location, values and security considerations for the policy setting, Network security Configure encryption types allowed for Kerberos Win7 only. -ms.reviewer: -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Configure encryption types allowed for Kerberos - -**Applies to** -- Windows 11 -- Windows 10 -- Windows Server - -Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos** security policy setting. - -## Reference - -This policy setting allows you to set the encryption types that the Kerberos protocol is allowed to use. If it isn't selected, the encryption type won't be allowed. This setting might affect compatibility with client computers or services and applications. Multiple selections are permitted. - -For more information, see [KDC event ID 16 or 27 is logged if DES for Kerberos is disabled](/troubleshoot/windows-server/windows-security/kdc-event-16-27-des-encryption-disabled). - -The following table lists and explains the allowed encryption types. - - -| Encryption type | Description and version support | -| - | - | -| DES_CBC_CRC | Data Encryption Standard with Cipher Block Chaining using the Cyclic Redundancy Check function
    Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. | -| DES_CBC_MD5| Data Encryption Standard with Cipher Block Chaining using the Message-Digest algorithm 5 checksum function
    Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. The Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, and later operating systems don't support DES by default. | -| RC4_HMAC_MD5| Rivest Cipher 4 with Hashed Message Authentication Code using the Message-Digest algorithm 5 checksum function
    Supported in Windows 2000 Server, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.| -| AES128_HMAC_SHA1| Advanced Encryption Standard in 128-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
    Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
    Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. | -| AES256_HMAC_SHA1| Advanced Encryption Standard in 256-bit cipher block with Hashed Message Authentication Code using the Secure Hash Algorithm (1).
    Not supported in Windows 2000 Server, Windows XP, or Windows Server 2003.
    Supported in Windows Vista, Windows Server 2008, Windows 7, Windows 10, Windows 11, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2. | -| Future encryption types| Reserved by Microsoft for other encryption types that might be implemented.| - -### Possible values - - -The encryption type options include: - -- DES\_CBC\_CRC -- DES\_CBC\_MD5 -- RC4\_HMAC\_MD5 -- AES128\_HMAC\_SHA1 -- AES256\_HMAC\_SHA1 -- Future encryption types - - As of the release of Windows 7 and Windows Server 2008 R2, these options are reserved by Microsoft for other encryption types that might be implemented. - -### Best practices - -Analyze your environment to determine which encryption types will be supported and then select the types that meet that evaluation. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy| Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | The default OS setting applies, DES suites aren't supported by default.| -| Member server effective default settings | The default OS setting applies, DES suites aren't supported by default.| -| Effective GPO default settings on client computers | The default OS setting applies, DES suites aren't supported by default.| - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Windows Server 2008 R2, Windows 7, and Windows 10, don't support the DES cryptographic suites because stronger ones are available. To enable Kerberos interoperability with non-Windows versions of the Kerberos protocol, these suites can be enabled. However, doing so might open attack vectors on computers running -Windows Server 2008 R2, Windows 7 and Windows 10. You can also disable DES for your computers running Windows Vista and Windows Server 2008. - -### Countermeasure - -Don't configure this policy. This disablement will force the computers running Windows Server 2008 R2, Windows 7, and Windows 10 to use the AES or RC4 cryptographic suites. - -### Potential impact - -If you don't select any of the encryption types, computers running Windows Server 2008 R2, Windows 7 and Windows 10, might have Kerberos authentication failures when connecting with computers running non-Windows versions of the Kerberos protocol. - - -If you do select any encryption type, you'll lower the effectiveness of encryption for Kerberos authentication but you'll improve interoperability with computers running older versions of Windows. -Contemporary non-Windows implementations of the Kerberos protocol support RC4 and AES 128-bit and AES 256-bit encryption. Most implementations, including the MIT Kerberos protocol and the Windows Kerberos protocol, are deprecating DES encryption. - -## Related articles - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md b/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md deleted file mode 100644 index a421232bf4..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md +++ /dev/null @@ -1,86 +0,0 @@ ---- -title: Network security Do not store LAN Manager hash value on next password change -description: Best practices, security considerations, and more for the security policy setting, Network security Do not store LAN Manager hash value on next password change. -ms.assetid: 6452b268-e5ba-4889-9d38-db28f919af51 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Do not store LAN Manager hash value on next password change - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network security: Do not store LAN Manager hash value on next password change** security policy setting. - -## Reference - -This policy setting determines whether LAN Manager is prevented from storing hash values for the new password the next time the password is changed. Hash values are a representation of the password after the encryption algorithm is applied that corresponds to the format that is specified by the algorithm. To decrypt the hash value, the encryption algorithm must be determined and then reversed. The LAN Manager hash is relatively weak and prone to attack compared to the cryptographically stronger NTLM hash. Because the LM hash is stored on the local device in the security database, the passwords can be compromised if the security database, Security Accounts Manager (SAM), is attacked. - -When the attackers attack the SAM file, they can potentially gain access to user names and password hashes. Attackers can use a password-cracking tool to determine what the password is. After they have access to this information, they can use it to gain access to resources on your network by impersonating users. Enabling this policy setting won't prevent these types of attacks, but it will make them much more difficult. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - - - Set **Network security: Do not store LAN Manager hash value on next password change** to **Enabled**. - - Require all users to set new passwords the next time they sign in to the domain so that LAN Manager hashes are removed. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings|Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The SAM file can be targeted by attackers who seek access to user names and password hashes. Such attacks use special tools to discover passwords, which can then be used to impersonate users and gain access to resources on your network. These types of attacks aren't prevented by enabling this policy setting because LAN Manager hashes are much weaker than NTLM hashes, but it's much more difficult for these attacks to succeed. - -### Countermeasure - -Enable the **Network security: Do not store LAN Manager hash value on next password change** setting. Require all users to set new passwords the next time they sign in to the domain so that LAN Manager hashes are removed. - -### Potential impact - -Some non-Microsoft applications might not be able to connect to the system. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md b/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md deleted file mode 100644 index 7af8f09acd..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md +++ /dev/null @@ -1,91 +0,0 @@ ---- -title: Network security Force logoff when logon hours expire -description: Best practices, location, values, policy management, and security considerations for the policy setting, Network security Force logoff when logon hours expire. -ms.assetid: 64d5dde4-58e4-4217-b2c4-73bd554ec926 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Force logoff when logon hours expire - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Network security: Force logoff when logon hours expire** security policy setting. - -## Reference - -This security setting determines whether to disconnect users who are connected to the local device outside their user account's valid sign-in hours. This setting affects the Server Message Block (SMB) component. - -This policy setting doesn't apply to administrator accounts, but it behaves as an account policy. For domain accounts, there can be only one account policy. The account policy must be defined in the Default Domain Policy, and it's enforced by the domain controllers that make up the domain. A domain controller always pulls the account policy from the Default Domain Policy Group Policy Object (GPO), even if there's a different account policy that is applied to the organizational unit that contains the domain controller. By default, workstations and servers that are joined to a domain (for example, member devices) also receive the same account policy for their local accounts. However, local account policies for member devices can be different from the domain account policy by defining an account policy for the organizational unit that contains the member devices. Kerberos settings aren't applied to member devices. - -### Possible values - -- Enabled - - When enabled, this policy causes client sessions with the SMB server to be forcibly disconnected when the client's sign-in hours expire. - -- Disabled - - When disabled, this policy allows for the continuation of an established client session after the client's sign-in hours have expired. - -- Not defined - -### Best practices - -- Set **Network security: Force logoff when logon hours expire** to Enabled. SMB sessions will be terminated on member servers when a user's sign-in time expires, and the user will be unable to sign in to the system until their next scheduled access time begins. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Disabled| -| Default Domain Controller Policy| Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If you disable this policy setting, users can remain connected to the computer outside of their allotted sign-in hours. - -### Countermeasure - -Enable the **Network security: Force logoff when logon hours expire** setting. This policy setting doesn't apply to administrator accounts. - -### Potential impact - -When a user's sign-in time expires, SMB sessions terminate. The user can't sign in to the device until the next scheduled access time commences. - -## Related articles - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md deleted file mode 100644 index 806700542f..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md +++ /dev/null @@ -1,118 +0,0 @@ ---- -title: Network security LAN Manager authentication level -description: Best practices, location, values, policy management and security considerations for the policy setting, Network security LAN Manager authentication level. -ms.assetid: bbe1a98c-420a-41e7-9d3c-3a2fe0f1843e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: LAN Manager authentication level - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network security: LAN Manager authentication level** security policy setting. - -## Reference - -This policy setting determines which challenge or response authentication protocol is used for network logons. LAN Manager (LM) includes client computer and server software from Microsoft that allows users to link personal devices together on a single network. Network capabilities include transparent file and print sharing, user security features, and network administration tools. In Active Directory domains, the Kerberos protocol is the default authentication protocol. However, if the Kerberos protocol isn't negotiated for some reason, Active Directory uses LM, NTLM, or NTLM version 2 (NTLMv2). - -LAN Manager authentication includes the LM, NTLM, and NTLMv2 variants, and it's the protocol that is used to authenticate all client devices running the Windows operating system when they perform the following operations: - -- Join a domain -- Authenticate between Active Directory forests -- Authenticate to domains based on earlier versions of the Windows operating system -- Authenticate to computers that don't run Windows operating systems, beginning with Windows 2000 -- Authenticate to computers that aren't in the domain - -### Possible values - -- Send LM & NTLM responses -- Send LM & NTLM - use NTLMv2 session security if negotiated -- Send NTLM responses only -- Send NTLMv2 responses only -- Send NTLMv2 responses only. Refuse LM -- Send NTLMv2 responses only. Refuse LM & NTLM -- Not Defined - -The **Network security: LAN Manager authentication level** setting determines which challenge/response authentication protocol is used for network logons. This choice affects the authentication protocol level that clients use, the session security level that the computers negotiate, and the -authentication level that servers accept. The following table identifies the policy settings, describes the setting, and identifies the security level used in the corresponding registry setting if you choose to use the registry to control this setting instead of the policy setting. - -| Setting | Description | Registry security level | -| - | - | - | -| Send LM & NTLM responses | Client devices use LM and NTLM authentication, and they never use NTLMv2 session security. Domain controllers accept LM, NTLM, and NTLMv2 authentication.| 0| -| Send LM & NTLM – use NTLMv2 session security if negotiated | Client devices use LM and NTLM authentication, and they use NTLMv2 session security if the server supports it. Domain controllers accept LM, NTLM, and NTLMv2 authentication.| 1| -| Send NTLM response only| Client devices use NTLMv1 authentication, and they use NTLMv2 session security if the server supports it. Domain controllers accept LM, NTLM, and NTLMv2 authentication.| 2| -| Send NTLMv2 response only | Client devices use NTLMv2 authentication, and they use NTLMv2 session security if the server supports it. Domain controllers accept LM, NTLM, and NTLMv2 authentication.| 3| -| Send NTLMv2 response only. Refuse LM | Client devices use NTLMv2 authentication, and they use NTLMv2 session security if the server supports it. Domain controllers refuse to accept LM authentication, and they'll accept only NTLM and NTLMv2 authentication.| 4| -| Send NTLMv2 response only. Refuse LM & NTLM | Client devices use NTLMv2 authentication, and they use NTLMv2 session security if the server supports it. Domain controllers refuse to accept LM and NTLM authentication, and they'll accept only NTLMv2 authentication.| 5| - -### Best practices - -- Best practices are dependent on your specific security and authentication requirements. - -### Policy Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Registry Location - -HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Send NTLMv2 response only| -| DC Effective Default Settings | Send NTLMv2 response only| -| Member Server Effective Default Settings | Send NTLMv2 response only| -| Client Computer Effective Default Settings | Not defined| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Modifying this setting may affect compatibility with client devices, services, and applications. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -In Windows 7 and Windows Vista, this setting is undefined. In Windows Server 2008 R2 and later, this setting is configured to **Send NTLMv2 responses only**. - -### Countermeasure - -Configure the **Network security: LAN Manager Authentication Level** setting to **Send NTLMv2 responses only**. Microsoft and many independent organizations strongly recommend this level of authentication when all client computers support NTLMv2. - -### Potential impact - -Client devices that don't support NTLMv2 authentication can't authenticate in the domain and access domain resources by using LM and NTLM. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md deleted file mode 100644 index 1c8757c3f8..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: Network security LDAP client signing requirements -description: Best practices, location, values, policy management and security considerations for the policy setting, Network security LDAP client signing requirements. -ms.assetid: 38b35489-eb5b-4035-bc87-df63de50509c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: LDAP client signing requirements - -**Applies to** -- Windows 11 -- Windows 10 - -This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. This information applies to computers running at least the Windows Server 2008 operating system. - -## Reference - -This policy setting determines the level of data signing that is requested on behalf of client devices that issue LDAP BIND requests. The levels of data signing are described in the following list: - -- **None**. The LDAP BIND request is issued with the caller-specified options. -- **Negotiate signing**. If Transport Layer Security/Secure Sockets Layer (TLS/SSL) hasn't been started, the LDAP BIND request is initiated with the LDAP data signing option set in addition to the caller-specified options. If TLS/SSL has been started, the LDAP BIND request is initiated with the caller-specified options. -- **Require signing**. This level is the same as **Negotiate signing**. However, if the LDAP server's intermediate saslBindInProgress response doesn't indicate that LDAP traffic signing is required, the caller is returned a message that the LDAP BIND command request failed. - -Misuse of this policy setting is a common error that can cause data loss or problems with data access or security. - -### Possible values - -- None -- Negotiate signing -- Require signature -- Not Defined - -### Best practices - -- Set both the **Network security: LDAP client signing requirements** and **Domain controller: LDAP server signing requirements** settings to **Require signing**. To avoid usage of unsigned traffic, set both client and server sides to require signing. Not setting one of the sides will prevent client computers from communicating with the server. This prevention can cause many features to fail, including user authentication, Group Policy, and logon scripts. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Negotiate signing| -| DC Effective Default Settings | Negotiate signing| -| Member Server Effective Default Settings | Negotiate signing| -| Client Computer Effective Default Settings | Negotiate signing| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Modifying this setting may affect compatibility with client devices, services, and applications. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Unsigned network traffic is susceptible to man-in-the-middle attacks in which an intruder captures the packets between the client computer and server, modifies them, and then forwards them to the server. For an LDAP server, this susceptibility means that an attacker could cause a server to make decisions that are based on false or altered data from the LDAP queries. To lower this risk in your network, you can implement strong physical security measures to protect the network infrastructure. Also, you can make all types of man-in-the-middle attacks difficult if you require digital signatures on all network packets throughs IPsec authentication headers. - -### Countermeasure - -Configure the **Network security: LDAP client signing requirements** setting to **Require signing**. - -### Potential impact - -If you configure the client to require LDAP signatures, it may fail to communicate with the LDAP servers that don't require requests to be signed. To avoid this issue, make sure that both the **Network security: LDAP client signing requirements** and **Domain controller: LDAP server signing requirements** settings are set to **Require signing**. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md deleted file mode 100644 index 5c12f9b876..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md +++ /dev/null @@ -1,91 +0,0 @@ ---- -title: Network security Minimum session security for NTLM SSP based (including secure RPC) clients -description: Best practices and more for the security policy setting, Network security Minimum session security for NTLM SSP based (including secure RPC) clients. -ms.assetid: 89903de8-23d0-4e0f-9bef-c00cb7aebf00 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 07/27/2017 ---- - -# Network security: Minimum session security for NTLM SSP based (including secure RPC) clients - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients** security policy setting. - -## Reference - -This policy setting allows a client device to require the negotiation of 128-bit encryption or NTLMv2 session security. These values are dependent on the **Network security: LAN Manager Authentication Level policy** setting value. - -### Possible values - -- Require NTLMv2 session security - - The connection fails if the NTLMv2 protocol is not negotiated. - -- Require 128-bit encryption - - The connection fails if strong encryption (128-bit) is not negotiated. - -### Best practices - -Practices in setting this policy are dependent on your security requirements. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy| Not defined| -| Stand-Alone Server Default Settings | Require 128-bit encryption| -| DC Effective Default Settings | Require 128-bit encryption| -| Member Server Effective Default Settings | Require 128-bit encryption| -| Client Computer Effective Default Settings | Require 128-bit encryption| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy. - -### Policy conflicts - -The settings for this security policy are dependent on the **Network security: LAN Manager Authentication Level policy** setting value. For info about this policy, see [Network security: LAN Manager authentication level](network-security-lan-manager-authentication-level.md). - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Network traffic that uses the NTLM Security Support Provider (NTLM SSP) could be exposed such that an attacker who has gained access to the network can create man-in-the-middle attacks. - -### Countermeasure - -Enable all options that are available for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients policy** setting. - -### Potential impact - -Client devices that enforce these settings cannot communicate with older servers that do not support them. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md deleted file mode 100644 index 952c7a8873..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md +++ /dev/null @@ -1,89 +0,0 @@ ---- -title: Network security Minimum session security for NTLM SSP based (including secure RPC) servers -description: Best practices and security considerations for the policy setting, Network security Minimum session security for NTLM SSP based (including secure RPC) servers. -ms.assetid: c6a60c1b-bc8d-4d02-9481-f847a411b4fc -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Minimum session security for NTLM SSP based (including secure RPC) servers - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** security policy setting. - -## Reference - -This policy setting allows a client device to require the negotiation of 128-bit encryption or NTLMv2 session security. These values are dependent on the [Network security: LAN Manager authentication level](network-security-lan-manager-authentication-level.md) policy setting value. - -Setting all of these values for this policy setting will help protect network traffic that uses the NTLM Security Support Provider (NTLM SSP) from being exposed or tampered with by a malicious user who has gained access to the same network. That is, these settings help protect against man-in-the-middle attacks. - -### Possible values - -- Require 128-bit encryption. The connection fails if strong encryption (128-bit) isn't negotiated. -- Require NTLMv2 session security. The connection fails if the NTLMv2 protocol isn't negotiated. -- Not Defined. - -### Best practices - -- Enable all values that are available for this security policy. Legacy client devices that don't support these policy settings will be unable to communicate with the server. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy| Not defined| -| Stand-Alone Server Default Settings | Require 128-bit encryption| -| DC Effective Default Settings | Require 128-bit encryption| -| Member Server Effective Default Settings | Require 128-bit encryption| -| Client Computer Effective Default Settings | Require 128-bit encryption| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Policy dependencies - -The settings for this security policy are dependent on the [Network security: LAN Manager authentication level](network-security-lan-manager-authentication-level.md) setting value. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Network traffic that uses the NTLM Security Support Provider (NTLM SSP) could be exposed such that an attacker who has gained access to the network can create man-in-the-middle attacks. - -### Countermeasure - -Enable all options that are available for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** policy setting. - -### Potential impact - -Older client devices that don't support these security settings can't communicate with the computer on which this policy is set. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md deleted file mode 100644 index bc6bb0004a..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md +++ /dev/null @@ -1,109 +0,0 @@ ---- -title: Network security Restrict NTLM Add remote server exceptions for NTLM authentication -description: Best practices, security considerations, and more for the policy setting, Network security Restrict NTLM Add remote server exceptions for NTLM authentication. -ms.assetid: 9b017399-0a54-4580-bfae-614c2beda3a1 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** security policy setting. - -## Reference - -The **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** policy setting allows you to create an exception list of remote servers to which client devices are allowed to use NTLM authentication if the [Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers](network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md) policy setting is configured. - -If you configure this policy setting, you can define a list of remote servers to which client devices are allowed to use NTLM authentication. - -If you don't configure this policy setting, no exceptions will be applied, and if [Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers](network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md) is enabled, NTLM authentication attempts from the client devices will fail. - -List the NetBIOS server names that are used by the applications as the naming format, one per line. To ensure exceptions, the names that are used by all applications need to be in the list. A single asterisk (\*) can be used anywhere in the string as a wildcard character. - -### Possible values - -- User-defined list of remote servers - - When you enter a list of remote servers to which clients are allowed to use NTLM authentication, the policy is defined and enabled. - -- Not defined - - If you don't configure this policy setting by defining a list of servers, the policy is undefined and no exceptions will be applied. - -### Best practices - -1. First enforce the [Network Security: Restrict NTLM: Audit incoming NTLM traffic](network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md) or [Network Security: Restrict NTLM: Audit NTLM authentication in this domain](network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md) policy setting and then review the operational event log to understand which servers are involved in these authentication attempts so you can decide which servers to exempt. - -2. After you have set the server exception list, enforce the [Network Security: Restrict NTLM: Audit incoming NTLM traffic](network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md) or [Network Security: Restrict NTLM: Audit NTLM authentication in this domain](network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md) policy setting and then review the operational event log again before setting the policies to block NTLM traffic. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or GPO | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not defined| -| Member server effective default settings | Not defined| -| Client computer effective default settings| Not defined| - -## Policy management - -This section describes the features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy through Group Policy takes precedence over the setting on the local device. If the Group Policy setting is set to **Not Configured**, local settings will apply. - -### Auditing - -View the operational event log to see if your server exception list is functioning as intended. Audit and block events are recorded on this device in the operational event log located in **Applications and Services Log\\Microsoft\\Windows\\NTLM**. - -There are no security audit policies that can be configured to view output from this policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -When it has been determined that the NTLM authentication protocol shouldn't be used from a client device to any remote servers because you're required to use a more secure protocol such as Kerberos, there might be some client applications that still use NTLM. If so, and you set [Network Security: -Restrict NTLM: Outgoing NTLM traffic to remote servers](network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md) to any of the deny options, those applications will fail because the outbound NTLM authentication traffic from the client computer will be blocked. - -If you define an exception list of servers to which client devices are allowed to use NTLM authentication, then NTLM authentication traffic will continue to flow between those client applications and servers. The servers then are vulnerable to any malicious attack that takes advantage of security weaknesses in NTLM. - -### Countermeasure - -When you use [Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers](network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md) in audit-only mode, you can determine by reviewing which client applications are making NTLM authentication requests to the remote -servers in your environment. When assessed, you'll have to determine on a case-by-case basis if NTLM authentication still minimally meets your security requirements. If not, the client application has to be upgraded to use something other than NTLM authentication. - -### Potential impact - -Defining a list of servers for this policy setting will enable NTLM authentication traffic from the client application that uses those servers, and this traffic might result in a security vulnerability. - -If this list isn't defined and [Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers](network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md) is enabled, then client applications that use NTLM will fail to authenticate to those servers that they've previously used. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md deleted file mode 100644 index fe6fa9e00a..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md +++ /dev/null @@ -1,108 +0,0 @@ ---- -title: Network security Restrict NTLM Add server exceptions in this domain -description: Best practices, security considerations, and more for the security policy setting, Network security Restrict NTLM Add server exceptions in this domain. -ms.assetid: 2f981b68-6aa7-4dd9-b53d-d88551277cc0 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Restrict NTLM: Add server exceptions in this domain - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add server exceptions in this domain** security policy setting. - -## Reference - -The **Network security: Restrict NTLM: Add server exceptions in this domain** policy setting allows you to create an exception list of servers in this domain to which client devices are allowed to use NTLM pass-through authentication if any of the deny options are set in the [Network Security: Restrict NTLM: NTLM authentication in this domain](network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md) policy setting. - -If you configure this policy setting, you can define a list of servers in this domain to which client devices are allowed to use NTLM authentication. - -If you don't configure this policy setting, no exceptions will be applied, and if **Network Security: Restrict NTLM: NTLM authentication in this domain** is enabled, all NTLM authentication attempts in the domain will fail. - -List the NetBIOS server names as the naming format, one per line. A single asterisk (\*) can be used anywhere in the string as a wildcard character. - -### Possible values - -- User-defined list of servers - - When you enter a list of servers in this domain to which clients are allowed to use NTLM authentication, the policy is defined and enabled. - -- Not defined - - If you don't configure this policy setting by defining a list of servers, the policy is undefined and no exceptions will be applied. - -### Best practices - -1. First enforce the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** policy setting, and then review the operational event log to understand what domain controllers are involved in these authentication attempts so you can decide which servers to exempt. -2. After you have set the server exception list, enforce the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** policy setting, and then review the operational event log again before setting the policies to block NTLM traffic. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or GPO | Default value | -| - | - | -| Default domain policy| Not defined | -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not defined| -| Member server effective default settings | Not defined| -| Client computer effective default settings | Not defined| - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a restart when saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy via Group Policy takes precedence over the setting on the local device. If the Group Policy is set to **Not Configured**, local settings will apply. - -### Auditing - -View the operational event log to see if your server exception list is functioning as intended. Audit and block events are recorded on this computer in the operational event log located in **Applications and Services Log\\Microsoft\\Windows\\NTLM**. - -There are no security audit policies that can be configured to view output from this policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -When it has been determined that the NTLM authentication protocol shouldn't be used within a domain because you're required to use a more secure protocol such as Kerberos, there might be some NTLM authentication traffic that is still present in the domain. If so, and you set Network Security: -[Network Security: Restrict NTLM: NTLM authentication in this domain](network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md) to any of the deny options, any NTLM authentication request will fail because the pass-through member server will block the NTLM request. - -If you define an exception list of servers in this domain to which client computers are allowed to use NTLM pass-through authentication, then NTLM authentication traffic will continue to flow between those servers, which make them vulnerable to any malicious attack that takes advantage of security -weaknesses in NTLM. - -### Countermeasure - -When you use **Network Security: Restrict NTLM: NTLM authentication in this domain** in audit-only mode, you can determine by reviewing which client applications are making NTLM authentication requests to the pass-through authentication servers. When assessed, you'll have to determine on a case-by-case basis if NTLM authentication still minimally meets your security requirements. - -### Potential impact - -Defining a list of servers for this policy setting will enable NTLM authentication traffic between those servers might result in a security vulnerability. - -If this list isn't defined and **Network Security: Restrict NTLM: NTLM authentication in this domain** is enabled, then NTLM authentication will fail on those pass-through servers in the domain that they've previously used - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md deleted file mode 100644 index 23ba1014a2..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md +++ /dev/null @@ -1,112 +0,0 @@ ---- -title: Network security Restrict NTLM Audit incoming NTLM traffic -description: Best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM Audit incoming NTLM traffic. -ms.assetid: 37e380c2-22e1-44cd-9993-e12815b845cf -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Restrict NTLM: Audit incoming NTLM traffic - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit incoming NTLM traffic** security policy setting. - -## Reference - -The **Network Security: Restrict NTLM: Audit incoming NTLM traffic** policy setting allows you to audit incoming NTLM traffic. - -When this audit policy is enabled within Group Policy, it's enforced on any server where that Group Policy is distributed. The events will be recorded in the operational event log located in **Applications and Services Log\\Microsoft\\Windows\\NTLM**. Using an audit event collection system can help you collect the events for analysis more efficiently. - -When you enable this policy on a server, only authentication traffic to that server will be logged. - -When you enable this audit policy, it functions in the same way as the [Network Security: Restrict NTLM: Incoming NTLM traffic](network-security-restrict-ntlm-incoming-ntlm-traffic.md) policy, but it doesn't actually block any traffic. Therefore, you can use it effectively to understand the -authentication traffic in your environment, and when you're ready to block that traffic, you can enable the Network Security: Restrict NTLM: Incoming NTLM traffic policy setting and select **Deny all accounts** or **Deny all domain accounts**. - -### Possible values - -- Disable - - The server on which this policy is set won't log events for incoming NTLM traffic. - -- Enable auditing for domain accounts - - The server on which this policy is set will log events for NTLM pass-through authentication requests only for accounts in the domain that would be blocked when the [Network Security: Restrict NTLM: Incoming NTLM traffic](network-security-restrict-ntlm-incoming-ntlm-traffic.md) policy setting is set to **Deny all domain accounts**. - -- Enable auditing for all accounts - - The server on which this policy is set will log events for all NTLM authentication requests that would be blocked when the [Network Security: Restrict NTLM: Incoming NTLM traffic](network-security-restrict-ntlm-incoming-ntlm-traffic.md) policy setting is set to **Deny all accounts**. - -- Not defined - - This state of not being defined is the same as **Disable**, and it results in no auditing of NTLM traffic. - -### Best practices - -Depending on your environment and the duration of your testing, monitor the log size regularly. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or GPO | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not defined| -| Member server effective default settings | Not defined| -| Client computer effective default settings | Not defined| - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a restart when saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy using Group Policy takes precedence over the setting on the local device. If the Group Policy is set to **Not Configured**, local settings will apply. - -### Auditing - -View the operational event log to see if this policy is functioning as intended. Audit and block events are recorded on this computer in the operational event log located in **Applications and Services Log\\Microsoft\\Windows\\NTLM**. Using an audit event collection system can help you collect the events for analysis more efficiently. - -There are no security audit event policies that can be configured to view output from this policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -NTLM and NTLMv2 authentication is vulnerable to various malicious attacks, including SMB relay, man-in-the-middle attacks, and brute force attacks. Reducing and eliminating NTLM authentication from your environment forces the Windows operating system to use more secure protocols, such as the Kerberos version 5 protocol, or different authentication mechanisms, such as smart cards. - -### Vulnerability - -Enabling this policy setting will reveal through logging which servers and client computers within your network or domain handle NTLM traffic. The identity of these devices can be used in malicious ways if NTLM authentication traffic is compromised. The policy setting doesn't prevent or mitigate any vulnerability because it is for audit purposes only. - -### Countermeasure - -Restrict access to the log files when this policy setting is enabled in your production environment. - -### Potential impact - -If you don't enable or configure this policy setting, no NTLM authentication traffic information will be logged. If you do enable this policy setting, only auditing functions will occur; no security enhancements will be implemented. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md deleted file mode 100644 index 533e169c84..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md +++ /dev/null @@ -1,107 +0,0 @@ ---- -title: Network security Restrict NTLM Audit NTLM authentication in this domain -description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Audit NTLM authentication in this domain. -ms.reviewer: -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Restrict NTLM: Audit NTLM authentication in this domain - -**Applies to** -- Windows Server - -Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting. - -## Reference - -The **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** policy setting allows you to audit on the domain controller NTLM authentication in that domain. - -When you enable this policy setting on the domain controller, only authentication traffic to that domain controller will be logged. - -When you enable this audit policy, it functions in the same way as the **Network Security: Restrict NTLM: NTLM authentication in this domain** policy setting, but it doesn't actually block any traffic. Therefore, you can use it effectively to understand the authentication traffic to your domain controllers and when you're ready to block that traffic, you can enable the **Network Security: Restrict NTLM: NTLM authentication in this domain** policy setting and select **Deny for domain accounts to domain servers**, **Deny for domain servers**, or **Deny for domain accounts**. - -### Possible values - -- **Disable** - - The domain controller on which this policy is set won't log events for incoming NTLM traffic. - -- **Enable for domain accounts to domain servers** - - The domain controller on which this policy is set will log events for NTLM authentication sign-in attempts for accounts in the domain to domain servers when NTLM authentication would be denied because the **Network security: Restrict NTLM: NTLM authentication in this domain** policy setting is set to **Deny for domain accounts to domain servers**. - -- **Enable for domain accounts** - - The domain controller will log events for NTLM authentication sign-in attempts that use domain accounts when NTLM authentication would be denied because the **Network security: Restrict NTLM: NTLM authentication in this domain** policy setting is set to **Deny for domain accounts**. - -- **Enable for domain servers** - - The domain controller will log events for NTLM authentication requests to all servers in the domain when NTLM authentication would be denied because the **Network security: Restrict NTLM: NTLM authentication in this domain** policy setting is set to **Deny for domain servers**. - -- **Enable all** - - The domain controller on which this policy is set will log all events for incoming NTLM traffic. - -### Best practices - -Depending on your environment and the duration of your testing, monitor the operational event log size regularly. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or GPO | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not defined| -| Member server effective default settings | Not defined| -| Client computer effective default settings | Not defined| - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a restart when saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy using Group Policy takes precedence over the setting on the local device. If the Group Policy is set to **Not Configured**, local settings will apply. - -### Auditing - -View the operational event log to see if this policy is functioning as intended. Audit and block events are recorded on this computer in the operational event log located in **Applications and Services Log\\Microsoft\\Windows\\NTLM**. Using an audit event collection system can help you collect the events for analysis more efficiently. - -There are no security audit event policies that can be configured to view output from this policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -NTLM and NTLMv2 authentication is vulnerable to various malicious attacks, including SMB relay, man-in-the-middle attacks, and brute force attacks. Reducing and eliminating NTLM authentication from your environment forces the Windows operating system to use more secure protocols, such as the -Kerberos version 5 protocol, or different authentication mechanisms, such as smart cards. - -### Vulnerability - -Enabling this policy setting will reveal through logging which devices within your network or domain handle NTLM traffic. The identity of these devices can be used in malicious ways if NTLM authentication traffic is compromised. The policy setting doesn't prevent or mitigate any vulnerability because it is for audit purposes only. -### Countermeasure - -Restrict access to the log files when this policy setting is enabled in your production environment. - -### Potential impact - -If you don't enable or configure this policy setting, no NTLM authentication traffic information will be logged. If you do enable this policy setting, only auditing functions will occur; no security enhancements will be implemented. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md deleted file mode 100644 index 9432404d9c..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md +++ /dev/null @@ -1,107 +0,0 @@ ---- -title: Network security Restrict NTLM Incoming NTLM traffic -description: Best practices, security considerations, and more for the security policy setting, Network Security Restrict NTLM Incoming NTLM traffic. -ms.assetid: c0eff7d3-ed59-4004-908a-2205295fefb8 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Network security: Restrict NTLM: Incoming NTLM traffic - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Incoming NTLM traffic** security policy setting. - -## Reference - -The **Network Security: Restrict NTLM: Incoming NTLM traffic** policy setting allows you to deny or allow incoming NTLM traffic from client computers, other member servers, or a domain controller. - -### Possible values - -- **Allow all** - - The server will allow all NTLM authentication requests. - -- **Deny all domain accounts** - - The server will deny NTLM authentication requests for domain sign in, return an NTLM blocked error message to the client device, and log the error, but the server will allow local account sign in. - - -- **Deny all accounts** - - The server will deny NTLM authentication requests from all incoming traffic (whether domain account sign in or local account sign in), return an NTLM blocked error message to the client device, and log the error. - -- Not defined - - This state of not being defined is the same as **Allow all**, and the server will allow all NTLM authentication requests. - -### Best practices - -If you select **Deny all domain accounts** or **Deny all accounts**, incoming NTLM traffic to the member server will be restricted. It's better to set the **Network Security: Restrict NTLM: Audit Incoming NTLM traffic** policy setting and then review the Operational log to understand what authentication attempts are made to the member servers, and then what client applications are using NTLM. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or GPO | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined | -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not defined| -| Member server effective default settings | Not defined| -| Client computer effective default settings | Not defined| - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a restart when saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy using Group Policy takes precedence over the setting on the local device. If the Group Policy is set to **Not Configured**, local settings will apply. - -### Auditing - -View the operational event log to see if this policy is functioning as intended. Audit and block events are recorded on this computer in the operational event log located in **Applications and Services Log\\Microsoft\\Windows\\NTLM**. - -There are no Security Audit Event policies that can be configured to view event output from this policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -NTLM and NTLMv2 authentication is vulnerable to various malicious attacks, including SMB replay, man-in-the-middle attacks, and brute force attacks. Reducing and eliminating NTLM authentication from your environment forces the Windows operating system to use more secure protocols, such as the Kerberos version 5 protocol, or different authentication mechanisms, such as smart cards. - -### Vulnerability - -Malicious attacks on NTLM authentication traffic that result in a compromised server can occur only if the server handles NTLM requests. If those requests are denied, brute force attacks on NTLM are eliminated. - -### Countermeasure - -When it has been determined that the NTLM authentication protocol shouldn't be used within a network because you're required to use a more secure protocol such as Kerberos, you can select one of several options that this security policy setting offers to restrict NTLM usage. - -### Potential impact - -If you configure this policy setting, numerous NTLM authentication requests could fail within your network, which could degrade productivity. Before implementing this change through this policy setting, set **Network security: Restrict NTLM: Audit Incoming NTLM traffic** to the same option so that -you can review the log for the potential impact, perform an analysis of servers, and create an exception list of servers to exclude from this policy setting [Network security: Restrict NTLM: Add server exceptions in this domain](network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md). - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md deleted file mode 100644 index 039bfedb88..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md +++ /dev/null @@ -1,110 +0,0 @@ ---- -title: Network security Restrict NTLM in this domain -description: Learn about best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM NTLM authentication in this domain. -ms.reviewer: -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.topic: reference -ms.date: 12/31/2017 ---- - -# Network security: Restrict NTLM: NTLM authentication in this domain - -**Applies to** -- Windows Server - -Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting. - -## Reference - -The **Network Security: Restrict NTLM: NTLM authentication in this domain** policy setting allows you to deny or allow NTLM authentication within a domain from this domain controller. This policy setting doesn't affect interactive logon to this domain controller. - -### Possible values - -- **Disable** - - The domain controller will allow all NTLM pass-through authentication requests within the domain. - -- **Deny for domain accounts to domain servers** - - The domain controller will deny all NTLM authentication sign-in attempts using accounts from this domain to all servers in the domain. The NTLM authentication attempts will be blocked and will return an NTLM blocked error unless the server name is on the exception list in the **Network security: Restrict NTLM: Add server exceptions in this domain** policy setting. - - NTLM can be used if the users are connecting to other domains, depending on whether any Restrict NTLM policies have been set on those domains. - -- **Deny for domain accounts** - - Only the domain controller will deny all NTLM authentication sign-in attempts from domain accounts and will return an NTLM blocked error unless the server name is on the exception list in the **Network security: Restrict NTLM: Add server exceptions in this domain** policy setting. - -- **Deny for domain servers** - - The domain controller will deny NTLM authentication requests to all servers in the domain and will return an NTLM blocked error unless the server name is on the exception list in the **Network security: Restrict NTLM: Add server exceptions in this domain** policy setting. Servers that aren't joined to the domain won't be affected if this policy setting is configured. - -- **Deny all** - - The domain controller will deny all NTLM pass-through authentication requests from its servers and for its accounts and return an NTLM blocked error unless the server name is on the exception list in the **Network security: Restrict NTLM: Add server exceptions in this domain** policy setting. - -- Not defined - - The domain controller will allow all NTLM authentication requests in the domain where the policy is deployed. - -### Best practices - -If you select any of the deny options, incoming NTLM traffic to the domain will be restricted. First, set the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** policy setting, and then review the Operational log to understand what authentication attempts are made to the member servers. You can then add those member server names to a server exception list by using the [Network security: Restrict NTLM: Add server exceptions in this domain](network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md) policy setting. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or GPO | Default value | -| - | - | -| Default domain policy| Not configured| -| Default domain controller policy | Not configured| -| Stand-alone server default settings | Not configured| -| Domain controller effective default settings | Not configured| -| Member server effective default settings | Not configured | -| Client computer effective default settings | Not configured| - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a restart when saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy using Group Policy takes precedence over the setting on the local device. If the Group Policy is set to **Not Configured**, local settings will apply. The policy is applicable to domain controllers only. - -### Auditing - -View the operational event log to see if this policy is functioning as intended. Audit and block events are recorded on this computer in the operational event log located in **Applications and Services Log\\Microsoft\\Windows\\NTLM**. - -There are no security audit event policies that can be configured to view output from this policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -NTLM and NTLMv2 authentication is vulnerable to various malicious attacks, including SMB replay, man-in-the-middle attacks, and brute force attacks. Reducing and eliminating NTLM authentication from your environment forces the Windows operating system to use more secure protocols, such as the Kerberos version 5 protocol, or different authentication mechanisms, such as smart cards. - -### Vulnerability - -Malicious attacks on NTLM authentication traffic resulting in a compromised server or domain controller can occur only if the server or domain controller handles NTLM requests. If those requests are denied, this attack vector is eliminated. - -### Countermeasure - -When it has been determined that the NTLM authentication protocol shouldn't be used within a network because you're required to use a more secure protocol such as the Kerberos protocol, then you can select one of several options that this security policy setting offers to restrict NTLM usage -within the domain. - -### Potential impact - -If you configure this policy setting, numerous NTLM authentication requests could fail within the domain, which could degrade productivity. Before implementing this change through this policy setting, set **Network security: Restrict NTLM: Audit NTLM authentication in this domain** to the same option so that you can review the log for the potential impact, perform an analysis of servers, and create an exception list of servers to exclude from this policy setting by using [Network security: Restrict NTLM: Add server exceptions in this domain](network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md). - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md b/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md deleted file mode 100644 index fe152c8d75..0000000000 --- a/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md +++ /dev/null @@ -1,112 +0,0 @@ ---- -title: Network security Restrict NTLM Outgoing traffic -description: Learn about best practices, security considerations and more for the policy setting, Network Security Restrict NTLM Outgoing NTLM traffic to remote servers. -ms.assetid: 63437a90-764b-4f06-aed8-a4a26cf81bd1 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 06/15/2022 ---- - -# Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** security policy setting. - - -> [!NOTE] -> For more information about configuring a server to be accessed remotely, see [Remote Desktop - Allow access to your PC](/windows-server/remote/remote-desktop-services/clients/remote-desktop-allow-access). - -## Reference - -The **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** policy setting allows you to deny or audit outgoing NTLM traffic from a computer running Windows 7, Windows Server 2008, or later to any remote server running the Windows operating system. - ->**Warning:**  Modifying this policy setting may affect compatibility with client computers, services, and applications. - -### Possible values - -- **Allow all** - - The device can authenticate identities to a remote server by using NTLM authentication because no restrictions exist. - -- **Audit all** - - The device that sends the NTLM authentication request to a remote server logs an event for each request. This event allows you to identify those servers that receive NTLM authentication requests from the client device. - -- **Deny all** - - The device can't authenticate any identities to a remote server by using NTLM authentication. You can use the [Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication](network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md) policy setting to define a list of remote servers to which client devices are allowed to use NTLM authentication while denying others. This setting will also log an event on the device that is making the authentication request. - -- Not defined - - This state of being not defined is the same as **Allow all**, and the device will allow all NTLM authentication requests when the policy is deployed. - -### Best practices - -If you select **Deny all**, the client device can't authenticate identities to a remote server by using NTLM authentication. First, select **Audit all** and then review the operational event log to understand which servers are involved in these authentication attempts. You can then add those server names to a server exception list by using the [Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication](network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md) policy setting. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -| Server type or GPO | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not defined| -| Domain controller effective default settings | Not defined| -| Member server effective default settings | Not defined| -| Client computer effective default settings | Not defined| - -## Policy management - -This section describes different features and tools available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a restart when saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy using Group Policy takes precedence over the setting on the local device. If the Group Policy is set to **Not Configured**, local settings will apply. - -### Auditing - -View the operational event log to see if this policy is functioning as intended. Audit and block events are recorded on this computer in the operational event log located in **Applications and Services Log\\Microsoft\\Windows\\NTLM**. - -There are no security audit event policies that can be configured to view event output from this policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -NTLM and NTLMv2 authentication is vulnerable to various malicious attacks, including SMB relay, man-in-the-middle attacks, and brute force attacks. Reducing and eliminating NTLM authentication from your environment forces the Windows operating system to use more secure protocols, such as the Kerberos version 5 protocol, or different authentication mechanisms, such as smart cards. - -### Vulnerability - -Malicious attacks on NTLM authentication traffic that result in a compromised server or domain controller can occur only if the server or domain controller handles NTLM requests. If those requests are denied, this attack vector is eliminated. - -### Countermeasure - -When it has been determined that the NTLM authentication protocol shouldn't be used within a network because you're required to use a more secure protocol such as Kerberos, then you can select from several options to restrict NTLM usage to servers. - -### Potential impact - -If you configure this policy setting to deny all requests, numerous NTLM authentication requests to remote servers could fail, which could degrade productivity. Before implementing this restriction through this policy setting, select **Audit all** so that you can review the log for the potential impact, perform an analysis of servers, and create an exception list of servers to exclude from this policy setting by using [Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication](network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md) -. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md b/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md deleted file mode 100644 index a00661af55..0000000000 --- a/windows/security/threat-protection/security-policy-settings/password-must-meet-complexity-requirements.md +++ /dev/null @@ -1,116 +0,0 @@ ---- -title: Password must meet complexity requirements -description: Describes the best practices, location, values, and security considerations for the Password must meet complexity requirements security policy setting. -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 06/07/2023 ---- - - # Password must meet complexity requirements - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Password must meet complexity requirements** security policy setting. - -## Reference - -The **Passwords must meet complexity requirements** policy setting determines whether passwords must meet a series of strong-password guidelines. When enabled, this setting requires passwords to meet the following requirements: - -1. Passwords may not contain the user's samAccountName (Account Name) value or entire displayName (Full Name value). Neither of these checks is case-sensitive. - - The samAccountName is checked in its entirety only to determine whether it's part of the password. If the samAccountName is fewer than three characters long, this check is skipped. The displayName is parsed for delimiters: commas, periods, dashes or hyphens, underscores, spaces, pound signs, and tabs. If any of these delimiters are found, the displayName is split and all parsed sections (tokens) are confirmed not to be included in the password. Tokens that are shorter than three characters are ignored, and substrings of the tokens aren't checked. For example, the name "Erin M. Hagens" is split into three tokens: "Erin", "M", and "Hagens". Because the second token is only one character long, it's ignored. So, this user couldn't have a password that included either "erin" or "hagens" as a substring anywhere in the password. - -2. The password contains characters from three of the following categories: - - - Uppercase letters of European languages (A through Z, with diacritic marks, Greek and Cyrillic characters). - - - Lowercase letters of European languages (a through z, sharp-s, with diacritic marks, Greek and Cyrillic characters). - - - Base 10 digits (0 through 9). - - - Non-alphanumeric characters (special characters): - - ``` - '-!"#$%&()*,./:;?@[]^_`{|}~+<=> - ``` - - Currency symbols such as the Euro or British Pound aren't counted as special characters for this policy setting. - - - Any Unicode character that's categorized as an alphabetic character but isn't uppercase or lowercase. This group includes Unicode characters from Asian languages. - -Complexity requirements are enforced when passwords are changed or created. - -The rules that are included in the Windows Server password complexity requirements are part of `Passfilt.dll`, and they can't be directly modified. - -When enabled, the default Passfilt.dll may cause some more Help Desk calls for locked-out accounts, because users are used to passwords that contain only characters that are in the alphabet. But this policy setting is liberal enough that all users should get used to it. - -Other settings that can be included in a custom `Passfilt.dll` are the use of non-upper-row characters. To type upper-row characters, you hold the SHIFT key and press one of any of the keys on the number row of the keyboard (from 1 through 9 and 0). - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -> [!TIP] -> For the latest best practices, see [Password Guidance](https://www.microsoft.com/research/publication/password-guidance). - -Set **Passwords must meet complexity requirements** to Enabled. This policy setting, combined with a minimum password length of 8, ensures that there are at least 159,238,157,238,528 different possibilities for a single password. This setting makes a brute force attack difficult, but still not impossible. - -The use of ALT key character combinations may greatly enhance the complexity of a password. However, requiring all users in an organization to adhere to such stringent password requirements might result in unhappy users and an over-worked Help Desk. Consider implementing a requirement in your organization to use ALT characters in the range from 0128 through 0159 as part of all administrator passwords. (ALT characters outside of that range can represent standard alphanumeric characters that don't add more complexity to the password.) - -Short passwords that contain only alphanumeric characters are easy to compromise by using publicly available tools. To prevent this vulnerability, passwords should contain other characters and/or meet complexity requirements. - -### Location - -`Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy` - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy's property page. - -| Server type or Group Policy Object (GPO) | Default value | -|----------------------------------------------------|---------------| -| Default domain policy | Enabled | -| Default domain controller policy | Enabled | -| Stand-alone server default settings | Disabled | -| Domain controller effective default settings | Enabled | -| Member server effective default settings | Enabled | -| Effective GPO default settings on client computers | Disabled | - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Passwords that contain only alphanumeric characters are easy to discover with several publicly available tools. - -### Countermeasure - -Configure the **Passwords must meet complexity requirements** policy setting to _Enabled_ and advise users to use various characters in their passwords. - -When combined with a [Minimum password length](minimum-password-length.md) of 8, this policy setting ensures that the number of different possibilities for a single password is so great that it's difficult (but possible) for a brute force attack to succeed. (If the Minimum password length policy setting is increased, the average amount of time necessary for a successful attack also increases.) - -### Potential impact - -If the default configuration for password complexity is kept, more Help Desk calls for locked-out accounts could occur because users might not be used to passwords that contain non-alphabetical characters, or they might have problems entering passwords that contain accented characters or symbols on keyboards with different layouts. However, all users should be able to follow the complexity requirement with minimal difficulty. - -If your organization has more stringent security requirements, you can create a custom version of the `Passfilt.dll` file that allows the use of arbitrarily complex password strength rules. For example, a custom password filter might require the use of non-upper-row symbols. (Upper-row symbols are those symbols that require you to press and hold the SHIFT key and then press any of the keys on the number row of the keyboard, from 1 through 9 and 0.) A custom password filter might also perform a dictionary check to verify that the proposed password doesn't contain common dictionary words or fragments. - -The use of ALT key character combinations may greatly enhance the complexity of a password. However, such stringent password requirements might result in more Help Desk requests. Alternatively, your organization could consider a requirement for all administrator passwords to use ALT characters in the 0128-0159 range. (ALT characters outside of this range can represent standard alphanumeric characters that wouldn't add more complexity to the password.) - -## Related articles - -- [Password Policy](/microsoft-365/admin/misc/password-policy-recommendations) - diff --git a/windows/security/threat-protection/security-policy-settings/password-policy.md b/windows/security/threat-protection/security-policy-settings/password-policy.md deleted file mode 100644 index c9050c5e21..0000000000 --- a/windows/security/threat-protection/security-policy-settings/password-policy.md +++ /dev/null @@ -1,61 +0,0 @@ ---- -title: Password Policy -description: An overview of password policies for Windows and links to information for each policy setting. -ms.assetid: aec1220d-a875-4575-9050-f02f9c54a3b6 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Password Policy - -**Applies to** -- Windows 11 -- Windows 10 - -An overview of password policies for Windows and links to information for each policy setting. - -In many operating systems, the most common method to authenticate a user's identity is to use a secret passphrase or password. A secure network environment requires all users to use strong passwords, which have at least eight characters and include a combination of letters, numbers, and symbols. These passwords help prevent the compromise of user accounts and administrative accounts by unauthorized users who use manual methods or automated tools to guess weak passwords. Strong passwords that are changed regularly reduce the likelihood of a successful password attack. - -Introduced in Windows Server 2008 R2 and Windows Server 2008, Windows supports fine-grained password policies. This feature provides organizations with a way to define different password and account lockout policies for different sets of users in a domain. Fine-grained password policies apply only to user objects (or inetOrgPerson objects if they are used instead of user objects) and global security groups. For more details, see [AD DS Fine-Grained Password and Account Lockout Policy Step-by-Step Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc770842(v=ws.10)). - -To apply a fine-grained password policy to users of an OU, you can use a shadow group. A shadow group is a global security group that is logically mapped to an OU to enforce a fine-grained password policy. You add users of the OU as members of the newly created shadow group and then apply the fine-grained password policy to this shadow group. You can create additional shadow groups for other OUs as needed. If you move a user from one OU to another, you must update the membership of the corresponding shadow groups. - -Fine-grained password policies include attributes for all the settings that can be defined in the default domain policy (except Kerberos settings) in addition to account lockout settings. When you specify a fine-grained password policy, you must specify all of these settings. By default, only members of the Domain Admins group can set fine-grained password policies. However, you can also delegate the ability to set these policies to other users. The domain must be running at least Windows Server 2008 R2 or Windows Server 2008 to use fine-grained password policies. Fine-grained password policies cannot be applied to an organizational unit (OU) directly. - -You can enforce the use of strong passwords through an appropriate password policy. There are password policy settings that control the complexity and lifetime of passwords, such as the **Passwords must meet complexity requirements** policy setting. - -You can configure the password policy settings in the following location by using the Group Policy Management Console: - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy** - -This group policy is applied on the domain level. If individual groups require distinct password policies, consider using fine-grained password policies, as described above. - -The following topics provide a discussion of password policy implementation and best practices considerations, policy location, default values for the server type or GPO, relevant differences in operating system versions, security considerations (including the possible vulnerabilities of each setting), countermeasures that you can take, and the potential impact for each setting. - -## In this section - -| Topic | Description | -| - | - | -| [Enforce password history](enforce-password-history.md)| Describes the best practices, location, values, policy management, and security considerations for the **Enforce password history** security policy setting.| -| [Maximum password age](maximum-password-age.md) | Describes the best practices, location, values, policy management, and security considerations for the **Maximum password age** security policy setting.| -| [Minimum password age](minimum-password-age.md) | Describes the best practices, location, values, policy management, and security considerations for the **Minimum password age** security policy setting.| -| [Minimum password length](minimum-password-length.md) | Describes the best practices, location, values, policy management, and security considerations for the **Minimum password length** security policy setting.| -| [Password must meet complexity requirements](password-must-meet-complexity-requirements.md) | Describes the best practices, location, values, and security considerations for the **Password must meet complexity requirements** security policy setting.| -| [Store passwords using reversible encryption](store-passwords-using-reversible-encryption.md) | Describes the best practices, location, values, and security considerations for the **Store passwords using reversible encryption** security policy setting.| - -## Related topics - -- [Configure security policy settings](how-to-configure-security-policy-settings.md) - diff --git a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md b/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md deleted file mode 100644 index 5f1bb7b6cd..0000000000 --- a/windows/security/threat-protection/security-policy-settings/perform-volume-maintenance-tasks.md +++ /dev/null @@ -1,99 +0,0 @@ ---- -title: Perform volume maintenance tasks -description: Describes the best practices, location, values, policy management, and security considerations for the Perform volume maintenance tasks security policy setting. -ms.assetid: b6990813-3898-43e2-8221-c9c06d893244 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Perform volume maintenance tasks - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Perform volume maintenance tasks** security policy setting. - -## Reference - -This policy setting determines which users can perform volume or disk management tasks, such as defragmenting an existing volume, creating or removing volumes, and running the Disk Cleanup tool. - -Use caution when assigning this user right. Users with this user right can explore disks and extend files in to memory that contains other data. When the extended files are opened, the user might be able to read and modify the acquired data. - -Constant: SeManageVolumePrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- Ensure that only the local Administrators group is assigned the **Perform volume maintenance tasks** user right. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Administrators on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Administrators| -| Stand-Alone Server Default Settings | Administrators| -| DC Effective Default Settings | Administrators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings | Administrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -A user who is assigned the **Perform volume maintenance tasks** user right could delete a volume, which could result in the loss of data or a denial-of- service condition. Also, disk maintenance tasks can be used to modify data on the disk, such as user rights assignments that might lead to escalation of privileges. - -### Countermeasure - -Ensure that only the local Administrators group is assigned the **Perform volume maintenance tasks** user right. - -### Potential impact - -None. Restricting the **Perform volume maintenance tasks** user right to the local Administrators group is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/profile-single-process.md b/windows/security/threat-protection/security-policy-settings/profile-single-process.md deleted file mode 100644 index 565b612a6f..0000000000 --- a/windows/security/threat-protection/security-policy-settings/profile-single-process.md +++ /dev/null @@ -1,98 +0,0 @@ ---- -title: Profile single process -description: Describes the best practices, location, values, policy management, and security considerations for the Profile single process security policy setting. -ms.assetid: c0963de4-4f5e-430e-bfcd-dfd68e66a075 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Profile single process - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Profile single process** security policy setting. - -## Reference - -This policy setting determines which users can view a sample performance of an application process. Typically, you don't need this user right to use the performance reporting tools included in the operating system. However, you do need this user right if the system’s monitor components are configured to collect data through Windows Management Instrumentation (WMI). - -Constant: SeProfileSingleProcessPrivilege - -### Possible values - -- User-defined list of accounts -- Administrators -- Not Defined - -### Best practices - -- This right shouldn't be granted to individual users. It should be granted only for trusted applications that monitor other programs. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Administrators on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Administrators| -| Stand-Alone Server Default Settings | Administrators| -| Domain Controller Effective Default Settings | Administrators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings| Administrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object, which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The **Profile single process** user right presents a moderate vulnerability. Attackers with this user right could monitor a computer's performance to help identify critical processes that they might want to attack directly. Attackers may be able to determine what processes run on the computer so that they could identify countermeasures that they may need to avoid, such as anti-virus software or an intrusion-detection system. They could also identify other users who are signed in to a computer. - -### Countermeasure - -Ensure that only the local Administrators group is assigned the **Profile single process** user right. - -### Potential impact - -If you remove the **Profile single process** user right from the Power Users group or other accounts, you could limit the abilities of users who are assigned to specific administrative roles in your environment. You should ensure that delegated tasks aren't negatively affected. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md b/windows/security/threat-protection/security-policy-settings/profile-system-performance.md deleted file mode 100644 index f0af56ab38..0000000000 --- a/windows/security/threat-protection/security-policy-settings/profile-system-performance.md +++ /dev/null @@ -1,100 +0,0 @@ ---- -title: Profile system performance -description: Best practices, location, values, policy management, and security considerations for the security policy setting, Profile system performance. -ms.assetid: ffabc3c5-9206-4105-94ea-84f597a54b2e -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Profile system performance - -**Applies to** -- Windows 11 -- Windows 10 - -This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for the **Profile system performance** security policy setting. - -## Reference - -This security setting determines which users can use Windows performance monitoring tools to monitor the performance of system processes. - -Constant: SeSystemProfilePrivilege - -### Possible values - -- User-defined list of accounts -- Administrators -- Not defined - -### Best practices - -- Ensure that only the local Administrators group is assigned the **Profile system performance** user right. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, this setting is Administrators and NT SERVICE\WdiServiceHost on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Administrators| -| Stand-Alone Server Default Settings | Administrators| -| Domain Controller Effective Default Settings | Administrators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings | Administrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -Depending on your version of Windows and your environment, you might need to add this user right to the Local System account or the Local Service account if you encounter access errors when you use the Administrators account. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The **Profile system performance** user right poses a moderate vulnerability. Attackers with this user right could monitor a computer's performance to help identify critical processes that they might want to attack directly. Attackers might also be able to determine what processes are active on the computer so that they could identify countermeasures to avoid, such as anti-virus software or an intrusion detection system. - -### Countermeasure - -Ensure that only the local Administrators group is assigned the **Profile system performance** user right. - -### Potential impact - -None. Restricting the **Profile system performance** user right to the local Administrators group is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md deleted file mode 100644 index 55d2e7660d..0000000000 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-automatic-administrative-logon.md +++ /dev/null @@ -1,101 +0,0 @@ ---- -title: Recovery console Allow automatic administrative logon -description: Best practices, location, values, policy management, and security considerations for the policy setting, Recovery console Allow automatic administrative logon. -ms.assetid: be2498fc-48f4-43f3-ad09-74664e45e596 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Recovery console: Allow automatic administrative logon - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow automatic administrative logon** security policy setting. - -## Reference - -This policy setting determines whether the built-in Administrator account password must be provided before access to the device is granted. If you enable this setting, the built-in Administrator account is automatically logged on to the computer at the Recovery Console; no password is required. - -The Recovery Console can be useful when troubleshooting and repairing systems that can't be restarted. However, enabling this policy setting so a user can automatically sign in to the console is dangerous. Anyone can walk up to the server, shut it down by disconnecting the power, reboot it, select **Recovery Console** from the **Restart** menu, and then assume full control of the server. - -### Possible values - -- Enabled - - The built-in Administrator account is automatically logged on to the computer at the Recovery Console; no password is required - -- Disabled - - Automatic administrative logon isn't allowed. - -- Not defined - - Automatic administrative logon isn't allowed. - -### Best practices - -- Set **Recovery Console: Allow automatic administrative logon** to **Disabled**. This setting requires a user to enter a user name and password to access the Recovery Console account. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy| Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy using Group Policy takes precedence over the setting on the local device - -### Policy conflicts - -None. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The Recovery Console can be useful when you must troubleshoot and repair devices that don't start. However, allowing automatic logon to the Recovery Console can make it possible for someone to assume full control of the server. - -### Countermeasure - -Disable the **Recovery console: Allow automatic administrative logon** setting. - -### Potential impact - -Users must enter a user name and password to access the Recovery Console. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md b/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md deleted file mode 100644 index 10304c2de7..0000000000 --- a/windows/security/threat-protection/security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md +++ /dev/null @@ -1,107 +0,0 @@ ---- -title: Recovery console Allow floppy copy and access to all drives and folders -description: Best practices, security considerations, and more for the policy setting, Recovery console Allow floppy copy and access to all drives and folders. -ms.assetid: a5b4ac0c-f33d-42b5-a866-72afa7cbd0bd -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Recovery console: Allow floppy copy and access to all drives and folders - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Recovery console: Allow floppy copy and access to all drives and folders** security policy setting. - -## Reference - -This policy setting enables or disables the Recovery Console SET command, which allows you to set the following Recovery Console environment variables. - -- **AllowWildCards**. Enables wildcard support for some commands, such as the DEL command. -- **AllowAllPaths**. Allows access to all files and folders on the device. -- **AllowRemovableMedia**. Allows files to be copied to removable media, such as a floppy disk. -- **NoCopyPrompt**. Suppresses the prompt that typically displays before an existing file is overwritten. - -You might forget to remove removable media, such as CD or floppy disk, with sensitive data or applications that a malicious user could then steal. Or you could accidentally leave a startup disk in the computer after using the Recovery Console. If the device is restarted for any reason and the BIOS has been configured to boot from the removable media before the hard disk drive, the server will start from the removable disk. This boot causes the server's network services to be unavailable. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Set **Recovery Console: Allow floppy copy and access to drives and folders** to **Disabled**. Users who have started a server by using the Recovery Console and logged in with the built-in Administrator account won't be able to copy files and folders to a floppy disk. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy using Group Policy takes precedence over the setting on the local device. - -### Policy conflicts - -None. - -### Command-line tools - -Enabling this security option makes the Recovery Console SET command available, which allows you to set the following Recovery Console environment variables: - -- AllowWildCards: Enable wildcard support for some commands (such as the DEL command). -- AllowAllPaths: Allow access to all files and folders on the device. -- AllowRemovableMedia: Allow files to be copied to removable media, such as a floppy disk. -- NoCopyPrompt: Don't prompt when overwriting an existing file. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An attacker who can cause the system to restart into the Recovery Console could steal sensitive data and leave no audit or access trail. - -### Countermeasure - -Disable the **Recovery console: Allow floppy copy and access to drives and folders** setting. - -### Potential impact - -Users who have started a server through the Recovery Console and logged in with the built-in Administrator account can't copy files and folders to a floppy disk. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md b/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md deleted file mode 100644 index d7f19e7b40..0000000000 --- a/windows/security/threat-protection/security-policy-settings/remove-computer-from-docking-station.md +++ /dev/null @@ -1,104 +0,0 @@ ---- -title: Remove computer from docking station - security policy setting -description: Describes the best practices, location, values, policy management, and security considerations for the Remove computer from docking station security policy setting. -ms.assetid: 229a385a-a862-4973-899a-413b1b5b6c30 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Remove computer from docking station - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Remove computer from docking station** security policy setting. - -## Reference - -This security setting determines whether a user can undock a portable device from its docking station without logging on. This policy setting only affects scenarios that involve a portable computer and its docking station. - -If this user right is assigned to the user’s account (or if the user is a member of the assigned group), the user must sign in before removing the portable device from its docking station. Otherwise, as a security measure, the user won't be able to sign in after the device is removed from the docking station. If this policy isn't assigned, the user may remove the portable device from its docking station without signing in, and then have the ability to start and sign in to the device afterwards in its undocked state. - -Constant: SeUndockPrivilege - -### Possible values - -- User-defined list of accounts -- Not Defined - -### Best practices - -- Assign this user right to only those accounts that are permitted to use the portable device. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -Although this portable device scenario doesn't normally apply to servers, by default this setting is Administrators on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Administrators| -| Stand-Alone Server Default Settings | Administrators| -| Domain Controller Effective Default Settings | Administrators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings | Administrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Anyone who has the **Remove computer from docking station** user right can sign in and then remove a portable device from its docking station. If this setting isn't defined, it has the same effect as if everyone was granted this right. However, the value of implementing this countermeasure is reduced by the following factors: - -- If attackers can restart the device, they could remove it from the docking station after the BIOS starts but before the operating system starts. -- This setting doesn't affect servers because they typically aren't installed in docking stations. -- An attacker could steal the device and the docking station together. -- Devices that can be mechanically undocked can be physically removed by the user whether or not they use the Windows undocking functionality. - -### Countermeasure - -Ensure that only the local Administrators group and the user account to which the device is allocated are assigned the **Remove computer from docking station** user right. - -### Potential impact - -By default, only members of the local Administrators group are granted this right. Other user accounts must be explicitly granted this user right as necessary. If your organization's users aren't members of the local Administrators groups on their portable devices, they can't remove their portable devices from their docking stations if they don't first shut down the device. Therefore, you may want to assign the **Remove computer from docking station** privilege to the local Users group for portable devices. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md b/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md deleted file mode 100644 index 139239d715..0000000000 --- a/windows/security/threat-protection/security-policy-settings/replace-a-process-level-token.md +++ /dev/null @@ -1,102 +0,0 @@ ---- -title: Replace a process level token -description: Describes the best practices, location, values, policy management, and security considerations for the Replace a process level token security policy setting. -ms.assetid: 5add02db-6339-489e-ba21-ccc3ccbe8745 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Replace a process level token - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Replace a process level token** security policy setting. - -## Reference - -This policy setting determines which parent processes can replace the access token that is associated with a child process. - -Specifically, the **Replace a process level token** setting determines which user accounts can call the CreateProcessAsUser() application programming interface (API) so that one service can start another. An example of a process that uses this user right is Task Scheduler, where the user right is extended to any processes that can be managed by Task Scheduler. - -An access token is an object that describes the security context of a process or thread. The information in a token includes the identity and privileges of the user account that is associated with the process or thread. With this user right, every child process that runs on behalf of this user account would have its access token replaced with the process level token. - -Constant: SeAssignPrimaryTokenPrivilege - -### Possible values - -- User-defined list of accounts -- Defaults -- Not defined - -### Best practices - -- For member servers, ensure that only the Local Service and Network Service accounts have the **Replace a process level token** user right. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Network Service and Local Service on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Network Service
    Local Service | -| Stand-Alone Server Default Settings | Network Service
    Local Service| -| Domain Controller Effective Default Settings | Network Service
    Local Service| -| Member Server Effective Default Settings | Network Service
    Local Service| -| Client Computer Effective Default Settings | Network Service
    Local Service| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users with the **Replace a process level token** user right can start processes as another user if they know the user’s credentials. - -### Countermeasure - -For member servers, ensure that only the Local Service and Network Service accounts have the **Replace a process level token** user right. - -### Potential impact - -On most computers, restricting the **Replace a process level token** user right to the Local Service and the Network Service built-in accounts is the default configuration, and there is no negative impact. However, if you have installed optional components such as ASP.NET or IIS, you may need to assign the **Replace a process level token** user right to additional accounts. For example, IIS requires that the Service, Network Service, and IWAM\_*<ComputerName>* accounts be explicitly granted this user right. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md b/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md deleted file mode 100644 index 83a1004c87..0000000000 --- a/windows/security/threat-protection/security-policy-settings/reset-account-lockout-counter-after.md +++ /dev/null @@ -1,78 +0,0 @@ ---- -title: Reset account lockout counter after -description: Describes the best practices, location, values, and security considerations for the Reset account lockout counter after security policy setting. -ms.assetid: d5ccf6dd-5ba7-44a9-8e0b-c478d8b1442c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 11/02/2018 ---- - -# Reset account lockout counter after - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Reset account lockout counter after** security policy setting. - -## Reference - -The **Reset account lockout counter after** policy setting determines the number of minutes that must elapse from the time a user fails to sign in before the failed sign-in attempt counter is reset to 0. If [Account lockout threshold](account-lockout-threshold.md) is set to a number greater than zero, this reset time must be less than or equal to the value of [Account lockout duration](account-lockout-duration.md). - -The disadvantage of a high setting is that users lock themselves out for an inconveniently long period if they exceed the account lockout threshold through sign-in errors. Users may make excessive Help Desk calls. - -### Possible values - -- A user-defined number of minutes from 1 through 99,999 -- Not defined - -### Best practices - -Determine the threat level for your organization and balance that against the cost of your Help Desk support for password resets. Each organization will have specific requirements. - -[Windows security baselines](../../operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines.md) recommend configuring the **Reset account lockout counter after** policy setting to 15, but as with other account lockout settings, this value is more of a guideline than a rule or best practice because there's no "one size fits all." For more information, see [Configuring Account Lockout](/archive/blogs/secguide/configuring-account-lockout). - -### Location - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Account Lockout Policy** - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy| Not defined| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | Not applicable| -| Domain controller effective default settings | Not defined| -| Member server effective default settings | Not defined| -| Client computer effective default settings | Not applicable| - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users can accidentally lock themselves out of their accounts if they mistype their password multiple times. - -### Countermeasure - -[Windows security baselines](../../operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines.md) recommend configuring the **Reset account lockout counter after** policy setting to 15. - -### Potential impact - -If you don't configure this policy setting or if the value is configured to an interval that is too long, an attacker could attempt to sign in to each user's account numerous times and lock out their accounts, a denial-of-service (DoS) attack might succeed, or administrators might have to manually unlock all locked-out accounts. If you configure this policy setting to a reasonable value, users can perform new attempts to sign in after a failed sign in within a reasonable time, without making brute force attacks feasible at high speeds. Be sure that you notify users of the values that are used for this policy setting so that they wait for the lockout timer to expire before they call the Help Desk. - -## Related topics - -- [Account Lockout Policy](account-lockout-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md b/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md deleted file mode 100644 index 85b208bd22..0000000000 --- a/windows/security/threat-protection/security-policy-settings/restore-files-and-directories.md +++ /dev/null @@ -1,105 +0,0 @@ ---- -title: Restore files and directories - security policy setting -description: Describes the best practices, location, values, policy management, and security considerations for the Restore files and directories security policy setting. -ms.assetid: c673c0fa-6f49-4edd-8c1f-c5e8513f701d -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Restore files and directories - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Restore files and directories** security policy setting. - -## Reference - -This security setting determines which users can bypass file, directory, registry, and other persistent object permissions when they restore backed up files and directories, and it determines which users can set valid security principals as the owner of an object. - -Granting this user right to an account is similar to granting the account the following permissions to all files and folders on the system: - -- **Traverse folder / execute file** -- **Write** - -Constant: SeRestorePrivilege - -### Possible values - -- User-defined list of accounts -- Defaults -- Not Defined - -### Best practices - -- Users with this user right can overwrite registry settings, hide data, and gain ownership of system objects, so only assign this user right to trusted users. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default, this right is granted to the Administrators, Backup Operators, and Server Operators groups on domain controllers, and to the Administrators and Backup Operators groups on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -|Default Domain Policy | | -| Default Domain Controller Policy| Administrators
    Backup Operators
    Server Operators| -| Stand-Alone Server Default Settings | Administrators
    Backup Operators| -| Domain Controller Effective Default Settings | Administrators
    Backup Operators
    Server Operators| -| Member Server Effective Default Settings | Administrators
    Backup Operators| -| Client Computer Effective Default Settings | Administrators
    Backup Operators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer is not required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object, which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -An attacker with the **Restore files and directories** user right could restore sensitive data to a computer and overwrite data that is more recent, which could lead to loss of important data, data corruption, or a denial-of-service condition. Attackers could overwrite executable files that are used by legitimate administrators or system services with versions that include malicious software to grant themselves elevated privileges, compromise data, or install programs that provide continued access to the device - ->**Note:**  Even if the following countermeasure is configured, an attacker could restore data to a computer in a domain that is controlled by the attacker. Therefore, it is critical that organizations carefully protect the media that are used to back up data. - -### Countermeasure - -Ensure that only the local Administrators group is assigned the **Restore files and directories** user right unless your organization has clearly defined roles for backup and for restore personnel. - -### Potential impact - -If you remove the **Restore files and directories** user right from the Backup Operators group and other accounts, users who aren't members of the local Administrators group can't load data backups. If restoring backups is delegated to a subset of IT staff in your organization, you should verify that this change does not negatively affect the ability of your organization's personnel to do their jobs. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md b/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md deleted file mode 100644 index ebfd260fab..0000000000 --- a/windows/security/threat-protection/security-policy-settings/secpol-advanced-security-audit-policy-settings.md +++ /dev/null @@ -1,36 +0,0 @@ ---- -title: Advanced security audit policy settings in brief -description: Provides information about the advanced security audit policy settings that are available in Windows and the audit events that they generate. -ms.assetid: 6BF9A642-DBC3-4101-94A3-B2316C553CE3 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Advanced security audit policy settings for Windows 10 - -**Applies to** -- Windows 11 -- Windows 10 - -Provides information about the advanced security audit policy settings that are available in Windows and the audit events that they generate. - -The security audit policy settings under **Security Settings\\Advanced Audit Policy Configuration** can help your organization audit compliance with important business-related and security-related rules by tracking precisely defined activities, such as: - -- A group administrator has modified settings or data on servers that contain finance information. -- An employee within a defined group has accessed an important file. -- The correct system access control list (SACL) is applied to every file and folder or registry key on a computer or file share as a verifiable safeguard against undetected access. - -You can access these audit policy settings through the Local Security Policy snap-in (secpol.msc) on the local device or by using Group Policy. - -These Advanced Audit policy settings allow you to select only the behaviors that you want to monitor. You can exclude audit results for behaviors that are of little or no concern to you, or behaviors that create an excessive number of log entries. In addition, because security audit policies can be applied by using domain Group Policy Objects, audit policy settings can be modified, tested, and deployed to selected users and groups with relative simplicity. - -For more info, see [Advanced security audit policies](../auditing/advanced-security-auditing.md). diff --git a/windows/security/threat-protection/security-policy-settings/security-options.md b/windows/security/threat-protection/security-policy-settings/security-options.md deleted file mode 100644 index 2872bdad4b..0000000000 --- a/windows/security/threat-protection/security-policy-settings/security-options.md +++ /dev/null @@ -1,131 +0,0 @@ ---- -title: Security options -description: Introduction to the Security Options settings of the local security policies plus links to more information. -ms.reviewer: -manager: aaroncz -ms.author: vinpa -ms.localizationpriority: medium -author: vinaypamnani-msft -ms.date: 01/13/2023 -ms.topic: reference ---- - -# Security Options - -**Applies to** - -- Windows 11 -- Windows 10 - -Provides an introduction to the **Security Options** settings for local security policies and links to more information. - -The **Security Options** contain the following groupings of security policy settings that allow you to configure the behavior of the local computer. Some of these policies can be included in a Group Policy Object and distributed over your organization. - -When you edit policy settings locally on a device, you only affect the settings on only that device. If you configure the settings in a Group Policy Object (GPO), the settings apply to all devices that are subject to that GPO. - -For info about setting security policies, see [Configure security policy settings](how-to-configure-security-policy-settings.md). - -## In this section - -| Article | Description | -| - | - | -| [Accounts: Administrator account status](accounts-administrator-account-status.md) | Describes the best practices, location, values, and security considerations for the **Accounts: Administrator account status** security policy setting.| -| [Accounts: Block Microsoft accounts](accounts-block-microsoft-accounts.md) | Describes the best practices, location, values, management, and security considerations for the **Accounts: Block Microsoft accounts** security policy setting.| -| [Accounts: Guest account status](accounts-guest-account-status.md) | Describes the best practices, location, values, and security considerations for the **Accounts: Guest account status** security policy setting.| -| [Accounts: Limit local account use of blank passwords to console logon only](accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md) | Describes the best practices, location, values, and security considerations for the **Accounts: Limit local account use of blank passwords to console logon only** security policy setting. | -| [Accounts: Rename administrator account](accounts-rename-administrator-account.md)| This security policy article for the IT professional describes the best practices, location, values, and security considerations for this policy setting.| -| [Accounts: Rename guest account](accounts-rename-guest-account.md) | Describes the best practices, location, values, and security considerations for the **Accounts: Rename guest account** security policy setting.| -| [Audit: Audit the access of global system objects](audit-audit-the-access-of-global-system-objects.md) | Describes the best practices, location, values, and security considerations for the **Audit: Audit the access of global system objects** security policy setting.| -| [Audit: Audit the use of Backup and Restore privilege](audit-audit-the-use-of-backup-and-restore-privilege.md) | Describes the best practices, location, values, and security considerations for the **Audit: Audit the use of Backup and Restore privilege** security policy setting.| -| [Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings](audit-force-audit-policy-subcategory-settings-to-override.md) | Describes the best practices, location, values, and security considerations for the **Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings** security policy setting. | -| [Audit: Shut down system immediately if unable to log security audits](audit-shut-down-system-immediately-if-unable-to-log-security-audits.md)| Describes the best practices, location, values, management practices, and security considerations for the **Audit: Shut down system immediately if unable to log security audits** security policy setting. | -| [DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax](dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md)| Describes the best practices, location, values, and security considerations for the **DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax** policy setting. | -| [DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax](dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md)| Describes the best practices, location, values, and security considerations for the **DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax** security policy setting. | -| [Devices: Allow undock without having to log on](devices-allow-undock-without-having-to-log-on.md)| Describes the best practices, location, values, and security considerations for the **Devices: Allow undock without having to log on** security policy setting.| -| [Devices: Allowed to format and eject removable media](devices-allowed-to-format-and-eject-removable-media.md) | Describes the best practices, location, values, and security considerations for the **Devices: Allowed to format and eject removable media** security policy setting.| -| [Devices: Prevent users from installing printer drivers](devices-prevent-users-from-installing-printer-drivers.md) | Describes the best practices, location, values, and security considerations for the **Devices: Prevent users from installing printer drivers** security policy setting.| -| [Devices: Restrict CD-ROM access to locally logged-on user only](devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md) | Describes the best practices, location, values, and security considerations for the **Devices: Restrict CD-ROM access to locally logged-on user only** security policy setting. | -| [Devices: Restrict floppy access to locally logged-on user only](devices-restrict-floppy-access-to-locally-logged-on-user-only.md)| Describes the best practices, location, values, and security considerations for the **Devices: Restrict floppy access to locally logged-on user only** security policy setting. | -| [Domain controller: Allow server operators to schedule tasks](domain-controller-allow-server-operators-to-schedule-tasks.md)| Describes the best practices, location, values, and security considerations for the **Domain controller: Allow server operators to schedule tasks** security policy setting. | -| [Domain controller: LDAP server signing requirements](domain-controller-ldap-server-signing-requirements.md)| Describes the best practices, location, values, and security considerations for the **Domain controller: LDAP server signing requirements** security policy setting. | -| [Domain controller: Refuse machine account password changes](domain-controller-refuse-machine-account-password-changes.md) | Describes the best practices, location, values, and security considerations for the **Domain controller: Refuse machine account password changes** security policy setting.| -| [Domain member: Digitally encrypt or sign secure channel data (always)](domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md) | Describes the best practices, location, values, and security considerations for the **Domain member: Digitally encrypt or sign secure channel data (always)** security policy setting. | -| [Domain member: Digitally encrypt secure channel data (when possible)](domain-member-digitally-encrypt-secure-channel-data-when-possible.md)| Describes the best practices, location, values, and security considerations for the **Domain member: Digitally encrypt secure channel data (when possible)** security policy setting. | -| [Domain member: Digitally sign secure channel data (when possible)](domain-member-digitally-sign-secure-channel-data-when-possible.md)| Describes the best practices, location, values, and security considerations for the **Domain member: Digitally sign secure channel data (when possible)** security policy setting.| -| [Domain member: Disable machine account password changes](domain-member-disable-machine-account-password-changes.md)| Describes the best practices, location, values, and security considerations for the **Domain member: Disable machine account password changes** security policy setting.| -| [Domain member: Maximum machine account password age](domain-member-maximum-machine-account-password-age.md) |Describes the best practices, location, values, and security considerations for the **Domain member: Maximum machine account password age** security policy setting.| -|[Domain member: Require strong (Windows 2000 or later) session key](domain-member-require-strong-windows-2000-or-later-session-key.md)| Describes the best practices, location, values, and security considerations for the **Domain member: Require strong (Windows 2000 or later) session key** security policy setting. | -| [Interactive logon: Display user information when the session is locked](interactive-logon-display-user-information-when-the-session-is-locked.md)| Describes the best practices, location, values, and security considerations for the **Interactive logon: Display user information when the session is locked** security policy setting. | -| [Interactive logon: Don't display last signed-in](interactive-logon-do-not-display-last-user-name.md)| Describes the best practices, location, values, and security considerations for the **Interactive logon: Don't display last signed-in** security policy setting.| -| [Interactive logon: Don't display username at sign-in](interactive-logon-dont-display-username-at-sign-in.md)| Describes the best practices, location, values, and security considerations for the **Interactive logon: Do not display username at sign-in** security policy setting.| -| [Interactive logon: Do not require CTRL+ALT+DEL](interactive-logon-do-not-require-ctrl-alt-del.md)| Describes the best practices, location, values, and security considerations for the **Interactive logon: Do not require CTRL+ALT+DEL** security policy setting.| -| [Interactive logon: Machine account lockout threshold](interactive-logon-machine-account-lockout-threshold.md) | Describes the best practices, location, values, management, and security considerations for the **Interactive logon: Machine account lockout threshold** security policy setting.| -| [Interactive logon: Machine inactivity limit](interactive-logon-machine-inactivity-limit.md)| Describes the best practices, location, values, management, and security considerations for the **Interactive logon: Machine inactivity limit** security policy setting.| -| [Interactive logon: Message text for users attempting to log on](interactive-logon-message-text-for-users-attempting-to-log-on.md) | Describes the best practices, location, values, management, and security considerations for the **Interactive logon: Message text for users attempting to log on** security policy setting. | -| [Interactive logon: Message title for users attempting to log on](interactive-logon-message-title-for-users-attempting-to-log-on.md)| Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Message title for users attempting to log on** security policy setting. | -| [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md)| Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Number of previous logons to cache (in case domain controller is not available)** security policy setting. | -| [Interactive logon: Prompt user to change password before expiration](interactive-logon-prompt-user-to-change-password-before-expiration.md)| Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Prompt user to change password before expiration** security policy setting. | -| [Interactive logon: Require Domain Controller authentication to unlock workstation](interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md)| Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Require Domain Controller authentication to unlock workstation** security policy setting. | -| [Interactive logon: Require Windows Hello for Business or smart card](interactive-logon-require-smart-card.md) | Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Require Windows Hello for Business or smart card** security policy setting.| -| [Interactive logon: Smart card removal behavior](interactive-logon-smart-card-removal-behavior.md) | Describes the best practices, location, values, policy management, and security considerations for the **Interactive logon: Smart card removal behavior** security policy setting.| -| [Microsoft network client: Digitally sign communications (always)](microsoft-network-client-digitally-sign-communications-always.md) | Describes the best practices, location, values, policy management, and security considerations for the **Microsoft network client: Digitally sign communications (always)** security policy setting for SMBv3 and SMBv2. | -| [Microsoft network client: Send unencrypted password to third-party SMB servers](microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md)| Describes the best practices, location, values, policy management, and security considerations for the **Microsoft network client: Send unencrypted password to third-party SMB servers** security policy setting. | -| [Microsoft network server: Amount of idle time required before suspending session](microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md)| Describes the best practices, location, values, and security considerations for the **Microsoft network server: Amount of idle time required before suspending session** security policy setting. | -| [Microsoft network server: Attempt S4U2Self to obtain claim information](microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md)| Describes the best practices, location, values, management, and security considerations for the **Microsoft network server: Attempt S4U2Self to obtain claim information** security policy setting. | -| [Microsoft network server: Digitally sign communications (always)](microsoft-network-server-digitally-sign-communications-always.md)| Describes the best practices, location, values, policy management, and security considerations for the **Microsoft network server: Digitally sign communications (always)** security policy setting for SMBv3 and SMBv2.| -| [Microsoft network server: Disconnect clients when logon hours expire](microsoft-network-server-disconnect-clients-when-logon-hours-expire.md)| Describes the best practices, location, values, and security considerations for the **Microsoft network server: Disconnect clients when logon hours expire** security policy setting. | -| [Microsoft network server: Server SPN target name validation level](microsoft-network-server-server-spn-target-name-validation-level.md)| Describes the best practices, location, and values, policy management, and security considerations for the **Microsoft network server: Server SPN target name validation level** security policy setting. | -| [Network access: Allow anonymous SID/Name translation](network-access-allow-anonymous-sidname-translation.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network access: Allow anonymous SID/Name translation** security policy setting.| -| [Network access: Do not allow anonymous enumeration of SAM accounts](network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md)| Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts** security policy setting. | -| [Network access: Do not allow anonymous enumeration of SAM accounts and shares](network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md)| Describes the best practices, location, values, and security considerations for the **Network access: Do not allow anonymous enumeration of SAM accounts and shares** security policy setting. | -| [Network access: Do not allow storage of passwords and credentials for network authentication](network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network access: Do not allow storage of passwords and credentials for network authentication** security policy setting. | -| [Network access: Let Everyone permissions apply to anonymous users](network-access-let-everyone-permissions-apply-to-anonymous-users.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network access: Let Everyone permissions apply to anonymous users** security policy setting. | -| [Network access: Named Pipes that can be accessed anonymously](network-access-named-pipes-that-can-be-accessed-anonymously.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network access: Named Pipes that can be accessed anonymously** security policy setting. | -| [Network access: Remotely accessible registry paths](network-access-remotely-accessible-registry-paths.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network access: Remotely accessible registry paths** security policy setting.| -| [Network access: Remotely accessible registry paths and subpaths](network-access-remotely-accessible-registry-paths-and-subpaths.md)| Describes the best practices, location, values, and security considerations for the **Network access: Remotely accessible registry paths and subpaths** security policy setting. | -| [Network access: Restrict anonymous access to Named Pipes and Shares](network-access-restrict-anonymous-access-to-named-pipes-and-shares.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network access: Restrict anonymous access to Named Pipes and Shares** security policy setting. | -| [Network access: Restrict clients allowed to make remote calls to SAM](network-access-restrict-clients-allowed-to-make-remote-sam-calls.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network access: Restrict clients allowed to make remote calls to SAM** security policy setting. | -| [Network access: Shares that can be accessed anonymously](network-access-shares-that-can-be-accessed-anonymously.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network access: Shares that can be accessed anonymously** security policy setting. | -| [Network access: Sharing and security model for local accounts](network-access-sharing-and-security-model-for-local-accounts.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network access: Sharing and security model for local accounts** security policy setting. | -| [Network security: Allow Local System to use computer identity for NTLM](network-security-allow-local-system-to-use-computer-identity-for-ntlm.md)| Describes the location, values, policy management, and security considerations for the **Network security: Allow Local System to use computer identity for NTLM** security policy setting. | -| [Network security: Allow LocalSystem NULL session fallback](network-security-allow-localsystem-null-session-fallback.md)| Describes the best practices, location, values, and security considerations for the **Network security: Allow LocalSystem NULL session fallback** security policy setting.| -| [Network security: Allow PKU2U authentication requests to this computer to use online identities](network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md)| Describes the best practices, location, and values for the **Network Security: Allow PKU2U authentication requests to this computer to use online identities** security policy setting. | -| [Network security: Configure encryption types allowed for Kerberos Win7 only](network-security-configure-encryption-types-allowed-for-kerberos.md)| Describes the best practices, location, values, and security considerations for the **Network security: Configure encryption types allowed for Kerberos Win7 only** security policy setting. | -| [Network security: Do not store LAN Manager hash value on next password change](network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network security: Do not store LAN Manager hash value on next password change** security policy setting. | -| [Network security: Force logoff when logon hours expire](network-security-force-logoff-when-logon-hours-expire.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network security: Force logoff when logon hours expire** security policy setting. | -| [Network security: LAN Manager authentication level](network-security-lan-manager-authentication-level.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network security: LAN Manager authentication level** security policy setting.| -| [Network security: LDAP client signing requirements](network-security-ldap-client-signing-requirements.md) | This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for this policy setting. This information applies to computers running at least the Windows Server 2008 operating system. | -| [Network security: Minimum session security for NTLM SSP based (including secure RPC) clients](network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) clients** security policy setting. | -| [Network security: Minimum session security for NTLM SSP based (including secure RPC) servers](network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md)| Describes the best practices, location, values, policy management, and security considerations for the **Network security: Minimum session security for NTLM SSP based (including secure RPC) servers** security policy setting. | -| [Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication](network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md)| Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication** security policy setting. | -| [Network security: Restrict NTLM: Add server exceptions in this domain](network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md)| Describes the best practices, location, values, management aspects, and security considerations for the **Network security: Restrict NTLM: Add server exceptions in this domain** security policy setting. | -| [Network security: Restrict NTLM: Audit incoming NTLM traffic](network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md)| Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit incoming NTLM traffic** security policy setting. | -| [Network security: Restrict NTLM: Audit NTLM authentication in this domain](network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md)| Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Audit NTLM authentication in this domain** security policy setting. | -| [Network security: Restrict NTLM: Incoming NTLM traffic](network-security-restrict-ntlm-incoming-ntlm-traffic.md)| Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Incoming NTLM traffic** security policy setting. | -| [Network security: Restrict NTLM: NTLM authentication in this domain](network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md)| Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: NTLM authentication in this domain** security policy setting. | -| [Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers](network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md)| Describes the best practices, location, values, management aspects, and security considerations for the **Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers** security policy setting. | -| [Recovery console: Allow automatic administrative logon](recovery-console-allow-automatic-administrative-logon.md)| Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow automatic administrative logon** security policy setting. | -| [Recovery console: Allow floppy copy and access to all drives and folders](recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md)| Describes the best practices, location, values, policy management, and security considerations for the **Recovery console: Allow floppy copy and access to all drives and folders** security policy setting. | -| [Shutdown: Allow system to be shut down without having to log on](shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md)| Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Allow system to be shut down without having to log on** security policy setting. | -| [Shutdown: Clear virtual memory pagefile](shutdown-clear-virtual-memory-pagefile.md)| Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Clear virtual memory pagefile** security policy setting.| -| [System cryptography: Force strong key protection for user keys stored on the computer](system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md)| Describes the best practices, location, values, policy management, and security considerations for the **System cryptography: Force strong key protection for user keys stored on the computer** security policy setting. | -| [System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing](system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md)| This security policy reference topic for the IT professional describes the best practices, location, values, policy management, and security considerations for this policy setting. | -| [System objects: Require case insensitivity for non-Windows subsystems](system-objects-require-case-insensitivity-for-non-windows-subsystems.md)| Describes the best practices, location, values, policy management, and security considerations for the **System objects: Require case insensitivity for non-Windows subsystems** security policy setting. | -| [System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)](system-objects-strengthen-default-permissions-of-internal-system-objects.md)| Describes the best practices, location, values, policy management, and security considerations for the **System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links)** security policy setting. | -| [System settings: Optional subsystems](system-settings-optional-subsystems.md) | Describes the best practices, location, values, policy management, and security considerations for the **System settings: Optional subsystems** security policy setting.| -| [System settings: Use certificate rules on Windows executables for Software Restriction Policies](system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md)| Describes the best practices, location, values, policy management, and security considerations for the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** security policy setting. | -| [User Account Control: Admin Approval Mode for the Built-in Administrator account](user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md)| Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting. | -| [User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop](user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md)| Describes the best practices, location, values, and security considerations for the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** security policy setting. | -| [User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode](user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md)| Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** security policy setting. | -| [User Account Control: Behavior of the elevation prompt for standard users](user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md)| Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Behavior of the elevation prompt for standard users** security policy setting. | -| [User Account Control: Detect application installations and prompt for elevation](user-account-control-detect-application-installations-and-prompt-for-elevation.md)| Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Detect application installations and prompt for elevation** security policy setting. | -| [User Account Control: Only elevate executables that are signed and validated](user-account-control-only-elevate-executables-that-are-signed-and-validated.md)| Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting. | -| [User Account Control: Only elevate UIAccess applications that are installed in secure locations](user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md)| Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** security policy setting. | -| [User Account Control: Run all administrators in Admin Approval Mode](user-account-control-run-all-administrators-in-admin-approval-mode.md)| Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Run all administrators in Admin Approval Mode** security policy setting. | -| [User Account Control: Switch to the secure desktop when prompting for elevation](user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md)| Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Switch to the secure desktop when prompting for elevation** security policy setting. | -| [User Account Control: Virtualize file and registry write failures to per-user locations](user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md)| Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Virtualize file and registry write failures to per-user locations** security policy setting. | - -## Related articles - -- [Security policy settings reference](security-policy-settings-reference.md) -- [Security policy settings](security-policy-settings.md) diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md deleted file mode 100644 index a6167efac3..0000000000 --- a/windows/security/threat-protection/security-policy-settings/security-policy-settings-reference.md +++ /dev/null @@ -1,40 +0,0 @@ ---- -title: Security policy settings reference -description: This reference of security settings provides information about how to implement and manage security policies, including setting options and security considerations. -ms.assetid: ef5a4579-15a8-4507-9a43-b7ccddcb0ed1 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Security policy settings reference - -**Applies to** -- Windows 11 -- Windows 10 - -This reference of security settings provides information about how to implement and manage security policies, including setting options and security considerations. - -This reference focuses on those settings that are considered security settings. This reference examines only the settings and features in the Windows operating systems that can help organizations secure their enterprises against malicious software threats. Management features and those security features that you can't configure aren't described in this reference. - -Each policy setting described contains referential content such as a detailed explanation of the settings, best practices, default settings, differences between operating system versions, policy management considerations, and security considerations that include a discussion of vulnerability, countermeasures, and potential impact of those countermeasures. - -## In this section - -| Topic | Description | -| - | - | -| [Account Policies](account-policies.md) | An overview of account policies in Windows and provides links to policy descriptions.| -| [Audit Policy](audit-policy.md) | Provides information about basic audit policies that are available in Windows and links to information about each setting.| -| [Security Options](security-options.md) | Provides an introduction to the settings under **Security Options** of the local security policies and links to information about each setting.| -| [Advanced security audit policy settings](secpol-advanced-security-audit-policy-settings.md) | Provides information about the advanced security audit policy settings that are available in Windows and the audit events that they generate.| -| [User Rights Assignment](user-rights-assignment.md) | Provides an overview and links to information about the User Rights Assignment security policy settings user rights that are available in Windows.  | - - diff --git a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md b/windows/security/threat-protection/security-policy-settings/security-policy-settings.md deleted file mode 100644 index 7c394d7e01..0000000000 --- a/windows/security/threat-protection/security-policy-settings/security-policy-settings.md +++ /dev/null @@ -1,410 +0,0 @@ ---- -title: Security policy settings -description: This reference topic describes the common scenarios, architecture, and processes for security settings. -ms.assetid: e7ac5204-7f6c-4708-a9f6-6af712ca43b9 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Security policy settings - -**Applies to** - -- Windows 10 -- Windows 11 - -This reference topic describes the common scenarios, architecture, and processes for security settings. - -Security policy settings are rules that administrators configure on a computer or multiple devices for protecting resources on a device or network. The Security Settings extension of the Local Group Policy Editor snap-in allows you to define security configurations as part of a Group Policy Object (GPO). The GPOs are linked to Active Directory containers such as sites, domains, or organizational units, and they enable you to manage security settings for multiple devices from any device joined to the domain. Security settings policies are used as part of your overall security implementation to help secure domain controllers, servers, clients, and other resources in your organization. - -Security settings can control: - -- User authentication to a network or device. -- The resources that users are permitted to access. -- Whether to record a user's or group's actions in the event log. -- Membership in a group. - -To manage security configurations for multiple devices, you can use one of the following options: - -- Edit specific security settings in a GPO. -- Use the Security Templates snap-in to create a security template that contains the security policies you want to apply, and then import the security template into a Group Policy Object. A security template is a file that represents a security configuration, and it can be imported to a GPO, applied to a local device, or used to analyze security. - -For more info about managing security configurations, see [Administer security policy settings](administer-security-policy-settings.md). - -The Security Settings extension of the Local Group Policy Editor includes the following types of security policies: - -- **Account Policies.** These policies are defined on devices; they affect how user accounts can interact with the computer or domain. Account policies include the following types of policies: - - - **Password Policy.** These policies determine settings for passwords, such as enforcement and lifetimes. Password policies are used for domain accounts. - - **Account Lockout Policy.** These policies determine the conditions and length of time that an account will be locked out of the system. Account lockout policies are used for domain or local user accounts. - - **Kerberos Policy.** These policies are used for domain user accounts; they determine Kerberos-related settings, such as ticket lifetimes and enforcement. - -- **Local Policies.** These policies apply to a computer and include the following types of policy settings: - - - **Audit Policy.** Specify security settings that control the logging of security events into the Security log on the computer, and specifies what types of security events to log (success, failure, or both). - - > [!NOTE] - > For devices running Windows 7 and later, we recommend to use the settings under Advanced Audit Policy Configuration rather than the Audit Policy settings under Local Policies. - - - **User Rights Assignment.** Specify the users or groups that have sign-in rights or privileges on a device - - **Security Options.** Specify security settings for the computer, such as Administrator and Guest Account names; access to floppy disk drives and CD-ROM drives; installation of drivers; sign-in prompts; and so on. - -- **Windows Firewall with Advanced Security.** Specify settings to protect the device on your network by using a stateful firewall that allows you to determine which network traffic is permitted to pass between your device and the network. -- **Network List Manager Policies.** Specify settings that you can use to configure different aspects of how networks are listed and displayed on one device or on many devices. -- **Public Key Policies.** Specify settings to control Encrypting File System, Data Protection, and BitLocker Drive Encryption in addition to certain certificate paths and services settings. -- **Software Restriction Policies.** Specify settings to identify software and to control its ability to run on your local device, organizational unit, domain, or site. -- **Application Control Policies.** Specify settings to control which users or groups can run particular applications in your organization based on unique identities of files. -- **IP Security Policies on Local Computer.** Specify settings to ensure private, secure communications over IP networks by using cryptographic security services. IPsec establishes trust and security from a source IP address to a destination IP address. -- **Advanced Audit Policy Configuration.** Specify settings that control the logging of security events into the security log on the device. The settings under Advanced Audit Policy Configuration provide finer control over which activities to monitor as opposed to the Audit Policy settings under Local Policies. - -[!INCLUDE [windows-security-policy-settings-and-auditing](../../../../includes/licensing/windows-security-policy-settings-and-auditing.md)] - -## Policy-based security settings management - -The Security Settings extension to Group Policy provides an integrated policy-based management infrastructure to help you manage and enforce your security policies. - -You can define and apply security settings policies to users, groups, and network servers and clients through Group Policy and Active Directory Domain Services (AD DS). A group of servers with the same functionality can be created (for example, a Microsoft Web (IIS) server), and then Group Policy Objects can be used to apply common security settings to the group. If more servers are added to this group later, many of the common security settings are automatically applied, reducing deployment and administrative labor. - -### Common scenarios for using security settings policies - -Security settings policies are used to manage the following aspects of security: accounts policy, local policy, user rights assignment, registry values, file and registry Access Control Lists (ACLs), service startup modes, and more. - -As part of your security strategy, you can create GPOs with security settings policies configured specifically for the various roles in your organization, such as domain controllers, file servers, member servers, clients, and so on. - -You can create an organizational unit (OU) structure that groups devices according to their roles. Using OUs is the best method for separating specific security requirements for the different roles in your network. This approach also allows you to apply customized security templates to each class of server or computer. After creating the security templates, you create a new GPO for each of the OUs, and then import the security template (.inf file) into the new GPO. - -Importing a security template to a GPO ensures that any accounts to which the GPO is applied automatically receive the template's security settings when the Group Policy settings are refreshed. On a workstation or server, the security settings are refreshed at regular intervals (with a random offset of at most 30 minutes), and, on a domain controller, this process occurs every few minutes if changes have occurred in any of the GPO settings that apply. The settings are also refreshed every 16 hours, whether or not any changes have occurred. - -> [!NOTE] -> These refresh settings vary between versions of the operating system and can be configured. - -By using Group Policy−based security configurations in conjunction with the delegation of administration, you can ensure that specific security settings, rights, and behavior are applied to all servers and computers within an OU. This approach makes it simple to update many servers with any other changes required in the future. - -### Dependencies on other operating system technologies - -For devices that are members of a Windows Server 2008 or later domain, security settings policies depend on the following technologies: - -- **Active Directory Domain Services (AD DS)** - - The Windows-based directory service, AD DS, stores information about objects on a network and makes this information available to administrators and users. By using AD DS, you can view and manage network objects on the network from a single location, and users can access permitted network resources by using a single sign in. - -- **Group Policy** - - The infrastructure within AD DS that enables directory-based configuration management of user and computer settings on devices running Windows Server. By using Group Policy, you can define configurations for groups of users and computers, including policy settings, registry-based policies, software installation, scripts, folder redirection, Remote Installation Services, Internet Explorer maintenance, and security. - -- **Domain Name System (DNS)** - - A hierarchical naming system used for locating domain names on the Internet and on private TCP/IP networks. DNS provides a service for mapping DNS domain names to IP addresses, and IP addresses to domain names. This service allows users, computers, and applications to query DNS to specify remote systems by fully qualified domain names rather than by IP addresses. - -- **Winlogon** - - A part of the Windows operating system that provides interactive logon support. Winlogon is designed around an interactive logon model that consists of three components: the Winlogon executable, a credential provider, and any number of network providers. - -- **Setup** - - Security configuration interacts with the operating system setup process during a clean installation or upgrade from earlier versions of Windows Server. - -- **Security Accounts Manager (SAM)** - - A Windows service used during the sign-in process. SAM maintains user account information, including groups to which a user belongs. - -- **Local Security Authority (LSA)** - - A protected subsystem that authenticates and signs in users to the local system. LSA also maintains information about all aspects of local security on a system, collectively known as the Local Security Policy of the system. - -- **Windows Management Instrumentation (WMI)** - - A feature of the Microsoft Windows operating system, WMI is the Microsoft implementation of Web-Based Enterprise Management (WBEM), which is an industry initiative to develop a standard technology for accessing management information in an enterprise environment. WMI provides access to information about objects in a managed environment. Through WMI and the WMI application programming interface (API), applications can query for and make changes to static information in the Common Information Model (CIM) repository and dynamic information maintained by the various types of providers. - -- **Resultant Set of Policy (RSoP)** - - An enhanced Group Policy infrastructure that uses WMI in order to make it easier to plan and debug policy settings. RSoP provides public methods that expose what an extension to Group Policy would do in a what-if situation, and what the extension has done in an actual situation. These public methods allow administrators to easily determine the combination of policy settings that apply to, or will apply to, a user or device. - -- **Service Control Manager (SCM)** - - Used for configuration of service startup modes and security. - -- **Registry** - - Used for configuration of registry values and security. - -- **File system** - - Used for configuration of security. - -- **File system conversions** - - Security is set when an administrator converts a file system from FAT to NTFS. - -- **Microsoft Management Console (MMC)** - - The user interface for the Security Settings tool is an extension of the Local Group Policy Editor MMC snap-in. - -### Security settings policies and Group Policy - -The Security Settings extension of the Local Group Policy Editor is part of the Security Configuration Manager tool set. The following components are associated with Security Settings: a configuration engine; an analysis engine; a template and database interface layer; setup integration logic; and the secedit.exe command-line tool. The security configuration engine is responsible for handling security configuration editor-related security requests for the system on which it runs. The analysis engine analyzes system security for a given configuration and saves the result. The template and database interface layer handles reading and writing requests from and to the template or database (for internal storage). The Security Settings extension of the Local Group Policy Editor handles Group Policy from a domain-based or local device. The security configuration logic integrates with setup and manages system security for a clean installation or upgrade to a more recent Windows operating system. Security information is stored in templates (.inf files) or in the Secedit.sdb database. - -The following diagram shows Security Settings and related features. - -#### Security Settings Policies and Related Features - -![components related to security policies.](images/secpol-components.gif) - -- **Scesrv.dll** - - Provides the core security engine functionality. - -- **Scecli.dll** - - Provides the client-side interfaces to the security configuration engine and provides data to Resultant Set of Policy (RSoP). - -- **Wsecedit.dll** - - The Security Settings extension of Local Group Policy Editor. scecli.dll is loaded into wsecedit.dll to support the Security Settings user interface. - -- **Gpedit.dll** - - The Local Group Policy Editor MMC snap-in. - -## Security Settings extension architecture - -The Security Settings extension of the Local Group Policy Editor is part of the Security Configuration Manager tools, as shown in the following diagram. - -**Security Settings Architecture** - -![architecture of security policy settings.](images/secpol-architecture.gif) - -The security settings configuration and analysis tools include a security configuration engine, which provides local computer (non-domain member) and Group Policy−based configuration and analysis of security settings policies. The security configuration engine also supports the creation of security policy files. The primary features of the security configuration engine are scecli.dll and scesrv.dll. - -The following list describes these primary features of the security configuration engine and other Security Settings−related features. - -- **scesrv.dll** - - This .dll file is hosted in services.exe and runs under local system context. scesrv.dll provides core Security Configuration Manager functionality, such as import, configure, analyze, and policy propagation. - - Scesrv.dll performs configuration and analysis of various security-related system parameters by calling corresponding system APIs, including LSA, SAM, and the registry. - - Scesrv.dll exposes APIs such as import, export, configure, and analyze. It checks that the request is made over LRPC (Windows XP) and fails the call if it isn't. - - Communication between parts of the Security Settings extension occurs by using the following methods: - - - Component Object Model (COM) calls - - Local Remote Procedure Call (LRPC) - - Lightweight Directory Access Protocol (LDAP) - - Active Directory Service Interfaces (ADSI) - - Server Message Block (SMB) - - Win32 APIs - - Windows Management Instrumentation (WMI) calls - - On domain controllers, scesrv.dll receives notifications of changes made to SAM and the LSA that need to be synchronized across domain controllers. Scesrv.dll incorporates those changes into the Default Domain Controller Policy GPO by using in-process scecli.dll template modification APIs. - Scesrv.dll also performs configuration and analysis operations. - -- **Scecli.dll** - - This Scecli.dll is the client-side interface or wrapper to scesrv.dll. scecli.dll is loaded into Wsecedit.dll to support MMC snap-ins. It's used by Setup to configure default system security and security of files, registry keys, and services installed by the Setup API .inf files. - - The command-line version of the security configuration and analysis user interfaces, secedit.exe, uses scecli.dll. - - Scecli.dll implements the client-side extension for Group Policy. - - Scesrv.dll uses scecli.dll to download applicable Group Policy files from SYSVOL in order to apply Group Policy security settings to the local device. - - Scecli.dll logs application of security policy into WMI (RSoP). - - Scesrv.dll policy filter uses scecli.dll to update Default Domain Controller Policy GPO when changes are made to SAM and LSA. - -- **Wsecedit.dll** - - The Security Settings extension of the Group Policy Object Editor snap-in. You use this tool to configure security settings in a Group Policy Object for a site, domain, or organizational unit. You can also use Security Settings to import security templates to a GPO. - -- **Secedit.sdb** - - This Secedit.sdb is a permanent system database used for policy propagation including a table of persistent settings for rollback purposes. - -- **User databases** - - A user database is any database other than the system database created by administrators for the purposes of configuration or analysis of security. - -- **.Inf Templates** - - These templates are text files that contain declarative security settings. They're loaded into a database before configuration or analysis. Group Policy security policies are stored in .inf files on the SYSVOL folder of domain controllers, where they're downloaded (by using file copy) and merged into the system database during policy propagation. - -## Security settings policy processes and interactions - -For a domain-joined device, where Group Policy is administered, security settings are processed in conjunction with Group Policy. Not all settings are configurable. - -### Group Policy processing - -When a computer starts and a user signs in, computer policy and user policy are applied according to the following sequence: - -1. The network starts. Remote Procedure Call System Service (RPCSS) and Multiple Universal Naming Convention Provider (MUP) start. -1. An ordered list of Group Policy Objects is obtained for the device. The list might depend on these factors: - - - Whether the device is part of a domain and, therefore, subject to Group Policy through Active Directory. - - The location of the device in Active Directory. - - Whether the list of Group Policy Objects has changed. If the list of Group Policy Objects hasn't changed, no processing is done. - -1. Computer policy is applied. These settings are the ones under Computer Configuration from the gathered list. This process is a synchronous one by default and occurs in the following order: local, site, domain, organizational unit, child organizational unit, and so on. No user interface appears while computer policies are processed. -1. Startup scripts run. These scripts are hidden and synchronous by default; each script must complete or time out before the next one starts. The default time-out is 600 seconds. You can use several policy settings to modify this behavior. -1. The user presses CTRL+ALT+DEL to sign in. -1. After the user is validated, the user profile loads; it's governed by the policy settings that are in effect. -1. An ordered list of Group Policy Objects is obtained for the user. The list might depend on these factors: - - - Whether the user is part of a domain and, therefore, subject to Group Policy through Active Directory. - - Whether loopback policy processing is enabled, and if so, the state (Merge or Replace) of the loopback policy setting. - - The location of the user in Active Directory. - - Whether the list of Group Policy Objects has changed. If the list of Group Policy Objects hasn't changed, no processing is done. - -1. User policy is applied. These settings are the ones under User Configuration from the gathered list. These settings are synchronous by default and in the following order: local, site, domain, organizational unit, child organizational unit, and so on. No user interface appears while user policies are processed. -1. Logon scripts run. Group Policy−based logon scripts are hidden and asynchronous by default. The user object script runs last. -1. The operating system user interface that is prescribed by Group Policy appears. - -### Group Policy Objects storage - -A Group Policy Object (GPO) is a virtual object that is identified by a Globally Unique Identifier (GUID) and stored at the domain level. The policy setting information of a GPO is stored in the following two locations: - -- **Group Policy containers in Active Directory.** - - The Group Policy container is an Active Directory container that contains GPO properties, such as version information, GPO status, plus a list of other component settings. - -- **Group Policy templates in a domain's system volume folder (SYSVOL).** - - The Group Policy template is a file system folder that includes policy data specified by .admx files, security settings, script files, and information about applications that are available for installation. The Group Policy template is located in the SYSVOL folder in the \\\Policies subfolder. - -The **GROUP\_POLICY\_OBJECT** structure provides information about a GPO in a GPO list, including the version number of the GPO, a pointer to a string that indicates the Active Directory portion of the GPO, and a pointer to a string that specifies the path to the file system portion of the GPO. - -### Group Policy processing order - -Group Policy settings are processed in the following order: - -1. **Local Group Policy Object.** - - Each device running a Windows operating system beginning with Windows XP has exactly one Group Policy Object that is stored locally. - -1. **Site.** - - Any Group Policy Objects that have been linked to the site are processed next. Processing is synchronous and in an order that you specify. - -1. **Domain.** - - Processing of multiple domain-linked Group Policy Objects is synchronous and in an order you specify. - -1. **Organizational units.** - - Group Policy Objects that are linked to the organizational unit that is highest in the Active Directory hierarchy are processed first, then Group Policy Objects that are linked to its child organizational unit, and so on. Finally, the Group Policy Objects that are linked to the organizational unit that contains the user or device are processed. - -At the level of each organizational unit in the Active Directory hierarchy, one, many, or no Group Policy Objects can be linked. If several Group Policy Objects are linked to an organizational unit, their processing is synchronous and in an order that you specify. - -This order means that the local Group Policy Object is processed first, and Group Policy Objects that are linked to the organizational unit of which the computer or user is a direct member are processed last, which overwrites the earlier Group Policy Objects. - -This order is the default processing order and administrators can specify exceptions to this order. A Group Policy Object that is linked to a site, domain, or organizational unit (not a local Group Policy Object) can be set to **Enforced** with respect to that site, domain, or organizational unit, so that none of its policy settings can be overridden. At any site, domain, or organizational unit, you can mark Group Policy inheritance selectively as **Block Inheritance**. Group Policy Object links that are set to **Enforced** are always applied, however, and they can't be blocked. For more information, see [Group Policy Basics – Part 2: Understanding Which GPOs to Apply](/archive/blogs/musings_of_a_technical_tam/group-policy-basics-part-2-understanding-which-gpos-to-apply). - -### Security settings policy processing - -In the context of Group Policy processing, security settings policy is processed in the following order. - -1. During Group Policy processing, the Group Policy engine determines which security settings policies to apply. -1. If security settings policies exist in a GPO, Group Policy invokes the Security Settings client-side extension. -1. The Security Settings extension downloads the policy from the appropriate location such as a specific domain controller. -1. The Security Settings extension merges all security settings policies according to precedence rules. The processing is according to the Group Policy processing order of local, site, domain, and organizational unit (OU), as described earlier in the "Group Policy processing order" section. If multiple GPOs are in effect for a given device and there are no conflicting policies, then the policies are cumulative and are merged. - - This example uses the Active Directory structure shown in the following figure. A given computer is a member of OU2, to which the **GroupMembershipPolGPO** GPO is linked. This computer is also subject to the **UserRightsPolGPO** GPO, which is linked to OU1, higher in the hierarchy. In this case, no conflicting policies exist so the device receives all of the policies contained in both the **UserRightsPolGPO** and the **GroupMembershipPolGPO** GPOs. - - **Multiple GPOs and Merging of Security Policy** - - ![multiple gpos and merging of security policy.](images/secpol-multigpomerge.gif) - -1. The resultant security policies are stored in secedit.sdb, the security settings database. The security engine gets the security template files and imports them to secedit.sdb. -1. The security settings policies are applied to devices. -The following figure illustrates the security settings policy processing. - -**Security Settings Policy Processing** - -![process and interactions of security policy settings.](images/secpol-processes.gif) - -### Merging of security policies on domain controllers - -Password policies, Kerberos, and some security options are only merged from GPOs that are linked at the root level on the domain. This merging is done to keep those settings synchronized across all domain controllers in the domain. The following security options are merged: - -- Network Security: Force sign out when sign-in hours expire -- Accounts: Administrator account status -- Accounts: Guest account status -- Accounts: Rename administrator account -- Accounts: Rename guest account - -Another mechanism exists that allows security policy changes made by administrators by using net accounts to be merged into the Default Domain Policy GPO. User rights changes that are made by using Local Security Authority (LSA) APIs are filtered into the Default Domain Controllers Policy GPO. - -### Special considerations for domain controllers - -If an application is installed on a primary domain controller (PDC) with operations master role (also known as flexible single master operations or FSMO) and the application makes changes to user rights or password policy, these changes must be communicated to ensure that synchronization across domain controllers occurs. Scesrv.dll receives a notification of any changes made to the security account manager (SAM) and LSA that need to be synchronized across domain controllers and then incorporates the changes into the Default Domain Controller Policy GPO by using scecli.dll template modification APIs. - -### When security settings are applied - -After you've edited the security settings policies, the settings are refreshed on the computers in the organizational unit linked to your Group Policy Object in the following instances: - -- When a device is restarted. -- Every 90 minutes on a workstation or server and every 5 minutes on a domain controller. This refresh interval is configurable. -- By default, Security policy settings delivered by Group Policy are also applied every 16 hours (960 minutes) even if a GPO hasn't changed. - -### Persistence of security settings policy - -Security settings can persist even if a setting is no longer defined in the policy that originally applied it. - -Security settings might persist in the following cases: - -- The setting hasn't been previously defined for the device. -- The setting is for a registry security object. -- The settings are for a file system security object. - -All settings applied through local policy or through a Group Policy Object are stored in a local database on your computer. Whenever a security setting is modified, the computer saves the security setting value to the local database, which retains a history of all the settings that have been applied to the computer. If a policy first defines a security setting and then no longer defines that setting, then the setting takes on the previous value in the database. If a previous value doesn't exist in the database, then the setting doesn't revert to anything and remains defined as is. -This behavior is sometimes referred to as "tattooing". - -Registry and file security settings will maintain the values applied through Group Policy until that setting is set to other values. - -### Permissions required for policy to apply - -Both Apply Group Policy and Read permissions are required to have the settings from a Group Policy Object apply to users or groups, and computers. - -### Filtering security policy - -By default, all GPOs have Read and Apply Group Policy both Allowed for the Authenticated Users group. The Authenticated Users group includes both users and computers. Security settings policies are computer-based. To specify which client computers will or won't have a Group Policy Object applied to them, you can deny them either the Apply Group Policy or Read permission on that Group Policy Object. Changing these permissions allows you to limit the scope of the GPO to a specific set of computers within a site, domain, or OU. - -> [!NOTE] -> Do not use security policy filtering on a domain controller as this would prevent security policy from applying to it. - -### Migration of GPOs containing security settings - -In some situations, you might want to migrate GPOs from one domain environment to another environment. The two most common scenarios are test-to-production migration, and production-to-production migration. The GPO copying process has implications for some types of security settings. - -Data for a single GPO is stored in multiple locations and in various formats; some data is contained in Active Directory and other data is stored on the SYSVOL share on the domain controllers. Certain policy data might be valid in one domain but might be invalid in the domain to which the GPO is being copied. For example, Security Identifiers (SIDs) stored in security policy settings are often domain-specific. So copying GPOs isn't as simple as taking a folder and copying it from one device to another. - -The following security policies can contain security principals and might require some more work to successfully move them from one domain to another. - -- User rights assignment -- Restricted groups -- Services -- File system -- Registry -- The GPO DACL, if you choose to preserve it during a copy operation - -To ensure that data is copied correctly, you can use Group Policy Management Console (GPMC). When there's a migration of a GPO from one domain to another, GPMC ensures that all relevant data is properly copied. GPMC also offers migration tables, which can be used to update domain-specific data to new values as part of the migration process. GPMC hides much of the complexity involved in the migrating GPO operations, and it provides simple and reliable mechanisms for performing operations such as copy and backup of GPOs. - -## In this section - -| Topic | Description | -| - | - | -| [Administer security policy settings](administer-security-policy-settings.md) | This article discusses different methods to administer security policy settings on a local device or throughout a small- or medium-sized organization.| -| [Configure security policy settings](how-to-configure-security-policy-settings.md) | Describes steps to configure a security policy setting on the local device, on a domain-joined device, and on a domain controller.| -| [Security policy settings reference](security-policy-settings-reference.md) | This reference of security settings provides information about how to implement and manage security policies, including setting options and security considerations.| diff --git a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md b/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md deleted file mode 100644 index 24628a2de8..0000000000 --- a/windows/security/threat-protection/security-policy-settings/shut-down-the-system.md +++ /dev/null @@ -1,109 +0,0 @@ ---- -title: Shut down the system - security policy setting -description: Describes the best practices, location, values, policy management, and security considerations for the Shut down the system security policy setting. -ms.assetid: c8e8f890-153a-401e-a957-ba6a130304bf -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Shut down the system - security policy setting - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Shut down the system** security policy setting. - -## Reference - -This security setting determines if a user who is logged on locally to a device can shut down Windows. - -Shutting down domain controllers makes them unable to do things like process sign-in requests, process Group Policy settings, and answer Lightweight Directory Access Protocol (LDAP) queries. Shutting down domain controllers that have been assigned operations master roles, which are also known as flexible single master operations or FSMO roles, can disable key domain functionality. For example, processing sign-in requests for new passwords, which are done by the primary domain controller (PDC) emulator master. - -The **Shut down the system** user right is required to enable hibernation support, to set the power management settings, and to cancel a shutdown. - -Constant: SeShutdownPrivilege - -### Possible values - -- A user-defined list of accounts -- Defaults -- Not defined - -### Best practices - -1. Ensure that only Administrators and Backup Operators have the **Shut down the system** user right on member servers. And that only Administrators have the user right on domain controllers. Removing these default groups might limit the abilities of users who are assigned to specific administrative roles in your environment. Ensure that their delegated tasks won't be negatively affected. -2. The ability to shut down domain controllers should be limited to a few trusted administrators. Even though a system shutdown requires the ability to sign in to the server, you should be careful about the accounts and groups that you allow to shut down a domain controller. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Administrators, Backup Operators, Server Operators, and Print Operators on domain controllers, and Administrators and Backup Operators on stand-alone servers. - -The following table lists the actual and effective default policy values for the most recent supported versions of Windows. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Administrators
    Backup Operators
    Server Operators
    Print Operators| -| Stand-Alone Server Default Settings | Administrators
    Backup Operators| -| Domain Controller Effective Default Settings | Administrators
    Backup Operators
    Server Operators
    Print Operators| -| Member Server Effective Default Settings | Administrators
    Backup Operators| -| Client Computer Effective Default Settings | Administrators
    Backup Operators
    Users| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the computer isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -This user right doesn't have the same effect as **Force shutdown from a remote system**. For more information, see [Force shutdown from a remote system](force-shutdown-from-a-remote-system.md). - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The ability to shut down domain controllers should be limited to a few trusted administrators. Although the **Shut down the system** user right requires the ability to sign in to the server, you should be careful about which accounts and groups you allow to shut down a domain controller. - -When a domain controller is shut down, it can't process sign-in requests, process Group Policy settings, and answer Lightweight Directory Access Protocol (LDAP) queries. If you shut down domain controllers that have operations master roles, you can disable key domain functionality, such as processing sign-in requests for new passwords, which are performed by the PDC master. - -For other server roles, especially roles where non-administrators have rights to sign in to the server, such as RD Session Host servers, it's critical that this user right be removed from users who don't have a legitimate reason to restart the servers. - -### Countermeasure - -Make sure that only the Administrators and Backup Operators groups are assigned the **Shut down the system** user right on member servers. And make sure that only the Administrators group is assigned the user right on domain controllers. - -### Potential impact - -The impact of removing these default groups from the **Shut down the system** user right could limit the delegated abilities of assigned roles in your environment. Confirm that delegated activities aren't adversely affected. - -## Related articles - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md b/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md deleted file mode 100644 index 86b9b4dfd8..0000000000 --- a/windows/security/threat-protection/security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md +++ /dev/null @@ -1,102 +0,0 @@ ---- -title: Shutdown Allow system to be shut down without having to log on -description: Best practices, security considerations, and more for the security policy setting Shutdown Allow system to be shut down without having to log on. -ms.assetid: f3964767-5377-4416-8eb3-e14d553a7315 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Shutdown: Allow system to be shut down without having to log on - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Shutdown: Allow system to be shut down without having to log on** security policy setting. - -## Reference - -This policy setting determines whether you can shut down a device without having to sign in to Windows. When you enable it, the **Shut Down** option is available on the sign-in screen in Windows. If you disable this setting, the **Shut Down** option is removed from the screen. To use the option, the user must sign in on the device successfully and have the **Shut down the system** user right. - -Users who access the console locally can shut down the system. Attackers or misguided users can connect to the server by using Remote Desktop Services, and then shut it down or restart it without having to identify themselves. A malicious user might also cause a temporary denial-of-service -condition from a local console by restarting or shutting down the server. - -### Possible values - -- Enabled - - The shutdown command is available on the sign-in screen. - -- Disabled - - The shut down option is removed from the sign-in screen. Users must have the **Shut down the system** user right to do a shutdown. - -- Not defined - -### Best practices - -1. On servers, set this policy to **Disabled**. You must sign in to servers to shut down or restart them. -2. On client devices, set this policy to **Enabled**. Define the list of users who have the right to shut them down or restart them with the User Rights Assignment policy **Shut down the system**. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they are saved locally or distributed through Group Policy. - -### Group Policy - -For info about the User Rights Assignment policy, **Shut down the system**, see [Shut down the system](shut-down-the-system.md). - -## Security considerations - -This section describes: -- How an attacker might exploit a feature or its configuration. -- How to implement the countermeasure. -- Possible negative consequences of countermeasure implementation. - -### Vulnerability - -Users who can access the console locally could shut down the device - -Attackers who have access to the local console could restart the server, which would cause a temporary DoS condition. Attackers could also shut down the server and leave all of its applications and services unavailable. - -### Countermeasure - -Disable the **Shutdown: Allow system to be shut down without having to log on** setting. - -### Potential impact - -You must sign in on servers to shut them down or restart them. - -## Related articles - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md b/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md deleted file mode 100644 index da640b385d..0000000000 --- a/windows/security/threat-protection/security-policy-settings/shutdown-clear-virtual-memory-pagefile.md +++ /dev/null @@ -1,90 +0,0 @@ ---- -title: Shutdown Clear virtual memory pagefile -description: Describes the best practices, location, values, policy management and security considerations for the Shutdown Clear virtual memory pagefile security policy setting. -ms.assetid: 31400078-6c56-4891-a6df-6dfb403c4bc9 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 08/01/2017 ---- - -# Shutdown: Clear virtual memory pagefile - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **Shutdown: Clear virtual memory pagefile** security policy setting. - -## Reference - -This policy setting determines whether the virtual memory paging file is cleared when the device is shut down. Virtual memory support uses a system paging file to swap pages of memory to disk when they aren't used. On a running device, this paging file is opened exclusively by the operating system, and it's well protected. However, devices that are configured to allow other operating systems to start should verify that the system paging file is cleared as the device shuts down. This confirmation ensures that sensitive information from process memory that might be placed in the paging file isn't available to an unauthorized user who manages to directly access the paging file after shutdown. - -Important information that is kept in real memory might be written periodically to the paging file. This periodical write-operation helps devices handle multitasking functions. A malicious user who has physical access to a server that has been shut down can view the contents of the paging file. The attacker can move the system volume into a different computer and then analyze the contents of the paging file. This process is a time-consuming one, but it can expose data that is cached from RAM to the paging file. A malicious user who has physical access to the server can bypass this countermeasure by unplugging the server from its power source. - -### Possible values - -- Enabled - - The system paging file is cleared when the system shuts down normally. Also, this policy setting forces the computer to clear the hibernation file (hiberfil.sys) when hibernation is disabled on a portable device. - -- Disabled -- Not defined - -### Best practices - -- Set this policy to **Enabled**. This policy setting causes Windows to clear the paging file when the system is shut down. Depending on the size of the paging file, this process might take several minutes before the system completely shuts down. This delay in shutting down the server is especially noticeable on servers with large paging files. For a server with 2 gigabytes (GB) of RAM and a 2-GB paging file, this setting can add more than 30 minutes to the shutdown process. For some organizations, this downtime violates their internal service level agreements. Use caution when implementing this countermeasure in your environment. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Important information that is kept in real memory may be written periodically to the paging file to help Windows handle multitasking functions. An attacker who has physical access to a server that has been shut down could view the contents of the paging file. The attacker could move the system volume into a different device and then analyze the contents of the paging file. Although this process is time consuming, it could expose data that is cached from random access memory (RAM) to the paging file. - ->**Caution:**  An attacker who has physical access to the device could bypass this countermeasure by unplugging the computer from its power source. - -### Countermeasure - -Enable the **Shutdown: Clear virtual memory page file** setting. This configuration causes the operating system to clear the paging file when the device is shut down. The amount of time that is required to complete this process depends on the size of the page file. Because the process overwrites the storage area that is used by the page file several times, it could be several minutes before the device completely shuts down. - -### Potential impact - -It takes longer to shut down and restart the device, especially on devices with large paging files. For a device with 2 gigabytes (GB) of RAM and a 2-GB paging file, this policy setting could increase the shutdown process by more than 30 minutes. For some organizations, this downtime violates their internal service level agreements. Therefore, use caution before you implement this countermeasure in your environment. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md b/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md deleted file mode 100644 index 30ba31a152..0000000000 --- a/windows/security/threat-protection/security-policy-settings/store-passwords-using-reversible-encryption.md +++ /dev/null @@ -1,82 +0,0 @@ ---- -title: Store passwords using reversible encryption -description: Describes the best practices, location, values, and security considerations for the Store passwords using reversible encryption security policy setting. -ms.assetid: 57f958c2-f1e9-48bf-871b-0a9b3299e238 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Store passwords using reversible encryption - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **Store passwords using reversible encryption** security policy setting. - -## Reference - -The **Store password using reversible encryption** policy setting provides support for applications that use protocols that require the user's password for authentication. Storing encrypted passwords in a way that is reversible means that the encrypted passwords can be decrypted. A knowledgeable attacker who is able to break this encryption can then sign in to network resources by using the compromised account. For this reason, never enable **Store password using reversible encryption** for all users in the domain unless application requirements outweigh the need to protect password information. - -If you use the Challenge Handshake Authentication Protocol (CHAP) through remote access or Internet Authentication Services (IAS), you must enable this policy setting. CHAP is an authentication protocol that is used by remote access and network connections. Digest Authentication in Internet -Information Services (IIS) also requires that you enable this policy setting. - -### Possible values -- Enabled -- Disabled -- Not defined - -### Best practices - -Set the value for **Store password using reversible encryption** to Disabled. If you use CHAP through remote access or IAS, or Digest Authentication in IIS, you must set this value to **Enabled**. This setting presents a security risk when you apply the setting by using Group Policy on a user-by-user basis because it requires opening the appropriate user account object in Active Directory Users and Computers. - ->**Note:**  Do not enable this policy setting unless business requirements outweigh the need to protect password information. - -### Location - -**Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy\\** - -### Default values - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or Group Policy Object (GPO) | Default value | -| - | - | -| Default domain policy| Disabled| -| Default domain controller policy| Disabled| -| Stand-alone server default settings | Disabled| -| Domain controller effective default settings | Disabled| -| Member server effective default settings | Disabled| -| Effective GPO default settings on client computers | Disabled| - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Enabling this policy setting allows the operating system to store passwords in a format that can weaken your overall security. - -### Countermeasure - -Disable the **Store password using reversible encryption** policy setting. - ->[!Note] -> When policy settings are disabled, only new passwords will be stored using one-way encryption by default. Existing passwords will be stored using reversible encryption until they are changed. - -### Potential impact - -If your organization uses CHAP through remote access or IAS, or Digest Authentication in IIS, you must configure this policy setting to Enabled. This setting presents a security risk when you apply the setting through Group Policy on a user-by-user basis because it requires the appropriate user account object to be opened in Active Directory Users and Computers. - -## Related topics - -- [Password Policy](password-policy.md) diff --git a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md b/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md deleted file mode 100644 index b5cbe5f54e..0000000000 --- a/windows/security/threat-protection/security-policy-settings/synchronize-directory-service-data.md +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: Synchronize directory service data -description: Describes the best practices, location, values, policy management, and security considerations for the Synchronize directory service data security policy setting. -ms.assetid: 97b0aaa4-674f-40f4-8974-b4bfb12c232c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Synchronize directory service data - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Synchronize directory service data** security policy setting. - -## Reference - -This policy setting determines which users and groups have authority to synchronize all directory service data, regardless of the protection for objects and properties. This privilege is required to use LDAP directory synchronization (dirsync) services. Domain controllers have this user right inherently because the synchronization process runs in the context of the **System** account on domain controllers. - -Constant: SeSyncAgentPrivilege - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -- Ensure that no accounts are assigned the **Synchronize directory service data** user right. Only domain controllers need this privilege, which they inherently have. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting isn't defined on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| Domain Controller Effective Default Settings | Enabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The **Synchronize directory service data** user right affects domain controllers (only domain controllers should be able to synchronize directory service data). Domain controllers have this user right inherently because the synchronization process runs in the context of the **System** account on domain controllers. Attackers who have this user right can view all information that is stored within the directory. They could then use some of that information to facilitate more attacks or expose sensitive data, such as direct telephone numbers or physical addresses. - -### Countermeasure - -Ensure that no accounts are assigned the **Synchronize directory service data** user right. - -### Potential impact - -None. Not defined is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md deleted file mode 100644 index b72384f5df..0000000000 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md +++ /dev/null @@ -1,86 +0,0 @@ ---- -title: System cryptography Force strong key protection for user keys stored on the computer -description: Best practices, security considerations, and more for the policy setting, System cryptography Force strong key protection for user keys stored on the computer. -ms.assetid: 8cbff267-881e-4bf6-920d-b583a5ff7de0 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# System cryptography: Force strong key protection for user keys stored on the computer - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **System cryptography: Force strong key protection for user keys stored on the computer** security policy setting. - -## Reference - -This policy setting determines whether users can use private keys, such as their Secure/Multipurpose Internet Mail Extensions (S/MIME) key, without a password. - -Configuring this policy setting so that users must provide a password every time they use a key (in addition to their domain password) makes it more difficult for a malicious user to access locally stored user keys, even if the attacker takes control of the user's device and determines their sign-in password. - -### Possible values - -- **User input is not required when new keys are stored and used** -- **User is prompted when the key is first used** -- **User must enter a password each time they use a key** -- Not defined - -### Best practices - -- Set this policy to **User must enter a password each time they use a key**. Users must enter their password every time they access a key that is stored on their computer. For example, if users use an S/MIME certificate to digitally sign their email, they'll be forced to enter the password for that certificate every time they send a signed email message. For some organizations, the overhead that is caused by using this value might be too high, but they should set the value at a minimum to **User is prompted when the key is first used**. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Not defined| -| DC Effective Default Settings | Not defined| -| Member Server Effective Default Settings | Not defined| -| Client Computer Effective Default Settings| Not defined| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -If a user's account is compromised or the user's device is inadvertently left unsecured, the malicious user can use the keys that are stored for the user to access protected resources. - -### Countermeasure - -Configure the **System cryptography: Force strong key protection for user keys stored on the computer** setting to **User must enter a password each time they use a key** so that users must provide a password that is distinct from their domain password every time they use a key. This configuration makes it more difficult for an attacker to access locally stored user keys, even if the attacker takes control of the user's computer and determines the sign-in password. - -### Potential impact - -Users must type their password every time they access a key that is stored on their device. For example, if users use an S/MIME certificate to digitally sign their email, they're forced to type the password for that certificate every time they send a signed email message. For some organizations, the overhead that is involved by using this configuration may be too high. At a minimum, this setting should be set to **User is prompted when the key is first used**. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md b/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md deleted file mode 100644 index 2c4c5679ce..0000000000 --- a/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md +++ /dev/null @@ -1,123 +0,0 @@ ---- -title: System cryptography Use FIPS compliant algorithms for encryption, hashing, and signing -description: Best practices, security considerations, and more for the policy setting System cryptography Use FIPS compliant algorithms for encryption, hashing, and signing -ms.assetid: 83988865-dc0f-45eb-90d1-ee33495eb045 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 11/16/2018 ---- - -# System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing - -**Applies to** -- Windows 11 -- Windows 10 - -This security policy reference topic for the IT professional describes the best practices, location, values, policy management and security considerations for this policy setting. - -## Reference - -The Federal Information Processing Standard (FIPS) 140 is a security implementation that is designed for certifying cryptographic software. Windows implements these certified algorithms to meet the requirements and standards for cryptographic modules for use by departments and agencies of the -United States federal government. - -**TLS/SSL** - -This policy setting determines whether the TLS/SSL security provider supports only the FIPS-compliant strong cipher suite known as TLS\_RSA\_WITH\_3DES\_EDE\_CBC\_SHA, which means that the provider only supports the TLS protocol as a client computer and as a server, if applicable. It uses only the -Triple Data Encryption Standard (3DES) encryption algorithm for the TLS traffic encryption, only the Rivest-Shamir-Adleman (RSA) public key algorithm for the TLS key exchange and authentication, and only the Secure Hash Algorithm version 1 (SHA-1) hashing algorithm for the TLS hashing requirements. - -**Encrypting File System (EFS)** - -For the EFS service, this policy setting supports the 3DES and Advanced Encryption Standard (AES) encryption algorithms for encrypting file data supported by the NTFS file system. To encrypt file data, by default EFS uses the Advanced Encryption Standard (AES) algorithm with a 256-bit key in the Windows Server 2003, Windows Vista, and later, and it uses a DESX algorithm in Windows XP. - -**Remote Desktop Services (RDS)** - -If you're using Remote Desktop Services, this policy setting should only be enabled if the 3DES encryption algorithm is supported. - -**BitLocker** - -For BitLocker, this policy setting needs to be enabled before any encryption key is generated. -Recovery passwords created on Windows Server 2012 R2 and Windows 8.1 and later when this policy is enabled are incompatible with BitLocker on operating systems prior to Windows Server 2012 R2 and Windows 8.1; BitLocker will prevent the creation or use of recovery passwords on these systems, so recovery keys should be used instead. -Additionally, if a data drive is password-protected, it can be accessed by a FIPS-compliant computer after the password is supplied, but the drive will be read-only. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -We recommend that customers hoping to comply with FIPS 140-2 research the configuration settings of applications and protocols they may be using to ensure their solutions can be configured to utilize the FIPS 140-2 validated cryptography provided by Windows when it's operating in FIPS 140-2 approved mode. - -For a complete list of Microsoft-recommended configuration settings, see [Windows security baselines](../../operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines.md). For more information about Windows and FIPS 140-2, see [FIPS 140 Validation](../fips-140-validation.md). - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -### Operating system version differences - -When this setting is enabled, the Encrypting File System (EFS) service supports only the Triple DES encryption algorithm for encrypting file data. By default, the Windows Vista and the Windows Server 2003 implementation of EFS uses the Advanced Encryption Standard (AES) with a 256-bit key. The Windows XP implementation uses DESX. - -When this setting is enabled, BitLocker generates recovery password or recovery keys applicable to the following versions: - -| Operating systems | Applicability | -| - | - | -| Windows 10, Windows 8.1, and Windows Server 2012 R2| When created on these operating systems, the recovery password can't be used on other systems listed in this table.| -| Windows Server 2012 and Windows 8 | When created on these operating systems, the recovery key can be used on other systems listed in this table as well.| -| Windows Server 2008 R2 and Windows 7 | When created on these operating systems, the recovery key can be used on other systems listed in this table as well.| -| Windows Server 2008 and Windows Vista | When created on these operating systems, the recovery key can be used on other systems listed in this table as well.| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -Setting and deploying this policy using Group Policy takes precedence over the setting on the local device. If the Group Policy is set to **Not Configured**, local settings will apply. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -You can enable this policy setting to ensure that the device uses the most powerful algorithms that are available for digital encryption, hashing, and signing. Use of these algorithms minimize the risk of compromise of digitally encrypted or signed data by an unauthorized user. - -### Countermeasure - -Enable the **System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing** setting. - -### Potential impact - -Client devices that have this policy setting enabled can't communicate through digitally encrypted or signed protocols with servers that don't support these algorithms. Network clients that don't support these algorithms can't use servers that require them for network communications. For example, many Apache-based Web servers aren't configured to support TLS. If you enable this setting, you must also configure Internet Explorer® to use TLS. This policy setting also affects the encryption level that is used for the Remote Desktop Protocol (RDP). The Remote Desktop Connection tool -uses the RDP protocol to communicate with servers that run Terminal Services and client computers that are configured for remote control; RDP connections fail if both devices aren't configured to use the same encryption algorithms. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md deleted file mode 100644 index 1f8e7eadab..0000000000 --- a/windows/security/threat-protection/security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md +++ /dev/null @@ -1,91 +0,0 @@ ---- -title: System objects Require case insensitivity for non-Windows subsystems -description: Best practices, security considerations and more for the security policy setting, System objects Require case insensitivity for non-Windows subsystems. -ms.assetid: 340d6769-8f33-4067-8470-1458978d1522 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# System objects: Require case insensitivity for non-Windows subsystems - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **System objects: Require case insensitivity for non-Windows subsystems** security policy setting. - -## Reference - -This policy setting determines whether case insensitivity is enforced for all subsystems. The Microsoft Win32 subsystem isn't case sensitive; however, the kernel supports case sensitivity for other subsystems, such as Portable Operating System Interface for UNIX (POSIX). Enabling this policy setting enforces case insensitivity for all directory objects, symbolic links, and input/output (I/O) objects, including file objects. Disabling this policy setting doesn't allow the Win32 subsystem to become case sensitive. - -Because Windows is case insensitive but the POSIX subsystem will support case sensitivity, if this policy setting isn't enforced, it's possible for a user of that subsystem to create a file with the same name as another file but with a different mix of capital letters. That convention might confuse users when they try to access these files by using normal Win32 tools, because only one of the files will be available. - -### Possible values - -- Enabled - - Case insensitivity is enforced for all directory objects, symbolic links, and IO objects, including file objects. - -- Disabled - - Won't allow the Win32 subsystem to become case sensitive. - -- Not defined - -### Best practices - -- Set this policy to **Enabled**. All subsystems will be forced to observe case insensitivity. However, this insensitivity might confuse users who are familiar with one of the UNIX-based operating systems and are used to a case sensitive operating system. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Because Windows is case insensitive but the POSIX subsystem supports case sensitivity, failure to enable this policy setting makes it possible for a user of that subsystem to create a file with the same name as another file but with a different mix of uppercase and lowercase letters. Such a situation could potentially confuse users when they try to access such files from normal Win32 tools because only one of the files is available. - -### Countermeasure - -Enable the **System objects: Require case insensitivity for non-Windows subsystems** setting. - -### Potential impact - -All subsystems are forced to observe case insensitivity. This configuration may confuse users who are familiar with any UNIX-based operating systems that are case sensitive. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md b/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md deleted file mode 100644 index 2045194c25..0000000000 --- a/windows/security/threat-protection/security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md +++ /dev/null @@ -1,83 +0,0 @@ ---- -title: System objects Strengthen default permissions of internal system objects (for example, Symbolic Links) -description: Best practices and more for the security policy setting, System objects Strengthen default permissions of internal system objects (for example, Symbolic Links). -ms.assetid: 3a592097-9cf5-4fd0-a504-7cbfab050bb6 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# System objects: Strengthen default permissions of internal system objects (for example, Symbolic Links) - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)** security policy setting. - -## Reference - -This policy setting determines the strength of the default discretionary access control list (DACL) for objects. Windows maintains a global list of shared system resources such as MS-DOS device names, mutexes, and semaphores. The processes use this list to locate and share objects. Each type of object is created with a default DACL that specifies who can access the objects with what permissions. Enabling this policy setting strengthens the default DACL and allows users who aren't administrators to read, but not to modify, shared objects that they didn't create. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- It's advisable to set this policy to **Enabled**. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\ Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled | -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -This policy setting is enabled by default to protect against a known vulnerability that can be used with hard links or symbolic links. Hard links are actual directory entries in the file system. With hard links, the same data in a file system can be referred to by different file names. Symbolic links are text files that provide a pointer to the file that is interpreted and followed by the operating system as a path to another file or directory. Because symbolic links are a separate file, they can exist independently of the target location. If a symbolic link is deleted, its target location remains unaffected. When this setting is disabled, it's possible for a malicious user to destroy a data file by creating a link that looks like a temporary file that the system automatically creates, such as a sequentially named log file, but it points to the data file that the malicious user wants to eradicate. When the system writes the files with that name, the data is overwritten. Enabling **System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links)** prevents an attacker from exploiting programs that create files with predictable names by not allowing them to write to objects that they didn't create. - -### Countermeasure - -Enable the **System objects: Strengthen default permissions of global system objects (for example, Symbolic Links)** setting. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md b/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md deleted file mode 100644 index b33abc4d19..0000000000 --- a/windows/security/threat-protection/security-policy-settings/system-settings-optional-subsystems.md +++ /dev/null @@ -1,86 +0,0 @@ ---- -title: System settings Optional subsystems -description: Describes the best practices, location, values, policy management, and security considerations for the System settings Optional subsystems security policy setting. -ms.assetid: 5cb6519a-4f84-4b45-8072-e2aa8a72fb78 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# System settings: Optional subsystems - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **System settings: Optional subsystems** security policy setting. - -## Reference - -This policy setting determines which subsystems support your applications. You can use this security setting to specify as many subsystems as your environment demands. - -The subsystem introduces a security risk that is related to processes that can potentially persist across logons. If a user starts a process and then signs out, the next user who signs in to the system might access the process that the previous user started. This pattern is dangerous, because the process started by the first user can retain that user's system user rights; therefore, anything that the second user does using that process is performed with the user rights of the first user. This privileges rollover makes it difficult to trace who creates processes and objects, which is essential for post-security incident forensics. - -### Possible values - -- User-defined list of subsystems -- Not defined - -### Best practices - -- Set this policy setting to a null value. The default value is **POSIX**, so applications that rely on the POSIX subsystem will no longer run. For example, Microsoft Services for UNIX 3.0 installs an updated version of the POSIX subsystem. Reset this policy setting in Group Policy for any servers that use Services for UNIX 3.0. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | POSIX| -| DC Effective Default Settings | POSIX| -| Member Server Effective Default Settings| POSIX| -| Client Computer Effective Default Settings | POSIX| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -The POSIX subsystem is an Institute of Electrical and Electronic Engineers (IEEE) standard that defines a set of operating system services. The POSIX subsystem is required if the server supports applications that use that subsystem. - -The POSIX subsystem introduces a security risk that relates to processes that can potentially persist across sign-ins. If a user starts a process and then signs out, there's a potential that the next user who signs in to the computer could access the previous user's process. This accessibility would allow the second user to take actions on the process by using the privileges of the first user. - -### Countermeasure - -Configure the **System settings: Optional subsystems setting** to a null value. The default value is POSIX. - -### Potential impact - -Applications that rely on the POSIX subsystem no longer operate. For example, Microsoft Services for UNIX (SFU) installs an updated version of the POSIX subsystem that is required, so you must reconfigure this setting in Group Policy for any servers that use SFU. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md b/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md deleted file mode 100644 index 61df619542..0000000000 --- a/windows/security/threat-protection/security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md +++ /dev/null @@ -1,84 +0,0 @@ ---- -title: System settings Use certificate rules on Windows executables for Software Restriction Policies -description: Best practices and more for the security policy setting, System settings Use certificate rules on Windows executables for Software Restriction Policies. -ms.assetid: 2380d93b-b553-4e56-a0c0-d1ef740d089c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# System settings: Use certificate rules on Windows executables for Software Restriction Policies - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** security policy setting. - -## Reference - -This policy setting determines whether digital certificates are processed when software restriction policies are enabled and a user or process attempts to run software with an .exe file name extension. This security setting enables or disables certificate rules (which are a type of software restriction policy). With a software restriction policy, you can create a certificate rule that allows or disallows Microsoft Authenticode®-signed software to run, based on the digital certificate that is associated with the software. For certificate rules to work in software restriction policies, you must enable this security setting. - -### Possible values - -- Enabled -- Disabled -- Not defined - -### Best practices - -- Set this policy to **Enabled**. Enabling certificate rules results in software restriction policies checking a certificate revocation list (CRL) to make sure that the software's certificate and signature are valid. When you start signed programs, this setting can decrease system performance. -You can disable CRLs by editing the software restriction policies in the desired GPO. In the **Trusted Publishers Properties** dialog box, clear the **Publisher** and **Timestamp** check boxes. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled | -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Without the use of software restriction policies, users and device might be exposed to unauthorized software that could include malware. - -### Countermeasure - -Enable the **System settings: Use certificate rules on Windows executables for Software Restriction Policies** setting. - -### Potential impact - -If you enable certificate rules, software restriction policies check a certificate revocation list (CRL) to verify that the software's certificate and signature are valid. This checking process may negatively affect performance when signed programs start. To disable this feature, you can edit the software restriction policies in the appropriate GPO. In the **Trusted Publishers Properties** dialog box, clear the **Publisher** and **Timestamp** check boxes. - -## Related topics - -- [Security Options](security-options.md) diff --git a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md b/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md deleted file mode 100644 index 1563e3d995..0000000000 --- a/windows/security/threat-protection/security-policy-settings/take-ownership-of-files-or-other-objects.md +++ /dev/null @@ -1,114 +0,0 @@ ---- -title: Take ownership of files or other objects -description: Describes the best practices, location, values, policy management, and security considerations for the Take ownership of files or other objects security policy setting. -ms.assetid: cb8595d1-74cc-4176-bb15-d97663eebb2d -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# Take ownership of files or other objects - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **Take ownership of files or other objects** security policy setting. - -## Reference - -This policy setting determines which users can take ownership of any securable object in the device, including Active Directory objects, NTFS files and folders, printers, registry keys, services, processes, and threads. - -Every object has an owner, whether the object resides in an NTFS volume or Active Directory database. The owner controls how permissions are set on the object and to whom permissions are granted. - -By default, the owner is the person who or the process that created the object. Owners can always change permissions to objects, even when they're denied all access to the object. - -Constant: SeTakeOwnershipPrivilege - -### Possible values - -- User-defined list of accounts -- Not defined - -### Best practices - -- Assigning this user right can be a security risk. Because owners of objects have full control of them, only assign this user right to trusted users. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment - -### Default values - -By default this setting is Administrators on domain controllers and on stand-alone servers. - -The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Administrators| -| Stand-Alone Server Default Settings | Administrators| -| Domain Controller Effective Default Settings | Administrators| -| Member Server Effective Default Settings | Administrators| -| Client Computer Effective Default Settings | Administrators| - -## Policy management - -This section describes features, tools, and guidance to help you manage this policy. - -A restart of the device isn't required for this policy setting to be effective. - -Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. - -Ownership can be taken by: - -- An administrator. By default, the Administrators group is given the **Take ownership of files or other objects** user right. -- Anyone or any group who has the **Take ownership** user right on the object. -- A user who has the **Restore files and directories** user right. - -Ownership can be transferred in the following ways: - -- The current owner can grant the **Take ownership** user right to another user if that user is a member of a group defined in the current owner's access token. The user must take ownership to complete the transfer. -- An administrator can take ownership. -- A user who has the **Restore files and directories** user right can double-click **Other users and groups** and choose any user or group to assign ownership to. - -### Group Policy - -Settings are applied in the following order through a Group Policy Object (GPO), which will overwrite settings on the local computer at the next Group Policy update: - -1. Local policy settings -2. Site policy settings -3. Domain policy settings -4. OU policy settings - -When a local setting is greyed out, it indicates that a GPO currently controls that setting. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Any users with the **Take ownership of files or other objects user right** can take control of any object, regardless of the permissions on that object, and then make any changes that they want to make to that object. Such changes could result in exposure of data, corruption of data, or a -denial-of-service condition. - -### Countermeasure - -Ensure that only the local Administrators group has the **Take ownership of files or other objects** user right. - -### Potential impact - -None. Restricting the **Take ownership of files or other objects** user right to the local Administrators group is the default configuration. - -## Related topics - -- [User Rights Assignment](user-rights-assignment.md) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md b/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md deleted file mode 100644 index 1dbf68c41d..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: User Account Control Admin Approval Mode for the Built-in Administrator account -description: Best practices, security considerations, and more for the policy setting, User Account Control Admin Approval Mode for the Built-in Administrator account. -ms.assetid: d465fc27-1cd2-498b-9cf6-7ad2276e5998 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 09/08/2017 ---- - -# User Account Control: Admin Approval Mode for the Built-in Administrator account -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Admin Approval Mode for the Built-in Administrator account** security policy setting. - -## Reference - -This policy setting determines the behavior of Admin Approval Mode for the built-in administrator account. -When the Admin Approval Mode is enabled, the local administrator account functions like a standard user account, but it has the ability to elevate privileges without logging on by using a different account. In this mode, any operation that requires elevation of privilege displays a prompt that allows the administrator to permit or deny the elevation of privilege. If Admin Approval Mode isn't enabled, the built-in Administrator account runs all applications by default with full administrative privileges. By default, Admin Approval Mode is set to **Disabled**. - -> [!NOTE] -> If a computer is upgraded from a previous version of the Windows operating system, and the administrator account is the only account on the computer, the built-in administrator account remains enabled, and this setting is also enabled. - -### Possible values - -- Enabled - - The built-in administrator account logs on in Admin Approval Mode so that any operation that requires elevation of privilege displays a prompt that provides the administrator the option to permit or deny the elevation of privilege. - -- Disabled - - If Admin Approval Mode isn't enabled, the built-in Administrator account runs all applications by default with full administrative privileges - -### Best practices - -- It's recommended not to enable the built-in Administrator account on the client computer, but to use the standard user account and User Account Control (UAC) instead. If you want to enable the built-in Administrator account to carry out administrative tasks, for security reasons you should also enable Admin Approval Mode. See [UAC-Admin-Approval-Mode-for-the-Built-in-Administrator-account](/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account) - - To enable Admin Approval Mode, you must also configure the local security policy setting: [User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode](/windows/device-security/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode) to **Prompt for consent on the secure desktop** and then click OK. - -> [!NOTE] -> After enabling Admin Approval Mode, to activate the setting, you must first log in and out. Alternatively, You may perform **gpupdate /force** from an elevated command prompt. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -One of the risks that the UAC feature tries to mitigate is that of malicious software running under elevated credentials without the user or administrator being aware of its activity. An attack vector for malicious programs is to discover the password of the Administrator account because that user account was created for all installations of Windows. To address this risk, the built-in Administrator account is disabled in computers running at least Windows Vista. In computers running at least Windows Server 2008, the Administrator account is enabled, and the password must be changed the first time the administrator logs on. In a default installation of a computer running at least Windows Vista, if the computer isn't joined to a domain, the first user account you create has the equivalent permissions of a local administrator. - -### Countermeasure - -Enable the **User Account Control: Admin Approval Mode for the Built-in Administrator account** setting if you have the built-in Administrator account enabled. - -### Potential impact - -Users who sign in by using the local administrator account are prompted for consent whenever a program requests an elevation in privilege. -## Related topics - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md b/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md deleted file mode 100644 index 4452ee2e72..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md +++ /dev/null @@ -1,126 +0,0 @@ ---- -title: User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop -description: Best practices and more for the policy setting, User Account Control Allow UIAccess applications to prompt for elevation without using the secure desktop. -ms.assetid: fce20472-3c93-449d-b520-13c4c74a9892 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, and security considerations for the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** security policy setting. - -## Reference - -This security setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. - ->**Note:**  This setting does not change the behavior of the UAC elevation prompt for administrators. - -**Background** - -User Interface Privilege Isolation (UIPI) implements restrictions in the Windows subsystem that prevent lower-privilege applications from sending messages or installing hooks in higher-privilege processes. Higher-privilege applications are permitted to send messages to lower-privilege processes. UIPI doesn't interfere with or change the behavior of messages between applications at the same privilege (or integrity) level. - -Microsoft UI Automation is the current model to support accessibility requirements in the Windows operating systems. Applications that support an accessible user experience control the behavior of other Windows applications for the user. When all applications on the automation client computer and server are running as a standard user (that is, at a medium integrity level), the UIPI restrictions don't interfere with the Microsoft UI automation model. - -However, there might be times when an administrative user runs an application with elevated privilege based on UAC in Admin Approval Mode. Microsoft UI Automation can't drive the UI graphics of elevated applications on the desktop without the ability to bypass the restrictions that UIPI implements. The ability to bypass UIPI restrictions across privilege levels is available for UI automation programs by using UIAccess. - -If an application presents a UIAccess attribute when it requests privileges, the application is stating a requirement to bypass UIPI restrictions for sending messages across privilege levels. Devices implement the following policy -checks before starting an application with UIAccess privilege. - -1. The application must have a digital signature that can be verified by using a digital certificate that is associated with the Trusted Root Certification Authorities store on the local computer. -2. The application must be installed in a local folder that is writeable only by administrators, such as the Program Files directory. The allowed directories for UI automation applications are: - - 1. %ProgramFiles% and its subdirectories. - 2. %WinDir% and its subdirectories, except a few subdirectories that are excluded because standard users have write access. - -**Resulting behavior** - -When this setting is enabled, UIAccess programs (including Windows Remote Assistance) can automatically disable the secure desktop for elevation prompts. Unless you have also disabled elevation prompts, the prompts appear on the interactive user's desktop instead of on the secure desktop. The prompts also appear on the remote administrator's view of the desktop during a Windows Remote Assistance session, and the remote administrator can provide the appropriate credentials for elevation. - -If you disable this setting, the secure desktop can only be disabled by the user of the interactive desktop or by disabling the [User Account Control: Switch to the secure desktop when prompting for elevation](user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md) setting, which by default is enabled. - -### Possible values - -- Enabled - - UIA programs can automatically disable the secure desktop for elevation prompts, and unless you have also disabled elevation prompts, the prompts appear on the interactive user's desktop instead of on the secure desktop. Prompts will also appear on the remote administrator's view of the desktop during a Windows Remote Assistance session, and the remote administrator can provide the appropriate credentials for elevation. - -- Disabled - - The secure desktop can be disabled only by the user of the interactive desktop or by disabling the **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting. - -### Best practices - -- Best practices are dependent on your security policies and your remote operational requirements. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -Server type or GPO| Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console (GPMC) or Local Security Policy snap-in for a domain, site, or organizational unit (OU). - -### Policy interactions - -If you plan to enable this setting, you should also review the effect of the [User Account Control: Behavior of the elevation prompt for standard users](user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md) setting. If it's configured as **Automatically deny elevation requests**, elevation requests aren't presented to the user. If you disable this setting, the secure desktop can only be disabled by the user of the interactive desktop or by disabling the [User Account Control: Switch to the secure desktop when prompting for elevation](user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md) setting, which by default is enabled. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -UIA programs are designed to interact with Windows and application programs on behalf of a user. This setting allows UIA programs to bypass the secure desktop to increase usability in certain cases, but it allows elevation requests to appear on the regular interactive desktop instead of on the secure desktop. This requests-appearance increases the risk that a malicious program could intercept data that is being transferred between the UI and the application. Because UIA programs must be able to respond to prompts regarding security issues, such as the UAC elevation prompt, UIA programs must be highly trusted. To be considered trusted, a UIA program must be digitally signed. By default, UIA programs can be run only from the following protected paths: - -- ..\\Program Files\\ (and subfolders) -- ..\\Program Files (x86)\\ (and subfolders, in 64-bit versions of Windows only) -- ..\\Windows\\System32\\ - -The requirement to be in a protected path can be disabled by the [User Account Control: Only elevate UIAccess applications that are installed in secure locations](user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md) setting. Although this setting applies to any UIA program, it's used primarily in certain Windows Remote Assistance scenarios. - -### Countermeasure - -Disable the **User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop** setting. - -### Potential impact - -If a user requests remote assistance from an administrator and the remote assistance session is established, elevation prompts appear on the interactive user's secure desktop and the administrator's remote session is paused. To avoid pausing the remote administrator’s session during elevation requests, the user can select the "Allow IT Expert to respond to User Account Control prompts" check box when setting up the remote assistance session. But selecting this check box requires the interactive user to respond to an elevation prompt on the secure desktop. If the interactive user is a standard user, the user doesn't have the required credentials to allow elevation. - -## Related topics - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md deleted file mode 100644 index ba2ac6f92a..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md +++ /dev/null @@ -1,115 +0,0 @@ ---- -title: User Account Control Behavior of the elevation prompt for administrators in Admin Approval Mode -description: Best practices and more for the security policy setting, User Account Control Behavior of the elevation prompt for administrators in Admin Approval Mode. -ms.assetid: 46a3c3a2-1d2e-4a6f-b5e6-29f9592f535d -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 09/08/2017 ---- - -# User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** security policy setting. - -## Reference - -This policy setting determines the behavior of the elevation prompt for accounts that have administrative credentials. - -### Possible values - -- **Elevate without prompting** - - Assumes that the administrator will permit an operation that requires elevation, and more consent or credentials aren't required. - - **Note**  Selecting **Elevate without prompting** minimizes the protection that is provided by UAC. We don't recommend selecting this value unless administrator accounts are tightly controlled and the operating environment is highly secure. - -- **Prompt for credentials on the secure desktop** - - When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. - -- **Prompt for consent on the secure desktop** - - When an operation requires elevation of privilege, the user is prompted on the secure desktop to select **Permit** or **Deny**. If the user selects **Permit**, the operation continues with the user's highest available privilege.* - -- **Prompt for credential**s - - An operation that requires elevation of privilege prompts the administrator to type the user name and password. If the administrator enters valid credentials, the operation continues with the applicable privilege. - -- **Prompt for consent** - - An operation that requires elevation of privilege prompts the administrator to select **Permit** or **Deny**. If the administrator selects **Permit**, the operation continues with the administrator's highest available privilege. - -- **Prompt for consent for non-Windows binaries** - - This prompt for consent is the default. When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select **Permit** or **Deny**. If the user selects **Permit**, the operation continues with the user's highest available privilege. - -\*If you've enabled the built-in Administrator account and have configured Admin Approval Mode, you must also configure the option **Prompt for consent on the secure desktop**. You can also configure this option from User Account Control, by typing **UAC** in the search box. From the User Account Control Settings dialog box, set the slider control to **Notify me only when apps try to make changes to my computer (default)**. - -> [!NOTE] -> After enabling Admin Approval Mode, to activate the setting, you must first log in and out. Alternatively, You may perform **gpupdate /force** from an elevated command prompt. - -### Best practices - -- Selecting the option **Elevate without prompting** minimizes the protection that is provided by UAC. We don't recommend selecting this value unless administrator accounts are tightly controlled and the operating environment is highly secure. - -- It's recommended not to enable the built-in Administrator account on the client computer, but to use the standard user account and User Account Control (UAC) instead. If you want to enable the built-in Administrator account to carry out administrative tasks, for security reasons you should also enable Admin Approval Mode. For more information, see [UAC-Admin-Approval-Mode-for-the-Built-in-Administrator-account](/windows/device-security/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account) - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined | -| Stand-Alone Server Default Settings | Prompt for consent for non-Windows binaries| -| DC Effective Default Settings | Prompt for consent for non-Windows binaries| -| Member Server Effective Default Settings | Prompt for consent for non-Windows binaries| -| Client Computer Effective Default Settings | Prompt for consent for non-Windows binaries| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console (GPMC) or Local Security Policy snap-in for a domain, site, or organizational unit (OU). - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -One of the risks that the UAC feature tries to mitigate is that of malicious software running under elevated credentials without the user or administrator being aware of its activity. This setting raises awareness to the administrator of elevated privilege operations, and it permits the administrator to prevent a malicious program from elevating its privilege when the program attempts to do so. - -### Countermeasure - -Configure the **User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode** setting to **Prompt for consent**. - -### Potential impact - -Administrators should be made aware that they'll be prompted for consent when all binaries attempt to run. - -## Related topics - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md b/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md deleted file mode 100644 index f4ef816fc7..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md +++ /dev/null @@ -1,87 +0,0 @@ ---- -title: Behavior of the elevation prompt for standard users -description: Learn about best practices, security considerations, and more for the policy setting, User Account Control Behavior of the elevation prompt for standard users. -ms.author: vinpa -author: vinaypamnani-msft -manager: aaroncz -ms.topic: reference -ms.date: 01/18/2023 ---- - -# User Account Control: Behavior of the elevation prompt for standard users - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Behavior of the elevation prompt for standard users** security policy setting. - -This policy setting determines the behavior of the elevation prompt for standard users. - -## Possible values - -- **Automatically deny elevation requests** - - This option returns an *Access denied* error message to standard users when they try to perform an operation that requires elevation of privilege. Most organizations that run desktops as standard users configure this policy to reduce help desk calls. - -- **Prompt for credentials on the secure desktop** - - When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. - -- **Prompt for credentials** - - An operation that requires elevation of privilege prompts the user to type an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. This is the default value. - -## Best practices - -1. Configure the **User Account Control: Behavior of the elevation prompt for standard users** to **Automatically deny elevation requests**. This setting requires the user to sign in with an administrative account to run programs that require elevation of privilege. -2. As a security best practice, standard users shouldn't have knowledge of administrative passwords. However, if your users have both standard and administrator-level accounts, set **Prompt for credentials on the secure desktop** so that the users don't choose to always sign in with their administrator accounts, and they shift their behavior to use the standard user account. - -## Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -## Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy | Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Prompt for credentials on the secure desktop| -| DC Effective Default Settings | Prompt for credentials on the secure desktop| -| Member Server Effective Default Settings | Prompt for credentials on the secure desktop| -| Client Computer Effective Default Settings | Prompt for credentials on the secure desktop| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console (GPMC) or Local Security Policy snap-in for a domain, site, or organizational unit (OU). - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -One of the risks that the UAC feature tries to mitigate is that of malicious programs running under elevated credentials without the user or administrator being aware of their activity. This setting raises awareness to the user that a program requires the use of elevated privilege operations, and it requires that the user supply administrative credentials for the program to run. - -### Countermeasure - -Configure the **User Account Control: Behavior of the elevation prompt for standard users** to **Automatically deny elevation requests**. This setting requires the user to sign in with an administrative account to run programs that require elevation of privilege. As a security best practice, standard users shouldn't have knowledge of administrative passwords. However, if your users have both standard and administrator-level accounts, we recommend setting **Prompt for credentials on the secure desktop** so that the users don't choose to always sign in with their administrator accounts, and they shift their behavior to use the standard user account. - -### Potential impact - -Users must provide administrative passwords to run programs with elevated privileges. This impact could cause an increased load on IT staff while the programs that are affected are identified and standard operating procedures are modified to support least privilege operations. - -## Related topics - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md deleted file mode 100644 index 4456c3de17..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md +++ /dev/null @@ -1,89 +0,0 @@ ---- -title: User Account Control Detect application installations and prompt for elevation -description: Learn about best practices and more for the security policy setting, User Account Control Detect application installations and prompt for elevation. -ms.assetid: 3f8cb170-ba77-4c9f-abb3-c3ed1ef264fc -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# User Account Control: Detect application installations and prompt for elevation - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Detect application installations and prompt for elevation** security policy setting. - -## Reference - -This policy setting determines the behavior of application installation detection for the entire system. -Some software might attempt to install itself after being given permission to run. The user may give permission for the program to run because the program is trusted. Then the user is prompted to install an unknown component. This security policy provides another way to identify and stop these attempted software installations before they can do damage. - -### Possible values - -- **Enabled** - - Application installation packages that require an elevation of privilege to install are detected and the user is prompted for administrative credentials. - -- **Disabled** - - Application installation packages that require an elevation of privilege to install aren't detected and the user isn't prompted for administrative credentials. - -### Best practices - -1. Installer detection is unnecessary when enterprises run standard user desktops that capitalize on delegated installation technologies like Group Policy Software Install (GPSI) or Configuration Manager. Therefore you can set this security policy to **Disabled**. -2. Enable the **User Account Control: Detect application installations and prompt for elevation** setting so standard users must provide administrative credentials before software is installed. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Some malicious software might attempt to install itself after being given permission to run, for example, malicious software with a trusted application shell. The user may give permission for the program to run because the program is trusted. Then the user is prompted to install an unknown component. This policy provides another way to trap the software before it can do damage. - -### Countermeasure - -Enable the **User Account Control: Detect application installations and prompt for elevation** setting. - -### Potential impact - -Users must provide administrative passwords to install programs. - -## Related topics - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md deleted file mode 100644 index ace44a281a..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md +++ /dev/null @@ -1,97 +0,0 @@ ---- -title: User Account Control Only elevate executables that are signed and validated -description: Best practices, security considerations, and more for the security policy setting, User Account Control Only elevate executables that are signed and validated. -ms.assetid: 64950a95-6985-4db6-9905-1db18557352d -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# User Account Control: Only elevate executables that are signed and validated - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate executables that are signed and validated** security policy setting. - -## Reference - -This policy setting enforces public key infrastructure (PKI) signature checks on any interactive application that requests elevation of privilege. You can control the apps that are allowed to run through the population of certificates in the local computer's Trusted Publishers store. - -A trusted publisher is a certificate issuer that the computer’s user has chosen to trust and that has certificate details that have been added to the store of trusted publishers. - -Windows maintains certificates in certificate stores. These stores can be represented by containers in the file system or the registry, or they can be implemented as physical stores such as smart cards. Certificate stores are associated with the computer object or they're owned by a distinct user who has a security context and profile on that computer. In addition, services can have certificate stores. A certificate store will often contain numerous certificates, possibly issued from many different certification authorities (CAs). -When certificate path discovery is initiated, Windows attempts to locate the issuing CA for the certificates, and it builds a certificate path to the trusted root certificate. Intermediate certificates are included as part of the application protocol or are picked up from Group Policy or through URLs that are specified in the Authority Information Access (AIA) extension. When the path is built, each certificate in the path is verified for validity with respect to various parameters, such as name, time, signature, revocation status, and other constraints. - -### Possible values - -- **Enabled** - - Enforces the PKI certificate chain validation of a given executable file before it's permitted to run. - -- **Disabled** - - Doesn't enforce PKI certificate chain validation before a given executable file is permitted to run. - -### Best practices - -- Best practices are dependent on your security and performance goals. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Disabled| -| DC Effective Default Settings | Disabled| -| Member Server Effective Default Settings | Disabled| -| Client Computer Effective Default Settings | Disabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a computer restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console (GPMC) or Local Security Policy snap-in for a domain, site, or organizational unit (OU). - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Intellectual property, personal information, and other confidential data are normally manipulated by applications on the computer, and elevated credentials are required to access the information. Users and administrators inherently trust applications that are used with these information sources, and they provide their credentials. If one of these applications is replaced by a rogue application that appears identical to the trusted application, the confidential data could be compromised and the user's administrative credentials would also be compromised. - -### Countermeasure - -Enable the **User Account Control: Only elevate executables that are signed and validated**. - -### Potential impact - -Enabling this setting requires that you have a PKI infrastructure and that your enterprise administrators have populated the Trusted Publishers store with the certificates for the allowed applications. Some older applications aren't signed, and they can't be used in an environment that is hardened with this setting. You should carefully test your applications in a preproduction environment before implementing this setting. -Control over the applications that are installed on the desktops and the hardware that joins your domain should provide similar protection from the vulnerability that is addressed by this setting. Additionally, the level of protection that is provided by this setting isn't an assurance that all rogue applications will be found. - -## Related topics - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md deleted file mode 100644 index 68167d5fe5..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md +++ /dev/null @@ -1,122 +0,0 @@ ---- -title: Only elevate UIAccess app installed in secure location -description: Learn about best practices and more for the policy setting, User Account Control Only elevate UIAccess applications that are installed in secure locations. -ms.assetid: 4333409e-a5be-4f2f-8808-618f53abd22c -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# User Account Control: Only elevate UIAccess applications that are installed in secure locations - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management, and security considerations for the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** security policy setting. - -## Reference - -This policy setting enforces the requirement that apps that request running with a UIAccess integrity level by marking *UIAccess=true* in their app manifest must reside in a secure location on the file system. Relatively secure locations are limited to the following directories: - -- \\Program Files\\ including subdirectories -- \\Windows\\system32\\ -- \\Program Files (x86)\\ including subdirectories for 64-bit versions of Windows - ->**Note:**  Windows enforces a PKI signature check on any interactive application that requests running with a UIAccess integrity level, regardless of the state of this security setting. - -**Background** - -User Interface Privilege Isolation (UIPI) implements restrictions in the Windows subsystem that prevent lower-privilege applications from sending messages or installing hooks in higher-privilege processes. Higher-privilege applications are permitted to send messages to lower-privilege processes. UIPI doesn't interfere with or change the behavior of messages between applications at the same privilege (or integrity) level. - -Microsoft UI Automation is the current model to support accessibility requirements in the Windows operating systems. Applications that are designed to support an accessible user experience control the behavior of other Windows applications for the user. When all applications on the automation client computer and server are running as a standard user (that is, at a medium integrity level), the UIPI restrictions don't interfere with the Microsoft UI automation model. - -However, there might be times when an administrative user runs an application with elevated privilege based on UAC in Admin Approval Mode. Microsoft UI Automation can't drive the UI graphics of elevated applications on the desktop without the ability to bypass the restrictions that UIPI implements. The ability to bypass UIPI restrictions across privilege levels is available for UI automation programs by using UIAccess. - -If an application presents a UIAccess attribute when it requests privileges, the application is stating a requirement to bypass UIPI restrictions for sending messages across privilege levels. Devices implement the following policy checks before starting an application with UIAccess privilege. - -1. The application must have a digital signature that can be verified by using a digital certificate that is associated with the Trusted Root Certification Authorities store on the local device -2. The application must be installed in a local folder that is writeable only by administrators, such as the Program Files directory. The allowed directories for UI automation applications are: - - 1. %ProgramFiles% and its subdirectories. - 2. %WinDir% and its subdirectories, except a few subdirectories that are excluded because standard users have write access. - -### Possible values - -- **Enabled** - - An application can start with UIAccess integrity only if it resides in a secure location in the file system. - -- **Disabled** - - An application can start with UIAccess integrity even if it doesn't reside in a secure location in the file system. - -### Best practices - -- Set this policy to **Enabled** to permit applications that are located in one of the designated secure directories to run with UIAccess integrity. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console (GPMC) or Local Security Policy snap-in for a domain, site, or organizational unit (OU). - -## Security considerations - -This section describes: -- How an attacker might exploit a feature or its configuration. -- How to implement the countermeasure. -- The possible negative consequences of countermeasure implementation. - -### Vulnerability - -UIAccess integrity allows an application to bypass User Interface Privilege Isolation (UIPI) restrictions when an application is elevated in privilege from a standard user to an administrator. When this setting is enabled, an application that has the UIAccess flag set to true in its manifest can interchange information with applications that are running at a higher privilege level, such as sign-in prompts and privilege elevation prompts. This ability is required to support accessibility features such as screen readers that transmit user interfaces to alternative forms. But it's not required by most applications. A process that's started with UIAccess rights has the following abilities: - -- Set the foreground window. -- Drive any application window by using the SendInput function. -- Use read input for all integrity levels by using low-level hooks, raw input, GetKeyState, GetAsyncKeyState, and GetKeyboardInput. -- Set journal hooks. -- Use AttachThreadInput to attach a thread to a higher integrity input queue. - -### Countermeasure - -Enable the **User Account Control: Only elevate UIAccess applications that are installed in secure locations** setting. - -### Potential impact - -If the application that requests UIAccess meets the UIAccess setting requirements, computers that run at least the Windows Vista operating system start the application with the ability to bypass most UIPI restrictions. If the application doesn't meet the security restrictions, the application is started without UIAccess rights, and it can interact only with applications at the same or lower privilege level. - -## Related articles - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md b/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md deleted file mode 100644 index f8aa1b8eec..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: UAC Run all administrators in Admin Approval Mode -description: Learn about best practices, security considerations and more for the security policy setting, User Account Control Run all administrators in Admin Approval Mode. -ms.assetid: b838c561-7bfc-41ef-a7a5-55857259c7bf -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# User Account Control: Run all administrators in Admin Approval Mode - -**Applies to** -- Windows 11 -- Windows 10 - -This article describes the best practices, location, values, policy management and security considerations for the **User Account Control: Run all administrators in Admin Approval Mode** security policy setting. - -## Reference - -This policy setting determines the behavior of all User Account Control (UAC) policies for the entire system. This setting is the one that turns on or off the UAC. - -### Possible values - -- **Enabled** - - Admin Approval Mode and all other UAC policies are dependent on this option being enabled. Changing this setting requires restarting the system. - -- **Disabled** - - Admin Approval Mode and all related UAC policies are disabled. - - > [!NOTE] - > If this security setting is configured to **Disabled**, **Windows Security** notifies the user that the overall security of the operating system has been reduced. - -### Best practices - -- Turn on this policy to allow all other UAC features and policies to function. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy's property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -The computer must be restarted before this policy is effective when changes to this policy are saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console or Local Security Policy snap-in for a domain, site, or organizational unit. - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -This setting turns on or turns off UAC. If this setting isn't turned on, UAC isn't used, and any security benefits and risk mitigations that are dependent on UAC aren't present on the computer. - -### Countermeasure - -Turn on the **User Account Control: Run all users, including administrators, as standard users** setting. - -### Potential impact - -Users and administrators must learn to work with UAC prompts and adjust their work habits to use least privilege operations. - -## Related topics - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md b/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md deleted file mode 100644 index 97f904064a..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md +++ /dev/null @@ -1,96 +0,0 @@ ---- -title: User Account Control Switch to the secure desktop when prompting for elevation -description: Best practices, security considerations, and more for the policy setting, User Account Control Switch to the secure desktop when prompting for elevation. -ms.assetid: 77a067db-c70d-4b02-9861-027503311b8b -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# User Account Control: Switch to the secure desktop when prompting for elevation - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Switch to the secure desktop when prompting for elevation** security policy setting. - -## Reference - -This policy setting determines whether the elevation request prompts on the interactive user desktop or on the secure desktop. - -The secure desktop presents the sign-in UI and restricts functionality and access to the system until the sign-in requirements are satisfied. - -The secure desktop’s primary difference from the user desktop is that only trusted processes running as SYSTEM are allowed to run here (that is, nothing is running at the user’s privilege level). The path to get to the secure desktop from the user desktop must also be trusted through the entire chain. - -### Possible values - -- **Enabled** - - All elevation requests by default go to the secure desktop. - -- **Disabled** - - All elevation requests go to the interactive user desktop. - -### Best practices - -- Enable the **User Account Control: Switch to the secure desktop when prompting for elevation setting**. The secure desktop helps protect against input and output spoofing by presenting the credentials dialog box in a protected section of memory that is accessible only by trusted system -processes. - -### Location - -Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value | -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console (GPMC) or Local Security Policy snap-in for a domain, site, or organizational unit (OU). - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Elevation prompt dialog boxes can be spoofed, causing users to disclose their passwords to malicious software. Mouse cursors can be spoofed by hiding the real cursor and replacing it with an offset so the cursor is actually pointing to the **Allow** button. - -### Countermeasure - -Enable the **User Account Control: Switch to the secure desktop when prompting for elevation setting**. The secure desktop helps protect against input and output spoofing by presenting the credentials dialog box in a protected section of memory that is accessible only by trusted system processes. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md b/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md deleted file mode 100644 index eb289356c6..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md +++ /dev/null @@ -1,94 +0,0 @@ ---- -title: User Account Control Virtualize file and registry write failures to per-user locations -description: Best practices, security considerations and more for the policy setting, User Account Control Virtualize file and registry write failures to per-user locations. -ms.assetid: a7b47420-cc41-4b1c-b03e-f67a05221261 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.topic: reference -ms.date: 04/19/2017 ---- - -# User Account Control: Virtualize file and registry write failures to per-user locations - -**Applies to** -- Windows 11 -- Windows 10 - -Describes the best practices, location, values, policy management and security considerations for the **User Account Control: Virtualize file and registry write failures to per-user locations** security policy setting. - -## Reference - -This policy setting enables or disables the redirection of the write failures of earlier applications to defined locations in the registry and the file system. This feature mitigates applications that historically ran as administrator and wrote runtime application data to %ProgramFiles%, %Windir%, %Windir%\\system32, or HKEY\_LOCAL\_MACHINE\\Software\\. - -This feature can be disabled for applications on devices running at least Windows Vista because it's unnecessary. - -### Possible values - -- **Enabled** - - Setting this value facilitates the runtime redirection of application write failures to defined user locations for the file system and the registry. - -- **Disabled** - - Applications that write data to protected locations fail. - -### Best practices - -1. If you run applications that aren't Windows Vista-compliant, enable this security policy to prevent the possibility that these older applications could write data to unsecure locations. -2. If you only run at least Windows Vista–compliant applications, this feature is unnecessary so you can disable this policy. - -### Location - -\\Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options - -### Default values - -The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. - -| Server type or GPO | Default value| -| - | - | -| Default Domain Policy| Not defined| -| Default Domain Controller Policy | Not defined| -| Stand-Alone Server Default Settings | Enabled| -| DC Effective Default Settings | Enabled| -| Member Server Effective Default Settings| Enabled| -| Client Computer Effective Default Settings | Enabled| - -## Policy management - -This section describes features and tools that are available to help you manage this policy. - -### Restart requirement - -None. Changes to this policy become effective without a device restart when they're saved locally or distributed through Group Policy. - -### Group Policy - -All auditing capabilities are integrated in Group Policy. You can configure, deploy, and manage these settings in the Group Policy Management Console (GPMC) or Local Security Policy snap-in for a domain, site, or organizational unit (OU). - -## Security considerations - -This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. - -### Vulnerability - -Earlier applications might not write data to secure locations. - -### Countermeasure - -Enable the **User Account Control: Virtualize file and registry write failures to per-user locations** setting. - -### Potential impact - -None. This non-impact state is the default configuration. - -## Related topics - -- [Security Options](/windows/device-security/security-policy-settings/security-options) diff --git a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md b/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md deleted file mode 100644 index 0ce9074142..0000000000 --- a/windows/security/threat-protection/security-policy-settings/user-rights-assignment.md +++ /dev/null @@ -1,88 +0,0 @@ ---- -title: User Rights Assignment -description: Provides an overview and links to information about the User Rights Assignment security policy settings user rights that are available in Windows. -ms.assetid: 99340252-60be-4c79-b0a5-56fbe1a9b0c5 -ms.reviewer: -ms.author: vinpa -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: vinaypamnani-msft -manager: aaroncz -audience: ITPro -ms.collection: - - highpri - - tier3 -ms.topic: reference -ms.date: 12/16/2021 ---- - -# User Rights Assignment - -**Applies to** -- Windows 10 -- Windows 11 - -Provides an overview and links to information about the User Rights Assignment security policy settings user rights that are available in Windows. -User rights govern the methods by which a user can log on to a system. User rights are applied at the local device level, and they allow users to perform tasks on a device or in a domain. User rights include logon rights and permissions. Logon rights control who is authorized to log on to a device and how they can log on. User rights permissions control access to computer and domain resources, and they can override permissions that have been set on specific objects. User rights are managed in Group Policy under the **User Rights Assignment** item. - -Each user right has a constant name and a Group Policy name associated with it. The constant names are used when referring to the user right in log events. You can configure the user rights assignment settings in the following location within the Group Policy Management Console (GPMC) under -**Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\User Rights Assignment**, or on the local device by using the Local Group Policy Editor (gpedit.msc). - -For information about setting security policies, see [Configure security policy settings](how-to-configure-security-policy-settings.md). - -The following table links to each security policy setting and provides the constant name for each. Setting descriptions contain reference information, best practices for configuring the policy setting, default values, differences between operating system versions, and considerations for policy management and security. - -| Group Policy Setting | Constant Name | -| - | - | -| [Access Credential Manager as a trusted caller](access-credential-manager-as-a-trusted-caller.md) | SeTrustedCredManAccessPrivilege| -| [Access this computer from the network](access-this-computer-from-the-network.md) | SeNetworkLogonRight| -| [Act as part of the operating system](act-as-part-of-the-operating-system.md) | SeTcbPrivilege| -| [Add workstations to domain](add-workstations-to-domain.md) | SeMachineAccountPrivilege| -| [Adjust memory quotas for a process](adjust-memory-quotas-for-a-process.md) | SeIncreaseQuotaPrivilege| -| [Allow log on locally](allow-log-on-locally.md) | SeInteractiveLogonRight| -| [Allow log on through Remote Desktop Services](allow-log-on-through-remote-desktop-services.md)| SeRemoteInteractiveLogonRight| -| [Back up files and directories](back-up-files-and-directories.md) | SeBackupPrivilege| -| [Bypass traverse checking](bypass-traverse-checking.md) | SeChangeNotifyPrivilege| -| [Change the system time](change-the-system-time.md) | SeSystemtimePrivilege| -| [Change the time zone](change-the-time-zone.md) | SeTimeZonePrivilege| -| [Create a pagefile](create-a-pagefile.md) | SeCreatePagefilePrivilege| -| [Create a token object](create-a-token-object.md) | SeCreateTokenPrivilege| -| [Create global objects](create-global-objects.md) | SeCreateGlobalPrivilege| -| [Create permanent shared objects](create-permanent-shared-objects.md) | SeCreatePermanentPrivilege| -| [Create symbolic links](create-symbolic-links.md) | SeCreateSymbolicLinkPrivilege| -| [Debug programs](debug-programs.md) | SeDebugPrivilege| -| [Deny access to this computer from the network](deny-access-to-this-computer-from-the-network.md)| SeDenyNetworkLogonRight | -| [Deny log on as a batch job](deny-log-on-as-a-batch-job.md) | SeDenyBatchLogonRight| -| [Deny log on as a service](deny-log-on-as-a-service.md) | SeDenyServiceLogonRight | -| [Deny log on locally](deny-log-on-locally.md) | SeDenyInteractiveLogonRight| -| [Deny log on through Remote Desktop Services](deny-log-on-through-remote-desktop-services.md)| SeDenyRemoteInteractiveLogonRight| -| [Enable computer and user accounts to be trusted for delegation](enable-computer-and-user-accounts-to-be-trusted-for-delegation.md)| SeEnableDelegationPrivilege| -| [Force shutdown from a remote system](force-shutdown-from-a-remote-system.md) | SeRemoteShutdownPrivilege| -| [Generate security audits](generate-security-audits.md) | SeAuditPrivilege| -| [Impersonate a client after authentication](impersonate-a-client-after-authentication.md)| SeImpersonatePrivilege| -| [Increase a process working set](increase-a-process-working-set.md) | SeIncreaseWorkingSetPrivilege| -| [Increase scheduling priority](increase-scheduling-priority.md) | SeIncreaseBasePriorityPrivilege| -| [Load and unload device drivers](load-and-unload-device-drivers.md) | SeLoadDriverPrivilege| -| [Lock pages in memory](lock-pages-in-memory.md) | SeLockMemoryPrivilege| -| [Log on as a batch job](log-on-as-a-batch-job.md) | SeBatchLogonRight| -| [Log on as a service](log-on-as-a-service.md) | SeServiceLogonRight| -| [Manage auditing and security log](manage-auditing-and-security-log.md)| SeSecurityPrivilege| -| [Modify an object label](modify-an-object-label.md) | SeRelabelPrivilege| -| [Modify firmware environment values](modify-firmware-environment-values.md)| SeSystemEnvironmentPrivilege| -| [Obtain an impersonation token for another user in the same session](impersonate-a-client-after-authentication.md) | SeDelegateSessionUserImpersonatePrivilege| -| [Perform volume maintenance tasks](perform-volume-maintenance-tasks.md) | SeManageVolumePrivilege| -| [Profile single process](profile-single-process.md) | SeProfileSingleProcessPrivilege| -| [Profile system performance](profile-system-performance.md) | SeSystemProfilePrivilege| -| [Remove computer from docking station](remove-computer-from-docking-station.md) | SeUndockPrivilege| -| [Replace a process level token](replace-a-process-level-token.md) | SeAssignPrimaryTokenPrivilege| -| [Restore files and directories](restore-files-and-directories.md) | SeRestorePrivilege | -| [Shut down the system](shut-down-the-system.md) | SeShutdownPrivilege| -| [Synchronize directory service data](synchronize-directory-service-data.md)| SeSyncAgentPrivilege| -| [Take ownership of files or other objects](take-ownership-of-files-or-other-objects.md) | SeTakeOwnershipPrivilege| - - -## Related topics - -- [Security policy settings reference](security-policy-settings-reference.md) diff --git a/windows/whats-new/deprecated-features.md b/windows/whats-new/deprecated-features.md index b0ebd708af..27b25a3083 100644 --- a/windows/whats-new/deprecated-features.md +++ b/windows/whats-new/deprecated-features.md @@ -1,7 +1,11 @@ --- title: Deprecated features in the Windows client description: Review the list of features that Microsoft is no longer actively developing in Windows 10 and Windows 11. +<<<<<<< HEAD ms.date: 02/27/2024 +======= +ms.date: 03/14/2024 +>>>>>>> 2611102eb68f1f90118309d07c5503b1ffb5ad07 ms.service: windows-client ms.subservice: itpro-fundamentals ms.localizationpriority: medium @@ -47,7 +51,12 @@ The features in this article are no longer being actively developed, and might b | Feature | Details and mitigation | Deprecation announced | |---|---|---| +<<<<<<< HEAD | NPLogonNotify and NPPasswordChangeNotify APIs | Starting in Windows 11, version 24H2, the inclusion of password payload in MPR notifications is set to disabled by default through group policy in [NPLogonNotify](/windows/win32/api/npapi/nf-npapi-nplogonnotify) and [NPPasswordChangeNotify](/windows/win32/api/npapi/nf-npapi-nppasswordchangenotify) APIs. The APIs may be removed in a future release. The primary reason for disabling this feature is to enhance security. When enabled, these APIs allow the caller to retrieve a users password, presenting potential risks for password exposure and harvesting by malicious users. | March 2024 | +======= +| TLS server authentication certificates using RSA keys with key lengths shorter than 2048 bits | Support for certificates using RSA keys with key lengths shorter than 2048 bits will be deprecated. Internet standards and regulatory bodies disallowed the use of 1024-bit keys in 2013, recommending specifically that RSA keys should have a key length of 2048 bits or longer. For more information, see [Transitioning of Cryptographic Algorithms and Key Sizes - Discussion Paper (nist.gov)](https://csrc.nist.gov/CSRC/media/Projects/Key-Management/documents/transitions/Transitioning_CryptoAlgos_070209.pdf). This deprecation focuses on ensuring that all RSA certificates used for TLS server authentication must have key lengths greater than or equal to 2048 bits to be considered valid by Windows.

    TLS certificates issued by enterprise or test certification authorities (CA) aren't impacted with this change. However, we recommend that they be updated to RSA keys greater than or equal to 2048 bits as a security best practice. This change is necessary to preserve security of Windows customers using certificates for authentication and cryptographic purposes.| March 2024| +| Test Base | [Test Base for Microsoft 365](/microsoft-365/test-base/overview), an Azure cloud service for application testing, is deprecated. The service will be retired in the future and will be no longer available for use after retirement. | March 2024 | +>>>>>>> 2611102eb68f1f90118309d07c5503b1ffb5ad07 | Windows Mixed Reality | [Windows Mixed Reality](/windows/mixed-reality/enthusiast-guide/before-you-start) is deprecated and will be removed in Windows 11, version 24H2. This deprecation includes the [Mixed Reality Portal](/windows/mixed-reality/enthusiast-guide/install-windows-mixed-reality) app, [Windows Mixed Reality for SteamVR](/windows/mixed-reality/enthusiast-guide/using-steamvr-with-windows-mixed-reality), and Steam VR Beta. Existing Windows Mixed Reality devices will continue to work with Steam through November 2026, if users remain on their current released version of Windows 11, version 23H2. After November 2026, Windows Mixed Reality will no longer receive security updates, nonsecurity updates, bug fixes, technical support, or online technical content updates.

    This deprecation doesn't affect HoloLens. We remain committed to HoloLens and our enterprise customers. | December 2023 | | Microsoft Defender Application Guard for Edge | [Microsoft Defender Application Guard](/windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview), including the [Windows Isolated App Launcher APIs](/windows/win32/api/isolatedapplauncher/), is being deprecated for Microsoft Edge for Business and [will no longer be updated](feature-lifecycle.md). Please download the [Microsoft Edge For Business Security Whitepaper](https://edgestatic.azureedge.net/shared/cms/pdfs/Microsoft_Edge_Security_Whitepaper_v2.pdf) to learn more about Edge for Business security capabilities. | December 2023 | | Legacy console mode | The [legacy console mode](/windows/console/legacymode) is deprecated and no longer being updated. In future Windows releases, it will be available as an optional [Feature on Demand](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). This feature won't be installed by default. | December 2023 | diff --git a/windows/whats-new/removed-features.md b/windows/whats-new/removed-features.md index 149c2ffc91..93c72a5390 100644 --- a/windows/whats-new/removed-features.md +++ b/windows/whats-new/removed-features.md @@ -8,7 +8,7 @@ ms.author: mstewart manager: aaroncz ms.topic: conceptual ms.subservice: itpro-fundamentals -ms.date: 02/28/2024 +ms.date: 03/11/2024 ms.collection: - highpri - tier1 @@ -44,7 +44,7 @@ The following features and functionalities have been removed from the installed | XDDM-based remote display driver | Support for Windows 2000 Display Driver Model (XDDM) based remote display drivers is removed in this release. Software publishers that use an XDDM-based remote display driver should plan a migration to the WDDM driver model. For more information on implementing remote display indirect display driver, see [Updates for IddCx versions 1.4 and later](/windows-hardware/drivers/display/iddcx1.4-updates). | 21H1 | |Microsoft Edge|The legacy version of Microsoft Edge is no longer supported after March 9, 2021. For more information, see [End of support reminder for Microsoft Edge Legacy](/lifecycle/announcements/edge-legacy-eos-details). | 21H1 | |MBAE service metadata|The MBAE app experience is replaced by an MO UWP app. Metadata for the MBAE service is removed. | 20H2 | -| Connect app | The **Connect** app for wireless projection using Miracast is no longer installed by default, but is available as an optional feature. To install the app, select **Settings** > **Apps** > **Optional features** > **Add a feature**, and then install the **Wireless Display** app. | 2004 | +| Connect app | The **Connect** app for wireless projection using Miracast is no longer installed by default, but is available as an optional feature. To add the feature, select **Settings** > **System** > **Optional features** > **Add a feature** (Windows 10) or **Settings** > **System** > **Optional features** > **Add an optional feature** (Windows 11), and then add the **Wireless Display** feature. | 2004 | | Rinna and Japanese Address suggestion | The Rinna and Japanese Address suggestion service for Microsoft Japanese Input Method Editor (IME) ended on August 13, 2020. For more information, see [Rinna and Japanese Address suggestion will no longer be offered](https://support.microsoft.com/help/4576767/windows-10-rinna-and-japanese-address-suggestion) | 2004 | | Windows To Go | Windows To Go was announced as deprecated in Windows 10, version 1903 and is removed in this release. | 2004 | | Mobile Plans and Messaging apps | Both apps are still supported, but are now distributed in a different way. OEMs can now include these apps in Windows images for cellular enabled devices. The apps are removed for noncellular devices.| 2004 | diff --git a/windows/whats-new/windows-11-plan.md b/windows/whats-new/windows-11-plan.md index fbb1d4e367..d8b9301431 100644 --- a/windows/whats-new/windows-11-plan.md +++ b/windows/whats-new/windows-11-plan.md @@ -99,15 +99,13 @@ It's important that organizations have adequate time to plan for Windows 11. Mic Microsoft's compatibility promise for Windows 10 is maintained for Windows 11. Data from the App Assure program shows that Windows 10 compatibility rates are over 99.7% for enterprise organizations, including line of business (LOB) apps. Microsoft remains committed to ensuring that the apps you rely upon continue to work as expected when you upgrade. Windows 11 is subject to the same app compatibility validation requirements that are in place for Windows 10 today, for both feature and quality updates. -#### App Assure and Test Base for Microsoft 365 +#### App Assure -If you run into compatibility issues or want to ensure that your organization's applications are compatible from day one, App Assure and Test Base for Microsoft 365 can help. +If you run into compatibility issues or want to ensure that your organization's applications are compatible from day one, App Assure can help. - **App Assure**: With enrollment in the [App Assure](/windows/compatibility/app-assure) service, any app compatibility issues that you find with Windows 11 can be resolved. Microsoft will help you remedy application issues at no cost. Since 2018, App Assure has evaluated almost 800,000 apps, and subscriptions are free for eligible customers with 150+ seats. -- **Test Base for Microsoft 365**: [Test Base](https://portal.azure.com/?feature.Win11=true%2F#view/Microsoft_Azure_Marketplace/GalleryItemDetailsBladeNopdl/id/Microsoft.TestBase) is a cloud testing platform that can help you evaluate applications readiness for Windows 11 upgrade or migration. IT administrators, software publishers, and system integrators can find desired test cases throughout the entire Windows validation lifecycle. Tests include, but aren't limited to, in-place upgrade validation, monthly quality updates, and tests against Windows preview features. - -You might already be using App Assure and Test Base in your Windows 10 environment. Both of these tools will continue to function with Windows 11. +You might already be using App Assure in your Windows 10 environment. The tool will continue to function with Windows 11. ## Next steps diff --git a/windows/whats-new/windows-11-requirements.md b/windows/whats-new/windows-11-requirements.md index d2de462f2e..62733bd8d1 100644 --- a/windows/whats-new/windows-11-requirements.md +++ b/windows/whats-new/windows-11-requirements.md @@ -11,7 +11,7 @@ ms.collection: - highpri - tier1 ms.subservice: itpro-fundamentals -ms.date: 02/13/2023 +ms.date: 03/13/2024 appliesto: - ✅ Windows 11 @@ -120,10 +120,8 @@ The following configuration requirements apply to VMs running Windows 11. ## Next steps +- [What's new in Windows 11](/windows/whats-new/windows-11-overview) - [Plan for Windows 11](windows-11-plan.md) - [Prepare for Windows 11](windows-11-prepare.md) - -## See also - - [Windows minimum hardware requirements](/windows-hardware/design/minimum/minimum-hardware-requirements-overview) -- [What's new in Windows 11 overview](/windows/whats-new/windows-11-overview) + diff --git a/windows/whats-new/windows-licensing.md b/windows/whats-new/windows-licensing.md index d4ac767421..78678bf0c6 100644 --- a/windows/whats-new/windows-licensing.md +++ b/windows/whats-new/windows-licensing.md @@ -8,7 +8,7 @@ manager: aaroncz ms.collection: - tier2 ms.topic: overview -ms.date: 05/04/2023 +ms.date: 02/29/2024 appliesto: - ✅ Windows 11 ms.service: windows-client @@ -48,7 +48,7 @@ Windows 11 Pro is designed for small and medium businesses. Windows 11 Pro enabl The Windows 11 Pro Upgrade license is recommended if you want to: - Upgrade a Windows 10 Pro device to Windows 11 Pro -- Upgrade Windows 7/8/8.1 Pro devices to Windows 10 Pro +- Upgrade Windows 7/8/8.1 Pro devices to Windows 10 Pro ## Windows 11 Enterprise @@ -69,7 +69,7 @@ The following table describes the unique Windows Enterprise edition features: |-|-| |**[Credential Guard][WIN-1]**|Protects against user credential harvesting and pass-the-hash attacks or pass the token attacks.| |**[Managed Microsoft Defender Application Guard (MDAG) for Microsoft Edge][WIN-11]**| Isolates enterprise-defined untrusted sites with virtualization-based security from Windows, protecting your organization while users browse the Internet.| -|**[Modern BitLocker Management][WIN-2]** | Allows you to eliminate on-premises tools to monitor and support BitLocker recovery scenarios. | +|**[Modern BitLocker Management][WIN-2]** | Allows you to eliminate on-premises tools to monitor and support BitLocker recovery scenarios. | |**[Personal Data Encryption][WIN-3]**|Encrypts individual's content using Windows Hello for Business to link the encryption keys to user credentials.| |**[Direct Access][WINS-1]**|Connect remote users to the organization network without the need for traditional VPN connections.| |**[Always-On VPN device tunnel][WINS-2]**|Advanced security capabilities to restrict the type of traffic and which applications can use the VPN connection.|