mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #9558 from MicrosoftDocs/main
merge main to live 3:30 PM 2/2/24
This commit is contained in:
commit
d91785ced3
@ -1757,7 +1757,7 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deploy/deploy-whats-new.md",
|
||||
"redirect_url": "/windows/deployment/deploy-whats-new",
|
||||
"redirect_url": "/windows/deployment/",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
|
@ -187,7 +187,7 @@
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/update/change-history-for-update-windows-10.md",
|
||||
"redirect_url": "/windows/deployment/deploy-whats-new",
|
||||
"redirect_url": "/windows/deployment/",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
@ -754,7 +754,7 @@
|
||||
"source_path": "windows/deployment/do/mcc-enterprise-portal-deploy.md",
|
||||
"redirect_url": "/windows/deployment/do/mcc-enterprise-deploy",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/windows-autopatch/deploy/index.md",
|
||||
"redirect_url": "/windows/deployment/windows-autopatch/deploy/windows-autopatch-admin-contacts",
|
||||
@ -1114,6 +1114,16 @@
|
||||
"source_path": "windows/deployment/windows-autopilot/windows-autopilot.md",
|
||||
"redirect_url": "/mem/autopilot/windows-autopilot",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/deploy-whats-new.md",
|
||||
"redirect_url": "/windows/deployment/",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/deployment/Windows-AutoPilot-EULA-note.md",
|
||||
"redirect_url": "/legal/windows/windows-autopilot-eula-note",
|
||||
"redirect_document_id": false
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: ApplicationControl DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the ApplicationControl configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -40,7 +40,7 @@ The following XML file contains the device description framework (DDF) for the A
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.18362</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -313,6 +313,50 @@ The following XML file contains the device description framework (DDF) for the A
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>BasePolicyId</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>The BasePolicyId of the Policy Indicated by the Policy GUID</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFTitle>BasePolicyId</DFTitle>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>PolicyOptions</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>The PolicyOptions of the Policy Indicated by the Policy GUID</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFTitle>PolicyOptions</DFTitle>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: ApplicationControl CSP
|
||||
description: Learn more about the ApplicationControl CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -24,12 +24,14 @@ The following list shows the ApplicationControl configuration service provider n
|
||||
- [{Policy GUID}](#policiespolicy-guid)
|
||||
- [Policy](#policiespolicy-guidpolicy)
|
||||
- [PolicyInfo](#policiespolicy-guidpolicyinfo)
|
||||
- [BasePolicyId](#policiespolicy-guidpolicyinfobasepolicyid)
|
||||
- [FriendlyName](#policiespolicy-guidpolicyinfofriendlyname)
|
||||
- [IsAuthorized](#policiespolicy-guidpolicyinfoisauthorized)
|
||||
- [IsBasePolicy](#policiespolicy-guidpolicyinfoisbasepolicy)
|
||||
- [IsDeployed](#policiespolicy-guidpolicyinfoisdeployed)
|
||||
- [IsEffective](#policiespolicy-guidpolicyinfoiseffective)
|
||||
- [IsSystemPolicy](#policiespolicy-guidpolicyinfoissystempolicy)
|
||||
- [PolicyOptions](#policiespolicy-guidpolicyinfopolicyoptions)
|
||||
- [Status](#policiespolicy-guidpolicyinfostatus)
|
||||
- [Version](#policiespolicy-guidpolicyinfoversion)
|
||||
- [Tokens](#tokens)
|
||||
@ -200,6 +202,45 @@ Information Describing the Policy indicated by the GUID.
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-Begin -->
|
||||
##### Policies/{Policy GUID}/PolicyInfo/BasePolicyId
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1903 [10.0.18362] and later |
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-Applicability-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-OmaUri-Begin -->
|
||||
```Device
|
||||
./Vendor/MSFT/ApplicationControl/Policies/{Policy GUID}/PolicyInfo/BasePolicyId
|
||||
```
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-OmaUri-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
The BasePolicyId of the Policy Indicated by the Policy GUID.
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-Description-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-Editable-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Get |
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-DFProperties-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-Examples-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-BasePolicyId-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-FriendlyName-Begin -->
|
||||
##### Policies/{Policy GUID}/PolicyInfo/FriendlyName
|
||||
|
||||
@ -446,6 +487,45 @@ TRUE/FALSE if the Policy is a System Policy, that's a policy managed by Microsof
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-IsSystemPolicy-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-Begin -->
|
||||
##### Policies/{Policy GUID}/PolicyInfo/PolicyOptions
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1903 [10.0.18362] and later |
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-Applicability-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-OmaUri-Begin -->
|
||||
```Device
|
||||
./Vendor/MSFT/ApplicationControl/Policies/{Policy GUID}/PolicyInfo/PolicyOptions
|
||||
```
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-OmaUri-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
The PolicyOptions of the Policy Indicated by the Policy GUID.
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-Description-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-Editable-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Get |
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-DFProperties-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-Examples-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-PolicyOptions-End -->
|
||||
|
||||
<!-- Device-Policies-{Policy GUID}-PolicyInfo-Status-Begin -->
|
||||
##### Policies/{Policy GUID}/PolicyInfo/Status
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: CertificateStore CSP
|
||||
description: Learn more about the CertificateStore CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -2384,6 +2384,7 @@ Optional. Notify the client whether enrollment server supports ROBO auto certifi
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| true (Default) | True. |
|
||||
| false | False. |
|
||||
<!-- Device-MY-WSTEP-Renew-ROBOSupport-AllowedValues-End -->
|
||||
|
||||
<!-- Device-MY-WSTEP-Renew-ROBOSupport-Examples-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: CertificateStore DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the CertificateStore configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -42,7 +42,7 @@ The following XML file contains the device description framework (DDF) for the C
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.10586</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -1252,6 +1252,10 @@ The following XML file contains the device description framework (DDF) for the C
|
||||
<MSFT:Value>true</MSFT:Value>
|
||||
<MSFT:ValueDescription>True</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>false</MSFT:Value>
|
||||
<MSFT:ValueDescription>False</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: ClientCertificateInstall CSP
|
||||
description: Learn more about the ClientCertificateInstall CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -392,7 +392,7 @@ When a value of "2" is contained in PFXCertPasswordEncryptionType, specify the s
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Get, Replace |
|
||||
| Dependency [EncryptionTypeDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType` <br> Dependency Allowed Value: `[2]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
| Dependency [EncryptionTypeDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType` <br> Dependency Allowed Value: `[2]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- Device-PFXCertInstall-{UniqueID}-PFXCertPasswordEncryptionStore-DFProperties-End -->
|
||||
|
||||
<!-- Device-PFXCertInstall-{UniqueID}-PFXCertPasswordEncryptionStore-Examples-Begin -->
|
||||
@ -492,7 +492,7 @@ The PFX isn't exportable when it's installed to TPM.
|
||||
| Format | `bool` |
|
||||
| Access Type | Add, Get, Replace |
|
||||
| Default Value | true |
|
||||
| Dependency [KeyLocationDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation` <br> Dependency Allowed Value: `[3]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
| Dependency [KeyLocationDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation` <br> Dependency Allowed Value: `[3]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- Device-PFXCertInstall-{UniqueID}-PFXKeyExportable-DFProperties-End -->
|
||||
|
||||
<!-- Device-PFXCertInstall-{UniqueID}-PFXKeyExportable-AllowedValues-Begin -->
|
||||
@ -1968,7 +1968,7 @@ When a value of "2" is contained in PFXCertPasswordEncryptionType, specify the s
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Get, Replace |
|
||||
| Dependency [EncryptionTypeDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType` <br> Dependency Allowed Value: `[2]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
| Dependency [EncryptionTypeDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `User/Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType` <br> Dependency Allowed Value: `[2]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- User-PFXCertInstall-{UniqueID}-PFXCertPasswordEncryptionStore-DFProperties-End -->
|
||||
|
||||
<!-- User-PFXCertInstall-{UniqueID}-PFXCertPasswordEncryptionStore-Examples-Begin -->
|
||||
@ -2066,7 +2066,7 @@ Optional. Used to specify if the private key installed is exportable (can be exp
|
||||
| Format | `bool` |
|
||||
| Access Type | Add, Get, Replace |
|
||||
| Default Value | true |
|
||||
| Dependency [KeyLocationDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation` <br> Dependency Allowed Value: `[3]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
| Dependency [KeyLocationDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `User/Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation` <br> Dependency Allowed Value: `[3]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- User-PFXCertInstall-{UniqueID}-PFXKeyExportable-DFProperties-End -->
|
||||
|
||||
<!-- User-PFXCertInstall-{UniqueID}-PFXKeyExportable-AllowedValues-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: ClientCertificateInstall DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the ClientCertificateInstall configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -39,7 +39,7 @@ The following XML file contains the device description framework (DDF) for the C
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.10586</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -72,8 +72,8 @@ The following XML file contains the device description framework (DDF) for the C
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required for PFX certificate installation. A unique ID to differentiate different certificate install requests.
|
||||
Format is node.
|
||||
<Description>Required for PFX certificate installation. A unique ID to differentiate different certificate install requests.
|
||||
Format is node.
|
||||
Calling Delete on the this node, should delete the certificates and the keys that were installed by the corresponding PFX blob.
|
||||
</Description>
|
||||
<DFFormat>
|
||||
@ -143,7 +143,7 @@ Calling Delete on the this node, should delete the certificates and the keys tha
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Optional.
|
||||
<Description>Optional.
|
||||
Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
@ -169,7 +169,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required.
|
||||
<Description>Required.
|
||||
CRYPT_DATA_BLOB structure that contains a PFX packet with the exported and encrypted certificates and keys. Add on this node will trigger the addition to the PFX certificate. This requires that all the other nodes under UniqueID that are parameters for PFX installation (Container Name, KeyLocation, CertPassword, fKeyExportable) are present before this is called. This will also set the Status node to the current Status of the operation.
|
||||
If Add is called on this node and a blob already exists, it will fail. If Replace is called on this node, the certificates will be overwritten.
|
||||
If Add is called on this node for a new PFX, the certificate will be added. If Replace is called on this node when it does not exist, this will fail.
|
||||
@ -227,7 +227,7 @@ CRYPT_DATA_BLOB on MSDN can be found at http://msdn.microsoft.com/en-us/library/
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Optional. Used to specify if the PFX certificate password is encrypted with a certificate.
|
||||
If the value is
|
||||
If the value is
|
||||
0 - Password is not encrypted
|
||||
1- Password is encrypted using the MDM certificate by the MDM server
|
||||
2 - Password is encrypted by a Custom Certificate by the MDM server. When this value is used here, also specify the custom store name in the PFXCertPasswordEncryptionStore node.</Description>
|
||||
@ -294,7 +294,7 @@ If the value is
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="KeyLocationDependency">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation</MSFT:DependencyUri>
|
||||
<MSFT:DependencyUri>User/Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="Range">
|
||||
<MSFT:Value>[3]</MSFT:Value>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
@ -353,7 +353,7 @@ If the value is
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Optional.
|
||||
<Description>Optional.
|
||||
When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the store name where the certificate for decrypting the PFXCertPassword is stored. </Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
@ -372,7 +372,7 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="EncryptionTypeDependency">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType</MSFT:DependencyUri>
|
||||
<MSFT:DependencyUri>User/Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="Range">
|
||||
<MSFT:Value>[2]</MSFT:Value>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
@ -413,7 +413,7 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required for SCEP certificate installation. A unique ID to differentiate different certificate install requests.
|
||||
<Description>Required for SCEP certificate installation. A unique ID to differentiate different certificate install requests.
|
||||
Calling Delete on the this node, should delete the corresponding SCEP certificate</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
@ -596,7 +596,7 @@ Calling Delete on the this node, should delete the corresponding SCEP certificat
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>3</DefaultValue>
|
||||
<Description>Optional. Specify where to keep the private key. Note that even it is protected by TPM, it is not guarded with TPM PIN.
|
||||
<Description>Optional. Specify where to keep the private key. Note that even it is protected by TPM, it is not guarded with TPM PIN.
|
||||
SCEP enrolled cert doesn’t support TPM PIN protection. </Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
@ -640,7 +640,7 @@ SCEP enrolled cert doesn’t support TPM PIN protection. </Description>
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>5</DefaultValue>
|
||||
<Description>Optional. When the SCEP server sends pending status, specify device retry waiting time in minutes.
|
||||
<Description>Optional. When the SCEP server sends pending status, specify device retry waiting time in minutes.
|
||||
|
||||
Default value is: 5
|
||||
The min value is 1. </Description>
|
||||
@ -725,7 +725,7 @@ The min value is 0 which means no retry. </Description>
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required for enrollment. Specify private key length (RSA).
|
||||
<Description>Required for enrollment. Specify private key length (RSA).
|
||||
Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
@ -764,7 +764,7 @@ Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength.</D
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required for enrollment. Hash algorithm family (SHA-1, SHA-2, SHA-3) specified by MDM server. If multiple hash algorithm families are specified, they must be separated via +.
|
||||
<Description>Required for enrollment. Hash algorithm family (SHA-1, SHA-2, SHA-3) specified by MDM server. If multiple hash algorithm families are specified, they must be separated via +.
|
||||
|
||||
For NGC, only SHA256 is supported as the supported algorithm</Description>
|
||||
<DFFormat>
|
||||
@ -845,7 +845,7 @@ For NGC, only SHA256 is supported as the supported algorithm</Description>
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>Days</DefaultValue>
|
||||
<Description>Optional. Specify the units for valid period. Valid values are: Days(Default), Months, Years.
|
||||
<Description>Optional. Specify the units for valid period. Valid values are: Days(Default), Months, Years.
|
||||
MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio) the SCEP server as part of certificate enrollment request. It is the server’s decision on how to use this valid period to create the certificate.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
@ -885,7 +885,7 @@ MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. Note the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days.
|
||||
<Description>Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. Note the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days.
|
||||
NOTE: The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio) the SCEP server as part of certificate enrollment request. It is the server’s decision on how to use this valid period to create the certificate.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
@ -912,7 +912,7 @@ NOTE: The device only sends the MDM server expected certificate validation perio
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Optional.
|
||||
<Description>Optional.
|
||||
Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
@ -1122,7 +1122,7 @@ Valid values are:
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.10586</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -1155,8 +1155,8 @@ Valid values are:
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required for PFX certificate installation. A unique ID to differentiate different certificate install requests.
|
||||
Format is node.
|
||||
<Description>Required for PFX certificate installation. A unique ID to differentiate different certificate install requests.
|
||||
Format is node.
|
||||
Calling Delete on the this node, should delete the certificates and the keys that were installed by the corresponding PFX blob.
|
||||
</Description>
|
||||
<DFFormat>
|
||||
@ -1226,7 +1226,7 @@ Calling Delete on the this node, should delete the certificates and the keys tha
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Optional.
|
||||
<Description>Optional.
|
||||
Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
@ -1252,7 +1252,7 @@ Specifies the NGC container name (if NGC KSP is chosen for above node). If this
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required.
|
||||
<Description>Required.
|
||||
CRYPT_DATA_BLOB structure that contains a PFX packet with the exported and encrypted certificates and keys. Add on this node will trigger the addition to the PFX certificate. This requires that all the other nodes under UniqueID that are parameters for PFX installation (Container Name, KeyLocation, CertPassword, fKeyExportable) are present before this is called. This will also set the Status node to the current Status of the operation.
|
||||
If Add is called on this node and a blob already exists, it will fail. If Replace is called on this node, the certificates will be overwritten.
|
||||
If Add is called on this node for a new PFX, the certificate will be added. If Replace is called on this node when it does not exist, this will fail.
|
||||
@ -1310,7 +1310,7 @@ CRYPT_DATA_BLOB on MSDN can be found at http://msdn.microsoft.com/en-us/library/
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Optional. Used to specify if the PFX certificate password is encrypted with a certificate.
|
||||
If the value is
|
||||
If the value is
|
||||
0 - Password is not encrypted
|
||||
1- Password is encrypted using the MDM certificate by the MDM server
|
||||
2 - Password is encrypted by a Custom Certificate by the MDM server. When this value is used here, also specify the custom store name in the PFXCertPasswordEncryptionStore node.</Description>
|
||||
@ -1377,7 +1377,7 @@ If the value is
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="KeyLocationDependency">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation</MSFT:DependencyUri>
|
||||
<MSFT:DependencyUri>Device/Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/KeyLocation</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="Range">
|
||||
<MSFT:Value>[3]</MSFT:Value>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
@ -1436,7 +1436,7 @@ If the value is
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Optional.
|
||||
<Description>Optional.
|
||||
When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the store name where the certificate for decrypting the PFXCertPassword is stored. </Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
@ -1455,7 +1455,7 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="EncryptionTypeDependency">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType</MSFT:DependencyUri>
|
||||
<MSFT:DependencyUri>Device/Vendor/MSFT/ClientCertificateInstall/PFXCertInstall/[UniqueID]/PFXCertPasswordEncryptionType</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="Range">
|
||||
<MSFT:Value>[2]</MSFT:Value>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
@ -1496,7 +1496,7 @@ When a value of "2" is contained iin PFXCertPasswordEncryptionType, specify the
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required for SCEP certificate installation. A unique ID to differentiate different certificate install requests.
|
||||
<Description>Required for SCEP certificate installation. A unique ID to differentiate different certificate install requests.
|
||||
Calling Delete on the this node, should delete the corresponding SCEP certificate</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
@ -1679,7 +1679,7 @@ Calling Delete on the this node, should delete the corresponding SCEP certificat
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>3</DefaultValue>
|
||||
<Description>Optional. Specify where to keep the private key. Note that even it is protected by TPM, it is not guarded with TPM PIN.
|
||||
<Description>Optional. Specify where to keep the private key. Note that even it is protected by TPM, it is not guarded with TPM PIN.
|
||||
SCEP enrolled cert doesn’t support TPM PIN protection. </Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
@ -1723,7 +1723,7 @@ SCEP enrolled cert doesn’t support TPM PIN protection. </Description>
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>5</DefaultValue>
|
||||
<Description>Optional. When the SCEP server sends pending status, specify device retry waiting time in minutes.
|
||||
<Description>Optional. When the SCEP server sends pending status, specify device retry waiting time in minutes.
|
||||
|
||||
Default value is: 5
|
||||
The min value is 1. </Description>
|
||||
@ -1808,7 +1808,7 @@ The min value is 0 which means no retry. </Description>
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required for enrollment. Specify private key length (RSA).
|
||||
<Description>Required for enrollment. Specify private key length (RSA).
|
||||
Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
@ -1847,7 +1847,7 @@ Valid value: 1024, 2048, 4096. For NGC, only 2048 is the supported keylength.</D
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required for enrollment. Hash algorithm family (SHA-1, SHA-2, SHA-3) specified by MDM server. If multiple hash algorithm families are specified, they must be separated via +.
|
||||
<Description>Required for enrollment. Hash algorithm family (SHA-1, SHA-2, SHA-3) specified by MDM server. If multiple hash algorithm families are specified, they must be separated via +.
|
||||
|
||||
For NGC, only SHA256 is supported as the supported algorithm</Description>
|
||||
<DFFormat>
|
||||
@ -1928,7 +1928,7 @@ For NGC, only SHA256 is supported as the supported algorithm</Description>
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>Days</DefaultValue>
|
||||
<Description>Optional. Specify the units for valid period. Valid values are: Days(Default), Months, Years.
|
||||
<Description>Optional. Specify the units for valid period. Valid values are: Days(Default), Months, Years.
|
||||
MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio) the SCEP server as part of certificate enrollment request. It is the server’s decision on how to use this valid period to create the certificate.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
@ -1968,7 +1968,7 @@ MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. Note the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days.
|
||||
<Description>Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. Note the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days.
|
||||
NOTE: The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPerio) the SCEP server as part of certificate enrollment request. It is the server’s decision on how to use this valid period to create the certificate.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
@ -1995,7 +1995,7 @@ NOTE: The device only sends the MDM server expected certificate validation perio
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Optional.
|
||||
<Description>Optional.
|
||||
Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: CloudDesktop DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the CloudDesktop configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -40,7 +40,7 @@ The following XML file contains the device description framework (DDF) for the C
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>99.9.99999</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>9.9</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x30;0x31;0x7E;0x88;0xA1;0xA2;0xA4;0xA5;0xBC;0xBF;0xCD;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x30;0x31;0x7E;0x88;0xA1;0xA2;0xA4;0xA5;0xBC;0xBF;0xCD;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -53,7 +53,7 @@ The following XML file contains the device description framework (DDF) for the C
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>This node allows to configure different kinds of Boot to Cloud mode. Boot to cloud mode enables users to seamlessly sign-in to a Cloud PC. For using this feature, Cloud Provider application must be installed on the PC and the user must have a Cloud PC provisioned. This node supports the below options: 0. Not Configured. 1. Enable Boot to Cloud Shared PC Mode: Boot to Cloud Shared PC mode allows multiple users to sign-in on the device and use for shared purpose. 2. Enable Boot to Cloud Personal Mode (Cloud only): Personal mode allows user to sign-in on the device using various authentication mechanism configured by their organization (For ex. PIN, Biometrics etc). This mode preserves user personalization, including their profile picture and username in local machine, and facilitates fast account switching.</Description>
|
||||
<Description>This node allows to configure different kinds of Boot to Cloud mode. Boot to cloud mode enables users to seamlessly sign-in to a Cloud PC. For using this feature, Cloud Provider application must be installed on the PC and the user must have a Cloud PC provisioned. This node supports the below options: 0. Not Configured. 1. Enable Boot to Cloud Shared PC Mode: Boot to Cloud Shared PC mode allows multiple users to sign-in on the device and use for shared purpose. 2. Enable Boot to Cloud Dedicated Mode (Cloud only): Dedicated mode allows user to sign-in on the device using various authentication mechanism configured by their organization (For ex. PIN, Biometrics etc). This mode preserves user personalization, including their profile picture and username in local machine, and facilitates fast account switching.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -82,7 +82,7 @@ The following XML file contains the device description framework (DDF) for the C
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>2</MSFT:Value>
|
||||
<MSFT:ValueDescription>Enable Boot to Cloud Personal Mode (Cloud only)</MSFT:ValueDescription>
|
||||
<MSFT:ValueDescription>Enable Boot to Cloud Dedicated Mode (Cloud only)</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Defender CSP
|
||||
description: Learn more about the Defender CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -24,7 +24,20 @@ The following list shows the Defender configuration service provider nodes:
|
||||
- [AllowNetworkProtectionDownLevel](#configurationallownetworkprotectiondownlevel)
|
||||
- [AllowNetworkProtectionOnWinServer](#configurationallownetworkprotectiononwinserver)
|
||||
- [AllowSwitchToAsyncInspection](#configurationallowswitchtoasyncinspection)
|
||||
- [ArchiveMaxDepth](#configurationarchivemaxdepth)
|
||||
- [ArchiveMaxSize](#configurationarchivemaxsize)
|
||||
- [ASROnlyPerRuleExclusions](#configurationasronlyperruleexclusions)
|
||||
- [BehavioralNetworkBlocks](#configurationbehavioralnetworkblocks)
|
||||
- [BruteForceProtection](#configurationbehavioralnetworkblocksbruteforceprotection)
|
||||
- [BruteForceProtectionAggressiveness](#configurationbehavioralnetworkblocksbruteforceprotectionbruteforceprotectionaggressiveness)
|
||||
- [BruteForceProtectionConfiguredState](#configurationbehavioralnetworkblocksbruteforceprotectionbruteforceprotectionconfiguredstate)
|
||||
- [BruteForceProtectionExclusions](#configurationbehavioralnetworkblocksbruteforceprotectionbruteforceprotectionexclusions)
|
||||
- [BruteForceProtectionMaxBlockTime](#configurationbehavioralnetworkblocksbruteforceprotectionbruteforceprotectionmaxblocktime)
|
||||
- [RemoteEncryptionProtection](#configurationbehavioralnetworkblocksremoteencryptionprotection)
|
||||
- [RemoteEncryptionProtectionAggressiveness](#configurationbehavioralnetworkblocksremoteencryptionprotectionremoteencryptionprotectionaggressiveness)
|
||||
- [RemoteEncryptionProtectionConfiguredState](#configurationbehavioralnetworkblocksremoteencryptionprotectionremoteencryptionprotectionconfiguredstate)
|
||||
- [RemoteEncryptionProtectionExclusions](#configurationbehavioralnetworkblocksremoteencryptionprotectionremoteencryptionprotectionexclusions)
|
||||
- [RemoteEncryptionProtectionMaxBlockTime](#configurationbehavioralnetworkblocksremoteencryptionprotectionremoteencryptionprotectionmaxblocktime)
|
||||
- [DataDuplicationDirectory](#configurationdataduplicationdirectory)
|
||||
- [DataDuplicationLocalRetentionPeriod](#configurationdataduplicationlocalretentionperiod)
|
||||
- [DataDuplicationMaximumQuota](#configurationdataduplicationmaximumquota)
|
||||
@ -356,6 +369,88 @@ Control whether network protection can improve performance by switching from rea
|
||||
|
||||
<!-- Device-Configuration-AllowSwitchToAsyncInspection-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-Begin -->
|
||||
### Configuration/ArchiveMaxDepth
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/ArchiveMaxDepth
|
||||
```
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Specify the maximum folder depth to extract from archive files for scanning. If this configuration is off or not set, the default value (0) is applied, and all archives are extracted up to the deepest folder for scanning.
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-4294967295]` |
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxDepth-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxSize-Begin -->
|
||||
### Configuration/ArchiveMaxSize
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxSize-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-ArchiveMaxSize-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxSize-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/ArchiveMaxSize
|
||||
```
|
||||
<!-- Device-Configuration-ArchiveMaxSize-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxSize-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Specify the maximum size, in KB, of archive files to be extracted and scanned. If this configuration is off or not set, the default value (0) is applied, and all archives are extracted and scanned regardless of size.
|
||||
<!-- Device-Configuration-ArchiveMaxSize-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxSize-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-ArchiveMaxSize-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxSize-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-4294967295]` |
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-ArchiveMaxSize-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxSize-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-ArchiveMaxSize-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-ArchiveMaxSize-End -->
|
||||
|
||||
<!-- Device-Configuration-ASROnlyPerRuleExclusions-Begin -->
|
||||
### Configuration/ASROnlyPerRuleExclusions
|
||||
|
||||
@ -395,6 +490,485 @@ Apply ASR only per rule exclusions.
|
||||
|
||||
<!-- Device-Configuration-ASROnlyPerRuleExclusions-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-Begin -->
|
||||
### Configuration/BehavioralNetworkBlocks
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-Description-Begin -->
|
||||
<!-- Description-Source-Not-Found -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `node` |
|
||||
| Access Type | Get |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-Begin -->
|
||||
#### Configuration/BehavioralNetworkBlocks/BruteForceProtection
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/BruteForceProtection
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-Description-Begin -->
|
||||
<!-- Description-Source-Not-Found -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `node` |
|
||||
| Access Type | Get |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-Begin -->
|
||||
##### Configuration/BehavioralNetworkBlocks/BruteForceProtection/BruteForceProtectionAggressiveness
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/BruteForceProtection/BruteForceProtectionAggressiveness
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Set the criteria for when Brute-Force Protection blocks IP addresses.
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | Low: Only IP addresses that are 100% confidence malicious (default). |
|
||||
| 1 | Medium: Use cloud aggregation to block IP addresses that are over 99% likely malicious. |
|
||||
| 2 | High: Block IP addresses identified using client intelligence and context to block IP addresses that are over 90% likely malicious. |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionAggressiveness-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-Begin -->
|
||||
##### Configuration/BehavioralNetworkBlocks/BruteForceProtection/BruteForceProtectionConfiguredState
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/BruteForceProtection/BruteForceProtectionConfiguredState
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Brute-Force Protection in Microsoft Defender Antivirus detects and blocks attempts to forcibly sign in and initiate sessions.
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | Not configured: Apply defaults set by the antivirus engine and platform. |
|
||||
| 1 | Block: Prevent suspicious and malicious behaviors. |
|
||||
| 2 | Audit: Generate EDR detections without blocking. |
|
||||
| 4 | Off: Feature is disabled with no performance impact. |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionConfiguredState-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-Begin -->
|
||||
##### Configuration/BehavioralNetworkBlocks/BruteForceProtection/BruteForceProtectionExclusions
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/BruteForceProtection/BruteForceProtectionExclusions
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Specify IP addresses, subnets, or workstation names to exclude from being blocked by Brute-Force Protection. Note that attackers can spoof excluded addresses and names to bypass protection.
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | List (Delimiter: `|`) |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionExclusions-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-Begin -->
|
||||
##### Configuration/BehavioralNetworkBlocks/BruteForceProtection/BruteForceProtectionMaxBlockTime
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/BruteForceProtection/BruteForceProtectionMaxBlockTime
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Set the maximum time an IP address is blocked by Brute-Force Protection. After this time, blocked IP addresses will be able to sign-in and initiate sessions. If set to 0, internal feature logic will determine blocking time.
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-4294967295]` |
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-BruteForceProtection-BruteForceProtectionMaxBlockTime-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-Begin -->
|
||||
#### Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-Description-Begin -->
|
||||
<!-- Description-Source-Not-Found -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `node` |
|
||||
| Access Type | Get |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-Begin -->
|
||||
##### Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection/RemoteEncryptionProtectionAggressiveness
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection/RemoteEncryptionProtectionAggressiveness
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Set the criteria for when Remote Encryption Protection blocks IP addresses.
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | Low: Block only when confidence level is 100% (Default). |
|
||||
| 1 | Medium: Use cloud aggregation and block when confidence level is above 99%. |
|
||||
| 2 | High: Use cloud intel and context, and block when confidence level is above 90%. |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionAggressiveness-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-Begin -->
|
||||
##### Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection/RemoteEncryptionProtectionConfiguredState
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection/RemoteEncryptionProtectionConfiguredState
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Remote Encryption Protection in Microsoft Defender Antivirus detects and blocks attempts to replace local files with encrypted versions from another device.
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | Not configured: Apply defaults set for the antivirus engine and platform. |
|
||||
| 1 | Block: Prevent suspicious and malicious behaviors. |
|
||||
| 2 | Audit: Generate EDR detections without blocking. |
|
||||
| 4 | Off: Feature is off with no performance impact. |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionConfiguredState-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-Begin -->
|
||||
##### Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection/RemoteEncryptionProtectionExclusions
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection/RemoteEncryptionProtectionExclusions
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Specify IP addresses, subnets, or workstation names to exclude from being blocked by Remote Encryption Protection. Note that attackers can spoof excluded addresses and names to bypass protection.
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | List (Delimiter: `|`) |
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionExclusions-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-Begin -->
|
||||
##### Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection/RemoteEncryptionProtectionMaxBlockTime
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1607 [10.0.14393] and later |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-Applicability-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Defender/Configuration/BehavioralNetworkBlocks/RemoteEncryptionProtection/RemoteEncryptionProtectionMaxBlockTime
|
||||
```
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-OmaUri-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Set the maximum time an IP address is blocked by Remote Encryption Protection. After this time, blocked IP addresses will be able to reinitiate connections. If set to 0, internal feature logic will determine blocking time.
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-Editable-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-4294967295]` |
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-Examples-End -->
|
||||
|
||||
<!-- Device-Configuration-BehavioralNetworkBlocks-RemoteEncryptionProtection-RemoteEncryptionProtectionMaxBlockTime-End -->
|
||||
|
||||
<!-- Device-Configuration-DataDuplicationDirectory-Begin -->
|
||||
### Configuration/DataDuplicationDirectory
|
||||
|
||||
@ -533,7 +1107,7 @@ Defines the maximum data duplication quota in MB that can be collected. When the
|
||||
|
||||
<!-- Device-Configuration-DataDuplicationRemoteLocation-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Define data duplication remote location for device control.
|
||||
Define data duplication remote location for Device Control. When configuring this setting, ensure that Device Control is Enabled and that the provided path is a remote path the user can access.
|
||||
<!-- Device-Configuration-DataDuplicationRemoteLocation-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-DataDuplicationRemoteLocation-Editable-Begin -->
|
||||
@ -1834,8 +2408,8 @@ This setting enables the DNS Sinkhole feature for Network Protection, respecting
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 1 (Default) | DNS Sinkhole is disabled. |
|
||||
| 0 | DNS Sinkhole is enabled. |
|
||||
| 0 | DNS Sinkhole is disabled. |
|
||||
| 1 (Default) | DNS Sinkhole is enabled. |
|
||||
<!-- Device-Configuration-EnableDnsSinkhole-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Configuration-EnableDnsSinkhole-Examples-Begin -->
|
||||
@ -2202,7 +2776,7 @@ Allow managed devices to update through metered connections. Default is 0 - not
|
||||
|
||||
<!-- Device-Configuration-NetworkProtectionReputationMode-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This sets the reputation mode for Network Protection.
|
||||
This sets the reputation mode engine for Network Protection.
|
||||
<!-- Device-Configuration-NetworkProtectionReputationMode-Description-End -->
|
||||
|
||||
<!-- Device-Configuration-NetworkProtectionReputationMode-Editable-Begin -->
|
||||
@ -2219,6 +2793,15 @@ This sets the reputation mode for Network Protection.
|
||||
| Default Value | 0 |
|
||||
<!-- Device-Configuration-NetworkProtectionReputationMode-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-NetworkProtectionReputationMode-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | Use standard reputation engine. |
|
||||
| 1 | Use ESP reputation engine. |
|
||||
<!-- Device-Configuration-NetworkProtectionReputationMode-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Configuration-NetworkProtectionReputationMode-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-NetworkProtectionReputationMode-Examples-End -->
|
||||
@ -2743,9 +3326,19 @@ Defines which device's primary ids should be secured by Defender Device Control.
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Regular Expression: `^RemovableMediaDevices|CdRomDevices|WpdDevices|PrinterDevices$` |
|
||||
<!-- Device-Configuration-SecuredDevicesConfiguration-DFProperties-End -->
|
||||
|
||||
<!-- Device-Configuration-SecuredDevicesConfiguration-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| RemovableMediaDevices | RemovableMediaDevices. |
|
||||
| CdRomDevices | CdRomDevices. |
|
||||
| WpdDevices | WpdDevices. |
|
||||
| PrinterDevices | PrinterDevices. |
|
||||
<!-- Device-Configuration-SecuredDevicesConfiguration-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Configuration-SecuredDevicesConfiguration-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Configuration-SecuredDevicesConfiguration-Examples-End -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Defender DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the Defender configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -39,7 +39,7 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.10586</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -1747,11 +1747,11 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>1</MSFT:Value>
|
||||
<MSFT:Value>0</MSFT:Value>
|
||||
<MSFT:ValueDescription>DNS Sinkhole is disabled</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>0</MSFT:Value>
|
||||
<MSFT:Value>1</MSFT:Value>
|
||||
<MSFT:ValueDescription>DNS Sinkhole is enabled</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
@ -2464,7 +2464,7 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Define data duplication remote location for device control.</Description>
|
||||
<Description>Define data duplication remote location for Device Control. When configuring this setting, ensure that Device Control is Enabled and that the provided path is a remote path the user can access.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -2511,8 +2511,23 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
<MSFT:OsBuildVersion>10.0.17763</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="RegEx">
|
||||
<MSFT:Value>^RemovableMediaDevices|CdRomDevices|WpdDevices|PrinterDevices$</MSFT:Value>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>RemovableMediaDevices</MSFT:Value>
|
||||
<MSFT:ValueDescription>RemovableMediaDevices</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>CdRomDevices</MSFT:Value>
|
||||
<MSFT:ValueDescription>CdRomDevices</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>WpdDevices</MSFT:Value>
|
||||
<MSFT:ValueDescription>WpdDevices</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>PrinterDevices</MSFT:Value>
|
||||
<MSFT:ValueDescription>PrinterDevices</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:List Delimiter="|" />
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
@ -2837,7 +2852,7 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>This sets the reputation mode for Network Protection.</Description>
|
||||
<Description>This sets the reputation mode engine for Network Protection.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -2854,6 +2869,16 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>0</MSFT:Value>
|
||||
<MSFT:ValueDescription>Use standard reputation engine</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>1</MSFT:Value>
|
||||
<MSFT:ValueDescription>Use ESP reputation engine</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
@ -2934,6 +2959,70 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>ArchiveMaxSize</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Specify the maximum size, in KB, of archive files to be extracted and scanned. If this configuration is off or not set, the default value (0) is applied, and all archives are extracted and scanned regardless of size.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="Range">
|
||||
<MSFT:Value>[0-4294967295]</MSFT:Value>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>ArchiveMaxDepth</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Specify the maximum folder depth to extract from archive files for scanning. If this configuration is off or not set, the default value (0) is applied, and all archives are extracted up to the deepest folder for scanning.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="Range">
|
||||
<MSFT:Value>[0-4294967295]</MSFT:Value>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>ScanOnlyIfIdleEnabled</NodeName>
|
||||
<DFProperties>
|
||||
@ -3012,6 +3101,377 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>BehavioralNetworkBlocks</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<DDFName />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
<NodeName>RemoteEncryptionProtection</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<DDFName />
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
<NodeName>RemoteEncryptionProtectionConfiguredState</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Remote Encryption Protection in Microsoft Defender Antivirus detects and blocks attempts to replace local files with encrypted versions from another device.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>0</MSFT:Value>
|
||||
<MSFT:ValueDescription>Not configured: Apply defaults set for the antivirus engine and platform</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>1</MSFT:Value>
|
||||
<MSFT:ValueDescription>Block: Prevent suspicious and malicious behaviors</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>2</MSFT:Value>
|
||||
<MSFT:ValueDescription>Audit: Generate EDR detections without blocking</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>4</MSFT:Value>
|
||||
<MSFT:ValueDescription>Off: Feature is off with no performance impact</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>RemoteEncryptionProtectionMaxBlockTime</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Set the maximum time an IP address is blocked by Remote Encryption Protection. After this time, blocked IP addresses will be able to reinitiate connections. If set to 0, internal feature logic will determine blocking time.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="Range">
|
||||
<MSFT:Value>[0-4294967295]</MSFT:Value>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>RemoteEncryptionProtectionAggressiveness</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Set the criteria for when Remote Encryption Protection blocks IP addresses.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>0</MSFT:Value>
|
||||
<MSFT:ValueDescription>Low: Block only when confidence level is 100% (Default)</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>1</MSFT:Value>
|
||||
<MSFT:ValueDescription>Medium: Use cloud aggregation and block when confidence level is above 99%</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>2</MSFT:Value>
|
||||
<MSFT:ValueDescription>High: Use cloud intel and context, and block when confidence level is above 90%</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>RemoteEncryptionProtectionExclusions</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Specify IP addresses, subnets, or workstation names to exclude from being blocked by Remote Encryption Protection. Note that attackers can spoof excluded addresses and names to bypass protection.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="None">
|
||||
<MSFT:List Delimiter="|" />
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>BruteForceProtection</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<DDFName />
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
<NodeName>BruteForceProtectionConfiguredState</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Brute-Force Protection in Microsoft Defender Antivirus detects and blocks attempts to forcibly sign in and initiate sessions.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>0</MSFT:Value>
|
||||
<MSFT:ValueDescription>Not configured: Apply defaults set by the antivirus engine and platform</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>1</MSFT:Value>
|
||||
<MSFT:ValueDescription>Block: Prevent suspicious and malicious behaviors</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>2</MSFT:Value>
|
||||
<MSFT:ValueDescription>Audit: Generate EDR detections without blocking</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>4</MSFT:Value>
|
||||
<MSFT:ValueDescription>Off: Feature is disabled with no performance impact</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>BruteForceProtectionMaxBlockTime</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Set the maximum time an IP address is blocked by Brute-Force Protection. After this time, blocked IP addresses will be able to sign-in and initiate sessions. If set to 0, internal feature logic will determine blocking time.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="Range">
|
||||
<MSFT:Value>[0-4294967295]</MSFT:Value>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>BruteForceProtectionAggressiveness</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Set the criteria for when Brute-Force Protection blocks IP addresses.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>0</MSFT:Value>
|
||||
<MSFT:ValueDescription>Low: Only IP addresses that are 100% confidence malicious (default)</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>1</MSFT:Value>
|
||||
<MSFT:ValueDescription>Medium: Use cloud aggregation to block IP addresses that are over 99% likely malicious</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>2</MSFT:Value>
|
||||
<MSFT:ValueDescription>High: Block IP addresses identified using client intelligence and context to block IP addresses that are over 90% likely malicious</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>BruteForceProtectionExclusions</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Specify IP addresses, subnets, or workstation names to exclude from being blocked by Brute-Force Protection. Note that attackers can spoof excluded addresses and names to bypass protection.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.14393</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.3</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="None">
|
||||
<MSFT:List Delimiter="|" />
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>Scan</NodeName>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: DevicePreparation CSP
|
||||
description: Learn more about the DevicePreparation CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -26,6 +26,9 @@ The following list shows the DevicePreparation configuration service provider no
|
||||
- [Progress](#mdmproviderprogress)
|
||||
- [RebootRequired](#mdmproviderrebootrequired)
|
||||
- [PageEnabled](#pageenabled)
|
||||
- [PageErrorCode](#pageerrorcode)
|
||||
- [PageErrorDetails](#pageerrordetails)
|
||||
- [PageErrorPhase](#pageerrorphase)
|
||||
- [PageSettings](#pagesettings)
|
||||
- [PageStatus](#pagestatus)
|
||||
<!-- DevicePreparation-Tree-End -->
|
||||
@ -306,6 +309,133 @@ This node determines whether to show the Device Preparation page during OOBE.
|
||||
|
||||
<!-- Device-PageEnabled-End -->
|
||||
|
||||
<!-- Device-PageErrorCode-Begin -->
|
||||
## PageErrorCode
|
||||
|
||||
<!-- Device-PageErrorCode-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- Device-PageErrorCode-Applicability-End -->
|
||||
|
||||
<!-- Device-PageErrorCode-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/DevicePreparation/PageErrorCode
|
||||
```
|
||||
<!-- Device-PageErrorCode-OmaUri-End -->
|
||||
|
||||
<!-- Device-PageErrorCode-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This node provides specific overall HRESULT causing a fatal error on the Device Preparation page. This node is valid only if the PageErrorPhase node's value isn't Unknown.
|
||||
<!-- Device-PageErrorCode-Description-End -->
|
||||
|
||||
<!-- Device-PageErrorCode-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-PageErrorCode-Editable-End -->
|
||||
|
||||
<!-- Device-PageErrorCode-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Get |
|
||||
<!-- Device-PageErrorCode-DFProperties-End -->
|
||||
|
||||
<!-- Device-PageErrorCode-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-PageErrorCode-Examples-End -->
|
||||
|
||||
<!-- Device-PageErrorCode-End -->
|
||||
|
||||
<!-- Device-PageErrorDetails-Begin -->
|
||||
## PageErrorDetails
|
||||
|
||||
<!-- Device-PageErrorDetails-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- Device-PageErrorDetails-Applicability-End -->
|
||||
|
||||
<!-- Device-PageErrorDetails-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/DevicePreparation/PageErrorDetails
|
||||
```
|
||||
<!-- Device-PageErrorDetails-OmaUri-End -->
|
||||
|
||||
<!-- Device-PageErrorDetails-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This node provides optional details for any fatal error on the Device Preparation page. This node is valid only if the PageErrorPhase node's value isn't Unknown, but not all errors will have details.
|
||||
<!-- Device-PageErrorDetails-Description-End -->
|
||||
|
||||
<!-- Device-PageErrorDetails-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-PageErrorDetails-Editable-End -->
|
||||
|
||||
<!-- Device-PageErrorDetails-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Get |
|
||||
<!-- Device-PageErrorDetails-DFProperties-End -->
|
||||
|
||||
<!-- Device-PageErrorDetails-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-PageErrorDetails-Examples-End -->
|
||||
|
||||
<!-- Device-PageErrorDetails-End -->
|
||||
|
||||
<!-- Device-PageErrorPhase-Begin -->
|
||||
## PageErrorPhase
|
||||
|
||||
<!-- Device-PageErrorPhase-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- Device-PageErrorPhase-Applicability-End -->
|
||||
|
||||
<!-- Device-PageErrorPhase-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/DevicePreparation/PageErrorPhase
|
||||
```
|
||||
<!-- Device-PageErrorPhase-OmaUri-End -->
|
||||
|
||||
<!-- Device-PageErrorPhase-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This node provides the specific phase that failed during the Device Preparation page. Values are an enum: 0 = Unknown; 1 = AgentDownload; 2 = AgentProgress.
|
||||
<!-- Device-PageErrorPhase-Description-End -->
|
||||
|
||||
<!-- Device-PageErrorPhase-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-PageErrorPhase-Editable-End -->
|
||||
|
||||
<!-- Device-PageErrorPhase-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Get |
|
||||
<!-- Device-PageErrorPhase-DFProperties-End -->
|
||||
|
||||
<!-- Device-PageErrorPhase-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 | Unknown. |
|
||||
| 1 | AgentDownload. |
|
||||
| 2 | AgentProgress. |
|
||||
<!-- Device-PageErrorPhase-AllowedValues-End -->
|
||||
|
||||
<!-- Device-PageErrorPhase-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-PageErrorPhase-Examples-End -->
|
||||
|
||||
<!-- Device-PageErrorPhase-End -->
|
||||
|
||||
<!-- Device-PageSettings-Begin -->
|
||||
## PageSettings
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: DevicePreparation DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the DevicePreparation configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -40,7 +40,7 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>99.9.99999</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -110,6 +110,83 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>PageErrorPhase</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>This node provides the specific phase that failed during the Device Preparation page. Values are an enum: 0 = Unknown; 1 = AgentDownload; 2 = AgentProgress.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Permanent />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>0</MSFT:Value>
|
||||
<MSFT:ValueDescription>Unknown</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>1</MSFT:Value>
|
||||
<MSFT:ValueDescription>AgentDownload</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>2</MSFT:Value>
|
||||
<MSFT:ValueDescription>AgentProgress</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>PageErrorCode</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>This node provides specific overall HRESULT causing a fatal error on the Device Preparation page. This node is valid only if the PageErrorPhase node's value is not Unknown.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Permanent />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>PageErrorDetails</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>This node provides optional details for any fatal error on the Device Preparation page. This node is valid only if the PageErrorPhase node's value is not Unknown, but not all errors will have details.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Permanent />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>PageSettings</NodeName>
|
||||
<DFProperties>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: DMAcc CSP
|
||||
description: Learn more about the DMAcc CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -709,7 +709,7 @@ Specifies the authentication type. If AAuthLevel is CLCRED, the supported types
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Get, Replace |
|
||||
| Dependency [AAuthlevelDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/DMAcc/[AccountUID]/AppAuth/[ObjectName]/AAuthLevel` <br> Dependency Allowed Value: `SRVCRED` <br> Dependency Allowed Value Type: `ENUM` <br> |
|
||||
| Dependency [AAuthlevelDependency] | Dependency Type: `DependsOn` <br> Dependency URI: `Syncml/DMAcc/[AccountUID]/AppAuth/[ObjectName]/AAuthLevel` <br> Dependency Allowed Value: `SRVCRED` <br> Dependency Allowed Value Type: `ENUM` <br> |
|
||||
<!-- Device-{AccountUID}-AppAuth-{ObjectName}-AAuthType-DFProperties-End -->
|
||||
|
||||
<!-- Device-{AccountUID}-AppAuth-{ObjectName}-AAuthType-AllowedValues-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: DMAcc DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the DMAcc configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -40,7 +40,7 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.10586</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -527,7 +527,7 @@ The following XML file contains the device description framework (DDF) for the D
|
||||
</MSFT:Enum>
|
||||
</MSFT:DependencyChangedAllowedValues>
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/DMAcc/[AccountUID]/AppAuth/[ObjectName]/AAuthLevel</MSFT:DependencyUri>
|
||||
<MSFT:DependencyUri>Syncml/DMAcc/[AccountUID]/AppAuth/[ObjectName]/AAuthLevel</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>SRVCRED</MSFT:Value>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: HealthAttestation CSP
|
||||
description: Learn more about the HealthAttestation CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -9,6 +9,8 @@ ms.date: 01/18/2024
|
||||
<!-- HealthAttestation-Begin -->
|
||||
# HealthAttestation CSP
|
||||
|
||||
[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)]
|
||||
|
||||
<!-- HealthAttestation-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
The Device HealthAttestation configuration service provider (DHA-CSP) enables enterprise IT administrators to assess if a device is booted to a trusted and compliant state, and to take enterprise policy actions.
|
||||
@ -25,6 +27,7 @@ The following list is a description of the functions performed by the Device Hea
|
||||
The following list shows the HealthAttestation configuration service provider nodes:
|
||||
|
||||
- ./Vendor/MSFT/HealthAttestation
|
||||
- [AttestErrorMessage](#attesterrormessage)
|
||||
- [AttestStatus](#atteststatus)
|
||||
- [Certificate](#certificate)
|
||||
- [CorrelationID](#correlationid)
|
||||
@ -42,6 +45,45 @@ The following list shows the HealthAttestation configuration service provider no
|
||||
- [VerifyHealth](#verifyhealth)
|
||||
<!-- HealthAttestation-Tree-End -->
|
||||
|
||||
<!-- Device-AttestErrorMessage-Begin -->
|
||||
## AttestErrorMessage
|
||||
|
||||
<!-- Device-AttestErrorMessage-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- Device-AttestErrorMessage-Applicability-End -->
|
||||
|
||||
<!-- Device-AttestErrorMessage-OmaUri-Begin -->
|
||||
```Device
|
||||
./Vendor/MSFT/HealthAttestation/AttestErrorMessage
|
||||
```
|
||||
<!-- Device-AttestErrorMessage-OmaUri-End -->
|
||||
|
||||
<!-- Device-AttestErrorMessage-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
AttestErrorMessage maintains the error message for the last attestation session, if returned by the attestation service.
|
||||
<!-- Device-AttestErrorMessage-Description-End -->
|
||||
|
||||
<!-- Device-AttestErrorMessage-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-AttestErrorMessage-Editable-End -->
|
||||
|
||||
<!-- Device-AttestErrorMessage-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Get |
|
||||
<!-- Device-AttestErrorMessage-DFProperties-End -->
|
||||
|
||||
<!-- Device-AttestErrorMessage-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-AttestErrorMessage-Examples-End -->
|
||||
|
||||
<!-- Device-AttestErrorMessage-End -->
|
||||
|
||||
<!-- Device-AttestStatus-Begin -->
|
||||
## AttestStatus
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: HealthAttestation DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the HealthAttestation configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -40,7 +40,7 @@ The following XML file contains the device description framework (DDF) for the H
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.10586</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -416,6 +416,31 @@ The following XML file contains the device description framework (DDF) for the H
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>AttestErrorMessage</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>AttestErrorMessage maintains the error message for the last attestation session, if returned by the attestation service.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Permanent />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>99.9.99999</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.4</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
</MgmtTree>
|
||||
```
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: LAPS CSP
|
||||
description: Learn more about the LAPS CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -34,7 +34,13 @@ The following list shows the LAPS configuration service provider nodes:
|
||||
- [AdministratorAccountName](#policiesadministratoraccountname)
|
||||
- [ADPasswordEncryptionEnabled](#policiesadpasswordencryptionenabled)
|
||||
- [ADPasswordEncryptionPrincipal](#policiesadpasswordencryptionprincipal)
|
||||
- [AutomaticAccountManagementEnableAccount](#policiesautomaticaccountmanagementenableaccount)
|
||||
- [AutomaticAccountManagementEnabled](#policiesautomaticaccountmanagementenabled)
|
||||
- [AutomaticAccountManagementNameOrPrefix](#policiesautomaticaccountmanagementnameorprefix)
|
||||
- [AutomaticAccountManagementRandomizeName](#policiesautomaticaccountmanagementrandomizename)
|
||||
- [AutomaticAccountManagementTarget](#policiesautomaticaccountmanagementtarget)
|
||||
- [BackupDirectory](#policiesbackupdirectory)
|
||||
- [PassphraseLength](#policiespassphraselength)
|
||||
- [PasswordAgeDays](#policiespasswordagedays)
|
||||
- [PasswordComplexity](#policiespasswordcomplexity)
|
||||
- [PasswordExpirationProtectionEnabled](#policiespasswordexpirationprotectionenabled)
|
||||
@ -420,6 +426,275 @@ If the specified user or group account is invalid the device will fallback to us
|
||||
|
||||
<!-- Device-Policies-ADPasswordEncryptionPrincipal-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-Begin -->
|
||||
### Policies/AutomaticAccountManagementEnableAccount
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview [99.9.9999] |
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-Applicability-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnableAccount
|
||||
```
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-OmaUri-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Use this setting to configure whether the automatically managed account is enabled or disabled.
|
||||
|
||||
- If this setting is enabled, the target account will be enabled.
|
||||
|
||||
- If this setting is disabled, the target account will be disabled.
|
||||
|
||||
If not specified, this setting defaults to False.
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-Description-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-Editable-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `bool` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | False |
|
||||
| Dependency [AutomaticAccountManagementEnabled] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabled` <br> Dependency Allowed Value: `true` <br> Dependency Allowed Value Type: `ENUM` <br> |
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-DFProperties-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| False (Default) | The target account will be disabled. |
|
||||
| True | The target account will be enabled. |
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-Examples-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnableAccount-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-Begin -->
|
||||
### Policies/AutomaticAccountManagementEnabled
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview [99.9.9999] |
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-Applicability-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabled
|
||||
```
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-OmaUri-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Use this setting to specify whether automatic account management is enabled.
|
||||
|
||||
- If this setting is enabled, the target account will be automatically managed.
|
||||
|
||||
- If this setting is disabled, the target account won't be automatically managed.
|
||||
|
||||
If not specified, this setting defaults to False.
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-Description-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-Editable-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `bool` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | False |
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-DFProperties-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| false (Default) | The target account won't be automatically managed. |
|
||||
| true | The target account will be automatically managed. |
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-Examples-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementEnabled-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-Begin -->
|
||||
### Policies/AutomaticAccountManagementNameOrPrefix
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview [99.9.9999] |
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-Applicability-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementNameOrPrefix
|
||||
```
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-OmaUri-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Use this setting to configure the name or prefix of the managed local administrator account.
|
||||
|
||||
If specified, the value will be used as the name or name prefix of the managed account.
|
||||
|
||||
If not specified, this setting will default to "WLapsAdmin".
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-Description-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-Editable-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Dependency [AutomaticAccountManagementEnabled] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabled` <br> Dependency Allowed Value: `true` <br> Dependency Allowed Value Type: `ENUM` <br> |
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-DFProperties-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-Examples-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementNameOrPrefix-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-Begin -->
|
||||
### Policies/AutomaticAccountManagementRandomizeName
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview [99.9.9999] |
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-Applicability-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementRandomizeName
|
||||
```
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-OmaUri-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Use this setting to configure whether the name of the automatically managed account uses a random numeric suffix each time the password is rotated.
|
||||
|
||||
If this setting is enabled, the name of the target account will use a random numeric suffix.
|
||||
|
||||
If this setting is disbled, the name of the target account won't use a random numeric suffix.
|
||||
|
||||
If not specified, this setting defaults to False.
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-Description-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-Editable-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `bool` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | False |
|
||||
| Dependency [AutomaticAccountManagementEnabled] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabled` <br> Dependency Allowed Value: `true` <br> Dependency Allowed Value Type: `ENUM` <br> |
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-DFProperties-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| False (Default) | The name of the target account won't use a random numeric suffix. |
|
||||
| True | The name of the target account will use a random numeric suffix. |
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-Examples-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementRandomizeName-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-Begin -->
|
||||
### Policies/AutomaticAccountManagementTarget
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview [99.9.9999] |
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-Applicability-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementTarget
|
||||
```
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-OmaUri-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Use this setting to configure which account is automatically managed.
|
||||
|
||||
The allowable settings are:
|
||||
|
||||
0=The builtin administrator account will be managed.
|
||||
|
||||
1=A new account created by Windows LAPS will be managed.
|
||||
|
||||
If not specified, this setting will default to 1.
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-Description-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-Editable-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 1 |
|
||||
| Dependency [AutomaticAccountManagementEnabled] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabled` <br> Dependency Allowed Value: `true` <br> Dependency Allowed Value Type: `ENUM` <br> |
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-DFProperties-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 | Manage the built-in administrator account. |
|
||||
| 1 (Default) | Manage a new custom administrator account. |
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-Examples-End -->
|
||||
|
||||
<!-- Device-Policies-AutomaticAccountManagementTarget-End -->
|
||||
|
||||
<!-- Device-Policies-BackupDirectory-Begin -->
|
||||
### Policies/BackupDirectory
|
||||
|
||||
@ -478,6 +753,54 @@ If not specified, this setting will default to 0.
|
||||
|
||||
<!-- Device-Policies-BackupDirectory-End -->
|
||||
|
||||
<!-- Device-Policies-PassphraseLength-Begin -->
|
||||
### Policies/PassphraseLength
|
||||
|
||||
<!-- Device-Policies-PassphraseLength-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview [99.9.9999] |
|
||||
<!-- Device-Policies-PassphraseLength-Applicability-End -->
|
||||
|
||||
<!-- Device-Policies-PassphraseLength-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/LAPS/Policies/PassphraseLength
|
||||
```
|
||||
<!-- Device-Policies-PassphraseLength-OmaUri-End -->
|
||||
|
||||
<!-- Device-Policies-PassphraseLength-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Use this setting to configure the number of passphrase words.
|
||||
|
||||
If not specified, this setting will default to 6 words.
|
||||
|
||||
This setting has a minimum allowed value of 3 words.
|
||||
|
||||
This setting has a maximum allowed value of 10 words.
|
||||
<!-- Device-Policies-PassphraseLength-Description-End -->
|
||||
|
||||
<!-- Device-Policies-PassphraseLength-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-PassphraseLength-Editable-End -->
|
||||
|
||||
<!-- Device-Policies-PassphraseLength-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[3-10]` |
|
||||
| Default Value | 6 |
|
||||
| Dependency [PasswordComplexity] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/LAPS/Policies/PasswordComplexity` <br> Dependency Allowed Value: `[6-8]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- Device-Policies-PassphraseLength-DFProperties-End -->
|
||||
|
||||
<!-- Device-Policies-PassphraseLength-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Policies-PassphraseLength-Examples-End -->
|
||||
|
||||
<!-- Device-Policies-PassphraseLength-End -->
|
||||
|
||||
<!-- Device-Policies-PasswordAgeDays-Begin -->
|
||||
### Policies/PasswordAgeDays
|
||||
|
||||
@ -550,9 +873,15 @@ The allowable settings are:
|
||||
1=Large letters
|
||||
2=Large letters + small letters
|
||||
3=Large letters + small letters + numbers
|
||||
4=Large letters + small letters + numbers + special characters.
|
||||
4=Large letters + small letters + numbers + special characters
|
||||
5=Large letters + small letters + numbers + special characters (improved readability)
|
||||
6=Passphrase (long words)
|
||||
7=Passphrase (short words)
|
||||
8=Passphrase (short words with unique prefixes)
|
||||
|
||||
If not specified, this setting will default to 4.
|
||||
|
||||
Passphrase list taken from "Deep Dive: EFF's New Wordlists for Random Passphrases" by Electronic Frontier Foundation, and is used under a CC-BY-3.0 Attribution license. See <https://go.microsoft.com/fwlink/?linkid=2255471> for more information.
|
||||
<!-- Device-Policies-PasswordComplexity-Description-End -->
|
||||
|
||||
<!-- Device-Policies-PasswordComplexity-Editable-Begin -->
|
||||
@ -580,6 +909,10 @@ If not specified, this setting will default to 4.
|
||||
| 2 | Large letters + small letters. |
|
||||
| 3 | Large letters + small letters + numbers. |
|
||||
| 4 (Default) | Large letters + small letters + numbers + special characters. |
|
||||
| 5 | Large letters + small letters + numbers + special characters (improved readability). |
|
||||
| 6 | Passphrase (long words). |
|
||||
| 7 | Passphrase (short words). |
|
||||
| 8 | Passphrase (short words with unique prefixes). |
|
||||
<!-- Device-Policies-PasswordComplexity-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Policies-PasswordComplexity-Examples-Begin -->
|
||||
@ -683,6 +1016,7 @@ This setting has a maximum allowed value of 64 characters.
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[8-64]` |
|
||||
| Default Value | 14 |
|
||||
| Dependency [PasswordComplexity] | Dependency Type: `DependsOn` <br> Dependency URI: `Vendor/MSFT/LAPS/Policies/PasswordComplexity` <br> Dependency Allowed Value: `[1-5]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- Device-Policies-PasswordLength-DFProperties-End -->
|
||||
|
||||
<!-- Device-Policies-PasswordLength-Examples-Begin -->
|
||||
@ -740,6 +1074,7 @@ If not specified, this setting will default to 3 (Reset the password and logoff
|
||||
| 1 | Reset password: upon expiry of the grace period, the managed account password will be reset. |
|
||||
| 3 (Default) | Reset the password and logoff the managed account: upon expiry of the grace period, the managed account password will be reset and any interactive logon sessions using the managed account will be terminated. |
|
||||
| 5 | Reset the password and reboot: upon expiry of the grace period, the managed account password will be reset and the managed device will be immediately rebooted. |
|
||||
| 11 | Reset the password, logoff the managed account, and terminate any remaining processes: upon expiration of the grace period, the managed account password is reset, any interactive logon sessions using the managed account are logged off, and any remaining processes are terminated. |
|
||||
<!-- Device-Policies-PostAuthenticationActions-AllowedValues-End -->
|
||||
|
||||
<!-- Device-Policies-PostAuthenticationActions-Examples-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: LAPS DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the LAPS configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -194,8 +194,14 @@ The allowable settings are:
|
||||
2=Large letters + small letters
|
||||
3=Large letters + small letters + numbers
|
||||
4=Large letters + small letters + numbers + special characters
|
||||
5=Large letters + small letters + numbers + special characters (improved readability)
|
||||
6=Passphrase (long words)
|
||||
7=Passphrase (short words)
|
||||
8=Passphrase (short words with unique prefixes)
|
||||
|
||||
If not specified, this setting will default to 4.</Description>
|
||||
If not specified, this setting will default to 4.
|
||||
|
||||
Passphrase list taken from "Deep Dive: EFF's New Wordlists for Random Passphrases" by Electronic Frontier Foundation, and is used under a CC-BY-3.0 Attribution license. See https://go.microsoft.com/fwlink/?linkid=2255471 for more information.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -225,6 +231,22 @@ If not specified, this setting will default to 4.</Description>
|
||||
<MSFT:Value>4</MSFT:Value>
|
||||
<MSFT:ValueDescription>Large letters + small letters + numbers + special characters</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>5</MSFT:Value>
|
||||
<MSFT:ValueDescription>Large letters + small letters + numbers + special characters (improved readability)</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>6</MSFT:Value>
|
||||
<MSFT:ValueDescription>Passphrase (long words)</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>7</MSFT:Value>
|
||||
<MSFT:ValueDescription>Passphrase (short words)</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>8</MSFT:Value>
|
||||
<MSFT:ValueDescription>Passphrase (short words with unique prefixes)</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
@ -260,6 +282,70 @@ This setting has a maximum allowed value of 64 characters.</Description>
|
||||
<MSFT:AllowedValues ValueType="Range">
|
||||
<MSFT:Value>[8-64]</MSFT:Value>
|
||||
</MSFT:AllowedValues>
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="PasswordComplexity">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/LAPS/Policies/PasswordComplexity</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="Range">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>[1-5]</MSFT:Value>
|
||||
<MSFT:ValueDescription>PasswordComplexity configured to generate a password</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
</MSFT:Dependency>
|
||||
</MSFT:DependencyGroup>
|
||||
</MSFT:DependencyBehavior>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>PassphraseLength</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>6</DefaultValue>
|
||||
<Description>Use this setting to configure the number of passphrase words.
|
||||
|
||||
If not specified, this setting will default to 6 words
|
||||
|
||||
This setting has a minimum allowed value of 3 words.
|
||||
|
||||
This setting has a maximum allowed value of 10 words.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>99.9.9999</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.1</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="Range">
|
||||
<MSFT:Value>[3-10]</MSFT:Value>
|
||||
</MSFT:AllowedValues>
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="PasswordComplexity">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/LAPS/Policies/PasswordComplexity</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="Range">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>[6-8]</MSFT:Value>
|
||||
<MSFT:ValueDescription>PasswordComplexity configured to generate a passphrase</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
</MSFT:Dependency>
|
||||
</MSFT:DependencyGroup>
|
||||
</MSFT:DependencyBehavior>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
@ -567,9 +653,278 @@ If not specified, this setting will default to 3 (Reset the password and logoff
|
||||
<MSFT:Value>5</MSFT:Value>
|
||||
<MSFT:ValueDescription>Reset the password and reboot: upon expiry of the grace period, the managed account password will be reset and the managed device will be immediately rebooted.</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>11</MSFT:Value>
|
||||
<MSFT:ValueDescription>Reset the password, logoff the managed account, and terminate any remaining processes: upon expiration of the grace period, the managed account password is reset, any interactive logon sessions using the managed account are logged off, and any remaining processes are terminated.</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>AutomaticAccountManagementEnabled</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>False</DefaultValue>
|
||||
<Description>Use this setting to specify whether automatic account management is enabled.
|
||||
|
||||
If this setting is enabled, the target account will be automatically managed.
|
||||
|
||||
If this setting is disabled, the target account will not be automatically managed.
|
||||
|
||||
If not specified, this setting defaults to False.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>99.9.9999</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.1</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>false</MSFT:Value>
|
||||
<MSFT:ValueDescription>The target account will not be automatically managed</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>true</MSFT:Value>
|
||||
<MSFT:ValueDescription>The target account will be automatically managed</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>AutomaticAccountManagementTarget</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>1</DefaultValue>
|
||||
<Description>Use this setting to configure which account is automatically managed.
|
||||
|
||||
The allowable settings are:
|
||||
|
||||
0=The builtin administrator account will be managed.
|
||||
1=A new account created by Windows LAPS will be managed.
|
||||
|
||||
If not specified, this setting will default to 1.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>99.9.9999</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.1</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>0</MSFT:Value>
|
||||
<MSFT:ValueDescription>Manage the built-in administrator account</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>1</MSFT:Value>
|
||||
<MSFT:ValueDescription>Manage a new custom administrator account</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="AutomaticAccountManagementEnabled">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabled</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>true</MSFT:Value>
|
||||
<MSFT:ValueDescription>AutomaticAccountManagementEnabled enabled</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
</MSFT:Dependency>
|
||||
</MSFT:DependencyGroup>
|
||||
</MSFT:DependencyBehavior>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>AutomaticAccountManagementNameOrPrefix</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Use this setting to configure the name or prefix of the managed local administrator account.
|
||||
|
||||
If specified, the value will be used as the name or name prefix of the managed account.
|
||||
|
||||
If not specified, this setting will default to "WLapsAdmin".</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>99.9.9999</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.1</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="AutomaticAccountManagementEnabled">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabled</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>true</MSFT:Value>
|
||||
<MSFT:ValueDescription>AutomaticAccountManagementEnabled enabled</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
</MSFT:Dependency>
|
||||
</MSFT:DependencyGroup>
|
||||
</MSFT:DependencyBehavior>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>AutomaticAccountManagementEnableAccount</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>False</DefaultValue>
|
||||
<Description>Use this setting to configure whether the automatically managed account is enabled or disabled.
|
||||
|
||||
If this setting is enabled, the target account will be enabled.
|
||||
|
||||
If this setting is disabled, the target account will be disabled.
|
||||
|
||||
If not specified, this setting defaults to False.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>99.9.9999</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.1</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>False</MSFT:Value>
|
||||
<MSFT:ValueDescription>The target account will be disabled</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>True</MSFT:Value>
|
||||
<MSFT:ValueDescription>The target account will be enabled</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="AutomaticAccountManagementEnabled">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabled</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>true</MSFT:Value>
|
||||
<MSFT:ValueDescription>AutomaticAccountManagementEnabled enabled</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
</MSFT:Dependency>
|
||||
</MSFT:DependencyGroup>
|
||||
</MSFT:DependencyBehavior>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>AutomaticAccountManagementRandomizeName</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Add />
|
||||
<Delete />
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>False</DefaultValue>
|
||||
<Description>Use this setting to configure whether the name of the automatically managed account uses a random numeric suffix each time the password is rotated.
|
||||
|
||||
If this setting is enabled, the name of the target account will use a random numeric suffix.
|
||||
|
||||
If this setting is disbled, the name of the target account will not use a random numeric suffix..
|
||||
|
||||
If not specified, this setting defaults to False.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<ZeroOrOne />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Dynamic />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME />
|
||||
</DFType>
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>99.9.9999</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.1</MSFT:CspVersion>
|
||||
</MSFT:Applicability>
|
||||
<MSFT:AllowedValues ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>False</MSFT:Value>
|
||||
<MSFT:ValueDescription>The name of the target account will not use a random numeric suffix.</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>True</MSFT:Value>
|
||||
<MSFT:ValueDescription>The name of the target account will use a random numeric suffix.</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:AllowedValues>
|
||||
<MSFT:DependencyBehavior>
|
||||
<MSFT:DependencyGroup FriendlyId="AutomaticAccountManagementEnabled">
|
||||
<MSFT:Dependency Type="DependsOn">
|
||||
<MSFT:DependencyUri>Vendor/MSFT/LAPS/Policies/AutomaticAccountManagementEnabled</MSFT:DependencyUri>
|
||||
<MSFT:DependencyAllowedValue ValueType="ENUM">
|
||||
<MSFT:Enum>
|
||||
<MSFT:Value>true</MSFT:Value>
|
||||
<MSFT:ValueDescription>AutomaticAccountManagementEnabled enabled</MSFT:ValueDescription>
|
||||
</MSFT:Enum>
|
||||
</MSFT:DependencyAllowedValue>
|
||||
</MSFT:Dependency>
|
||||
</MSFT:DependencyGroup>
|
||||
</MSFT:DependencyBehavior>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>Actions</NodeName>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Personalization CSP
|
||||
description: Learn more about the Personalization CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -127,7 +127,7 @@ An http or https Url to a jpg, jpeg or png image that needs to be downloaded and
|
||||
|
||||
<!-- Device-CompanyName-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
The name of the company to be displayed on the sign-in screen. This setting is currently available for boot to cloud shared pc mode only.
|
||||
This represents the name of the company. It can be at most 30 characters long. This setting is currently available only for boot to cloud shared pc mode to display the company name on sign-in screen.
|
||||
<!-- Device-CompanyName-Description-End -->
|
||||
|
||||
<!-- Device-CompanyName-Editable-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Personalization DDF file
|
||||
description: View the XML file containing the device description framework (DDF) for the Personalization configuration service provider.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -42,7 +42,7 @@ The following XML file contains the device description framework (DDF) for the P
|
||||
<MSFT:Applicability>
|
||||
<MSFT:OsBuildVersion>10.0.16299</MSFT:OsBuildVersion>
|
||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;</MSFT:EditionAllowList>
|
||||
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2;</MSFT:EditionAllowList>
|
||||
</MSFT:Applicability>
|
||||
</DFProperties>
|
||||
<Node>
|
||||
@ -203,7 +203,7 @@ The following XML file contains the device description framework (DDF) for the P
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>The name of the company to be displayed on the sign-in screen. This setting is currently available for boot to cloud shared pc mode only.</Description>
|
||||
<Description>This represents the name of the company. It can be at most 30 characters long. This setting is currently available only for boot to cloud shared pc mode to display the company name on sign-in screen.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: ADMX-backed policies in Policy CSP
|
||||
description: Learn about the ADMX-backed policies in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -539,6 +539,8 @@ This article lists the ADMX-backed policies in Policy CSP.
|
||||
- [HelpQualifiedRootDir_Comp](policy-csp-admx-help.md)
|
||||
- [RestrictRunFromHelp_Comp](policy-csp-admx-help.md)
|
||||
- [DisableHHDEP](policy-csp-admx-help.md)
|
||||
- [AllowChildProcesses](policy-csp-admx-help.md)
|
||||
- [HideChildProcessMessageBox](policy-csp-admx-help.md)
|
||||
|
||||
## ADMX_HelpAndSupport
|
||||
|
||||
@ -2515,6 +2517,7 @@ This article lists the ADMX-backed policies in Policy CSP.
|
||||
- [ConfigureRpcAuthnLevelPrivacyEnabled](policy-csp-printers.md)
|
||||
- [ConfigureIppPageCountsPolicy](policy-csp-printers.md)
|
||||
- [ConfigureRedirectionGuardPolicy](policy-csp-printers.md)
|
||||
- [ConfigureWindowsProtectedPrint](policy-csp-printers.md)
|
||||
|
||||
## RemoteAssistance
|
||||
|
||||
@ -2587,6 +2590,10 @@ This article lists the ADMX-backed policies in Policy CSP.
|
||||
- [WPDDevicesDenyReadAccessPerDevice](policy-csp-storage.md)
|
||||
- [WPDDevicesDenyWriteAccessPerDevice](policy-csp-storage.md)
|
||||
|
||||
## Sudo
|
||||
|
||||
- [EnableSudo](policy-csp-sudo.md)
|
||||
|
||||
## System
|
||||
|
||||
- [BootStartDriverInitialization](policy-csp-system.md)
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Policies in Policy CSP supported by Group Policy
|
||||
description: Learn about the policies in Policy CSP supported by Group Policy.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -281,6 +281,9 @@ This article lists the policies in Policy CSP that have a group policy mapping.
|
||||
- [PasswordComplexity](policy-csp-devicelock.md)
|
||||
- [PasswordHistorySize](policy-csp-devicelock.md)
|
||||
- [AllowAdministratorLockout](policy-csp-devicelock.md)
|
||||
- [MinimumPasswordLength](policy-csp-devicelock.md)
|
||||
- [MinimumPasswordLengthAudit](policy-csp-devicelock.md)
|
||||
- [RelaxMinimumPasswordLengthLimits](policy-csp-devicelock.md)
|
||||
|
||||
## Display
|
||||
|
||||
@ -383,14 +386,11 @@ This article lists the policies in Policy CSP that have a group policy mapping.
|
||||
- [DomainMember_DisableMachineAccountPasswordChanges](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [DomainMember_MaximumMachineAccountPasswordAge](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [DomainMember_RequireStrongSessionKey](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [MinimumPasswordLength](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [MinimumPasswordLengthAudit](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [RelaxMinimumPasswordLengthLimits](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [InteractiveLogon_DoNotRequireCTRLALTDEL](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [InteractiveLogon_DoNotDisplayLastSignedIn](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [InteractiveLogon_DoNotDisplayUsernameAtSignIn](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [InteractiveLogon_MachineAccountThreshold](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [InteractiveLogon_MachineAccountLockoutThreshold](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [InteractiveLogon_MachineInactivityLimit](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [InteractiveLogon_MessageTextForUsersAttemptingToLogOn](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [InteractiveLogon_MessageTitleForUsersAttemptingToLogOn](policy-csp-localpoliciessecurityoptions.md)
|
||||
@ -425,10 +425,12 @@ This article lists the policies in Policy CSP that have a group policy mapping.
|
||||
- [UserAccountControl_UseAdminApprovalMode](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_AllowUIAccessApplicationsToPromptForElevation](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_BehaviorOfTheElevationPromptForAdministrators](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_RunAllAdministratorsInAdminApprovalMode](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_TypeOfAdminApprovalMode](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations](policy-csp-localpoliciessecurityoptions.md)
|
||||
- [UserAccountControl_DetectApplicationInstallationsAndPromptForElevation](policy-csp-localpoliciessecurityoptions.md)
|
||||
@ -865,6 +867,7 @@ This article lists the policies in Policy CSP that have a group policy mapping.
|
||||
## WindowsAI
|
||||
|
||||
- [TurnOffWindowsCopilot](policy-csp-windowsai.md)
|
||||
- [DisableAIDataAnalysis](policy-csp-windowsai.md)
|
||||
|
||||
## WindowsDefenderSecurityCenter
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Policy CSP
|
||||
description: Learn more about the Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -1155,6 +1155,7 @@ Specifies the name/value pair used in the policy. See the individual Area DDFs f
|
||||
- [Start](policy-csp-start.md)
|
||||
- [Stickers](policy-csp-stickers.md)
|
||||
- [Storage](policy-csp-storage.md)
|
||||
- [Sudo](policy-csp-sudo.md)
|
||||
- [System](policy-csp-system.md)
|
||||
- [SystemServices](policy-csp-systemservices.md)
|
||||
- [TaskManager](policy-csp-taskmanager.md)
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: ADMX_Help Policy CSP
|
||||
description: Learn more about the ADMX_Help Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -11,10 +11,62 @@ ms.date: 01/18/2024
|
||||
|
||||
[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)]
|
||||
|
||||
[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)]
|
||||
|
||||
<!-- ADMX_Help-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- ADMX_Help-Editable-End -->
|
||||
|
||||
<!-- AllowChildProcesses-Begin -->
|
||||
## AllowChildProcesses
|
||||
|
||||
<!-- AllowChildProcesses-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- AllowChildProcesses-Applicability-End -->
|
||||
|
||||
<!-- AllowChildProcesses-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/ADMX_Help/AllowChildProcesses
|
||||
```
|
||||
<!-- AllowChildProcesses-OmaUri-End -->
|
||||
|
||||
<!-- AllowChildProcesses-Description-Begin -->
|
||||
<!-- Description-Source-Not-Found -->
|
||||
<!-- AllowChildProcesses-Description-End -->
|
||||
|
||||
<!-- AllowChildProcesses-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- AllowChildProcesses-Editable-End -->
|
||||
|
||||
<!-- AllowChildProcesses-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
<!-- AllowChildProcesses-DFProperties-End -->
|
||||
|
||||
<!-- AllowChildProcesses-AdmxBacked-Begin -->
|
||||
<!-- ADMX-Not-Found -->
|
||||
[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)]
|
||||
|
||||
**ADMX mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | AllowChildProcesses |
|
||||
| ADMX File Name | Help.admx |
|
||||
<!-- AllowChildProcesses-AdmxBacked-End -->
|
||||
|
||||
<!-- AllowChildProcesses-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- AllowChildProcesses-Examples-End -->
|
||||
|
||||
<!-- AllowChildProcesses-End -->
|
||||
|
||||
<!-- DisableHHDEP-Begin -->
|
||||
## DisableHHDEP
|
||||
|
||||
@ -148,6 +200,56 @@ For additional options, see the "Restrict these programs from being launched fro
|
||||
|
||||
<!-- HelpQualifiedRootDir_Comp-End -->
|
||||
|
||||
<!-- HideChildProcessMessageBox-Begin -->
|
||||
## HideChildProcessMessageBox
|
||||
|
||||
<!-- HideChildProcessMessageBox-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- HideChildProcessMessageBox-Applicability-End -->
|
||||
|
||||
<!-- HideChildProcessMessageBox-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/ADMX_Help/HideChildProcessMessageBox
|
||||
```
|
||||
<!-- HideChildProcessMessageBox-OmaUri-End -->
|
||||
|
||||
<!-- HideChildProcessMessageBox-Description-Begin -->
|
||||
<!-- Description-Source-Not-Found -->
|
||||
<!-- HideChildProcessMessageBox-Description-End -->
|
||||
|
||||
<!-- HideChildProcessMessageBox-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- HideChildProcessMessageBox-Editable-End -->
|
||||
|
||||
<!-- HideChildProcessMessageBox-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
<!-- HideChildProcessMessageBox-DFProperties-End -->
|
||||
|
||||
<!-- HideChildProcessMessageBox-AdmxBacked-Begin -->
|
||||
<!-- ADMX-Not-Found -->
|
||||
[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)]
|
||||
|
||||
**ADMX mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | HideChildProcessMessageBox |
|
||||
| ADMX File Name | Help.admx |
|
||||
<!-- HideChildProcessMessageBox-AdmxBacked-End -->
|
||||
|
||||
<!-- HideChildProcessMessageBox-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- HideChildProcessMessageBox-Examples-End -->
|
||||
|
||||
<!-- HideChildProcessMessageBox-End -->
|
||||
|
||||
<!-- RestrictRunFromHelp-Begin -->
|
||||
## RestrictRunFromHelp
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: DeviceLock Policy CSP
|
||||
description: Learn more about the DeviceLock Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -711,7 +711,7 @@ This security setting determines the period of time (in days) that a password ca
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-999]` |
|
||||
| Default Value | 1 |
|
||||
| Default Value | 42 |
|
||||
<!-- MaximumPasswordAge-DFProperties-End -->
|
||||
|
||||
<!-- MaximumPasswordAge-GpMapping-Begin -->
|
||||
@ -1016,6 +1016,109 @@ This security setting determines the period of time (in days) that a password mu
|
||||
|
||||
<!-- MinimumPasswordAge-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-Begin -->
|
||||
## MinimumPasswordLength
|
||||
|
||||
<!-- MinimumPasswordLength-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- MinimumPasswordLength-Applicability-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/DeviceLock/MinimumPasswordLength
|
||||
```
|
||||
<!-- MinimumPasswordLength-OmaUri-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This security setting determines the least number of characters that a password for a user account may contain. The maximum value for this setting depends on the value of the Relax minimum password length limits setting. If the Relax minimum password length limits setting isn't defined, this setting may be configured from 0 to 14. If the Relax minimum password length limits setting is defined and disabled, this setting may be configured from 0 to 14. If the Relax minimum password length limits setting is defined and enabled, this setting may be configured from 0 to 128. Setting the required number of characters to 0 means that no password is required.
|
||||
|
||||
> [!NOTE]
|
||||
> By default, member computers follow the configuration of their domain controllers. Default values: 7 on domain controllers 0 on stand-alone servers Configuring this setting larger than 14 may affect compatibility with clients, services, and applications. We recommend that you only configure this setting larger than 14 after you use the Minimum password length audit setting to test for potential incompatibilities at the new setting.
|
||||
<!-- MinimumPasswordLength-Description-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- MinimumPasswordLength-Editable-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-128]` |
|
||||
| Default Value | 0 |
|
||||
<!-- MinimumPasswordLength-DFProperties-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | Minimum password length |
|
||||
| Path | Windows Settings > Security Settings > Account Policies > Password Policy |
|
||||
<!-- MinimumPasswordLength-GpMapping-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- MinimumPasswordLength-Examples-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Begin -->
|
||||
## MinimumPasswordLengthAudit
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- MinimumPasswordLengthAudit-Applicability-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/DeviceLock/MinimumPasswordLengthAudit
|
||||
```
|
||||
<!-- MinimumPasswordLengthAudit-OmaUri-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This security setting determines the minimum password length for which password length audit warning events are issued. This setting may be configured from 1 to 128. You should only enable and configure this setting when you try to determine the potential effect of increasing the minimum password length setting in your environment. If this setting isn't defined, audit events won't be issued. If this setting is defined and is less than or equal to the minimum password length setting, audit events won't be issued. If this setting is defined and is greater than the minimum password length setting, and the length of a new account password is less than this setting, an audit event will be issued.
|
||||
<!-- MinimumPasswordLengthAudit-Description-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- MinimumPasswordLengthAudit-Editable-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[1-128]` |
|
||||
| Default Value | 4294967295 |
|
||||
<!-- MinimumPasswordLengthAudit-DFProperties-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | Minimum password length audit |
|
||||
| Path | Windows Settings > Security Settings > Account Policies > Password Policy |
|
||||
<!-- MinimumPasswordLengthAudit-GpMapping-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- MinimumPasswordLengthAudit-Examples-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-End -->
|
||||
|
||||
<!-- PasswordComplexity-Begin -->
|
||||
## PasswordComplexity
|
||||
|
||||
@ -1248,6 +1351,64 @@ If you enable this setting, users will no longer be able to modify slide show se
|
||||
|
||||
<!-- PreventLockScreenSlideShow-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Begin -->
|
||||
## RelaxMinimumPasswordLengthLimits
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Applicability-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/DeviceLock/RelaxMinimumPasswordLengthLimits
|
||||
```
|
||||
<!-- RelaxMinimumPasswordLengthLimits-OmaUri-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This setting controls whether the minimum password length setting can be increased beyond the legacy limit of 14. If this setting isn't defined, minimum password length may be configured to no more than 14. If this setting is defined and disabled, minimum password length may be configured to no more than 14. If this setting is defined and enabled, minimum password length may be configured more than 14.
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Description-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Editable-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 0 |
|
||||
<!-- RelaxMinimumPasswordLengthLimits-DFProperties-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | Disabled. |
|
||||
| 1 | Enabled. |
|
||||
<!-- RelaxMinimumPasswordLengthLimits-AllowedValues-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | Relax minimum password length |
|
||||
| Path | Windows Settings > Security Settings > Account Policies > Password Policy |
|
||||
<!-- RelaxMinimumPasswordLengthLimits-GpMapping-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Examples-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-End -->
|
||||
|
||||
<!-- ScreenTimeoutWhileLocked-Begin -->
|
||||
## ScreenTimeoutWhileLocked
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Kerberos Policy CSP
|
||||
description: Learn more about the Kerberos Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -316,7 +316,7 @@ If you don't configure this policy, the SHA1 algorithm will assume the **Default
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 1 |
|
||||
| Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfigurationEnabled` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
| Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfiguration` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- PKInitHashAlgorithmSHA1-DFProperties-End -->
|
||||
|
||||
<!-- PKInitHashAlgorithmSHA1-AllowedValues-Begin -->
|
||||
@ -389,7 +389,7 @@ If you don't configure this policy, the SHA256 algorithm will assume the **Defau
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 1 |
|
||||
| Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfigurationEnabled` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
| Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfiguration` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- PKInitHashAlgorithmSHA256-DFProperties-End -->
|
||||
|
||||
<!-- PKInitHashAlgorithmSHA256-AllowedValues-Begin -->
|
||||
@ -462,7 +462,7 @@ If you don't configure this policy, the SHA384 algorithm will assume the **Defau
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 1 |
|
||||
| Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfigurationEnabled` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
| Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfiguration` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- PKInitHashAlgorithmSHA384-DFProperties-End -->
|
||||
|
||||
<!-- PKInitHashAlgorithmSHA384-AllowedValues-Begin -->
|
||||
@ -535,7 +535,7 @@ If you don't configure this policy, the SHA512 algorithm will assume the **Defau
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 1 |
|
||||
| Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfigurationEnabled` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
| Dependency [PKINIT_Hash_Algorithm_Configuration_DependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/Kerberos/PKInitHashAlgorithmConfiguration` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
|
||||
<!-- PKInitHashAlgorithmSHA512-DFProperties-End -->
|
||||
|
||||
<!-- PKInitHashAlgorithmSHA512-AllowedValues-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: LocalPoliciesSecurityOptions Policy CSP
|
||||
description: Learn more about the LocalPoliciesSecurityOptions Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -366,7 +366,7 @@ Accounts: Rename guest account This security setting determines whether a differ
|
||||
<!-- Audit_AuditTheUseOfBackupAndRestoreprivilege-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- Audit_AuditTheUseOfBackupAndRestoreprivilege-Applicability-End -->
|
||||
|
||||
<!-- Audit_AuditTheUseOfBackupAndRestoreprivilege-OmaUri-Begin -->
|
||||
@ -395,6 +395,7 @@ Audit: Audit the use of Backup and Restore privilege This security setting deter
|
||||
| Format | `b64` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | List (Delimiter: ``) |
|
||||
| Default Value | 00 |
|
||||
<!-- Audit_AuditTheUseOfBackupAndRestoreprivilege-DFProperties-End -->
|
||||
|
||||
<!-- Audit_AuditTheUseOfBackupAndRestoreprivilege-Examples-Begin -->
|
||||
@ -409,7 +410,7 @@ Audit: Audit the use of Backup and Restore privilege This security setting deter
|
||||
<!-- Audit_ForceAuditPolicySubcategorySettingsToOverrideAuditPolicyCategorySettings-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- Audit_ForceAuditPolicySubcategorySettingsToOverrideAuditPolicyCategorySettings-Applicability-End -->
|
||||
|
||||
<!-- Audit_ForceAuditPolicySubcategorySettingsToOverrideAuditPolicyCategorySettings-OmaUri-Begin -->
|
||||
@ -450,7 +451,7 @@ Audit: Force audit policy subcategory settings (Windows Vista or later) to overr
|
||||
<!-- Audit_ShutdownSystemImmediatelyIfUnableToLogSecurityAudits-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- Audit_ShutdownSystemImmediatelyIfUnableToLogSecurityAudits-Applicability-End -->
|
||||
|
||||
<!-- Audit_ShutdownSystemImmediatelyIfUnableToLogSecurityAudits-OmaUri-Begin -->
|
||||
@ -715,7 +716,7 @@ Devices: Restrict CD-ROM access to locally logged-on user only This security set
|
||||
<!-- Devices_RestrictFloppyAccessToLocallyLoggedOnUserOnly-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- Devices_RestrictFloppyAccessToLocallyLoggedOnUserOnly-Applicability-End -->
|
||||
|
||||
<!-- Devices_RestrictFloppyAccessToLocallyLoggedOnUserOnly-OmaUri-Begin -->
|
||||
@ -764,7 +765,7 @@ Devices: Restrict floppy access to locally logged-on user only This security set
|
||||
<!-- DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways-Applicability-End -->
|
||||
|
||||
<!-- DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways-OmaUri-Begin -->
|
||||
@ -817,7 +818,7 @@ Domain member: Digitally encrypt or sign secure channel data (always) This secur
|
||||
<!-- DomainMember_DigitallyEncryptSecureChannelDataWhenPossible-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- DomainMember_DigitallyEncryptSecureChannelDataWhenPossible-Applicability-End -->
|
||||
|
||||
<!-- DomainMember_DigitallyEncryptSecureChannelDataWhenPossible-OmaUri-Begin -->
|
||||
@ -873,7 +874,7 @@ Domain member: Digitally encrypt secure channel data (when possible) This securi
|
||||
<!-- DomainMember_DigitallySignSecureChannelDataWhenPossible-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- DomainMember_DigitallySignSecureChannelDataWhenPossible-Applicability-End -->
|
||||
|
||||
<!-- DomainMember_DigitallySignSecureChannelDataWhenPossible-OmaUri-Begin -->
|
||||
@ -923,7 +924,7 @@ Domain member: Digitally sign secure channel data (when possible) This security
|
||||
<!-- DomainMember_DisableMachineAccountPasswordChanges-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- DomainMember_DisableMachineAccountPasswordChanges-Applicability-End -->
|
||||
|
||||
<!-- DomainMember_DisableMachineAccountPasswordChanges-OmaUri-Begin -->
|
||||
@ -980,7 +981,7 @@ Domain member: Disable machine account password changes Determines whether a dom
|
||||
<!-- DomainMember_MaximumMachineAccountPasswordAge-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- DomainMember_MaximumMachineAccountPasswordAge-Applicability-End -->
|
||||
|
||||
<!-- DomainMember_MaximumMachineAccountPasswordAge-OmaUri-Begin -->
|
||||
@ -1033,7 +1034,7 @@ Domain member: Maximum machine account password age This security setting determ
|
||||
<!-- DomainMember_RequireStrongSessionKey-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- DomainMember_RequireStrongSessionKey-Applicability-End -->
|
||||
|
||||
<!-- DomainMember_RequireStrongSessionKey-OmaUri-Begin -->
|
||||
@ -1318,31 +1319,31 @@ Interactive logon: Don't require CTRL+ALT+DEL This security setting determines w
|
||||
|
||||
<!-- InteractiveLogon_DoNotRequireCTRLALTDEL-End -->
|
||||
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-Begin -->
|
||||
## InteractiveLogon_MachineAccountThreshold
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-Begin -->
|
||||
## InteractiveLogon_MachineAccountLockoutThreshold
|
||||
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-Applicability-Begin -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-Applicability-End -->
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-Applicability-End -->
|
||||
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-OmaUri-Begin -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/InteractiveLogon_MachineAccountThreshold
|
||||
./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/InteractiveLogon_MachineAccountLockoutThreshold
|
||||
```
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-OmaUri-End -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-OmaUri-End -->
|
||||
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-Description-Begin -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Interactive logon: Machine account threshold. The machine lockout policy is enforced only on those machines that have BitLocker enabled for protecting OS volumes. Please ensure that appropriate recovery password backup policies are enabled. This security setting determines the number of failed logon attempts that causes the machine to be locked out. A locked out machine can only be recovered by providing recovery key at console. You can set the value between 1 and 999 failed logon attempts. If you set the value to 0, the machine will never be locked out. Values from 1 to 3 will be interpreted as 4. Failed password attempts against workstations or member servers that have been locked using either CTRL+ALT+DELETE or password protected screen savers counts as failed logon attempts. The machine lockout policy is enforced only on those machines that have BitLocker enabled for protecting OS volumes. Please ensure that the appropriate recovery password backup policies are enabled. Default: 0.
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-Description-End -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-Description-End -->
|
||||
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-Editable-Begin -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-Editable-End -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-Editable-End -->
|
||||
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-DFProperties-Begin -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
@ -1351,22 +1352,22 @@ Interactive logon: Machine account threshold. The machine lockout policy is enfo
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-999]` |
|
||||
| Default Value | 0 |
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-DFProperties-End -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-DFProperties-End -->
|
||||
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-GpMapping-Begin -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | Interactive logon: Machine account lockout threshold |
|
||||
| Path | Windows Settings > Security Settings > Local Policies > Security Options |
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-GpMapping-End -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-GpMapping-End -->
|
||||
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-Examples-Begin -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-Examples-End -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-Examples-End -->
|
||||
|
||||
<!-- InteractiveLogon_MachineAccountThreshold-End -->
|
||||
<!-- InteractiveLogon_MachineAccountLockoutThreshold-End -->
|
||||
|
||||
<!-- InteractiveLogon_MachineInactivityLimit-Begin -->
|
||||
## InteractiveLogon_MachineInactivityLimit
|
||||
@ -1524,7 +1525,7 @@ Interactive logon: Message title for users attempting to log on This security se
|
||||
<!-- InteractiveLogon_NumberOfPreviousLogonsToCache-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- InteractiveLogon_NumberOfPreviousLogonsToCache-Applicability-End -->
|
||||
|
||||
<!-- InteractiveLogon_NumberOfPreviousLogonsToCache-OmaUri-Begin -->
|
||||
@ -1564,7 +1565,7 @@ Interactive logon: Number of previous logons to cache (in case domain controller
|
||||
<!-- InteractiveLogon_PromptUserToChangePasswordBeforeExpiration-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- InteractiveLogon_PromptUserToChangePasswordBeforeExpiration-Applicability-End -->
|
||||
|
||||
<!-- InteractiveLogon_PromptUserToChangePasswordBeforeExpiration-OmaUri-Begin -->
|
||||
@ -1859,7 +1860,7 @@ Microsoft network client: Send unencrypted password to connect to third-party SM
|
||||
<!-- MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession-Applicability-End -->
|
||||
|
||||
<!-- MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession-OmaUri-Begin -->
|
||||
@ -1884,8 +1885,8 @@ Microsoft network server: Amount of idle time required before suspending a sessi
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-15]` |
|
||||
| Default Value | 15 |
|
||||
| Allowed Values | Range: `[0-99999]` |
|
||||
| Default Value | 99999 |
|
||||
<!-- MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession-DFProperties-End -->
|
||||
|
||||
<!-- MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession-GpMapping-Begin -->
|
||||
@ -2042,7 +2043,7 @@ Microsoft network server: Digitally sign communications (if client agrees) This
|
||||
<!-- MicrosoftNetworkServer_DisconnectClientsWhenLogonHoursExpire-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- MicrosoftNetworkServer_DisconnectClientsWhenLogonHoursExpire-Applicability-End -->
|
||||
|
||||
<!-- MicrosoftNetworkServer_DisconnectClientsWhenLogonHoursExpire-OmaUri-Begin -->
|
||||
@ -2083,7 +2084,7 @@ Microsoft network server: Disconnect clients when logon hours expire This securi
|
||||
<!-- MicrosoftNetworkServer_ServerSPNTargetNameValidationLevel-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- MicrosoftNetworkServer_ServerSPNTargetNameValidationLevel-Applicability-End -->
|
||||
|
||||
<!-- MicrosoftNetworkServer_ServerSPNTargetNameValidationLevel-OmaUri-Begin -->
|
||||
@ -2118,109 +2119,6 @@ Microsoft network server: Server SPN target name validation level This policy se
|
||||
|
||||
<!-- MicrosoftNetworkServer_ServerSPNTargetNameValidationLevel-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-Begin -->
|
||||
## MinimumPasswordLength
|
||||
|
||||
<!-- MinimumPasswordLength-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- MinimumPasswordLength-Applicability-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/MinimumPasswordLength
|
||||
```
|
||||
<!-- MinimumPasswordLength-OmaUri-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This security setting determines the least number of characters that a password for a user account may contain. The maximum value for this setting depends on the value of the Relax minimum password length limits setting. If the Relax minimum password length limits setting isn't defined, this setting may be configured from 0 to 14. If the Relax minimum password length limits setting is defined and disabled, this setting may be configured from 0 to 14. If the Relax minimum password length limits setting is defined and enabled, this setting may be configured from 0 to 128. Setting the required number of characters to 0 means that no password is required.
|
||||
|
||||
> [!NOTE]
|
||||
> By default, member computers follow the configuration of their domain controllers. Default values: 7 on domain controllers 0 on stand-alone servers Configuring this setting larger than 14 may affect compatibility with clients, services, and applications. We recommend that you only configure this setting larger than 14 after you use the Minimum password length audit setting to test for potential incompatibilities at the new setting.
|
||||
<!-- MinimumPasswordLength-Description-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- MinimumPasswordLength-Editable-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-128]` |
|
||||
| Default Value | 0 |
|
||||
<!-- MinimumPasswordLength-DFProperties-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | Minimum password length |
|
||||
| Path | Windows Settings > Security Settings > Account Policies > Password Policy |
|
||||
<!-- MinimumPasswordLength-GpMapping-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- MinimumPasswordLength-Examples-End -->
|
||||
|
||||
<!-- MinimumPasswordLength-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Begin -->
|
||||
## MinimumPasswordLengthAudit
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- MinimumPasswordLengthAudit-Applicability-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/MinimumPasswordLengthAudit
|
||||
```
|
||||
<!-- MinimumPasswordLengthAudit-OmaUri-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This security setting determines the minimum password length for which password length audit warning events are issued. This setting may be configured from 1 to 128. You should only enable and configure this setting when you try to determine the potential effect of increasing the minimum password length setting in your environment. If this setting isn't defined, audit events won't be issued. If this setting is defined and is less than or equal to the minimum password length setting, audit events won't be issued. If this setting is defined and is greater than the minimum password length setting, and the length of a new account password is less than this setting, an audit event will be issued.
|
||||
<!-- MinimumPasswordLengthAudit-Description-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- MinimumPasswordLengthAudit-Editable-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[1-128]` |
|
||||
| Default Value | 4294967295 |
|
||||
<!-- MinimumPasswordLengthAudit-DFProperties-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | Minimum password length audit |
|
||||
| Path | Windows Settings > Security Settings > Account Policies > Password Policy |
|
||||
<!-- MinimumPasswordLengthAudit-GpMapping-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- MinimumPasswordLengthAudit-Examples-End -->
|
||||
|
||||
<!-- MinimumPasswordLengthAudit-End -->
|
||||
|
||||
<!-- NetworkAccess_AllowAnonymousSIDOrNameTranslation-Begin -->
|
||||
## NetworkAccess_AllowAnonymousSIDOrNameTranslation
|
||||
|
||||
@ -2408,7 +2306,7 @@ Network access: Don't allow anonymous enumeration of SAM accounts and shares Thi
|
||||
<!-- NetworkAccess_DoNotAllowStorageOfPasswordsAndCredentialsForNetworkAuthentication-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetworkAccess_DoNotAllowStorageOfPasswordsAndCredentialsForNetworkAuthentication-Applicability-End -->
|
||||
|
||||
<!-- NetworkAccess_DoNotAllowStorageOfPasswordsAndCredentialsForNetworkAuthentication-OmaUri-Begin -->
|
||||
@ -2456,7 +2354,7 @@ Network access: Don't allow storage of passwords and credentials for network aut
|
||||
<!-- NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers-Applicability-End -->
|
||||
|
||||
<!-- NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers-OmaUri-Begin -->
|
||||
@ -2506,7 +2404,7 @@ Network access: Let Everyone permissions apply to anonymous users This security
|
||||
<!-- NetworkAccess_NamedPipesThatCanBeAccessedAnonymously-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetworkAccess_NamedPipesThatCanBeAccessedAnonymously-Applicability-End -->
|
||||
|
||||
<!-- NetworkAccess_NamedPipesThatCanBeAccessedAnonymously-OmaUri-Begin -->
|
||||
@ -2531,6 +2429,7 @@ Network access: Named pipes that can be accessed anonymously This security setti
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | List (Delimiter: `,`) |
|
||||
<!-- NetworkAccess_NamedPipesThatCanBeAccessedAnonymously-DFProperties-End -->
|
||||
|
||||
<!-- NetworkAccess_NamedPipesThatCanBeAccessedAnonymously-Examples-Begin -->
|
||||
@ -2545,7 +2444,7 @@ Network access: Named pipes that can be accessed anonymously This security setti
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPaths-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPaths-Applicability-End -->
|
||||
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPaths-OmaUri-Begin -->
|
||||
@ -2573,6 +2472,7 @@ Network access: Remotely accessible registry paths This security setting determi
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | List (Delimiter: `,`) |
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPaths-DFProperties-End -->
|
||||
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPaths-Examples-Begin -->
|
||||
@ -2587,7 +2487,7 @@ Network access: Remotely accessible registry paths This security setting determi
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPathsAndSubpaths-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPathsAndSubpaths-Applicability-End -->
|
||||
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPathsAndSubpaths-OmaUri-Begin -->
|
||||
@ -2615,6 +2515,7 @@ Network access: Remotely accessible registry paths and subpaths This security se
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | List (Delimiter: `,`) |
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPathsAndSubpaths-DFProperties-End -->
|
||||
|
||||
<!-- NetworkAccess_RemotelyAccessibleRegistryPathsAndSubpaths-Examples-Begin -->
|
||||
@ -2735,7 +2636,7 @@ Network access: Restrict clients allowed to make remote calls to SAM This policy
|
||||
<!-- NetworkAccess_SharesThatCanBeAccessedAnonymously-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetworkAccess_SharesThatCanBeAccessedAnonymously-Applicability-End -->
|
||||
|
||||
<!-- NetworkAccess_SharesThatCanBeAccessedAnonymously-OmaUri-Begin -->
|
||||
@ -2760,6 +2661,7 @@ Network access: Shares that can be accessed anonymously This security setting de
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | List (Delimiter: `,`) |
|
||||
<!-- NetworkAccess_SharesThatCanBeAccessedAnonymously-DFProperties-End -->
|
||||
|
||||
<!-- NetworkAccess_SharesThatCanBeAccessedAnonymously-Examples-Begin -->
|
||||
@ -2774,7 +2676,7 @@ Network access: Shares that can be accessed anonymously This security setting de
|
||||
<!-- NetworkAccess_SharingAndSecurityModelForLocalAccounts-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetworkAccess_SharingAndSecurityModelForLocalAccounts-Applicability-End -->
|
||||
|
||||
<!-- NetworkAccess_SharingAndSecurityModelForLocalAccounts-OmaUri-Begin -->
|
||||
@ -2818,7 +2720,7 @@ Network access: Sharing and security model for local accounts This security sett
|
||||
<!-- NetworkSecurity_AllowLocalSystemNULLSessionFallback-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetworkSecurity_AllowLocalSystemNULLSessionFallback-Applicability-End -->
|
||||
|
||||
<!-- NetworkSecurity_AllowLocalSystemNULLSessionFallback-OmaUri-Begin -->
|
||||
@ -3076,7 +2978,7 @@ Network security: Force logoff when logon hours expire This security setting det
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 0 |
|
||||
| Default Value | 1 |
|
||||
<!-- NetworkSecurity_ForceLogoffWhenLogonHoursExpire-DFProperties-End -->
|
||||
|
||||
<!-- NetworkSecurity_ForceLogoffWhenLogonHoursExpire-AllowedValues-Begin -->
|
||||
@ -3084,8 +2986,8 @@ Network security: Force logoff when logon hours expire This security setting det
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 1 | Enable. |
|
||||
| 0 (Default) | Disable. |
|
||||
| 1 (Default) | Enable. |
|
||||
| 0 | Disable. |
|
||||
<!-- NetworkSecurity_ForceLogoffWhenLogonHoursExpire-AllowedValues-End -->
|
||||
|
||||
<!-- NetworkSecurity_ForceLogoffWhenLogonHoursExpire-GpMapping-Begin -->
|
||||
@ -3174,7 +3076,7 @@ Network security LAN Manager authentication level This security setting determin
|
||||
<!-- NetworkSecurity_LDAPClientSigningRequirements-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetworkSecurity_LDAPClientSigningRequirements-Applicability-End -->
|
||||
|
||||
<!-- NetworkSecurity_LDAPClientSigningRequirements-OmaUri-Begin -->
|
||||
@ -3206,7 +3108,7 @@ Network security: LDAP client signing requirements This security setting determi
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[0-2]` |
|
||||
| Default Value | 0 |
|
||||
| Default Value | 1 |
|
||||
<!-- NetworkSecurity_LDAPClientSigningRequirements-DFProperties-End -->
|
||||
|
||||
<!-- NetworkSecurity_LDAPClientSigningRequirements-Examples-Begin -->
|
||||
@ -3580,7 +3482,7 @@ Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers This po
|
||||
<!-- RecoveryConsole_AllowAutomaticAdministrativeLogon-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- RecoveryConsole_AllowAutomaticAdministrativeLogon-Applicability-End -->
|
||||
|
||||
<!-- RecoveryConsole_AllowAutomaticAdministrativeLogon-OmaUri-Begin -->
|
||||
@ -3630,7 +3532,7 @@ Recovery console: Allow automatic administrative logon This security setting det
|
||||
<!-- RecoveryConsole_AllowFloppyCopyAndAccessToAllDrivesAndAllFolders-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- RecoveryConsole_AllowFloppyCopyAndAccessToAllDrivesAndAllFolders-Applicability-End -->
|
||||
|
||||
<!-- RecoveryConsole_AllowFloppyCopyAndAccessToAllDrivesAndAllFolders-OmaUri-Begin -->
|
||||
@ -3665,64 +3567,6 @@ Recovery console: Allow floppy copy and access to all drives and all folders Ena
|
||||
|
||||
<!-- RecoveryConsole_AllowFloppyCopyAndAccessToAllDrivesAndAllFolders-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Begin -->
|
||||
## RelaxMinimumPasswordLengthLimits
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Applicability-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/RelaxMinimumPasswordLengthLimits
|
||||
```
|
||||
<!-- RelaxMinimumPasswordLengthLimits-OmaUri-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This setting controls whether the minimum password length setting can be increased beyond the legacy limit of 14. If this setting isn't defined, minimum password length may be configured to no more than 14. If this setting is defined and disabled, minimum password length may be configured to no more than 14. If this setting is defined and enabled, minimum password length may be configured more than 14.
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Description-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Editable-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 0 |
|
||||
<!-- RelaxMinimumPasswordLengthLimits-DFProperties-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | Disabled. |
|
||||
| 1 | Enabled. |
|
||||
<!-- RelaxMinimumPasswordLengthLimits-AllowedValues-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | Relax minimum password length |
|
||||
| Path | Windows Settings > Security Settings > Account Policies > Password Policy |
|
||||
<!-- RelaxMinimumPasswordLengthLimits-GpMapping-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- RelaxMinimumPasswordLengthLimits-Examples-End -->
|
||||
|
||||
<!-- RelaxMinimumPasswordLengthLimits-End -->
|
||||
|
||||
<!-- Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn-Begin -->
|
||||
## Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
|
||||
|
||||
@ -3845,7 +3689,7 @@ Shutdown: Clear virtual memory pagefile This security setting determines whether
|
||||
<!-- SystemCryptography_ForceStrongKeyProtection-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- SystemCryptography_ForceStrongKeyProtection-Applicability-End -->
|
||||
|
||||
<!-- SystemCryptography_ForceStrongKeyProtection-OmaUri-Begin -->
|
||||
@ -3886,7 +3730,7 @@ System Cryptography: Force strong key protection for user keys stored on the com
|
||||
<!-- SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems-Applicability-End -->
|
||||
|
||||
<!-- SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems-OmaUri-Begin -->
|
||||
@ -3936,7 +3780,7 @@ System objects: Require case insensitivity for non-Windows subsystems This secur
|
||||
<!-- SystemObjects_StrengthenDefaultPermissionsOfInternalSystemObjects-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- SystemObjects_StrengthenDefaultPermissionsOfInternalSystemObjects-Applicability-End -->
|
||||
|
||||
<!-- SystemObjects_StrengthenDefaultPermissionsOfInternalSystemObjects-OmaUri-Begin -->
|
||||
@ -4094,6 +3938,64 @@ User Account Control: Behavior of the elevation prompt for administrators in Adm
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForAdministrators-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-Begin -->
|
||||
## UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-Applicability-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators
|
||||
```
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-OmaUri-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
User Account Control: Behavior of the elevation prompt for administrators running with enhanced privilege protection. This policy setting controls the behavior of the elevation prompt for administrators. The options are: - Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege. - Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-Description-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-Editable-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 2 |
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-DFProperties-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 1 | Prompt for credentials on the secure desktop. |
|
||||
| 2 (Default) | Prompt for consent on the secure desktop. |
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-AllowedValues-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | User Account Control: Behavior of the elevation prompt for administrators running with enhanced privilege protection |
|
||||
| Path | Windows Settings > Security Settings > Local Policies > Security Options |
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-GpMapping-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-Examples-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForEnhancedAdministrators-End -->
|
||||
|
||||
<!-- UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers-Begin -->
|
||||
## UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers
|
||||
|
||||
@ -4446,6 +4348,64 @@ User Account Control: Switch to the secure desktop when prompting for elevation
|
||||
|
||||
<!-- UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation-End -->
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-Begin -->
|
||||
## UserAccountControl_TypeOfAdminApprovalMode
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-Applicability-End -->
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/UserAccountControl_TypeOfAdminApprovalMode
|
||||
```
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-OmaUri-End -->
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
User Account Control: Configure type of Admin Approval Mode. This policy setting controls whether enhanced privilege protection is applied to admin approval mode elevations. If you change this policy setting, you must restart your computer. This policy is only supported on Windows Desktop, not Server. The options are: - Admin Approval Mode is running in legacy mode (default). - Admin Approval Mode is running with enhanced privilege protection.
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-Description-End -->
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-Editable-End -->
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 1 |
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-DFProperties-End -->
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 1 (Default) | Legacy Admin Approval Mode. |
|
||||
| 2 | Admin Approval Mode with enhanced privilege protection. |
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-AllowedValues-End -->
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | User Account Control: Configure type of Admin Approval Mode |
|
||||
| Path | Windows Settings > Security Settings > Local Policies > Security Options |
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-GpMapping-End -->
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-Examples-End -->
|
||||
|
||||
<!-- UserAccountControl_TypeOfAdminApprovalMode-End -->
|
||||
|
||||
<!-- UserAccountControl_UseAdminApprovalMode-Begin -->
|
||||
## UserAccountControl_UseAdminApprovalMode
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: MixedReality Policy CSP
|
||||
description: Learn more about the MixedReality Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -321,6 +321,97 @@ This policy setting controls if pressing the brightness button changes the brigh
|
||||
|
||||
<!-- BrightnessButtonDisabled-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyAction-Begin -->
|
||||
## ConfigureDeviceStandbyAction
|
||||
|
||||
<!-- ConfigureDeviceStandbyAction-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- ConfigureDeviceStandbyAction-Applicability-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyAction-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/MixedReality/ConfigureDeviceStandbyAction
|
||||
```
|
||||
<!-- ConfigureDeviceStandbyAction-OmaUri-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyAction-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting controls device maintenance action during standby.
|
||||
<!-- ConfigureDeviceStandbyAction-Description-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyAction-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- ConfigureDeviceStandbyAction-Editable-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyAction-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 0 |
|
||||
<!-- ConfigureDeviceStandbyAction-DFProperties-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyAction-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | Not configured. |
|
||||
| 1 | Logoff users. |
|
||||
| 2 | Reboot device. |
|
||||
<!-- ConfigureDeviceStandbyAction-AllowedValues-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyAction-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- ConfigureDeviceStandbyAction-Examples-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyAction-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-Begin -->
|
||||
## ConfigureDeviceStandbyActionTimeout
|
||||
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-Applicability-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/MixedReality/ConfigureDeviceStandbyActionTimeout
|
||||
```
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-OmaUri-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting controls when to start maintenance action after device enters standby. The timeout value is in hours.
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-Description-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-Editable-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Allowed Values | Range: `[1-168]` |
|
||||
| Default Value | 8 |
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-DFProperties-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-Examples-End -->
|
||||
|
||||
<!-- ConfigureDeviceStandbyActionTimeout-End -->
|
||||
|
||||
<!-- ConfigureMovingPlatform-Begin -->
|
||||
## ConfigureMovingPlatform
|
||||
|
||||
@ -643,7 +734,7 @@ Windows Network Connectivity Status Indicator may get a false positive internet-
|
||||
<!-- EnableStartMenuSingleHandGesture-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621] and later |
|
||||
<!-- EnableStartMenuSingleHandGesture-Applicability-End -->
|
||||
|
||||
<!-- EnableStartMenuSingleHandGesture-OmaUri-Begin -->
|
||||
@ -692,7 +783,7 @@ This policy setting controls if pinching your thumb and index finger, while look
|
||||
<!-- EnableStartMenuVoiceCommand-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621] and later |
|
||||
<!-- EnableStartMenuVoiceCommand-Applicability-End -->
|
||||
|
||||
<!-- EnableStartMenuVoiceCommand-OmaUri-Begin -->
|
||||
@ -741,7 +832,7 @@ This policy setting controls if using voice commands to open the Start menu is e
|
||||
<!-- EnableStartMenuWristTap-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621] and later |
|
||||
<!-- EnableStartMenuWristTap-Applicability-End -->
|
||||
|
||||
<!-- EnableStartMenuWristTap-OmaUri-Begin -->
|
||||
@ -1104,7 +1195,7 @@ The following example XML string shows the value to enable this policy:
|
||||
<!-- PreferLogonAsOtherUser-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621] and later |
|
||||
<!-- PreferLogonAsOtherUser-Applicability-End -->
|
||||
|
||||
<!-- PreferLogonAsOtherUser-OmaUri-Begin -->
|
||||
@ -1153,7 +1244,7 @@ This policy configures whether the Sign-In App should prefer showing Other User
|
||||
<!-- RequireStartIconHold-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621] and later |
|
||||
<!-- RequireStartIconHold-Applicability-End -->
|
||||
|
||||
<!-- RequireStartIconHold-OmaUri-Begin -->
|
||||
@ -1202,7 +1293,7 @@ This policy setting controls if it's require that the Start icon to be pressed f
|
||||
<!-- RequireStartIconVisible-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621] and later |
|
||||
<!-- RequireStartIconVisible-Applicability-End -->
|
||||
|
||||
<!-- RequireStartIconVisible-OmaUri-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: MSSecurityGuide Policy CSP
|
||||
description: Learn more about the MSSecurityGuide Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -11,6 +11,8 @@ ms.date: 01/18/2024
|
||||
|
||||
[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)]
|
||||
|
||||
[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)]
|
||||
|
||||
<!-- MSSecurityGuide-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- MSSecurityGuide-Editable-End -->
|
||||
@ -221,7 +223,7 @@ ms.date: 01/18/2024
|
||||
<!-- NetBTNodeTypeConfiguration-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 1803 [10.0.17134] and later |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- NetBTNodeTypeConfiguration-Applicability-End -->
|
||||
|
||||
<!-- NetBTNodeTypeConfiguration-OmaUri-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: NetworkListManager Policy CSP
|
||||
description: Learn more about the NetworkListManager Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -9,6 +9,8 @@ ms.date: 01/18/2024
|
||||
<!-- NetworkListManager-Begin -->
|
||||
# Policy CSP - NetworkListManager
|
||||
|
||||
[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)]
|
||||
|
||||
<!-- NetworkListManager-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- NetworkListManager-Editable-End -->
|
||||
@ -19,7 +21,7 @@ ms.date: 01/18/2024
|
||||
<!-- AllNetworks_NetworkIcon-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- AllNetworks_NetworkIcon-Applicability-End -->
|
||||
|
||||
<!-- AllNetworks_NetworkIcon-OmaUri-Begin -->
|
||||
@ -68,7 +70,7 @@ This policy setting allows you to specify whether users can change the network i
|
||||
<!-- AllNetworks_NetworkLocation-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- AllNetworks_NetworkLocation-Applicability-End -->
|
||||
|
||||
<!-- AllNetworks_NetworkLocation-OmaUri-Begin -->
|
||||
@ -117,7 +119,7 @@ This policy setting allows you to specify whether users can change the network l
|
||||
<!-- AllNetworks_NetworkName-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- AllNetworks_NetworkName-Applicability-End -->
|
||||
|
||||
<!-- AllNetworks_NetworkName-OmaUri-Begin -->
|
||||
@ -260,7 +262,7 @@ This policy setting provides the string that names a network. If this setting is
|
||||
<!-- IdentifyingNetworks_LocationType-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- IdentifyingNetworks_LocationType-Applicability-End -->
|
||||
|
||||
<!-- IdentifyingNetworks_LocationType-OmaUri-Begin -->
|
||||
@ -309,7 +311,7 @@ This policy setting allows you to configure the Network Location for networks th
|
||||
<!-- UnidentifiedNetworks_LocationType-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- UnidentifiedNetworks_LocationType-Applicability-End -->
|
||||
|
||||
<!-- UnidentifiedNetworks_LocationType-OmaUri-Begin -->
|
||||
@ -358,7 +360,7 @@ This policy setting allows you to configure the Network Location type for networ
|
||||
<!-- UnidentifiedNetworks_UserPermissions-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ❌ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- UnidentifiedNetworks_UserPermissions-Applicability-End -->
|
||||
|
||||
<!-- UnidentifiedNetworks_UserPermissions-OmaUri-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Printers Policy CSP
|
||||
description: Learn more about the Printers Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -669,6 +669,56 @@ If you disable or don't configure this policy setting, dynamic TCP ports are use
|
||||
|
||||
<!-- ConfigureRpcTcpPort-End -->
|
||||
|
||||
<!-- ConfigureWindowsProtectedPrint-Begin -->
|
||||
## ConfigureWindowsProtectedPrint
|
||||
|
||||
<!-- ConfigureWindowsProtectedPrint-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621] and later |
|
||||
<!-- ConfigureWindowsProtectedPrint-Applicability-End -->
|
||||
|
||||
<!-- ConfigureWindowsProtectedPrint-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/Printers/ConfigureWindowsProtectedPrint
|
||||
```
|
||||
<!-- ConfigureWindowsProtectedPrint-OmaUri-End -->
|
||||
|
||||
<!-- ConfigureWindowsProtectedPrint-Description-Begin -->
|
||||
<!-- Description-Source-Not-Found -->
|
||||
<!-- ConfigureWindowsProtectedPrint-Description-End -->
|
||||
|
||||
<!-- ConfigureWindowsProtectedPrint-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- ConfigureWindowsProtectedPrint-Editable-End -->
|
||||
|
||||
<!-- ConfigureWindowsProtectedPrint-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
<!-- ConfigureWindowsProtectedPrint-DFProperties-End -->
|
||||
|
||||
<!-- ConfigureWindowsProtectedPrint-AdmxBacked-Begin -->
|
||||
<!-- ADMX-Not-Found -->
|
||||
[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)]
|
||||
|
||||
**ADMX mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | ConfigureWindowsProtectedPrint |
|
||||
| ADMX File Name | Printing.admx |
|
||||
<!-- ConfigureWindowsProtectedPrint-AdmxBacked-End -->
|
||||
|
||||
<!-- ConfigureWindowsProtectedPrint-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- ConfigureWindowsProtectedPrint-Examples-End -->
|
||||
|
||||
<!-- ConfigureWindowsProtectedPrint-End -->
|
||||
|
||||
<!-- EnableDeviceControl-Begin -->
|
||||
## EnableDeviceControl
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Search Policy CSP
|
||||
description: Learn more about the Search Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -286,7 +286,7 @@ The most restrictive value is `0` to not allow indexing of encrypted items.
|
||||
<!-- AllowSearchHighlights-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 2009 [10.0.19042.1620] and later <br> ✅ Windows 10, version 21H1 [10.0.19043.1620] and later <br> ✅ Windows 10, version 21H2 [10.0.19044.1620] and later <br> ✅ Windows 11, version 21H2 [10.0.22000.1761] and later <br> ✅ Windows 11, version 22H2 [10.0.22621] and later |
|
||||
<!-- AllowSearchHighlights-Applicability-End -->
|
||||
|
||||
<!-- AllowSearchHighlights-OmaUri-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: SmartScreen Policy CSP
|
||||
description: Learn more about the SmartScreen Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -70,6 +70,8 @@ App Install Control is a feature of Windows Defender SmartScreen that helps prot
|
||||
|:--|:--|
|
||||
| 0 (Default) | Turns off Application Installation Control, allowing users to download and install files from anywhere on the web. |
|
||||
| 1 | Turns on Application Installation Control, allowing users to only install apps from the Store. |
|
||||
| 2 | Turns on Application Installation Control, letting users know that there's a comparable app in the Store. |
|
||||
| 3 | Turns on Application Installation Control, warning users before installing apps from outside the Store. |
|
||||
<!-- EnableAppInstallControl-AllowedValues-End -->
|
||||
|
||||
<!-- EnableAppInstallControl-GpMapping-Begin -->
|
||||
|
78
windows/client-management/mdm/policy-csp-sudo.md
Normal file
78
windows/client-management/mdm/policy-csp-sudo.md
Normal file
@ -0,0 +1,78 @@
|
||||
---
|
||||
title: Sudo Policy CSP
|
||||
description: Learn more about the Sudo Area in Policy CSP.
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
|
||||
<!-- Sudo-Begin -->
|
||||
# Policy CSP - Sudo
|
||||
|
||||
[!INCLUDE [ADMX-backed CSP tip](includes/mdm-admx-csp-note.md)]
|
||||
|
||||
[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)]
|
||||
|
||||
<!-- Sudo-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Sudo-Editable-End -->
|
||||
|
||||
<!-- EnableSudo-Begin -->
|
||||
## EnableSudo
|
||||
|
||||
<!-- EnableSudo-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ❌ Pro <br> ❌ Enterprise <br> ❌ Education <br> ❌ Windows SE <br> ❌ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- EnableSudo-Applicability-End -->
|
||||
|
||||
<!-- EnableSudo-OmaUri-Begin -->
|
||||
```Device
|
||||
./Device/Vendor/MSFT/Policy/Config/Sudo/EnableSudo
|
||||
```
|
||||
<!-- EnableSudo-OmaUri-End -->
|
||||
|
||||
<!-- EnableSudo-Description-Begin -->
|
||||
<!-- Description-Source-Not-Found -->
|
||||
<!-- EnableSudo-Description-End -->
|
||||
|
||||
<!-- EnableSudo-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- EnableSudo-Editable-End -->
|
||||
|
||||
<!-- EnableSudo-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `chr` (string) |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
<!-- EnableSudo-DFProperties-End -->
|
||||
|
||||
<!-- EnableSudo-AdmxBacked-Begin -->
|
||||
<!-- ADMX-Not-Found -->
|
||||
[!INCLUDE [ADMX-backed policy note](includes/mdm-admx-policy-note.md)]
|
||||
|
||||
**ADMX mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | EnableSudo |
|
||||
| ADMX File Name | Sudo.admx |
|
||||
<!-- EnableSudo-AdmxBacked-End -->
|
||||
|
||||
<!-- EnableSudo-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- EnableSudo-Examples-End -->
|
||||
|
||||
<!-- EnableSudo-End -->
|
||||
|
||||
<!-- Sudo-CspMoreInfo-Begin -->
|
||||
<!-- Add any additional information about this CSP here. Anything outside this section will get overwritten. -->
|
||||
<!-- Sudo-CspMoreInfo-End -->
|
||||
|
||||
<!-- Sudo-End -->
|
||||
|
||||
## Related articles
|
||||
|
||||
[Policy configuration service provider](policy-configuration-service-provider.md)
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Update Policy CSP
|
||||
description: Learn more about the Update Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -275,7 +275,7 @@ Allows the IT admin to manage whether Automatic Updates accepts updates signed b
|
||||
<!-- AllowOptionalContent-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621] and later |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 21H2 [10.0.19044.3757] and later |
|
||||
<!-- AllowOptionalContent-Applicability-End -->
|
||||
|
||||
<!-- AllowOptionalContent-OmaUri-Begin -->
|
||||
@ -2428,7 +2428,7 @@ Number of days before feature updates are installed on devices automatically reg
|
||||
<!-- ConfigureDeadlineForFeatureUpdates-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
> [!NOTE]
|
||||
>
|
||||
>
|
||||
> - After the deadline passes, restarts will occur regardless of active hours and users won't be able to reschedule.
|
||||
> - When this policy is used, the download, installation, and reboot settings from [Update/AllowAutoUpdate](#allowautoupdate) are ignored.
|
||||
<!-- ConfigureDeadlineForFeatureUpdates-Editable-End -->
|
||||
@ -2487,7 +2487,7 @@ Number of days before quality updates are installed on devices automatically reg
|
||||
<!-- ConfigureDeadlineForQualityUpdates-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
> [!NOTE]
|
||||
>
|
||||
>
|
||||
> - After the deadline passes, restarts will occur regardless of active hours and users won't be able to reschedule.
|
||||
> - When this policy is used, the download, installation, and reboot settings from [Update/AllowAutoUpdate](#allowautoupdate) are ignored.
|
||||
<!-- ConfigureDeadlineForQualityUpdates-Editable-End -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: WebThreatDefense Policy CSP
|
||||
description: Learn more about the WebThreatDefense Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -9,6 +9,8 @@ ms.date: 01/18/2024
|
||||
<!-- WebThreatDefense-Begin -->
|
||||
# Policy CSP - WebThreatDefense
|
||||
|
||||
[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)]
|
||||
|
||||
<!-- WebThreatDefense-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
> [!NOTE]
|
||||
@ -21,7 +23,7 @@ ms.date: 01/18/2024
|
||||
<!-- AutomaticDataCollection-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 23H2 [10.0.22631] and later |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- AutomaticDataCollection-Applicability-End -->
|
||||
|
||||
<!-- AutomaticDataCollection-OmaUri-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Wifi Policy CSP
|
||||
description: Learn more about the Wifi Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -9,6 +9,8 @@ ms.date: 01/18/2024
|
||||
<!-- Wifi-Begin -->
|
||||
# Policy CSP - Wifi
|
||||
|
||||
[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)]
|
||||
|
||||
<!-- Wifi-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Wifi-Editable-End -->
|
||||
@ -227,7 +229,7 @@ Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks.
|
||||
<!-- AllowWFAQosManagementDSCPToUPMapping-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- AllowWFAQosManagementDSCPToUPMapping-Applicability-End -->
|
||||
|
||||
<!-- AllowWFAQosManagementDSCPToUPMapping-OmaUri-Begin -->
|
||||
@ -277,7 +279,7 @@ Allow or disallow the device to use the DSCP to UP Mapping feature from the Wi-F
|
||||
<!-- AllowWFAQosManagementMSCS-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | <!-- Not-Found --> |
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview |
|
||||
<!-- AllowWFAQosManagementMSCS-Applicability-End -->
|
||||
|
||||
<!-- AllowWFAQosManagementMSCS-OmaUri-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: WindowsAI Policy CSP
|
||||
description: Learn more about the WindowsAI Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 01/31/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -9,17 +9,81 @@ ms.date: 01/18/2024
|
||||
<!-- WindowsAI-Begin -->
|
||||
# Policy CSP - WindowsAI
|
||||
|
||||
[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)]
|
||||
|
||||
<!-- WindowsAI-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- WindowsAI-Editable-End -->
|
||||
|
||||
<!-- DisableAIDataAnalysis-Begin -->
|
||||
## DisableAIDataAnalysis
|
||||
|
||||
<!-- DisableAIDataAnalysis-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ❌ Device <br> ✅ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview [99.9.9999] |
|
||||
<!-- DisableAIDataAnalysis-Applicability-End -->
|
||||
|
||||
<!-- DisableAIDataAnalysis-OmaUri-Begin -->
|
||||
```User
|
||||
./User/Vendor/MSFT/Policy/Config/WindowsAI/DisableAIDataAnalysis
|
||||
```
|
||||
<!-- DisableAIDataAnalysis-OmaUri-End -->
|
||||
|
||||
<!-- DisableAIDataAnalysis-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
This policy setting allows you to prevent Windows AI from using and analyzing user patterns and data.
|
||||
|
||||
- If you enable this policy setting, Windows AI won't be able to take advantage of historical user patterns.
|
||||
|
||||
- If you disable or don't configure this policy setting, Windows AI will be able to assist users by considering their historical behaviors and data.
|
||||
<!-- DisableAIDataAnalysis-Description-End -->
|
||||
|
||||
<!-- DisableAIDataAnalysis-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- DisableAIDataAnalysis-Editable-End -->
|
||||
|
||||
<!-- DisableAIDataAnalysis-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `int` |
|
||||
| Access Type | Add, Delete, Get, Replace |
|
||||
| Default Value | 0 |
|
||||
<!-- DisableAIDataAnalysis-DFProperties-End -->
|
||||
|
||||
<!-- DisableAIDataAnalysis-AllowedValues-Begin -->
|
||||
**Allowed values**:
|
||||
|
||||
| Value | Description |
|
||||
|:--|:--|
|
||||
| 0 (Default) | Enable Data Analysis for Windows AI. |
|
||||
| 1 | Disable Data Analysis for Windows AI. |
|
||||
<!-- DisableAIDataAnalysis-AllowedValues-End -->
|
||||
|
||||
<!-- DisableAIDataAnalysis-GpMapping-Begin -->
|
||||
**Group policy mapping**:
|
||||
|
||||
| Name | Value |
|
||||
|:--|:--|
|
||||
| Name | DisableAIDataAnalysis |
|
||||
| Path | WindowsAI > AT > WindowsComponents > WindowsAI |
|
||||
<!-- DisableAIDataAnalysis-GpMapping-End -->
|
||||
|
||||
<!-- DisableAIDataAnalysis-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- DisableAIDataAnalysis-Examples-End -->
|
||||
|
||||
<!-- DisableAIDataAnalysis-End -->
|
||||
|
||||
<!-- TurnOffWindowsCopilot-Begin -->
|
||||
## TurnOffWindowsCopilot
|
||||
|
||||
<!-- TurnOffWindowsCopilot-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ❌ Device <br> ✅ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 22H2 [10.0.19045.3758] and later <br> ✅ Windows 11, version 22H2 [10.0.22621.2361] and later <br> ✅ Windows 11, version 23H2 [10.0.22631] and later |
|
||||
| ❌ Device <br> ✅ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 21H2 [10.0.19044.3758] and later <br> ✅ Windows 10, version 22H2 [10.0.19045.3758] and later <br> ✅ Windows 11, version 22H2 [10.0.22621.2361] and later <br> ✅ Windows 11, version 23H2 [10.0.22631] and later |
|
||||
<!-- TurnOffWindowsCopilot-Applicability-End -->
|
||||
|
||||
<!-- TurnOffWindowsCopilot-OmaUri-Begin -->
|
||||
|
@ -537,6 +537,8 @@ items:
|
||||
href: policy-csp-stickers.md
|
||||
- name: Storage
|
||||
href: policy-csp-storage.md
|
||||
- name: Sudo
|
||||
href: policy-csp-sudo.md
|
||||
- name: System
|
||||
href: policy-csp-system.md
|
||||
- name: SystemServices
|
||||
|
@ -1,16 +1,14 @@
|
||||
- name: Deploy and update Windows client
|
||||
href: index.yml
|
||||
items:
|
||||
items:
|
||||
- name: Get started
|
||||
items:
|
||||
- name: What's new
|
||||
href: deploy-whats-new.md
|
||||
items:
|
||||
- name: Windows client deployment scenarios
|
||||
href: windows-10-deployment-scenarios.md
|
||||
- name: Quick guide to Windows as a service
|
||||
href: update/waas-quick-start.md
|
||||
href: update/waas-quick-start.md
|
||||
- name: Windows as a service overview
|
||||
href: update/waas-overview.md
|
||||
href: update/waas-overview.md
|
||||
- name: Update release cycle
|
||||
href: update/release-cycle.md
|
||||
- name: Basics of Windows updates, channels, and tools
|
||||
@ -18,7 +16,7 @@
|
||||
- name: Prepare servicing strategy for Windows client updates
|
||||
href: update/waas-servicing-strategy-windows-10-updates.md
|
||||
- name: Deployment proof of concept
|
||||
items:
|
||||
items:
|
||||
- name: Deploy Windows 10 with MDT and Configuration Manager
|
||||
items:
|
||||
- name: 'Step by step guide: Configure a test lab to deploy Windows 10'
|
||||
@ -26,9 +24,9 @@
|
||||
- name: Deploy Windows 10 in a test lab using MDT
|
||||
href: windows-10-poc-mdt.md
|
||||
- name: Deploy Windows 10 in a test lab using Configuration Manager
|
||||
href: windows-10-poc-sc-config-mgr.md
|
||||
href: windows-10-poc-sc-config-mgr.md
|
||||
- name: Deployment process posters
|
||||
href: windows-10-deployment-posters.md
|
||||
href: windows-10-deployment-posters.md
|
||||
|
||||
- name: Plan
|
||||
items:
|
||||
@ -41,7 +39,7 @@
|
||||
- name: Evaluate infrastructure and tools
|
||||
href: update/eval-infra-tools.md
|
||||
- name: Determine application readiness
|
||||
href: update/plan-determine-app-readiness.md
|
||||
href: update/plan-determine-app-readiness.md
|
||||
- name: Define your servicing strategy
|
||||
href: update/plan-define-strategy.md
|
||||
- name: Delivery Optimization for Windows client updates
|
||||
@ -64,11 +62,11 @@
|
||||
- name: Deprecated features
|
||||
href: /windows/whats-new/deprecated-features?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Resources for deprecated features
|
||||
href: /windows/whats-new/deprecated-features-resources?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
href: /windows/whats-new/deprecated-features-resources?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Removed features
|
||||
href: /windows/whats-new/removed-features?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
href: /windows/whats-new/removed-features?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Prepare
|
||||
items:
|
||||
items:
|
||||
- name: Prepare for Windows 11
|
||||
href: /windows/whats-new/windows-11-prepare?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Prepare to deploy Windows client updates
|
||||
@ -97,7 +95,7 @@
|
||||
href: update/waas-manage-updates-wsus.md
|
||||
|
||||
- name: Deploy
|
||||
items:
|
||||
items:
|
||||
- name: Deploy Windows client
|
||||
items:
|
||||
- name: Deploy Windows client with Autopilot
|
||||
@ -139,11 +137,11 @@
|
||||
- name: Safeguard holds
|
||||
href: update/safeguard-holds.md
|
||||
- name: Manage the Windows client update experience
|
||||
items:
|
||||
items:
|
||||
- name: Manage device restarts after updates
|
||||
href: update/waas-restart.md
|
||||
- name: Manage additional Windows Update settings
|
||||
href: update/waas-wu-settings.md
|
||||
href: update/waas-wu-settings.md
|
||||
- name: Use Windows Update for Business
|
||||
items:
|
||||
- name: What is Windows Update for Business?
|
||||
@ -151,7 +149,7 @@
|
||||
- name: Configure Windows Update for Business
|
||||
href: update/waas-configure-wufb.md
|
||||
- name: Use Windows Update for Business and WSUS
|
||||
href: update/wufb-wsus.md
|
||||
href: update/wufb-wsus.md
|
||||
- name: Enforcing compliance deadlines for updates
|
||||
href: update/wufb-compliancedeadlines.md
|
||||
- name: Integrate Windows Update for Business with management solutions
|
||||
@ -165,7 +163,7 @@
|
||||
- name: Prerequisites for Windows Update for Business deployment service
|
||||
href: update/deployment-service-prerequisites.md
|
||||
- name: Deploy updates with the deployment service
|
||||
items:
|
||||
items:
|
||||
- name: Deploy feature updates using Graph Explorer
|
||||
href: update/deployment-service-feature-updates.md
|
||||
- name: Deploy expedited updates using Graph Explorer
|
||||
@ -184,21 +182,21 @@
|
||||
href: vda-subscription-activation.md
|
||||
- name: Deploy Windows Enterprise licenses
|
||||
href: deploy-enterprise-licenses.md
|
||||
- name: Volume Activation
|
||||
- name: Volume Activation
|
||||
items:
|
||||
- name: Overview
|
||||
href: volume-activation/volume-activation-windows-10.md
|
||||
- name: Plan for volume activation
|
||||
- name: Plan for volume activation
|
||||
href: volume-activation/plan-for-volume-activation-client.md
|
||||
- name: Activate using Key Management Service
|
||||
- name: Activate using Key Management Service
|
||||
href: volume-activation/activate-using-key-management-service-vamt.md
|
||||
- name: Activate using Active Directory-based activation
|
||||
- name: Activate using Active Directory-based activation
|
||||
href: volume-activation/activate-using-active-directory-based-activation-client.md
|
||||
- name: Activate clients running Windows 10
|
||||
href: volume-activation/activate-windows-10-clients-vamt.md
|
||||
- name: Monitor activation
|
||||
- name: Monitor activation
|
||||
href: volume-activation/monitor-activation-client.md
|
||||
- name: Use the Volume Activation Management Tool
|
||||
- name: Use the Volume Activation Management Tool
|
||||
href: volume-activation/use-the-volume-activation-management-tool-client.md
|
||||
href: volume-activation/appendix-information-sent-to-microsoft-during-activation-client.md
|
||||
- name: Volume Activation Management Tool (VAMT)
|
||||
@ -282,19 +280,19 @@
|
||||
- name: Windows Update for Business reports
|
||||
items:
|
||||
- name: Windows Update for Business reports overview
|
||||
href: update/wufb-reports-overview.md
|
||||
href: update/wufb-reports-overview.md
|
||||
- name: Enable Windows Update for Business reports
|
||||
items:
|
||||
items:
|
||||
- name: Windows Update for Business reports prerequisites
|
||||
href: update/wufb-reports-prerequisites.md
|
||||
- name: Enable Windows Update for Business reports
|
||||
href: update/wufb-reports-enable.md
|
||||
href: update/wufb-reports-enable.md
|
||||
- name: Configure clients with a script
|
||||
href: update/wufb-reports-configuration-script.md
|
||||
- name: Configure clients manually
|
||||
href: update/wufb-reports-configuration-manual.md
|
||||
- name: Configure clients with Microsoft Intune
|
||||
href: update/wufb-reports-configuration-intune.md
|
||||
href: update/wufb-reports-configuration-intune.md
|
||||
- name: Use Windows Update for Business reports
|
||||
items:
|
||||
- name: Windows Update for Business reports workbook
|
||||
@ -302,13 +300,13 @@
|
||||
- name: Delivery Optimization data in reports
|
||||
href: update/wufb-reports-do.md
|
||||
- name: Software updates in the Microsoft 365 admin center
|
||||
href: update/wufb-reports-admin-center.md
|
||||
href: update/wufb-reports-admin-center.md
|
||||
- name: Use Windows Update for Business reports data
|
||||
href: update/wufb-reports-use.md
|
||||
- name: FAQ for Windows Update for Business reports
|
||||
href: update/wufb-reports-faq.yml
|
||||
- name: Feedback and support
|
||||
href: update/wufb-reports-help.md
|
||||
href: update/wufb-reports-faq.yml
|
||||
- name: Feedback and support
|
||||
href: update/wufb-reports-help.md
|
||||
- name: Windows Update for Business reports schema reference
|
||||
items:
|
||||
- name: Windows Update for Business reports schema reference
|
||||
@ -316,21 +314,21 @@
|
||||
- name: UCClient
|
||||
href: update/wufb-reports-schema-ucclient.md
|
||||
- name: UCClientReadinessStatus
|
||||
href: update/wufb-reports-schema-ucclientreadinessstatus.md
|
||||
href: update/wufb-reports-schema-ucclientreadinessstatus.md
|
||||
- name: UCClientUpdateStatus
|
||||
href: update/wufb-reports-schema-ucclientupdatestatus.md
|
||||
- name: UCDeviceAlert
|
||||
href: update/wufb-reports-schema-ucdevicealert.md
|
||||
- name: UCDOAggregatedStatus
|
||||
href: update/wufb-reports-schema-ucdoaggregatedstatus.md
|
||||
href: update/wufb-reports-schema-ucdoaggregatedstatus.md
|
||||
- name: UCDOStatus
|
||||
href: update/wufb-reports-schema-ucdostatus.md
|
||||
href: update/wufb-reports-schema-ucdostatus.md
|
||||
- name: UCServiceUpdateStatus
|
||||
href: update/wufb-reports-schema-ucserviceupdatestatus.md
|
||||
- name: UCUpdateAlert
|
||||
href: update/wufb-reports-schema-ucupdatealert.md
|
||||
- name: Enumerated types
|
||||
href: update/wufb-reports-schema-enumerated-types.md
|
||||
href: update/wufb-reports-schema-enumerated-types.md
|
||||
- name: Troubleshooting
|
||||
items:
|
||||
- name: Resolve upgrade errors
|
||||
@ -362,7 +360,7 @@
|
||||
- name: Determine the source of Windows Updates
|
||||
href: ./update/how-windows-update-works.md
|
||||
- name: Windows Update security
|
||||
href: ./update/windows-update-security.md
|
||||
href: ./update/windows-update-security.md
|
||||
- name: Common Windows Update errors
|
||||
href: /troubleshoot/windows-client/deployment/common-windows-update-errors?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Windows Update error code reference
|
||||
@ -385,7 +383,7 @@
|
||||
- name: Servicing stack updates
|
||||
href: update/servicing-stack-updates.md
|
||||
- name: Update CSP policies
|
||||
href: /windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
href: /windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Additional Windows Update settings
|
||||
href: update/waas-wu-settings.md
|
||||
- name: Delivery Optimization reference
|
||||
@ -434,7 +432,7 @@
|
||||
href: usmt/usmt-reroute-files-and-settings.md
|
||||
- name: Verify the Condition of a Compressed Migration Store
|
||||
href: usmt/verify-the-condition-of-a-compressed-migration-store.md
|
||||
|
||||
|
||||
- name: USMT Reference
|
||||
items:
|
||||
- name: USMT Requirements
|
||||
|
@ -1,21 +0,0 @@
|
||||
---
|
||||
title: Windows Autopilot EULA dismissal – important information
|
||||
description: A notice about EULA dismissal through Windows Autopilot
|
||||
ms.service: windows-client
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 11/23/2022
|
||||
author: frankroj
|
||||
ms.author: frankroj
|
||||
manager: aaroncz
|
||||
ROBOTS: NOINDEX
|
||||
ms.topic: article
|
||||
ms.subservice: itpro-deploy
|
||||
---
|
||||
# Windows Autopilot EULA dismissal – important information
|
||||
|
||||
> [!IMPORTANT]
|
||||
> The information below isn't the EULA. It is a notice of awareness to the administrator that's configuring to skip End User License Agreement (EULA) during the OOBE (Out-of-Box Experience).
|
||||
|
||||
Using this tool allows you to configure individual installations of Windows on devices managed by your organization. You may choose to suppress or hide certain set-up screens that are normally presented to users when setting up Windows, including the EULA acceptance screen.
|
||||
|
||||
By using this function, you agree that suppressing or hiding any screens that are designed to provide users with notice or acceptance of terms means that you, on behalf of your organization or the individual user as the case may be, have consented to the notices and accepted the applicable terms. This consent includes your agreement to the terms and conditions of the license or notice that would be presented to the user if you didn't suppress or hide it using this tool. You and your users may not use the Windows software on those devices if you haven't validly acquired a license for the software from Microsoft or its licensed distributors.
|
@ -1,227 +0,0 @@
|
||||
---
|
||||
title: What's new in Windows client deployment
|
||||
description: Use this article to learn about new solutions and online content related to deploying Windows in your organization.
|
||||
ms.localizationpriority: medium
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-deploy
|
||||
author: frankroj
|
||||
manager: aaroncz
|
||||
ms.author: frankroj
|
||||
ms.topic: conceptual
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
ms.date: 01/18/2024
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||
---
|
||||
|
||||
# What's new in Windows client deployment
|
||||
|
||||
This article provides an overview of new solutions and online content related to deploying Windows client in your organization.
|
||||
|
||||
- For an all-up overview of new features in Windows, see [What's new in Windows](/windows/whats-new/).
|
||||
|
||||
## [Preview] Windows Autopilot diagnostics page
|
||||
|
||||
When you deploy Windows 11 with Autopilot, you can enable users to view additional information about the Autopilot provisioning process. A new **Windows Autopilot diagnostics Page** is available to provide IT admins and end users with a user-friendly view to troubleshoot Autopilot failures. For more information, see [Windows Autopilot: What's new](/mem/autopilot/windows-autopilot-whats-new#preview-windows-autopilot-diagnostics-page).
|
||||
|
||||
## Windows 11
|
||||
|
||||
Check out the following new articles about Windows 11:
|
||||
|
||||
- [Overview of Windows 11](/windows/whats-new/windows-11).
|
||||
- [Plan for Windows 11](/windows/whats-new/windows-11-plan).
|
||||
- [Prepare for Windows 11](/windows/whats-new/windows-11-prepare).
|
||||
- [Windows ADK for Windows 11](/windows-hardware/get-started/adk-install) is available.
|
||||
|
||||
## Deployment tools
|
||||
|
||||
- [SetupDiag](#setupdiag) is included with all currently supported versions of Windows.
|
||||
- New capabilities are available for [Delivery Optimization](#delivery-optimization) and [Windows Update for Business](#windows-update-for-business).
|
||||
- VPN support is added to [Windows Autopilot](#windows-autopilot).
|
||||
- An in-place upgrade wizard is available in [Configuration Manager](#microsoft-configuration-manager).
|
||||
|
||||
## The Modern Desktop Deployment Center
|
||||
|
||||
The [Modern Desktop Deployment Center](/microsoft-365/enterprise/desktop-deployment-center-home) has content to help you with large-scale deployment of supported version of Windows and Microsoft 365 Apps for enterprise.
|
||||
|
||||
## Microsoft 365
|
||||
|
||||
Microsoft 365 is a new offering from Microsoft that combines:
|
||||
|
||||
- A currently supported version of Windows.
|
||||
- Office 365.
|
||||
- Enterprise Mobility and Security (EMS).
|
||||
|
||||
See [Deploy Windows 10 with Microsoft 365](deploy-m365.md) for an overview, which now includes a link to download a [Microsoft 365 Enterprise poster](deploy-m365.md#microsoft-365-enterprise-poster).
|
||||
|
||||
## Windows servicing and support
|
||||
|
||||
### Delivery Optimization
|
||||
|
||||
Windows PowerShell cmdlets for Delivery Optimization is improved:
|
||||
|
||||
- **Get-DeliveryOptimizationStatus** has the **-PeerInfo** option for a real-time peek behind the scenes on peer-to-peer activity (for example the peer IP Address, bytes received / sent).
|
||||
- **Get-DeliveryOptimizationLogAnalysis** is a new cmdlet that provides a summary of the activity in your DO log (# of downloads, downloads from peers, overall peer efficiency). Use the **-ListConnections** option to for in-depth look at peer-to-peer connections.
|
||||
- **Enable-DeliveryOptimizationVerboseLogs** is a new cmdlet that enables a greater level of logging detail to help in troubleshooting.
|
||||
|
||||
Other improvements in [Delivery Optimization](./do/waas-delivery-optimization.md) include:
|
||||
|
||||
- Enterprise network [throttling is enhanced](/windows-insider/archive/new-for-business#new-download-throttling-options-for-delivery-optimization-build-18917) to optimize foreground vs. background throttling.
|
||||
- Automatic cloud-based congestion detection is available for PCs with cloud service support.
|
||||
- Improved peer efficiency for enterprises and educational institutions with complex networks is enabled with [new policies](/windows/client-management/mdm/policy-csp-deliveryoptimization). These policies now support Microsoft 365 Apps for enterprise updates and Intune content.
|
||||
|
||||
The following Delivery Optimization policies are removed in the Windows 10, version 2004 release:
|
||||
|
||||
- Percentage of Maximum Download Bandwidth (DOPercentageMaxDownloadBandwidth).
|
||||
- Reason: Replaced with separate policies for foreground and background.
|
||||
- Max Upload Bandwidth (DOMaxUploadBandwidth).
|
||||
- Reason: impacts uploads to internet peers only, which isn't used in enterprises.
|
||||
- Absolute max throttle (DOMaxDownloadBandwidth).
|
||||
- Reason: separated to foreground and background.
|
||||
|
||||
### Windows Update for Business
|
||||
|
||||
[Windows Update for Business](./update/waas-manage-updates-wufb.md) enhancements in this release include:
|
||||
|
||||
- **Intune console updates**: target version is now available allowing you to specify which supported version of Windows you want devices to move to. Additionally, this capability enables you to keep devices on their current version until they reach end of service. Check it out in Intune, also available as a Group Policy and Configuration Service Provider (CSP) policy.
|
||||
|
||||
- **Validation improvements**: To ensure devices and end users stay productive and protected, Microsoft blocks devices from updating when there are known issues affect that device. Also, to better enable IT administrators to validate on the latest release, a new policy is available that enables admins to opt devices out of the built-in safeguard holds.
|
||||
|
||||
- [**Automatic Restart Sign-on (ARSO)**](/windows-server/identity/ad-ds/manage/component-updates/winlogon-automatic-restart-sign-on--arso-): Windows automatically signs in as the user and locks their device in order to complete the update. Automatic sign-on ensures that when the user returns and unlocks the device, the update is completed.
|
||||
|
||||
- [**Windows Update for Business**](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523): There's now a single, common start date for phased deployments (no more SAC-T designation). In addition, there's a new notification and reboot scheduling experience for end users, the ability to enforce update installation and reboot deadlines, and the ability to provide end user control over reboots for a specific time period.
|
||||
|
||||
- **Update rollback improvements**: You can now automatically recover from startup failures by removing updates if the startup failure was introduced after the installation of recent driver or quality updates. When a device is unable to start up properly after the recent installation of Quality of driver updates, Windows will now automatically uninstall the updates to get the device back up and running normally.
|
||||
|
||||
- **Pause updates**: The ability to pause updates for both feature and monthly updates is extended. This extension ability is for all currently supported editions of Windows, including Home. You can pause both feature and monthly updates for up to 35 days (seven days at a time, up to five times). Once the 35-day pause period is reached, the device needs to update before pausing again.
|
||||
|
||||
- **Improved update notifications**: When there's an update requiring you to restart your device, a colored dot appears on the Power button in the Start menu and on the Windows icon in the taskbar.
|
||||
|
||||
- **Intelligent active hours**: To further enhance active hours, users now can let Windows Update intelligently adjust active hours based on their device-specific usage patterns. You must enable the intelligent active hours feature for the system to predict device-specific usage patterns.
|
||||
|
||||
- **Improved update orchestration to improve system responsiveness**: This feature improves system performance by intelligently coordinating Windows updates and Microsoft Store updates, so they occur when users are away from their devices to minimize disruptions.
|
||||
|
||||
Microsoft previously announced that we're [extending support](https://www.microsoft.com/microsoft-365/blog/2018/09/06/helping-customers-shift-to-a-modern-desktop) for Windows 10 Enterprise and Windows 10 Education editions to 30 months from the version release date. These editions include all past versions and future versions that are targeted for release in September (versions ending in 09, ex: 1809). Future releases that are targeted for release in March (versions ending in 03, ex: 1903) will continue to be supported for 18 months from their release date. All releases of Windows 10 Home, Windows 10 Pro, and Microsoft 365 Apps for enterprise will continue to be supported for 18 months (there's no change for these editions). These support policies are summarized in the following table:
|
||||
|
||||
:::image type="content" alt-text="Support lifecycle." source="images/support-cycle.png":::
|
||||
|
||||
## Windows 10 Enterprise upgrade
|
||||
|
||||
Windows 10 version 1703 includes a Windows 10 Enterprise E3 and E5 benefit to Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA). These customers can now subscribe users to Windows 10 Enterprise E3 or E5 and activate their subscriptions on up to five devices. Virtual machines can also be activated. For more information, see [Windows 10 Enterprise Subscription Activation](windows-10-subscription-activation.md).
|
||||
|
||||
Windows 10 Enterprise E3 launched in the Cloud Solution Provider (CSP) channel on September 1, 2016. Previously, only organizations with a Microsoft Volume Licensing Agreement could deploy Windows 10 Enterprise to their users. With Windows 10 Enterprise E3 in CSP, small and medium-sized organizations can more easily take advantage of Windows 10 Enterprise features.
|
||||
|
||||
For more information, see [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md).
|
||||
|
||||
## Deployment solutions and tools
|
||||
|
||||
### Windows Autopilot
|
||||
|
||||
[Windows Autopilot](/windows/deployment/windows-autopilot/windows-autopilot) streamlines and automates the process of setting up and configuring new devices, with minimal interaction required from the end user. You can also use Windows Autopilot to reset, repurpose, and recover devices.
|
||||
|
||||
With the release of Windows 10, version 2004 you can configure [Windows Autopilot user-driven](/windows/deployment/windows-autopilot/user-driven) Microsoft Entra hybrid join with VPN support.
|
||||
|
||||
If you configure the language settings in the Autopilot profile and the device is connected to Ethernet, all scenarios now skip the language, locale, and keyboard pages. In previous versions, these language settings were only supported with self-deploying profiles.
|
||||
|
||||
The following Windows Autopilot features are available in Windows 10, version 1903 and later:
|
||||
|
||||
- [Windows Autopilot for pre-provisioned deployment](/autopilot/pre-provision) is new in Windows 10, version 1903. Pre-provisioned deployment enables partners or IT staff to pre-provision devices so they're fully configured and business ready for your users.
|
||||
- The Intune [enrollment status page](/intune/windows-enrollment-status) (ESP) now tracks Intune Management Extensions.
|
||||
- [Cortana voiceover](/windows-hardware/customize/desktop/cortana-voice-support) and speech recognition during OOBE is disabled by default for all Windows 10 Pro Education, and Enterprise SKUs.
|
||||
- Windows Autopilot is self-updating during OOBE. From Windows 10 onward, version 1903 Autopilot functional and critical updates begin downloading automatically during OOBE.
|
||||
- Windows Autopilot sets the [diagnostics data](/windows/privacy/windows-diagnostic-data) level to Full on Windows 10 version 1903 and later during OOBE.
|
||||
|
||||
### Microsoft Configuration Manager
|
||||
|
||||
An in-place upgrade wizard is available in Configuration Manager. For more information, see [Simplifying Windows 10 deployment with Configuration Manager](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/simplifying-windows-10-deployment-with-configuration-manager/ba-p/1214364).
|
||||
|
||||
### Windows 10 Subscription Activation
|
||||
|
||||
Windows 10 Education support is added to Windows 10 Subscription Activation.
|
||||
|
||||
With Windows 10, version 1903, you can step up from Windows 10 Pro Education to the enterprise-grade edition for educational institutions - Windows 10 Education. For more information, see [Windows 10 Subscription Activation](./windows-10-subscription-activation.md).
|
||||
|
||||
### SetupDiag
|
||||
|
||||
[SetupDiag](upgrade/setupdiag.md) is a command-line tool that can help diagnose why an update of Windows failed. SetupDiag works by searching Windows Setup log files. When log files are being searched, SetupDiag uses a set of rules to match known issues.
|
||||
|
||||
During the upgrade process, Windows Setup extracts all its sources files to the `%SystemDrive%\$Windows.~bt\Sources` directory. **SetupDiag.exe** is also installed to this directory. If there's an issue with the upgrade, SetupDiag automatically runs to determine the cause of the failure. If the upgrade process proceeds normally, this directory is moved under `%SystemDrive%\Windows.Old` for cleanup.
|
||||
|
||||
### Upgrade Readiness
|
||||
|
||||
Upgrade Readiness helps you ensure that applications and drivers are ready for an upgrade of Windows. The solution provides up-to-date application and driver inventory, information about known issues, troubleshooting guidance, and per-device readiness and tracking details.
|
||||
|
||||
Input from the community heavily influenced the development of Upgrade Readiness and the development of new features is ongoing. To begin using Upgrade Readiness, add it to an existing Operation Management Suite (OMS) workspace or sign up for a new OMS workspace with the Upgrade Readiness solution enabled.
|
||||
|
||||
For more information about Upgrade Readiness, see the following articles:
|
||||
|
||||
- [Windows Analytics blog](https://aka.ms/blog/WindowsAnalytics/).
|
||||
- [Manage Windows upgrades with Upgrade Readiness](/mem/configmgr/desktop-analytics/overview).
|
||||
|
||||
### Update Compliance
|
||||
|
||||
Update Compliance helps you to keep supported Windows devices in your organization secure and up-to-date.
|
||||
|
||||
Update Compliance is a solution built using OMS Logs and Analytics that provides information about installation status of monthly quality and feature updates. Details are provided about the deployment progress of existing updates and the status of future updates. Information is also provided about devices that might need attention to resolve issues.
|
||||
|
||||
For more information about Update Compliance, see [Monitor Windows Updates with Update Compliance](update/update-compliance-monitor.md).
|
||||
|
||||
### Device Health
|
||||
|
||||
Device Health is the newest Windows Analytics solution that complements the existing Upgrade Readiness and Update Compliance solutions by helping to identify devices crashes and the cause. Device drivers that are causing crashes are identified along with alternative drivers that might reduce the number of crashes. Windows Information Protection misconfigurations are also identified. For more information, see [Monitor the health of devices with Device Health](/mem/configmgr/desktop-analytics/overview).
|
||||
|
||||
### MBR2GPT
|
||||
|
||||
MBR2GPT.EXE converts a disk from Master Boot Record (MBR) to GUID Partition Table (GPT) partition style without modifying or deleting data on the disk. Previously, it was necessary to image, then wipe and reload a disk to change from MBR format to GPT.
|
||||
|
||||
There are many benefits to converting the partition style of a disk to GPT, including the use of larger disk partitions, added data reliability, and faster boot and shutdown speeds. The GPT format also enables you to use the Unified Extensible Firmware Interface (UEFI) which replaces the Basic Input/Output System (BIOS) firmware interface. Security features of supported versions of Windows that require UEFI mode include: Secure Boot, Early Launch Anti-malware (ELAM) driver, Windows Trusted Boot, Measured Boot, Device Guard, Credential Guard, and BitLocker Network Unlock.
|
||||
|
||||
For more information, see [MBR2GPT.EXE](mbr-to-gpt.md).
|
||||
|
||||
### Microsoft Deployment Toolkit (MDT)
|
||||
|
||||
MDT version 8456 supports Windows 10, version 2004 and earlier operating systems, including Windows Server 2019.
|
||||
|
||||
For the latest information about MDT, see the [MDT release notes](/mem/configmgr/mdt/release-notes).
|
||||
|
||||
> [!IMPORTANT]
|
||||
>
|
||||
> MDT doesn't support versions of Windows after Windows 10 and Windows Server 2019.
|
||||
|
||||
### Windows Assessment and Deployment Kit (ADK)
|
||||
|
||||
IT Pros can use the tools in the Windows Assessment and Deployment Kit (Windows ADK) to deploy Windows.
|
||||
|
||||
Download the Windows ADK and Windows PE add-on for Windows 11 [here](/windows-hardware/get-started/adk-install).
|
||||
|
||||
For information about what's new in the ADK, see [What's new in the Windows ADK](/windows-hardware/get-started/what-s-new-in-kits-and-tools).
|
||||
|
||||
Also see [Windows ADK for Windows scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md).
|
||||
|
||||
## Testing and validation guidance
|
||||
|
||||
### Windows 10 deployment proof of concept (PoC)
|
||||
|
||||
The Windows 10 PoC guide enables you to test Windows 10 deployment in a virtual environment and become familiar with deployment tools such as MDT and Configuration Manager. The PoC guide provides step-by-step instructions for installing and using Hyper-V to create a virtual lab environment. The guide makes extensive use of Windows PowerShell to streamline each phase of the installation and setup.
|
||||
|
||||
For more information, see the following guides:
|
||||
|
||||
- [Step by step guide: Configure a test lab to deploy Windows 10](windows-10-poc.md).
|
||||
- [Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit](windows-10-poc-mdt.md).
|
||||
- [Deploy Windows 10 in a test lab using Microsoft Configuration Manager](windows-10-poc-sc-config-mgr.md).
|
||||
|
||||
## Troubleshooting guidance
|
||||
|
||||
[Resolve Windows upgrade errors](upgrade/resolve-windows-upgrade-errors.md) was published in October of 2016 and continues to be updated with new fixes. The article provides a detailed explanation of the Windows upgrade process and instructions on how to locate, interpret, and resolve specific errors that can be encountered during the upgrade process.
|
||||
|
||||
## Related articles
|
||||
|
||||
- [Overview of Windows as a service](update/waas-overview.md).
|
||||
- [Windows 10 deployment considerations](planning/windows-10-deployment-considerations.md).
|
||||
- [Windows 10 release information](/windows/windows-10/release-information).
|
||||
- [Windows 10 Specifications & Systems Requirements](https://www.microsoft.com/windows/windows-10-specifications).
|
||||
- [Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md).
|
||||
- [Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md).
|
Loading…
x
Reference in New Issue
Block a user