mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge branch 'main' into v-smandalika-5694287-B12
This commit is contained in:
commit
d946555570
@ -47,12 +47,12 @@ For more information about the exception criteria and exception process, see [Mi
|
|||||||
|
|
||||||
Click the scorecard links for each article to review the Acrolinx feedback on grammar, spelling, punctuation, writing style, and terminology:
|
Click the scorecard links for each article to review the Acrolinx feedback on grammar, spelling, punctuation, writing style, and terminology:
|
||||||
|
|
||||||
| Article | Score | Issues | Spelling<br>issues | Scorecard | Processed |
|
| Article | Score | Issues | Correctness<br>issues | Scorecard | Processed |
|
||||||
| ------- | ----- | ------ | ------ | --------- | --------- |
|
| ------- | ----- | ------ | ------ | --------- | --------- |
|
||||||
"
|
"
|
||||||
|
|
||||||
:template-change
|
:template-change
|
||||||
"| ${s/file} | ${acrolinx/qualityscore} | ${acrolinx/flags/issues} | ${acrolinx/flags/spelling} | [link](${acrolinx/scorecard}) | ${s/status} |
|
"| ${s/file} | ${acrolinx/qualityscore} | ${acrolinx/flags/issues} | ${acrolinx/flags/correctness} | [link](${acrolinx/scorecard}) | ${s/status} |
|
||||||
"
|
"
|
||||||
|
|
||||||
:template-footer
|
:template-footer
|
||||||
|
@ -114,7 +114,7 @@ Office 365 Education allows:
|
|||||||
|
|
||||||
* Faculty to help prevent unauthorized users from accessing documents and email by using Microsoft Azure Rights Management.
|
* Faculty to help prevent unauthorized users from accessing documents and email by using Microsoft Azure Rights Management.
|
||||||
|
|
||||||
* Faculty to use advanced compliance tools on the unified eDiscovery pages in the Office 365 Compliance Center.
|
* Faculty to use advanced compliance tools on the unified eDiscovery pages in the Microsoft Purview compliance portal.
|
||||||
|
|
||||||
* Faculty to host online classes, parent–teacher conferences, and other collaboration in Skype for Business.
|
* Faculty to host online classes, parent–teacher conferences, and other collaboration in Skype for Business.
|
||||||
|
|
||||||
|
@ -74,7 +74,7 @@ Office 365 Education allows:
|
|||||||
- Students and faculty to use email and calendars, with mailboxes up to 50 GB per user.
|
- Students and faculty to use email and calendars, with mailboxes up to 50 GB per user.
|
||||||
- Faculty to use advanced email features like email archiving and legal hold capabilities.
|
- Faculty to use advanced email features like email archiving and legal hold capabilities.
|
||||||
- Faculty to help prevent unauthorized users from accessing documents and email by using Azure Rights Management.
|
- Faculty to help prevent unauthorized users from accessing documents and email by using Azure Rights Management.
|
||||||
- Faculty to use advanced compliance tools on the unified eDiscovery pages in the Office 365 Compliance Center.
|
- Faculty to use advanced compliance tools on the unified eDiscovery pages in the Microsoft Purview compliance portal.
|
||||||
- Faculty to host online classes, parent–teacher conferences, and other collaboration in Skype for Business or Skype.
|
- Faculty to host online classes, parent–teacher conferences, and other collaboration in Skype for Business or Skype.
|
||||||
- Students and faculty to access up to 1 TB of personal cloud storage that users inside and outside the educational institution can share through OneDrive for Business.
|
- Students and faculty to access up to 1 TB of personal cloud storage that users inside and outside the educational institution can share through OneDrive for Business.
|
||||||
- Teachers to provide collaboration in the classroom through Microsoft SharePoint Online team sites.
|
- Teachers to provide collaboration in the classroom through Microsoft SharePoint Online team sites.
|
||||||
|
@ -33,7 +33,7 @@
|
|||||||
"externalReference": [],
|
"externalReference": [],
|
||||||
"globalMetadata": {
|
"globalMetadata": {
|
||||||
"recommendations": true,
|
"recommendations": true,
|
||||||
"breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json",
|
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||||
"ms.technology": "windows",
|
"ms.technology": "windows",
|
||||||
"audience": "ITPro",
|
"audience": "ITPro",
|
||||||
|
@ -33,7 +33,7 @@
|
|||||||
"externalReference": [],
|
"externalReference": [],
|
||||||
"globalMetadata": {
|
"globalMetadata": {
|
||||||
"recommendations": true,
|
"recommendations": true,
|
||||||
"breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json",
|
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||||
"ms.technology": "windows",
|
"ms.technology": "windows",
|
||||||
"audience": "ITPro",
|
"audience": "ITPro",
|
||||||
|
@ -33,7 +33,7 @@
|
|||||||
"externalReference": [],
|
"externalReference": [],
|
||||||
"globalMetadata": {
|
"globalMetadata": {
|
||||||
"recommendations": true,
|
"recommendations": true,
|
||||||
"breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json",
|
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||||
"ms.technology": "windows",
|
"ms.technology": "windows",
|
||||||
"audience": "ITPro",
|
"audience": "ITPro",
|
||||||
|
@ -13,7 +13,7 @@ ms.collection: M365-modern-desktop
|
|||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Connected Cached for Internet Service Providers (ISPs)
|
# Microsoft Connected Cache for Internet Service Providers (ISPs)
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
|
||||||
|
@ -35,7 +35,7 @@
|
|||||||
"externalReference": [],
|
"externalReference": [],
|
||||||
"globalMetadata": {
|
"globalMetadata": {
|
||||||
"recommendations": true,
|
"recommendations": true,
|
||||||
"breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json",
|
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||||
"ms.technology": "windows",
|
"ms.technology": "windows",
|
||||||
"audience": "ITPro",
|
"audience": "ITPro",
|
||||||
|
@ -17,7 +17,7 @@
|
|||||||
"recommendations": true,
|
"recommendations": true,
|
||||||
"ROBOTS": "INDEX, FOLLOW",
|
"ROBOTS": "INDEX, FOLLOW",
|
||||||
"audience": "ITPro",
|
"audience": "ITPro",
|
||||||
"breadcrumb_path": "/itpro/windows/breadcrumb/toc.json",
|
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||||
"_op_documentIdPathDepotMapping": {
|
"_op_documentIdPathDepotMapping": {
|
||||||
"./": {
|
"./": {
|
||||||
|
@ -1,53 +1,57 @@
|
|||||||
- name: Docs
|
items:
|
||||||
|
- name: Docs
|
||||||
tocHref: /
|
tocHref: /
|
||||||
topicHref: /
|
topicHref: /
|
||||||
items:
|
items:
|
||||||
- name: Windows
|
- name: Windows
|
||||||
tocHref: /windows
|
tocHref: /windows/
|
||||||
topicHref: /windows/windows-10
|
topicHref: /windows/resources/
|
||||||
items:
|
items:
|
||||||
- name: What's new
|
- name: What's new
|
||||||
tocHref: /windows/whats-new/
|
tocHref: /windows/whats-new/
|
||||||
topicHref: /windows/whats-new/index
|
topicHref: /windows/whats-new/
|
||||||
- name: Configuration
|
- name: Configuration
|
||||||
tocHref: /windows/configuration/
|
tocHref: /windows/configuration/
|
||||||
topicHref: /windows/configuration/index
|
topicHref: /windows/configuration/
|
||||||
- name: Deployment
|
- name: Deployment
|
||||||
tocHref: /windows/deployment/
|
tocHref: /windows/deployment/
|
||||||
topicHref: /windows/deployment/index
|
topicHref: /windows/deployment/
|
||||||
|
items:
|
||||||
|
- name: Delivery Optimization
|
||||||
|
tocHref: /windows/deployment/do/
|
||||||
|
topicHref: /windows/deployment/do/
|
||||||
- name: Application management
|
- name: Application management
|
||||||
tocHref: /windows/application-management/
|
tocHref: /windows/application-management/
|
||||||
topicHref: /windows/application-management/index
|
topicHref: /windows/application-management/
|
||||||
- name: Client management
|
- name: Client management
|
||||||
tocHref: /windows/client-management/
|
tocHref: /windows/client-management/
|
||||||
topicHref: /windows/client-management/index
|
topicHref: /windows/client-management/
|
||||||
items:
|
items:
|
||||||
- name: Mobile Device Management
|
- name: Mobile Device Management
|
||||||
tocHref: /windows/client-management/mdm/
|
tocHref: /windows/client-management/mdm/
|
||||||
topicHref: /windows/client-management/mdm/index
|
topicHref: /windows/client-management/mdm/
|
||||||
- name: Release information
|
|
||||||
tocHref: /windows/release-information/
|
|
||||||
topicHref: /windows/release-health/release-information
|
|
||||||
- name: Privacy
|
- name: Privacy
|
||||||
tocHref: /windows/privacy/
|
tocHref: /windows/privacy/
|
||||||
topicHref: /windows/privacy/index
|
topicHref: /windows/privacy/
|
||||||
- name: Security
|
- name: Security
|
||||||
tocHref: /windows/security/
|
tocHref: /windows/security/
|
||||||
topicHref: /windows/security/index
|
topicHref: /windows/security/
|
||||||
items:
|
|
||||||
- name: Identity and access protection
|
|
||||||
tocHref: /windows/security/identity-protection/
|
|
||||||
topicHref: /windows/security/identity-protection/index
|
|
||||||
items:
|
items:
|
||||||
- name: Windows Hello for Business
|
- name: Windows Hello for Business
|
||||||
tocHref: /windows/security/identity-protection/hello-for-business
|
tocHref: /windows/security/identity-protection/hello-for-business/
|
||||||
topicHref: /windows/security/identity-protection/hello-for-business/hello-identity-verification
|
topicHref: /windows/security/identity-protection/hello-for-business/
|
||||||
- name: Threat protection
|
- name: Security auditing
|
||||||
tocHref: /windows/security/threat-protection/
|
tocHref: /windows/security/threat-protection/auditing/
|
||||||
topicHref: /windows/security/threat-protection/index
|
topicHref: /windows/security/threat-protection/auditing/security-auditing-overview
|
||||||
- name: Information protection
|
- name: Microsoft Defender Application Guard
|
||||||
tocHref: /windows/security/information-protection/
|
tocHref: /windows/security/threat-protection/microsoft-defender-application-guard/
|
||||||
topicHref: /windows/security/information-protection/index
|
topicHref: /windows/security/threat-protection/microsoft-defender-application-guard/
|
||||||
- name: Hardware-based protection
|
- name: Security policy settings
|
||||||
tocHref: /windows/security/hardware-protection/
|
tocHref: /windows/security/threat-protection/security-policy-settings/
|
||||||
topicHref: /windows/security/hardware-protection/index
|
topicHref: /windows/security/threat-protection/security-policy-settings/security-policy-settings
|
||||||
|
- name: Application Control for Windows
|
||||||
|
tocHref: /windows/security/threat-protection/windows-defender-application-control/
|
||||||
|
topicHref: /windows/security/threat-protection/windows-defender-application-control/
|
||||||
|
- name: Windows Defender Firewall
|
||||||
|
tocHref: /windows/security/threat-protection/windows-firewall/
|
||||||
|
topicHref: /windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security
|
||||||
|
@ -36,7 +36,7 @@
|
|||||||
"globalMetadata": {
|
"globalMetadata": {
|
||||||
"recommendations": true,
|
"recommendations": true,
|
||||||
"audience": "ITPro",
|
"audience": "ITPro",
|
||||||
"breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json",
|
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||||
"ms.technology": "windows",
|
"ms.technology": "windows",
|
||||||
"ms.topic": "article",
|
"ms.topic": "article",
|
||||||
|
@ -33,7 +33,7 @@
|
|||||||
"externalReference": [],
|
"externalReference": [],
|
||||||
"globalMetadata": {
|
"globalMetadata": {
|
||||||
"recommendations": true,
|
"recommendations": true,
|
||||||
"breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json",
|
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||||
"ms.technology": "windows",
|
"ms.technology": "windows",
|
||||||
"audience": "ITPro",
|
"audience": "ITPro",
|
||||||
|
@ -307,6 +307,8 @@ You can also apply the Group Policies using the following registry keys:
|
|||||||
|
|
||||||
4. On the **Program** page, click **This program path**, type **%windir%\\systemapps\\Microsoft.Windows.Cortana\_cw5n1h2txyewy\\SearchUI.exe**, and then click **Next**.
|
4. On the **Program** page, click **This program path**, type **%windir%\\systemapps\\Microsoft.Windows.Cortana\_cw5n1h2txyewy\\SearchUI.exe**, and then click **Next**.
|
||||||
|
|
||||||
|
- On Windows 11, type **"%windir%\\SystemApps\\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\\SearchHost.exe"** instead.
|
||||||
|
|
||||||
5. On the **Action** page, click **Block the connection**, and then click **Next**.
|
5. On the **Action** page, click **Block the connection**, and then click **Next**.
|
||||||
|
|
||||||
6. On the **Profile** page, ensure that the **Domain**, **Private**, and **Public** check boxes are selected, and then click **Next**.
|
6. On the **Profile** page, ensure that the **Domain**, **Private**, and **Public** check boxes are selected, and then click **Next**.
|
||||||
@ -327,6 +329,8 @@ You can also apply the Group Policies using the following registry keys:
|
|||||||
|
|
||||||
- Create a new REG_SZ registry setting named **{0DE40C8E-C126-4A27-9371-A27DAB1039F7}** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules** and set it to a value of **v2.25|Action=Block|Active=TRUE|Dir=Out|Protocol=6|App=%windir%\\SystemApps\\Microsoft.Windows.Cortana_cw5n1h2txyewy\\searchUI.exe|Name=Block outbound Cortana|**
|
- Create a new REG_SZ registry setting named **{0DE40C8E-C126-4A27-9371-A27DAB1039F7}** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\FirewallRules** and set it to a value of **v2.25|Action=Block|Active=TRUE|Dir=Out|Protocol=6|App=%windir%\\SystemApps\\Microsoft.Windows.Cortana_cw5n1h2txyewy\\searchUI.exe|Name=Block outbound Cortana|**
|
||||||
|
|
||||||
|
- On Windows 11, follow the previous section instead and use the Group Policy editor.
|
||||||
|
|
||||||
If your organization tests network traffic, do not use a network proxy as Windows Firewall does not block proxy traffic. Instead, use a network traffic analyzer. Based on your needs, there are many network traffic analyzers available at no cost.
|
If your organization tests network traffic, do not use a network proxy as Windows Firewall does not block proxy traffic. Instead, use a network traffic analyzer. Based on your needs, there are many network traffic analyzers available at no cost.
|
||||||
|
|
||||||
|
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
"externalReference": [],
|
"externalReference": [],
|
||||||
"globalMetadata": {
|
"globalMetadata": {
|
||||||
"recommendations": true,
|
"recommendations": true,
|
||||||
"breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json",
|
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||||
"ms.topic": "article",
|
"ms.topic": "article",
|
||||||
"manager": "dansimp",
|
"manager": "dansimp",
|
||||||
|
@ -38,7 +38,7 @@ The Group Policy Editor, when the policy is enabled, creates a default signal ru
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Microsoft recommends using the default values for this policy settings. Measurements are relative based on the varying conditions of each environment. Therefore, the same values may produce different results. Test policy settings in each environment prior to broadly deploying the setting.
|
>Microsoft recommends using the default values for this policy settings. Measurements are relative based on the varying conditions of each environment. Therefore, the same values may produce different results. Test policy settings in each environment prior to broadly deploying the setting.
|
||||||
|
|
||||||
For this policy setting, the **type** and **scenario** attribute values are static and cannot change. The **classofDevice** is configurable but Phone is the only currently supported configuration. The attribute defaults to Phones sand uses the values from the following table:
|
For this policy setting, the **type** and **scenario** attribute values are static and cannot change. The **classofDevice** is configurable but Phone is the only currently supported configuration. The attribute defaults to Phones and uses the values from the following table:
|
||||||
|
|
||||||
|Description|Value|
|
|Description|Value|
|
||||||
|:-------------|:-------:|
|
|:-------------|:-------:|
|
||||||
|
@ -57,7 +57,7 @@ To help address this security insufficiency, companies developed data loss preve
|
|||||||
|
|
||||||
- **A way to scan company data to see whether it matches any of your defined rules.** Currently, Microsoft Exchange Server and Exchange Online provide this service for email in transit, while Microsoft SharePoint and SharePoint Online provide this service for content stored in document libraries.
|
- **A way to scan company data to see whether it matches any of your defined rules.** Currently, Microsoft Exchange Server and Exchange Online provide this service for email in transit, while Microsoft SharePoint and SharePoint Online provide this service for content stored in document libraries.
|
||||||
|
|
||||||
- **The ability to specify what happens when data matches a rule, including whether employees can bypass enforcement.** For example, in Microsoft SharePoint and SharePoint Online, the Microsoft data loss prevention system lets you warn your employees that shared data includes sensitive info, and to share it anyway (with an optional audit log entry).
|
- **The ability to specify what happens when data matches a rule, including whether employees can bypass enforcement.** For example, in Microsoft SharePoint and SharePoint Online, the Microsoft Purview data loss prevention system lets you warn your employees that shared data includes sensitive info, and to share it anyway (with an optional audit log entry).
|
||||||
|
|
||||||
Unfortunately, data loss prevention systems have their own problems. For example, the less detailed the rule set, the more false positives are created, leading employees to believe that the rules slow down their work and need to be bypassed in order to remain productive, potentially leading to data being incorrectly blocked or improperly released. Another major problem is that data loss prevention systems must be widely implemented to be effective. For example, if your company uses a data loss prevention system for email, but not for file shares or document storage, you might find that your data leaks through the unprotected channels. But perhaps the biggest problem with data loss prevention systems is that it provides a jarring experience that interrupts the employees’ natural workflow by stopping some operations (such as sending a message with an attachment that the system tags as sensitive) while allowing others, often according to subtle rules that the employee doesn’t see and can’t understand.
|
Unfortunately, data loss prevention systems have their own problems. For example, the less detailed the rule set, the more false positives are created, leading employees to believe that the rules slow down their work and need to be bypassed in order to remain productive, potentially leading to data being incorrectly blocked or improperly released. Another major problem is that data loss prevention systems must be widely implemented to be effective. For example, if your company uses a data loss prevention system for email, but not for file shares or document storage, you might find that your data leaks through the unprotected channels. But perhaps the biggest problem with data loss prevention systems is that it provides a jarring experience that interrupts the employees’ natural workflow by stopping some operations (such as sending a message with an attachment that the system tags as sensitive) while allowing others, often according to subtle rules that the employee doesn’t see and can’t understand.
|
||||||
|
|
||||||
|
@ -27,10 +27,9 @@ ms.technology: windows-sec
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>This information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
>This information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
To get started, open Device Configuration in Intune, then create a new profile.
|
To get started, Open the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), and then go to **Devices** > **Windows** > **Configuration profiles** > **Create profile** > Choose **Windows 10 and later** as the platform, Choose **Templates**, then **Endpoint protection** as the profile type.
|
||||||
Choose Windows 10 or Windows 11 as the platform, and Endpoint Protection as the profile type.
|
|
||||||
Select Windows Defender Firewall.
|
Select Windows Defender Firewall.
|
||||||

|
:::image type="content" source="images/windows-firewall-intune.png" alt-text="Example of a Windows Defender Firewall policy in Microsoft Endpoint Manager.":::
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>A single Endpoint Protection profile may contain up to a maximum of 150 firewall rules. If a client device requires more than 150 rules, then multiple profiles must be assigned to it.
|
>A single Endpoint Protection profile may contain up to a maximum of 150 firewall rules. If a client device requires more than 150 rules, then multiple profiles must be assigned to it.
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 608 KiB After Width: | Height: | Size: 140 KiB |
@ -33,7 +33,7 @@
|
|||||||
"externalReference": [],
|
"externalReference": [],
|
||||||
"globalMetadata": {
|
"globalMetadata": {
|
||||||
"recommendations": true,
|
"recommendations": true,
|
||||||
"breadcrumb_path": "/windows/windows-10/breadcrumb/toc.json",
|
"breadcrumb_path": "/windows/resources/breadcrumb/toc.json",
|
||||||
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
"uhfHeaderId": "MSDocsHeader-M365-IT",
|
||||||
"ms.topic": "article",
|
"ms.topic": "article",
|
||||||
"audience": "ITPro",
|
"audience": "ITPro",
|
||||||
|
Loading…
x
Reference in New Issue
Block a user