From d9a3d81a0a1941f7e941ee6df91942732ed0e815 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 9 Sep 2020 12:18:58 -0700 Subject: [PATCH] Updated GP info --- .../mdm/policy-csp-update.md | 19 ++++++++++--------- 1 file changed, 10 insertions(+), 9 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index d964981cd4..4eb6ccaccf 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -4152,19 +4152,19 @@ The following list shows the supported values: Pro - check mark + check mark1 Business - check mark + check mark1 Enterprise - check mark + check mark1 Education - check mark + check mark1 @@ -4181,23 +4181,24 @@ The following list shows the supported values: -By default, HTTP WSUS servers scan only if system proxy is configured. This policy setting allows you to configure user proxy as a fallback for detecting updates while using an HTTP based intranet server despite the vulnerabilities it presents. +Available in Windows 10, version 1607 and later. By default, HTTP WSUS servers scan only if system proxy is configured. This policy setting allows you to configure user proxy as a fallback for detecting updates while using an HTTP based intranet server despite the vulnerabilities it presents. This policy setting does not impact those customers who have, per Microsoft recommendation, secured their WSUS server with TLS/SSL protocol, thereby using HTTPS based intranet servers to keep systems secure. That said, if a proxy is required, we recommend configuring a system proxy to ensure the highest level of security. ADMX Info: -- GP English name: *Allow user proxy to be used as a fallback if detection using system proxy fails* -- GP name: ** -- GP path: *Windows Components/Windows Update/SpecifyintranetMicrosoftupdateserviceLocation* +- GP English name: *Select the proxy behavior for Windows Update client for detecting updates with non-TLS (HTTP) based service* +- GP name: *Select the proxy behavior* +- GP element: *Select the proxy behavior* +- GP path: *Windows Components/Windows Update/Specify intranet Microsoft update service location* - GP ADMX file name: *WindowsUpdate.admx* The following list shows the supported values: -- 0 - Allow system proxy only for HTTP scans. +- 0 (default) - Allow system proxy only for HTTP scans. - 1 - Allow user proxy to be used as a fallback if detection using system proxy fails. > [!NOTE] > Configuring this policy setting to 1 exposes your environment to potential security risk and makes scans unsecure.