mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-19 00:37:22 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into atp-securityanalytics
This commit is contained in:
commit
dc4473bf35
@ -31,6 +31,7 @@
|
|||||||
#### [Use fully qualified domain name with Surface Hub](use-fully-qualified-domain-name-surface-hub.md)
|
#### [Use fully qualified domain name with Surface Hub](use-fully-qualified-domain-name-surface-hub.md)
|
||||||
#### [Wireless network management](wireless-network-management-for-surface-hub.md)
|
#### [Wireless network management](wireless-network-management-for-surface-hub.md)
|
||||||
### [Install apps on your Surface Hub](install-apps-on-surface-hub.md)
|
### [Install apps on your Surface Hub](install-apps-on-surface-hub.md)
|
||||||
|
### [Set up and use Whiteboard to Whiteboard collaboration](whiteboard-collaboration.md)
|
||||||
### [End a Surface Hub meeting with End session](i-am-done-finishing-your-surface-hub-meeting.md)
|
### [End a Surface Hub meeting with End session](i-am-done-finishing-your-surface-hub-meeting.md)
|
||||||
### [Save your BitLocker key](save-bitlocker-key-surface-hub.md)
|
### [Save your BitLocker key](save-bitlocker-key-surface-hub.md)
|
||||||
### [Connect other devices and display with Surface Hub](connect-and-display-with-surface-hub.md)
|
### [Connect other devices and display with Surface Hub](connect-and-display-with-surface-hub.md)
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub, security
|
ms.pagetype: surfacehub, security
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -14,8 +16,12 @@ localizationpriority: medium
|
|||||||
|
|
||||||
This topic lists new and updated topics in the [Surface Hub Admin Guide]( surface-hub-administrators-guide.md).
|
This topic lists new and updated topics in the [Surface Hub Admin Guide]( surface-hub-administrators-guide.md).
|
||||||
|
|
||||||
|
## June 2017
|
||||||
|
|
||||||
|
| New or changed topic | Description |
|
||||||
|
| --- | --- |
|
||||||
|
| [Set up and use Whiteboard to Whiteboard collaboration](whiteboard-collaboration.md) | New |
|
||||||
|
| [Manage settings with an MDM provider (Surface Hub)](manage-settings-with-mdm-for-surface-hub.md#whiteboard-collaboration-settings) | Added settings for managing Whiteboard collaboration |
|
||||||
|
|
||||||
## RELEASE: Windows 10, version 1703
|
## RELEASE: Windows 10, version 1703
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: isaiahng
|
author: isaiahng
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
BIN
devices/surface-hub/images/wb-collab-example.png
Normal file
BIN
devices/surface-hub/images/wb-collab-example.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 173 KiB |
BIN
devices/surface-hub/images/wb-collab-link.png
Normal file
BIN
devices/surface-hub/images/wb-collab-link.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 67 KiB |
@ -7,6 +7,8 @@ ms.mktglfcycl: explore
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub, store
|
ms.pagetype: surfacehub, store
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub, mobility
|
ms.pagetype: surfacehub, mobility
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -22,6 +24,9 @@ Surface Hub has been validated with Microsoft’s first-party MDM providers:
|
|||||||
|
|
||||||
You can also manage Surface Hubs using any third-party MDM provider that can communicate with Windows 10 using the MDM protocol.
|
You can also manage Surface Hubs using any third-party MDM provider that can communicate with Windows 10 using the MDM protocol.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>[Azure Active Directory conditional access](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access) is not currently available for Surface Hub devices.
|
||||||
|
|
||||||
## <a href="" id="enroll-into-mdm"></a>Enroll a Surface Hub into MDM
|
## <a href="" id="enroll-into-mdm"></a>Enroll a Surface Hub into MDM
|
||||||
You can enroll your Surface Hubs using bulk or manual enrollment.
|
You can enroll your Surface Hubs using bulk or manual enrollment.
|
||||||
|
|
||||||
@ -178,6 +183,28 @@ The following tables include info on Windows 10 settings that have been validate
|
|||||||
| Set Network proxy | Use to configure a proxy server for ethernet and Wi-Fi connections. | [NetworkProxy CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/networkproxy-csp) | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
| Set Network proxy | Use to configure a proxy server for ethernet and Wi-Fi connections. | [NetworkProxy CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/networkproxy-csp) | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
\*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.
|
\*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.
|
||||||
|
|
||||||
|
### Whiteboard collaboration settings
|
||||||
|
|
||||||
|
MDM settings for Whiteboard collaboration use the **AppManagement/AppStore** node of the [EnterpriseModernAppManagement CSP](https://docs.microsoft.com/windows/client-management/mdm/enterprisemodernappmanagement-csp#appmanagement-appstore) to configure an **AppSettingPolicy**.
|
||||||
|
|
||||||
|
The value for each setting can be **True** or **False**. The default value for each setting is **False**.
|
||||||
|
|
||||||
|
The OMA URI for each setting consists of `./User/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/Microsoft.Office.Whiteboard_8wekyb3d8bbwe/AppSettingPolicy/` and the string from the **OMA URI** column in the table. For example, the full OMA URI for **Enable sign-in** is `./User/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/Microsoft.Office.Whiteboard_8wekyb3d8bbwe/AppSettingPolicy/EnableSignIn`.
|
||||||
|
|
||||||
|
|
||||||
|
| Setting | Details | OMA URI | Supported with<br>Intune? | Supported with<br>Configuration Manager? | Supported with<br>SyncML*? |
|
||||||
|
| --- | ---- | --- |---- | --- | --- |
|
||||||
|
| Enable sign-in | Users can sign in and authenticate | EnableSignIn | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Disable sign-in | Users are unable to sign in and access collaboration or education features | DisableSignIn | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Disable Collaboration | Users can sign in but not create or join collaborative sessions | DisableCollaboration | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Disable Sharing | Hide entry points for the Share button, hiding export in the Share charm and Collaboration | DisableSharing | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Disable Export | Users cannot send whiteboards using email, thumb drives, or other mechanisms through the Share charm | DisableExport | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Enable Ink to Shape | **Ink to Shape** is on by default when users open Whiteboard | EnableInkShapes | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Disable Ink to Shape | **Ink to Shape** is off by default when users open Whiteboard | DisableInkShapes | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Enable Ink to Table | **Ink to Table** is on by default when users open Whiteboard | EnableInkTables | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Disable Search | Hide entry points for Bing Search | DisableSearch | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
\*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.
|
||||||
|
|
||||||
### Generate OMA URIs for settings
|
### Generate OMA URIs for settings
|
||||||
You need to use a setting’s OMA URI to create a custom policy in Intune, or a custom setting in System Center Configuration Manager.
|
You need to use a setting’s OMA URI to create a custom policy in Intune, or a custom setting in System Center Configuration Manager.
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -30,6 +32,7 @@ Learn about managing and updating Surface Hub.
|
|||||||
| [Remote Surface Hub management](remote-surface-hub-management.md) |Topics related to managing your Surface Hub remotely. Include install apps, managing settings with MDM and monitoring with Operations Management Suite. |
|
| [Remote Surface Hub management](remote-surface-hub-management.md) |Topics related to managing your Surface Hub remotely. Include install apps, managing settings with MDM and monitoring with Operations Management Suite. |
|
||||||
| [Manage Surface Hub settings](manage-surface-hub-settings.md) |Topics related to managing Surface Hub settings: accessibility, device account, device reset, fully qualified domain name, Windows Update settings, and wireless network |
|
| [Manage Surface Hub settings](manage-surface-hub-settings.md) |Topics related to managing Surface Hub settings: accessibility, device account, device reset, fully qualified domain name, Windows Update settings, and wireless network |
|
||||||
| [Install apps on your Surface Hub]( https://technet.microsoft.com/itpro/surface-hub/install-apps-on-surface-hub) | Admins can install apps can from either the Microsoft Store or the Microsoft Store for Business.|
|
| [Install apps on your Surface Hub]( https://technet.microsoft.com/itpro/surface-hub/install-apps-on-surface-hub) | Admins can install apps can from either the Microsoft Store or the Microsoft Store for Business.|
|
||||||
|
| [Set up and use Whiteboard to Whiteboard collaboration](whiteboard-collaboration.md) | Microsoft Whiteboard’s latest update includes the capability for two Surface Hubs to collaborate in real time on the same board. |
|
||||||
| [End a meeting with End session](https://technet.microsoft.com/itpro/surface-hub/i-am-done-finishing-your-surface-hub-meeting) | At the end of a meeting, users can tap **End session** to clean up any sensitive data and prepare the device for the next meeting.|
|
| [End a meeting with End session](https://technet.microsoft.com/itpro/surface-hub/i-am-done-finishing-your-surface-hub-meeting) | At the end of a meeting, users can tap **End session** to clean up any sensitive data and prepare the device for the next meeting.|
|
||||||
| [Save your BitLocker key](https://technet.microsoft.com/itpro/surface-hub/save-bitlocker-key-surface-hub) | Every Surface Hub is automatically set up with BitLocker drive encryption software. Microsoft strongly recommends that you make sure you back up your BitLocker recovery keys.|
|
| [Save your BitLocker key](https://technet.microsoft.com/itpro/surface-hub/save-bitlocker-key-surface-hub) | Every Surface Hub is automatically set up with BitLocker drive encryption software. Microsoft strongly recommends that you make sure you back up your BitLocker recovery keys.|
|
||||||
| [Connect other devices and display with Surface Hub](https://technet.microsoft.com/itpro/surface-hub/connect-and-display-with-surface-hub) | You can connect other device to your Surface Hub to display content.|
|
| [Connect other devices and display with Surface Hub](https://technet.microsoft.com/itpro/surface-hub/connect-and-display-with-surface-hub) | You can connect other device to your Surface Hub to display content.|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub, security
|
ms.pagetype: surfacehub, security
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub, readiness
|
ms.pagetype: surfacehub, readiness
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: plan
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub, security
|
ms.pagetype: surfacehub, security
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -6,7 +6,9 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerMS
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@ ms.mktglfcycl: explore
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,6 +7,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -6,6 +6,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.pagetype: devices
|
ms.pagetype: devices
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: support
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -3,6 +3,8 @@ title: Use fully qualified doman name with Surface Hub
|
|||||||
description: Troubleshoot common problems, including setup issues, Exchange ActiveSync errors.
|
description: Troubleshoot common problems, including setup issues, Exchange ActiveSync errors.
|
||||||
keywords: ["Troubleshoot common problems", "setup issues", "Exchange ActiveSync errors"]
|
keywords: ["Troubleshoot common problems", "setup issues", "Exchange ActiveSync errors"]
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: support
|
ms.mktglfcycl: support
|
||||||
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub
|
ms.pagetype: surfacehub
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
77
devices/surface-hub/whiteboard-collaboration.md
Normal file
77
devices/surface-hub/whiteboard-collaboration.md
Normal file
@ -0,0 +1,77 @@
|
|||||||
|
---
|
||||||
|
title: Set up and use Whiteboard to Whiteboard collaboration
|
||||||
|
description: Microsoft Whiteboard’s latest update includes the capability for two Surface Hubs to collaborate in real time on the same board.
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: surfacehub
|
||||||
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
|
localizationpriority: medium
|
||||||
|
---
|
||||||
|
|
||||||
|
# Set up and use Whiteboard to Whiteboard collaboration (Surface Hub)
|
||||||
|
|
||||||
|
Microsoft Whiteboard’s latest update (17.8302.5275X or greater) includes the capability for two Surface Hubs to collaborate in real time on the same board.
|
||||||
|
|
||||||
|
By ensuring that your organization meets the prerequisites, users can then ink, collaborate, and ideate together. Mobile device management (MDM) allows you to control default settings and provides access to these capabilities. For more information about mobile device management for Surface Hub, see [Manage settings with an MDM provider (Surface Hub)](manage-settings-with-mdm-for-surface-hub.md).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Prerequisites for Whiteboard to Whiteboard collaboration
|
||||||
|
|
||||||
|
To get Whiteboard to Whiteboard collaboration up and running, you’ll need to make sure your organization meets the following requirements:
|
||||||
|
|
||||||
|
- Office 365 with cloud-based Azure Active Directory (Azure AD) for all users
|
||||||
|
- OneDrive for Business deployed for all users who intend to collaborate
|
||||||
|
- Currently not utilizing Office 365 Germany or Office 365 operated by 21Vianet
|
||||||
|
- Surface Hub needs to be updated to Windows 10, version 1607 or newer
|
||||||
|
- Port 443 needs to be open since Whiteboard makes standard https requests
|
||||||
|
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Collaborative sessions can only take place between users within the same tenant, so users outside of your organization won’t be able to join even if they have a Surface Hub.
|
||||||
|
|
||||||
|
## Using Whiteboard to Whiteboard collaboration
|
||||||
|
|
||||||
|
To start a collaboration session:
|
||||||
|
|
||||||
|
1. In the Whiteboard app, tap the **Sign in** button.
|
||||||
|
2. Sign in with your organization ID.
|
||||||
|
3. Tap the **Invite** button next to your name at the top of the app.
|
||||||
|
4. Tap **Start session**. Whiteboard will generate a link that you can share.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Copy and paste this link into a Skype chat with another Surface Hub
|
||||||
|
|
||||||
|
When the other Surface Hub receives the link, the recipient can tap on the link, sign in to Whiteboard, and then begin collaborating. You can copy and paste other content, use smart ink features like Ink to Shape, and co-author together.
|
||||||
|
|
||||||
|
After you’re done, you can export a copy of the Whiteboard collaboration for yourself through the Share charm and leave the board for others to continue working.
|
||||||
|
|
||||||
|
## How to control and manage Whiteboard to Whiteboard collaboration
|
||||||
|
|
||||||
|
Whiteboard has settings that can be managed via MDM. These allow you to disable or enable collaboration functionality in case your organization can’t meet the prerequisites or you’d rather not have your organization use this feature.
|
||||||
|
|
||||||
|
The value for each setting can be True or False. The default value for each setting is False.
|
||||||
|
|
||||||
|
The OMA URI for each setting consists of `./User/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/Microsoft.Office.Whiteboard_8wekyb3d8bbwe/AppSettingPolicy/` and the string from the OMA URI column in the table. For example, the full OMA URI for **Enable sign-in** is `./User/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/AppStore/Microsoft.Office.Whiteboard_8wekyb3d8bbwe/AppSettingPolicy/EnableSignIn`.
|
||||||
|
|
||||||
|
| Setting | Details | OMA URI | Supported with<br>Intune? | Supported with<br>Configuration Manager? | Supported with<br>SyncML*? |
|
||||||
|
| --- | ---- | --- |---- | --- | --- |
|
||||||
|
| Enable sign-in | Users can sign in and authenticate | EnableSignIn | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Disable sign-in | Users are unable to sign in and access collaboration or education features | DisableSignIn | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
| Disable Collaboration | Users can sign in but not create or join collaborative sessions | DisableCollaboration | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
|
\*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.
|
||||||
|
|
||||||
|
Whiteboard also has other MDM settings that can be managed and set for defaults, exporting, and sharing. You can see these additional settings in [Manage settings with an MDM provider (Surface Hub)](manage-settings-with-mdm-for-surface-hub.md#whiteboard-collaboration-settings).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
|
||||||
|
- [Windows 10 Creators Update for Surface Hub](https://www.microsoft.com/surface/support/surface-hub/windows-10-creators-update-surface-hub)
|
||||||
|
- [Support documentation for Microsoft Whiteboard](https://support.office.com/en-us/article/Whiteboard-Help-0c0f2aa0-b1bb-491c-b814-fd22de4d7c01)
|
@ -8,6 +8,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: surfacehub, networking
|
ms.pagetype: surfacehub, networking
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.date: 06/19/2017
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,2 +1,3 @@
|
|||||||
# [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md)
|
# [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md)
|
||||||
|
# [Change history for Microsoft Education get started](change-history-ms-edu-get-started.md)
|
||||||
|
|
||||||
|
27
education/get-started/change-history-ms-edu-get-started.md
Normal file
27
education/get-started/change-history-ms-edu-get-started.md
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
---
|
||||||
|
title: Change history for Microsoft Education Get started
|
||||||
|
description: New and changed topics in the Microsoft Education get started guide.
|
||||||
|
keywords: Microsoft Education get started guide, IT admin, IT pro, school, education, change history
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: edu
|
||||||
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
|
---
|
||||||
|
|
||||||
|
# Change history for Microsoft Education Get started
|
||||||
|
|
||||||
|
This topic lists the changes in the Microsoft Education IT admin get started.
|
||||||
|
|
||||||
|
## June 2017
|
||||||
|
|
||||||
|
| New or changed topic | Description |
|
||||||
|
| --- | ---- |
|
||||||
|
| [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) | Includes the following updates:</br></br> - New configuration guidance for IT administrators to deploy Microsoft Teams.</br> - Updated steps for School Data Sync to show the latest workflow and user experience. |
|
||||||
|
|
||||||
|
## May 2017
|
||||||
|
|
||||||
|
| New or changed topic | Description |
|
||||||
|
| --- | ---- |
|
||||||
|
| [Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) | New. Learn how to use the new Microsoft Education system to set up a cloud infrastructure for your school, acquire devices and apps, and configure and deploy policies to your Windows 10 devices. |
|
@ -27,7 +27,7 @@ author: CelesteDG
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="http://aka.ms/getstartedwithmicrosofteducation">
|
<a href="https://docs.microsoft.com/education/get-started/get-started-with-microsoft-education">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -50,13 +50,13 @@ author: CelesteDG
|
|||||||
<h1>Microsoft Education documentation and resources</h1>
|
<h1>Microsoft Education documentation and resources</h1>
|
||||||
<ul class="pivots">
|
<ul class="pivots">
|
||||||
<li>
|
<li>
|
||||||
<a href="#itpro">IT Pro</a>
|
<a href="#itpro">IT Admins</a>
|
||||||
<ul id="itpro">
|
<ul id="itpro">
|
||||||
<li>
|
<li>
|
||||||
<a href="#itpro-all"></a>
|
<a href="#itpro-all"></a>
|
||||||
<ul id="itpro-all" class="cardsC">
|
<ul id="itpro-all" class="cardsC">
|
||||||
<li>
|
<li>
|
||||||
<a href="https://aka.ms/getstartedwithmicrosofteducation">
|
<a href="https://docs.microsoft.com/education/get-started/get-started-with-microsoft-education">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -132,7 +132,7 @@ author: CelesteDG
|
|||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="http://aka.ms/sdsoverview">
|
<a href="https://support.office.com/article/Overview-of-School-Data-Sync-f3d1147b-4ade-4905-8518-508e729f2e91">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
<div class="cardPadding">
|
<div class="cardPadding">
|
||||||
<div class="card">
|
<div class="card">
|
||||||
@ -226,6 +226,25 @@ author: CelesteDG
|
|||||||
</div>
|
</div>
|
||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
|
<li>
|
||||||
|
<a href="https://onedrive.live.com/view.aspx?resid=91F4E618548FC604!2261&ithint=file%2cdocx&app=Word&authkey=!AOgLvpbaerOOfwM">
|
||||||
|
<div class="cardSize">
|
||||||
|
<div class="cardPadding">
|
||||||
|
<div class="card">
|
||||||
|
<div class="cardImageOuter">
|
||||||
|
<div class="cardImage bgdAccent1">
|
||||||
|
<img src="/media/hubs/education/education-ms-teams.svg" alt="Meet Microsoft Teams" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div class="cardText">
|
||||||
|
<h3>Microsoft Teams</h3>
|
||||||
|
<p>Make the most of Microsoft Teams and find out how to deploy, launch pilot teams, and launch Teams to the rest of your institution.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
</li>
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
@ -350,6 +369,25 @@ author: CelesteDG
|
|||||||
</div>
|
</div>
|
||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
|
<li>
|
||||||
|
<a href="https://education.microsoft.com/courses-and-resources/resources/meet-microsoft-teams">
|
||||||
|
<div class="cardSize">
|
||||||
|
<div class="cardPadding">
|
||||||
|
<div class="card">
|
||||||
|
<div class="cardImageOuter">
|
||||||
|
<div class="cardImage bgdAccent1">
|
||||||
|
<img src="/media/hubs/education/education-ms-teams.svg" alt="Meet Microsoft Teams" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div class="cardText">
|
||||||
|
<h3>Microsoft Teams</h3>
|
||||||
|
<p>Learn how the new classroom experiences in Microsoft Teams can help you manage your daily workflow more easily than ever before.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="/education/windows/use-set-up-school-pcs-app">
|
<a href="/education/windows/use-set-up-school-pcs-app">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
|
@ -7,17 +7,27 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Change history for Windows 10 for Education
|
# Change history for Windows 10 for Education
|
||||||
|
|
||||||
This topic lists new and updated topics in the [Windows 10 for Education](index.md) documentation.
|
This topic lists new and updated topics in the [Windows 10 for Education](index.md) documentation.
|
||||||
|
|
||||||
|
## June 2017
|
||||||
|
|
||||||
|
| New or changed topic | Description |
|
||||||
|
| --- | ---- |
|
||||||
|
| [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md) | Includes the following updates:</br></br> - New configuration guidance for IT administrators to enable students and school personnel, who use assistive technology apps not available in the Microsoft Store for Education and use devices running Windows 10 S, to be successful in the classroom and in their jobs.</br> - New configuration information when using Windows 10 S for education. |
|
||||||
|
| [Deployment recommendations for school IT administrators](edu-deployment-recommendations.md) | New configuration guidance for IT administrators to enable students and school personnel, who use assistive technology apps not available in the Microsoft Store for Education and use devices running Windows 10 S, to be successful in the classroom and in their jobs. |
|
||||||
|
| [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Updated the recommended apps section to include information about Office 365 for Windows 10 S (Education Preview). |
|
||||||
|
|
||||||
## May 2017
|
## May 2017
|
||||||
|
|
||||||
| New or changed topic | Description |
|
| New or changed topic | Description |
|
||||||
| --- | ---- |
|
| --- | ---- |
|
||||||
| [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](switch-to-pro-education.md) | New. If you have an education tenant and use devices Windows 10 Pro or Windows 10 S in your schools, find out how you can opt-in to a free switch to Windows 10 Pro Education. |
|
| [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](switch-to-pro-education.md) | New. If you have an education tenant and use devices Windows 10 Pro or Windows 10 S in your schools, find out how you can opt-in to a free switch to Windows 10 Pro Education. |
|
||||||
|
| [Use the Set up School PCs app ](use-set-up-school-pcs-app.md) | Updated. Now includes network tips and updated step-by-step instructions that show the latest updates to the app such as Wi-Fi setup. |
|
||||||
|
|
||||||
## RELEASE: Windows 10, version 1703 (Creators Update)
|
## RELEASE: Windows 10, version 1703 (Creators Update)
|
||||||
|
|
||||||
|
@ -9,6 +9,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu, devices
|
ms.pagetype: edu, devices
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: craigash
|
author: craigash
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Chromebook migration guide
|
# Chromebook migration guide
|
||||||
|
@ -1,11 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 configuration recommendations for education customers
|
title: Windows 10 configuration recommendations for education customers
|
||||||
description: Provides guidance on ways to configure the OS diagnostic data, consumer experiences, Cortana, search, as well as some of the preinstalled apps, so that Windows is ready for your school.
|
description: Provides guidance on ways to configure the OS diagnostic data, consumer experiences, Cortana, search, as well as some of the preinstalled apps, so that Windows is ready for your school.
|
||||||
keywords: Windows 10 deployment, recommendations, privacy settings, school, education, configurations
|
keywords: Windows 10 deployment, recommendations, privacy settings, school, education, configurations, accessibility, assistive technology
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows 10 configuration recommendations for education customers
|
# Windows 10 configuration recommendations for education customers
|
||||||
@ -14,18 +15,20 @@ author: CelesteDG
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
|
|
||||||
Privacy is important to us, we want to provide you with ways to customize the OS diagnostic data, consumer experiences, Cortana, search, as well as some of the preinstalled apps, for usage with [education editions of Windows 10](windows-editions-for-education-customers.md) in education environments. To learn more about Microsoft’s commitment to privacy, see [Windows 10 and privacy](https://go.microsoft.com/fwlink/?LinkId=809305).
|
Privacy is important to us, we want to provide you with ways to customize the OS diagnostic data, consumer experiences, Cortana, search, as well as some of the preinstalled apps, for usage with [education editions of Windows 10](windows-editions-for-education-customers.md) in education environments. These features work on all Windows 10 editions, but education editions of Windows 10 have the settings preconfigured. See the following table for more information. To learn more about Microsoft's commitment to privacy, see [Windows 10 and privacy](https://go.microsoft.com/fwlink/?LinkId=809305).
|
||||||
|
|
||||||
|
We want all students to have the chance to use the apps they need for success in the classroom and all school personnel to have apps they need for their job. Students and school personnel who use assistive technology apps not available in the Microsoft Store for Education, and use devices running Windows 10 S, will be able to configure the device at no additional charge to Windows 10 Pro Education. To learn more about the steps to configure this, see [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](switch-to-pro-education.md).
|
||||||
|
|
||||||
In Windows 10, version 1703 (Creators Update), it is straightforward to configure Windows to be education ready.
|
In Windows 10, version 1703 (Creators Update), it is straightforward to configure Windows to be education ready.
|
||||||
|
|
||||||
| Area | How to configure | What this does | Notes |
|
| Area | How to configure | What this does | Windows 10 Education | Windows 10 Pro Education | Windows 10 S |
|
||||||
| --- | --- | --- | --- |
|
| --- | --- | --- | --- | --- | --- |
|
||||||
| **Diagnostic Data** | **SetEduPolicies** | Sets Diagnostic Data to [Basic](https://technet.microsoft.com/itpro/windows/configure/configure-windows-telemetry-in-your-organization) | On Windows 10 Education or Windows 10 Pro Education, this is already set |
|
| **Diagnostic Data** | **SetEduPolicies** | Sets Diagnostic Data to [Basic](https://technet.microsoft.com/itpro/windows/configure/configure-windows-telemetry-in-your-organization) | This is already set | This is already set | The policy must be set |
|
||||||
| **Microsoft consumer experiences** | **SetEduPolicies** | Disables suggested content from Windows such as app recommendations | On Windows 10 Education or Windows 10 Pro Education, this is already set |
|
| **Microsoft consumer experiences** | **SetEduPolicies** | Disables suggested content from Windows such as app recommendations | This is already set | This is already set | The policy must be set |
|
||||||
| **Cortana** | **AllowCortana** | Disables Cortana | * Cortana is enabled by default on all editions in Windows 10, version 1703</br></br> * If using Windows 10 Pro Education or Windows 10 Education, upgrading from Windows 10, version 1607 to Windows 10, version 1703 will enable Cortana. You can use the **AllowCortana** policy to turn it off. |
|
| **Cortana** | **AllowCortana** | Disables Cortana </br></br> * Cortana is enabled by default on all editions in Windows 10, version 1703 | If using Windows 10 Education, upgrading from Windows 10, version 1607 to Windows 10, version 1703 will enable Cortana. </br></br> See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. | If using Windows 10 Pro Education, upgrading from Windows 10, version 1607 to Windows 10, version 1703 will enable Cortana. </br></br> See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. | See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. |
|
||||||
| **Safe search** | **SetEduPolicies** | Locks Bing safe search to Strict in Microsoft Edge | On Windows 10 Education or Windows 10 Pro Education, this is already set |
|
| **Safe search** | **SetEduPolicies** | Locks Bing safe search to Strict in Microsoft Edge | This is already set | This is already set | The policy must be set |
|
||||||
| **Bing search advertising** | Ad free search with Bing | Disables ads when searching the internet with Bing in Microsoft Edge | Depending on your specific requirements, there are different ways to configure this as detailed in [Ad-free search with Bing](#ad-free-search-with-bing) |
|
| **Bing search advertising** | Ad free search with Bing | Disables ads when searching the internet with Bing in Microsoft Edge | Depending on your specific requirements, there are different ways to configure this as detailed in [Ad-free search with Bing](#ad-free-search-with-bing) | Depending on your specific requirements, there are different ways to configure this as detailed in [Ad-free search with Bing](#ad-free-search-with-bing) | Depending on your specific requirements, there are different ways to configure this as detailed in [Ad-free search with Bing](#ad-free-search-with-bing) |
|
||||||
| **Apps** | **SetEduPolicies** | Preinstalled apps like Microsoft Edge, Movies & TV, Groove, and Skype become education ready | * Any app can detect Windows is running in an education ready configuration through [IsEducationEnvironment](https://docs.microsoft.com/en-us/uwp/api/windows.system.profile.educationsettings)</br></br> * On Windows 10 Education or Windows 10 Pro Education, this is already set |
|
| **Apps** | **SetEduPolicies** | Preinstalled apps like Microsoft Edge, Movies & TV, Groove, and Skype become education ready </br></br> * Any app can detect Windows is running in an education ready configuration through [IsEducationEnvironment](https://docs.microsoft.com/en-us/uwp/api/windows.system.profile.educationsettings) | This is already set | This is already set | The policy must be set |
|
||||||
|
|
||||||
|
|
||||||
## Recommended configuration
|
## Recommended configuration
|
||||||
@ -39,7 +42,7 @@ It is easy to be education ready when using Microsoft products. We recommend the
|
|||||||
|
|
||||||
You can [sign up to learn more about Intune for Education](https://info.microsoft.com/US-WNDWS-CNTNT-FY17-01Jan-17-IntuneforEducationlandingpageandnurture292531_01Registration-ForminBody.html).
|
You can [sign up to learn more about Intune for Education](https://info.microsoft.com/US-WNDWS-CNTNT-FY17-01Jan-17-IntuneforEducationlandingpageandnurture292531_01Registration-ForminBody.html).
|
||||||
|
|
||||||
3. On PCs running Windows 10, version 1703 (Windows 10 Pro Education or Windows 10 Education):
|
3. On PCs running Windows 10, version 1703:
|
||||||
1. Provision the PC using one of these methods:
|
1. Provision the PC using one of these methods:
|
||||||
* [Provision PCs with the Set up School PCs app](use-set-up-school-pcs-app.md) - This will automatically set both **SetEduPolicies** to True and **AllowCortana** to False.
|
* [Provision PCs with the Set up School PCs app](use-set-up-school-pcs-app.md) - This will automatically set both **SetEduPolicies** to True and **AllowCortana** to False.
|
||||||
* [Provision PCs with a custom package created with Windows Configuration Designer](https://technet.microsoft.com/en-us/itpro/windows/configure/provisioning-create-package) - Make sure to set both **SetEduPolicies** to True and **AllowCortana** to False.
|
* [Provision PCs with a custom package created with Windows Configuration Designer](https://technet.microsoft.com/en-us/itpro/windows/configure/provisioning-create-package) - Make sure to set both **SetEduPolicies** to True and **AllowCortana** to False.
|
||||||
@ -48,6 +51,8 @@ It is easy to be education ready when using Microsoft products. We recommend the
|
|||||||
* Manually Azure AD join the PC during the Windows device setup experience.
|
* Manually Azure AD join the PC during the Windows device setup experience.
|
||||||
3. Enroll the PCs in MDM.
|
3. Enroll the PCs in MDM.
|
||||||
* If you have activated Intune for Education in your Azure AD tenant, enrollment will happen automatically when the PC is joined to Azure AD. Intune for Education will automatically set **SetEduPolicies** to True and **AllowCortana** to False.
|
* If you have activated Intune for Education in your Azure AD tenant, enrollment will happen automatically when the PC is joined to Azure AD. Intune for Education will automatically set **SetEduPolicies** to True and **AllowCortana** to False.
|
||||||
|
4. Ensure that needed assistive technology apps can be used.
|
||||||
|
* If you have students or school personnel who rely on assistive technology apps that are not available in the Microsoft Store for Education, and who are using a Windows 10 S device, configure their device to Windows 10 Pro Education to allow the download and use of non-Microsoft Store assistive technology apps. See [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](switch-to-pro-education.md) for more info.
|
||||||
|
|
||||||
4. Distribute the PCs to students.
|
4. Distribute the PCs to students.
|
||||||
|
|
||||||
@ -69,6 +74,9 @@ You can set all the education compliance areas through both provisioning and man
|
|||||||
## AllowCortana
|
## AllowCortana
|
||||||
**AllowCortana** is a policy that enables or disables Cortana. It is a policy node in the Policy configuration service provider, [AllowCortana](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowcortana).
|
**AllowCortana** is a policy that enables or disables Cortana. It is a policy node in the Policy configuration service provider, [AllowCortana](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowcortana).
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> See the [Recommended configuration](#recommended-configuration) section for recommended Cortana settings.
|
||||||
|
|
||||||
Use one of these methods to set this policy.
|
Use one of these methods to set this policy.
|
||||||
|
|
||||||
### MDM
|
### MDM
|
||||||
|
@ -7,6 +7,7 @@ ms.mktglfcycl: plan
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
redirect_url: https://support.microsoft.com/help/4000711/windows-10-create-tests-using-microsoft-forms
|
redirect_url: https://support.microsoft.com/help/4000711/windows-10-create-tests-using-microsoft-forms
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -8,6 +8,7 @@ ms.pagetype: edu
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: craigash
|
author: craigash
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy Windows 10 in a school district
|
# Deploy Windows 10 in a school district
|
||||||
|
@ -8,6 +8,7 @@ ms.pagetype: edu
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: craigash
|
author: craigash
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy Windows 10 in a school
|
# Deploy Windows 10 in a school
|
||||||
|
@ -6,6 +6,7 @@ ms.mktglfcycl: plan
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
ms.prod: W10
|
ms.prod: W10
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -15,17 +16,17 @@ ms.prod: W10
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
|
|
||||||
Your privacy is important to us, so we want to provide you with ways to customize the OS privacy settings, as well as some of the apps, so that you can choose what information is shared with Microsoft. To learn more about Microsoft’s commitment to privacy, see [Windows 10 and privacy](https://go.microsoft.com/fwlink/?LinkId=809305).
|
Your privacy is important to us, so we want to provide you with ways to customize the OS privacy settings, as well as some of the apps, so that you can choose what information is shared with Microsoft. To learn more about Microsoft’s commitment to privacy, see [Windows 10 and privacy](https://go.microsoft.com/fwlink/?LinkId=809305). The following sections provide some best practices and specific privacy settings we’d like you to be aware of. Also see [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md) for more information about ways to customize the OS diagnostic data, consumer experiences, Cortana, and search.
|
||||||
|
|
||||||
Here are some best practices and specific privacy settings we’d like you to be aware of. Also see [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md) for more information about ways to customize the OS diagnostic data, consumer experiences, Cortana, and search.
|
We want all students to have the chance to use the apps they need for success in the classroom and all school personnel to have apps they need for their job. Students and school personnel who use assistive technology apps not available in the Microsoft Store for Education, and use devices running Windows 10 S, will be able to configure the device at no additional charge to Windows 10 Pro Education. To learn more about the steps to configure this, see [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](switch-to-pro-education.md).
|
||||||
|
|
||||||
## Deployment best practices
|
## Deployment best practices
|
||||||
|
|
||||||
Keep these best practices in mind when deploying any edition of Windows 10 in schools or districts:
|
Keep these best practices in mind when deploying any edition of Windows 10 in schools or districts:
|
||||||
* A Microsoft account is only intended for consumer services. Enterprises and educational institutions should use enterprise versions where possible, such as Skype for Business, OneDrive for Business, and so on. For schools, consider using mobile device management (MDM) or Group Policy to block students from adding a Microsoft account as a secondary account.
|
* A Microsoft account is only intended for consumer services. Enterprises and educational institutions should use enterprise versions where possible, such as Skype for Business, OneDrive for Business, and so on. For schools, consider using mobile device management (MDM) or Group Policy to block students from adding a Microsoft account as a secondary account.
|
||||||
|
|
||||||
* If schools allow the use of personal accounts by their students to access personal services, schools should be aware that these accounts belong to individuals, not the school.
|
* If schools allow the use of personal accounts by their students to access personal services, schools should be aware that these accounts belong to individuals, not the school.
|
||||||
* IT administrators, school officials, and teachers should also consider ratings when picking apps from the Windows Store.
|
* IT administrators, school officials, and teachers should also consider ratings when picking apps from the Windows Store.
|
||||||
|
* If you have students or school personnel who rely on assistive technology apps that are not available in the Microsoft Store for Education, and who are using a Windows 10 S device, configure their device to Windows 10 Pro Education to allow the download and use of non-Microsoft Store assistive technology apps. See [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](switch-to-pro-education.md) for more info.
|
||||||
|
|
||||||
## Windows 10 Contacts privacy settings
|
## Windows 10 Contacts privacy settings
|
||||||
|
|
||||||
|
@ -7,6 +7,7 @@ ms.mktglfcycl: plan
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: trudyha
|
author: trudyha
|
||||||
|
ms.author: trudyha
|
||||||
---
|
---
|
||||||
|
|
||||||
# Working with Microsoft Store for Education
|
# Working with Microsoft Store for Education
|
||||||
|
@ -7,6 +7,7 @@ ms.mktglfcycl: plan
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: trudyha
|
author: trudyha
|
||||||
|
ms.author: trudyha
|
||||||
---
|
---
|
||||||
|
|
||||||
# Get Minecraft: Education Edition
|
# Get Minecraft: Education Edition
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows 10 for Education
|
# Windows 10 for Education
|
||||||
|
@ -7,6 +7,7 @@ ms.mktglfcycl: plan
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: trudyha
|
author: trudyha
|
||||||
|
ms.author: trudyha
|
||||||
---
|
---
|
||||||
|
|
||||||
# For IT administrators - get Minecraft: Education Edition
|
# For IT administrators - get Minecraft: Education Edition
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Technical reference for the Set up School PCs app
|
# Technical reference for the Set up School PCs app
|
||||||
|
@ -7,6 +7,7 @@ ms.mktglfcycl: plan
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Set up student PCs to join domain
|
# Set up student PCs to join domain
|
||||||
|
@ -7,6 +7,7 @@ ms.mktglfcycl: plan
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Provision student PCs with apps
|
# Provision student PCs with apps
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Set up Windows devices for education
|
# Set up Windows devices for education
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S
|
# Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S
|
||||||
@ -41,30 +42,32 @@ There are two ways to switch from Windows 10 S to Windows 10 Pro Education, outl
|
|||||||
|
|
||||||
1. **Bulk switch through Microsoft Store for Education**
|
1. **Bulk switch through Microsoft Store for Education**
|
||||||
|
|
||||||
In this scenario, the global admin for the Azure AD education tenant can use Microsoft Store to switch all Windows 10 S devices on the tenant to Windows 10 Pro Education. See [Switch using Microsoft Store for Education](#switch-using-microsoft-store-for-education) for details on how to do this.
|
In this scenario, the global admin for the Azure AD education tenant can use Microsoft Store to switch all Windows 10 S devices on the tenant to Windows 10 Pro Education.
|
||||||
|
|
||||||
|
See [Switch using Microsoft Store for Education](#switch-using-microsoft-store-for-education) for details on how to do this.
|
||||||
|
|
||||||
2. **Asynchronous switch**
|
2. **Asynchronous switch**
|
||||||
|
|
||||||
In this scenario, the global admin must acquire the necessary keys and then select a method for key distribution.
|
In this scenario, the global admin must acquire the necessary keys and then select a method for key distribution.
|
||||||
|
|
||||||
**Key acquisition options:**
|
**Key acquisition options:**
|
||||||
|
- **Volume Licensing customers** - For schools with active Microsoft Volume Licensing agreements, global admins can obtain free MAK keys for Windows 10 Pro Education.
|
||||||
- Volume Licensing customers - For schools with active Microsoft Volume Licensing agreements, global admins can obtain free MAK keys for Windows 10 Pro Education.
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Windows 10 S is a Qualified OS (QOS) for Academic Volume Licensing only.
|
> Windows 10 S is a Qualified OS (QOS) for Academic Volume Licensing only.
|
||||||
|
|
||||||
- Non-Volume Licensing customers - For schools without an active Microsoft Volume Licensing agreement, the global admin can contact CSS, fill out a form and provide a proof of purchase to receive MAK keys for Windows 10 Pro Education.
|
- **Non-Volume Licensing customers** - For schools without an active Microsoft Volume Licensing agreement, the global admin can contact CSS, fill out a form and provide a proof of purchase to receive MAK keys for Windows 10 Pro Education.
|
||||||
|
|
||||||
**Key distribution options:**
|
**Key distribution options:**
|
||||||
|
|
||||||
- Bulk key distribution - You can apply MAK keys to switch the operating system on select devices or groups of devices using one of these methods:
|
You can find step-by-step info on how to use each of the options described here in [Switch options from Windows 10 S to Windows 10 Pro Education](#switch-options-from-windows-10-s-to-windows-10-pro-education).
|
||||||
|
|
||||||
|
- **Bulk key distribution** - You can apply MAK keys to switch the operating system on select devices or groups of devices using one of these methods:
|
||||||
- Use Microsoft Intune for Education. See [Switch using Intune for Education](#switch-using-intune-for-education) for details on how to do this.
|
- Use Microsoft Intune for Education. See [Switch using Intune for Education](#switch-using-intune-for-education) for details on how to do this.
|
||||||
- Use Windows Configuration Designer to create a provisioning package that will provision the switch on the device(s). See [Switch using Windows Configuration Designer](#switch-using-windows-configuration-designer) for details on how to do this.
|
- Use Windows Configuration Designer to create a provisioning package that will provision the switch on the device(s). See [Switch using Windows Configuration Designer](#switch-using-windows-configuration-designer) for details on how to do this.
|
||||||
- Use the mobile device management (MDM) policy, **UpgradeEditionWithProductKey**. See [Switch using MDM](#switch-using-mdm) for details on how to do this.
|
- Use the mobile device management (MDM) policy, **UpgradeEditionWithProductKey**. See [Switch using MDM](#switch-using-mdm) for details on how to do this.
|
||||||
- Use scripting. See [Switch using scripting](#switch-using-scripting) for details on how to do this.
|
- Use scripting. See [Switch using scripting](#switch-using-scripting) for details on how to do this.
|
||||||
|
- **Manual key entry** - You can also manually apply the MAK key using one of these methods:
|
||||||
- Manual key entry - You can also manually apply the MAK key using one of these methods:
|
|
||||||
- Enter the MAK key in the Windows **Settings > Activation** page. See [Switch using the Activation page](#switch-using-the-activation-page) for details on how to do this.
|
- Enter the MAK key in the Windows **Settings > Activation** page. See [Switch using the Activation page](#switch-using-the-activation-page) for details on how to do this.
|
||||||
- Install with a media and key through Windows setup. We don't recommend this option due to the potential for multi-reboot requirements.
|
- Install with a media and key through Windows setup. We don't recommend this option due to the potential for multi-reboot requirements.
|
||||||
|
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Take a Test app technical reference
|
# Take a Test app technical reference
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Set up Take a Test on multiple PCs
|
# Set up Take a Test on multiple PCs
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Set up Take a Test on a single PC
|
# Set up Take a Test on a single PC
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Take tests in Windows 10
|
# Take tests in Windows 10
|
||||||
|
@ -7,6 +7,7 @@ ms.mktglfcycl: plan
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: trudyha
|
author: trudyha
|
||||||
|
ms.author: trudyha
|
||||||
---
|
---
|
||||||
|
|
||||||
# For teachers - get Minecraft: Education Edition
|
# For teachers - get Minecraft: Education Edition
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Use the Set up School PCs app
|
# Use the Set up School PCs app
|
||||||
|
@ -8,6 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: edu
|
ms.pagetype: edu
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
|
ms.author: celested
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows 10 editions for education customers
|
# Windows 10 editions for education customers
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 16 KiB After Width: | Height: | Size: 20 KiB |
@ -1237,6 +1237,22 @@ Also Added [Firewall DDF file](firewall-ddf-file.md).</td></tr>
|
|||||||
<li>Power/HibernateTimeoutPluggedIn</li>
|
<li>Power/HibernateTimeoutPluggedIn</li>
|
||||||
<li>Power/StandbyTimeoutOnBattery</li>
|
<li>Power/StandbyTimeoutOnBattery</li>
|
||||||
<li>Power/StandbyTimeoutPluggedIn</li>
|
<li>Power/StandbyTimeoutPluggedIn</li>
|
||||||
|
<li>Update/ScheduledInstallEveryWeek</li>
|
||||||
|
<li>Update/ScheduledInstallFirstWeek</li>
|
||||||
|
<li>Update/ScheduledInstallFourthWeek</li>
|
||||||
|
<li>Update/ScheduledInstallSecondWeek</li>
|
||||||
|
<li>Update/ScheduledInstallThirdWeek</li>
|
||||||
|
<li>DeviceGuard/EnableVirtualizationBasedSecurity</li>
|
||||||
|
<li>DeviceGuard/RequirePlatformSecurityFeatures</li>
|
||||||
|
<li>DeviceGuard/LsaCfgFlags</li>
|
||||||
|
</ul>
|
||||||
|
</td></tr>
|
||||||
|
<tr class="odd">
|
||||||
|
<td style="vertical-align:top">[WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md)</td>
|
||||||
|
<td style="vertical-align:top">Updated the CSP in Windows 10, version 1709. Added the following settings:
|
||||||
|
<ul>
|
||||||
|
<li>DeviceTagging/Group</li>
|
||||||
|
<li>DeviceTagging/Criticality</li>
|
||||||
</ul>
|
</ul>
|
||||||
</td></tr>
|
</td></tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
|
@ -5732,6 +5732,120 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
|
|
||||||
|
<!--StartPolicy-->
|
||||||
|
<a href="" id="deviceguard-enablevirtualizationbasedsecurity"></a>**DeviceGuard/EnableVirtualizationBasedSecurity**
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>MobileEnterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--StartDescription-->
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">Added in the next major update to Windows 10. Turns On Virtualization Based Security(VBS) at the next reboot. Virtualization Based Security uses the Windows Hypervisor to provide support for security services. Value type is integer. Supported values:
|
||||||
|
<ul>
|
||||||
|
<li>0 (default) - disable Virtualization Based Security</li>
|
||||||
|
<li>1 - enable Virtualization Based Security</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
|
|
||||||
|
<!--StartPolicy-->
|
||||||
|
<a href="" id="deviceguard-requireplatformsecurityfeatures"></a>**DeviceGuard/RequirePlatformSecurityFeatures**
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>MobileEnterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--StartDescription-->Added in the next major update to Windows 10. Specifies the platform security level at the next reboot. Value type is integer. Supported values:
|
||||||
|
<ul>
|
||||||
|
<li>1 (default) - Turns on VBS with Secure Boot. </li>
|
||||||
|
<li>3 - Turns on VBS with Secure Boot and DMA. DMA requires hardware support.</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">
|
||||||
|
|
||||||
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
|
|
||||||
|
<!--StartPolicy-->
|
||||||
|
<a href="" id="deviceguard-lsacfgflags"></a>**DeviceGuard/LsaCfgFlags**
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>MobileEnterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--StartDescription-->
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">Added in the next major update to Windows 10. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer. Supported values:
|
||||||
|
<ul>
|
||||||
|
<li>0 (default) - (Disabled) Turns off Credential Guard remotely if configured previously without UEFI Lock</li>
|
||||||
|
<li>1 - (Enabled with UEFI lock) Turns on CredentialGuard with UEFI lock</li>
|
||||||
|
<li>2 - (Enabled without lock) Turns on CredentialGuard without UEFI lock</li>
|
||||||
|
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
|
|
||||||
<!--StartPolicy-->
|
<!--StartPolicy-->
|
||||||
<a href="" id="deviceinstallation-preventinstallationofmatchingdeviceids"></a>**DeviceInstallation/PreventInstallationOfMatchingDeviceIDs**
|
<a href="" id="deviceinstallation-preventinstallationofmatchingdeviceids"></a>**DeviceInstallation/PreventInstallationOfMatchingDeviceIDs**
|
||||||
|
|
||||||
@ -15301,7 +15415,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--EndSKU-->
|
<!--EndSKU-->
|
||||||
<!--StartDescription-->
|
<!--StartDescription-->
|
||||||
<p style="margin-left: 20px">Enabling this policy prevents indexing from continuing after less than the specified amount of hard drive space is left on the same drive as the index location. Select between 0 and 2147483647 MB.
|
<p style="margin-left: 20px">Enabling this policy prevents indexing from continuing after less than the specified amount of hard drive space is left on the same drive as the index location. Select between 0 and 1.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Enable this policy if computers in your environment have extremely limited hard drive space.
|
<p style="margin-left: 20px">Enable this policy if computers in your environment have extremely limited hard drive space.
|
||||||
|
|
||||||
@ -20060,7 +20174,7 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
|||||||
|
|
||||||
<p style="margin-left: 20px">Enables the IT admin to schedule the day of the update installation.
|
<p style="margin-left: 20px">Enables the IT admin to schedule the day of the update installation.
|
||||||
|
|
||||||
<p style="margin-left: 20px">The data type is a string.
|
<p style="margin-left: 20px">The data type is a integer.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add, Delete, Get, and Replace.
|
<p style="margin-left: 20px">Supported operations are Add, Delete, Get, and Replace.
|
||||||
|
|
||||||
@ -20075,6 +20189,181 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
|||||||
- 6 – Friday
|
- 6 – Friday
|
||||||
- 7 – Saturday
|
- 7 – Saturday
|
||||||
|
|
||||||
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
|
<!--StartPolicy-->
|
||||||
|
<a href="" id="update-scheduledinstalleveryweek"></a>**Update/ScheduledInstallEveryWeek**
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>MobileEnterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--StartDescription-->
|
||||||
|
<p style="margin-left: 20px">Added in Windows 10, the next major update. Enables the IT admin to schedule the update installation on the every week. Value type is integer. Supported values:
|
||||||
|
<ul>
|
||||||
|
<li>0 - no update in the schedule</li>
|
||||||
|
<li>1 - update is scheduled every week</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
|
<!--StartPolicy-->
|
||||||
|
<a href="" id="update-scheduledinstallfirstweek"></a>**Update/ScheduledInstallFirstWeek**
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>MobileEnterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--StartDescription-->
|
||||||
|
<p style="margin-left: 20px">Added in Windows 10, the next major update. Enables the IT admin to schedule the update installation on the first week of the month. Value type is integer. Supported values:
|
||||||
|
<ul>
|
||||||
|
<li>0 - no update in the schedule</li>
|
||||||
|
<li>1 - update is scheduled every first week of the month</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
|
<!--StartPolicy-->
|
||||||
|
<a href="" id="update-scheduledinstallfourthweek"></a>**Update/ScheduledInstallFourthWeek**
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>MobileEnterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--StartDescription-->
|
||||||
|
<p style="margin-left: 20px">Added in Windows 10, the next major update. Enables the IT admin to schedule the update installation on the fourth week of the month. Value type is integer. Supported values:
|
||||||
|
<ul>
|
||||||
|
<li>0 - no update in the schedule</li>
|
||||||
|
<li>1 - update is scheduled every fourth week of the month</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
|
<!--StartPolicy-->
|
||||||
|
<a href="" id="update-scheduledinstallsecondweek"></a>**Update/ScheduledInstallSecondWeek**
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>MobileEnterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--StartDescription-->
|
||||||
|
<p style="margin-left: 20px">Added in Windows 10, the next major update. Enables the IT admin to schedule the update installation on the second week of the month. Value type is integer. Supported values:
|
||||||
|
<ul>
|
||||||
|
<li>0 - no update in the schedule</li>
|
||||||
|
<li>1 - update is scheduled every second week of the month</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
|
<!--StartPolicy-->
|
||||||
|
<a href="" id="update-scheduledinstallthirdweek"></a>**Update/ScheduledInstallThirdWeek**
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>MobileEnterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--StartDescription-->
|
||||||
|
<p style="margin-left: 20px">Added in Windows 10, the next major update. Enables the IT admin to schedule the update installation on the third week of the month. Value type is integer. Supported values:
|
||||||
|
<ul>
|
||||||
|
<li>0 - no update in the schedule</li>
|
||||||
|
<li>1 - update is scheduled every third week of the month</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
<!--EndDescription-->
|
<!--EndDescription-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<!--StartPolicy-->
|
<!--StartPolicy-->
|
||||||
@ -20110,7 +20399,7 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
|||||||
|
|
||||||
<p style="margin-left: 20px">Enables the IT admin to schedule the time of the update installation.
|
<p style="margin-left: 20px">Enables the IT admin to schedule the time of the update installation.
|
||||||
|
|
||||||
<p style="margin-left: 20px">The data type is a string.
|
<p style="margin-left: 20px">The data type is a integer.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add, Delete, Get, and Replace.
|
<p style="margin-left: 20px">Supported operations are Add, Delete, Get, and Replace.
|
||||||
|
|
||||||
|
@ -91,6 +91,28 @@ The following list describes the characteristics and parameters.
|
|||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Get and Replace.
|
<p style="margin-left: 20px">Supported operations are Get and Replace.
|
||||||
|
|
||||||
|
<a href="" id="devicetagging"></a>**DeviceTagging**
|
||||||
|
<p style="margin-left: 20px">Added in Windows 10, version 1709. Represents Windows Defender Advanced Threat Protection configuration for managing role based access and device tagging.
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">Supported operations is Get.
|
||||||
|
|
||||||
|
<a href="" id="group"></a>**DeviceTagging/Group**
|
||||||
|
<p style="margin-left: 20px">Added in Windows 10, version 1709. Device group identifiers.
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">The data type is a string.
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">Supported operations are Get and Replace.
|
||||||
|
|
||||||
|
<a href="" id="criticality"></a>**DeviceTagging/Criticality**
|
||||||
|
<p style="margin-left: 20px">Added in Windows 10, version 1709. Asset criticality value. Supported values:
|
||||||
|
|
||||||
|
- 0 - Normal
|
||||||
|
- 1 - Critical
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">The data type is an integer.
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">Supported operations are Get and Replace.
|
||||||
|
|
||||||
## Examples
|
## Examples
|
||||||
|
|
||||||
|
|
||||||
@ -98,7 +120,7 @@ The following list describes the characteristics and parameters.
|
|||||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Get>
|
<Get>
|
||||||
<CmdID>11</CmdID>
|
<CmdID>111</CmdID>
|
||||||
<Item>
|
<Item>
|
||||||
<Target>
|
<Target>
|
||||||
<LocURI>
|
<LocURI>
|
||||||
@ -117,7 +139,7 @@ The following list describes the characteristics and parameters.
|
|||||||
</Target>
|
</Target>
|
||||||
</Item>
|
</Item>
|
||||||
</Get>
|
</Get>
|
||||||
<Get>
|
<Get>
|
||||||
<CmdID>2</CmdID>
|
<CmdID>2</CmdID>
|
||||||
<Item>
|
<Item>
|
||||||
<Target>
|
<Target>
|
||||||
@ -127,7 +149,7 @@ The following list describes the characteristics and parameters.
|
|||||||
</Target>
|
</Target>
|
||||||
</Item>
|
</Item>
|
||||||
</Get>
|
</Get>
|
||||||
<Get>
|
<Get>
|
||||||
<CmdID>3</CmdID>
|
<CmdID>3</CmdID>
|
||||||
<Item>
|
<Item>
|
||||||
<Target>
|
<Target>
|
||||||
@ -137,7 +159,7 @@ The following list describes the characteristics and parameters.
|
|||||||
</Target>
|
</Target>
|
||||||
</Item>
|
</Item>
|
||||||
</Get>
|
</Get>
|
||||||
<Get>
|
<Get>
|
||||||
<CmdID>4</CmdID>
|
<CmdID>4</CmdID>
|
||||||
<Item>
|
<Item>
|
||||||
<Target>
|
<Target>
|
||||||
@ -167,6 +189,26 @@ The following list describes the characteristics and parameters.
|
|||||||
</Target>
|
</Target>
|
||||||
</Item>
|
</Item>
|
||||||
</Get>
|
</Get>
|
||||||
|
<Get>
|
||||||
|
<CmdID>11</CmdID>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>
|
||||||
|
./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Group
|
||||||
|
</LocURI>
|
||||||
|
</Target>
|
||||||
|
</Item>
|
||||||
|
</Get>
|
||||||
|
<Get>
|
||||||
|
<CmdID>12</CmdID>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>
|
||||||
|
./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Criticality
|
||||||
|
</LocURI>
|
||||||
|
</Target>
|
||||||
|
</Item>
|
||||||
|
</Get>
|
||||||
<Get>
|
<Get>
|
||||||
<CmdID>99</CmdID>
|
<CmdID>99</CmdID>
|
||||||
<Item>
|
<Item>
|
||||||
|
@ -45,7 +45,7 @@ The XML below is the current version for this CSP.
|
|||||||
<Permanent />
|
<Permanent />
|
||||||
</Scope>
|
</Scope>
|
||||||
<DFType>
|
<DFType>
|
||||||
<MIME>com.microsoft/1.1/MDM/WindowsAdvancedThreatProtection</MIME>
|
<MIME>com.microsoft/1.2/MDM/WindowsAdvancedThreatProtection</MIME>
|
||||||
</DFType>
|
</DFType>
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
<Node>
|
<Node>
|
||||||
@ -267,6 +267,75 @@ The XML below is the current version for this CSP.
|
|||||||
</DFType>
|
</DFType>
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>DeviceTagging</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Represents Windows Defender Advanced Threat Protection configuration for managing role base access and device tagging</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<node />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFTitle>Device Tagging</DFTitle>
|
||||||
|
<DFType>
|
||||||
|
<DDFName></DDFName>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
<Node>
|
||||||
|
<NodeName>Group</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Device group identifiers</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<chr />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFTitle>Device Group Identifier</DFTitle>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>Criticality</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>0</DefaultValue>
|
||||||
|
<Description>Asset criticality value. 0 - Normal, 1 - Critical.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFTitle>Device Criticality</DFTitle>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
</MgmtTree>
|
</MgmtTree>
|
||||||
```
|
```
|
||||||
|
@ -98,7 +98,7 @@ In the CB servicing model, feature updates are available as soon as Microsoft re
|
|||||||
When Microsoft officially releases a feature update for Windows 10, that update is marked for CB, making it available to any PC not configured to defer feature updates so that those devices can immediately install it. Organizations that use Windows Server Update Services (WSUS), Microsoft System Center Configuration Manager, or Windows Update for Business, however, can defer CB feature updates to selective devices by withholding their approval and deployment. In this scenario, the content available for CB will be available but not necessarily immediately mandatory, depending on the policy of the management system. Only one CB build of Windows is supported at a time, so those clients not on the most current build will not receive quality updates (after a 60 day grace period) until the most current feature update has been installed. For more details about Windows 10 servicing tools, see [Servicing tools](#servicing-tools).
|
When Microsoft officially releases a feature update for Windows 10, that update is marked for CB, making it available to any PC not configured to defer feature updates so that those devices can immediately install it. Organizations that use Windows Server Update Services (WSUS), Microsoft System Center Configuration Manager, or Windows Update for Business, however, can defer CB feature updates to selective devices by withholding their approval and deployment. In this scenario, the content available for CB will be available but not necessarily immediately mandatory, depending on the policy of the management system. Only one CB build of Windows is supported at a time, so those clients not on the most current build will not receive quality updates (after a 60 day grace period) until the most current feature update has been installed. For more details about Windows 10 servicing tools, see [Servicing tools](#servicing-tools).
|
||||||
|
|
||||||
|
|
||||||
### Current Branch for Business
|
### Current Branch for Business
|
||||||
|
|
||||||
Organizations typically prefer to have a testing cycle before broadly deploying new features to business users. For Windows 10, most pilot testing will be done using the CB servicing branch. In contrast, the CBB servicing branch is typically used for broad deployment. Windows 10 clients in the CBB servicing branch receive the same build of Windows 10 as those in the CB servicing branch, just at a later time. CB releases are transitioned to CBB after about 4 months, indicating that Microsoft, independent software vendors (ISVs), partners, and customers believe that the release is ready for broad deployment. Therefore, CB and CBB have an inherent “staging” effect. Both of these branches have a purpose in the overall deployment process for an enterprise, providing another layer of testing capabilities in addition to the traditional phased deployment methods to specific groups of machines. Each feature update release will be supported and updated for 18 months from the time of its release.
|
Organizations typically prefer to have a testing cycle before broadly deploying new features to business users. For Windows 10, most pilot testing will be done using the CB servicing branch. In contrast, the CBB servicing branch is typically used for broad deployment. Windows 10 clients in the CBB servicing branch receive the same build of Windows 10 as those in the CB servicing branch, just at a later time. CB releases are transitioned to CBB after about 4 months, indicating that Microsoft, independent software vendors (ISVs), partners, and customers believe that the release is ready for broad deployment. Therefore, CB and CBB have an inherent “staging” effect. Both of these branches have a purpose in the overall deployment process for an enterprise, providing another layer of testing capabilities in addition to the traditional phased deployment methods to specific groups of machines. Each feature update release will be supported and updated for 18 months from the time of its release.
|
||||||
|
|
||||||
@ -120,7 +120,7 @@ Microsoft never publishes feature updates through Windows Update on devices that
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Windows 10 LTSB will support the currently released silicon at the time of release of the LTSB. As future silicon generations are released, support will be created through future Windows 10 LTSB releases that customers can deploy for those systems. For more information, see **Supporting the latest processor and chipsets on Windows** in [Lifecycle support policy FAQ - Windows Products](https://support.microsoft.com/help/18581/lifecycle-support-policy-faq-windows-products).
|
>Windows 10 LTSB will support the currently released silicon at the time of release of the LTSB. As future silicon generations are released, support will be created through future Windows 10 LTSB releases that customers can deploy for those systems. For more information, see **Supporting the latest processor and chipsets on Windows** in [Lifecycle support policy FAQ - Windows Products](https://support.microsoft.com/help/18581/lifecycle-support-policy-faq-windows-products).
|
||||||
|
|
||||||
LTSB is available only in the Windows 10 Enterprise LTSB edition. This build of Windows doesn’t contain many in-box applications, such as Microsoft Edge, Windows Store client, Cortana (limited search capabilities remain available), Microsoft Mail, Calendar, OneNote, Weather, News, Sports, Money, Photos, Camera, Music, and Clock. Therefore, it’s important to remember that Microsoft has positioned the LTSB model primarily for specialized devices.
|
LTSB is available only in the Windows 10 Enterprise LTSB edition. This build of Windows doesn’t contain many in-box applications, such as Microsoft Edge, Windows Store client, Cortana (limited search capabilities remain available), Microsoft Mail, Calendar, OneNote, Weather, News, Sports, Money, Photos, Camera, Music, and Clock. Therefore, it’s important to remember that Microsoft has positioned the LTSB model primarily for specialized devices. Since Windows Store client is not available in Windows 10 Enterprise LTSB, if you need to run a Windows Store app, you should not use Windows 10 LTSB on that device.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>If an organization has devices currently running Windows 10 Enterprise LTSB that it would like to change to the CB or CBB servicing branch, it can make the change without losing user data. Because LTSB is its own SKU, however, an upgrade is required from Windows 10 Enterprise LTSB to Windows 10 Enterprise, which supports CB and CBB.
|
>If an organization has devices currently running Windows 10 Enterprise LTSB that it would like to change to the CB or CBB servicing branch, it can make the change without losing user data. Because LTSB is its own SKU, however, an upgrade is required from Windows 10 Enterprise LTSB to Windows 10 Enterprise, which supports CB and CBB.
|
||||||
|
@ -12,7 +12,7 @@ author: brianlic-msft
|
|||||||
# Protecting cluster shared volumes and storage area networks with BitLocker
|
# Protecting cluster shared volumes and storage area networks with BitLocker
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows Server 2016
|
||||||
|
|
||||||
This topic for IT pros describes how to protect CSVs and SANs with BitLocker.
|
This topic for IT pros describes how to protect CSVs and SANs with BitLocker.
|
||||||
|
|
||||||
|
@ -20,7 +20,208 @@ For an overview of the process described in the following procedures, see [Deplo
|
|||||||
|
|
||||||
The process for creating a golden code integrity policy from a reference system is straightforward. This section outlines the process that is required to successfully create a code integrity policy with Windows PowerShell. First, for this example, you must initiate variables to be used during the creation process. Rather than using variables, you can simply use the full file paths in the command. Next, you create the code integrity policy by scanning the system for installed applications. When created, the policy file is converted to binary format so that Windows can consume its contents.
|
The process for creating a golden code integrity policy from a reference system is straightforward. This section outlines the process that is required to successfully create a code integrity policy with Windows PowerShell. First, for this example, you must initiate variables to be used during the creation process. Rather than using variables, you can simply use the full file paths in the command. Next, you create the code integrity policy by scanning the system for installed applications. When created, the policy file is converted to binary format so that Windows can consume its contents.
|
||||||
|
|
||||||
> **Note** Before you begin this procedure, ensure that the reference PC is clean of viruses or malware. Each piece of installed software should be validated as trustworthy before you create this policy. Also, be sure that any software that you would like to be scanned is installed on the system before you create the code integrity policy.
|
> [!Note]
|
||||||
|
> Before you begin this procedure, make sure that the reference PC is virus and malware-free,and that any software you want to be scanned is installed on the system before creating the code integrity policy.
|
||||||
|
|
||||||
|
### Scripting and applications
|
||||||
|
|
||||||
|
Each installed software application should be validated as trustworthy before you create a policy. We recommend that you review the reference PC for software that can load arbitrary DLLs and run code or scripts that could render the PC more vulnerable. Examples include software aimed at development or scripting such as msbuild.exe (part of Visual Studio and the .NET Framework) which can be removed if you do not want it to run scripts.
|
||||||
|
You can remove or disable such software on reference PCs used to create code integrity policies. You can also fine-tune your control by using Device Guard in combination with AppLocker, as described in [Device Guard with AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies#device-guard-with-applocker).
|
||||||
|
|
||||||
|
Members of the security community<sup>\*</sup> continuously collaborate with Microsoft® to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Device Guard code integrity policies.
|
||||||
|
|
||||||
|
Unless your use scenarios explicitly require them, Microsoft recommends that you block the following applications. These applications or files can be used by an attacker to circumvent Application Whitelisting policies, including Device Guard:
|
||||||
|
|
||||||
|
- bash.exe
|
||||||
|
- bginfo.exe
|
||||||
|
- cdb.exe
|
||||||
|
- csi.exe
|
||||||
|
- dnx.exe
|
||||||
|
- fsi.exe
|
||||||
|
- kd.exe
|
||||||
|
- lxssmanager.dll
|
||||||
|
- msbuild.exe<sup>[1]</sup>
|
||||||
|
- mshta.exe
|
||||||
|
- ntsd.exe
|
||||||
|
- rcsi.exe
|
||||||
|
- system.management.automation.dll
|
||||||
|
- windbg.exe
|
||||||
|
|
||||||
|
<sup>[1]</sup>If you are using your reference system in a development context and use msbuild.exe to build managed applications, we recommend that you whitelist msbuild.exe in your code integrity policies. However, if your reference system is an end user device that is not being used in a development context, we recommend that you block msbuild.exe.
|
||||||
|
|
||||||
|
<sup>*</sup>Microsoft recognizes the efforts of those in the security community who help us protect customers through responsible vulnerability disclosure, and extends thanks to the following people:
|
||||||
|
|
||||||
|
<br />
|
||||||
|
|
||||||
|
|Name|Twitter|
|
||||||
|
|---|---|
|
||||||
|
|Casey Smith |@subTee|
|
||||||
|
|Matt Graeber | @mattifestation|
|
||||||
|
|Matt Nelson | @enigma0x3|
|
||||||
|
|Oddvar Moe |@Oddvarmoe|
|
||||||
|
|
||||||
|
<br />
|
||||||
|
|
||||||
|
>[!Note]
|
||||||
|
>This application list is fluid and will be updated with the latest vendor information as application vulnerabilities are resolved and new issues are discovered.
|
||||||
|
|
||||||
|
Certain software applications may allow additional code to run by design. These types of applications should be blocked by your Device Guard policy. In addition, when an application version is upgraded to fix a security vulnerability or potential Device Guard bypass, you should add deny rules to your code integrity policies for that application’s previous, less secure versions.
|
||||||
|
|
||||||
|
Microsoft recommends that you install the latest security updates. The June 2017 Windows updates resolve several issues in in-box PowerShell modules that allowed an attacker to bypass Device Guard code integrity policies. These modules cannot be blocked by name or version, and therefore must be blocked by their corresponding hashes.
|
||||||
|
|
||||||
|
Microsoft recommends that you block the following Microsoft-signed applications and PowerShell files by merging the following policy into your existing policy to add these deny rules using the Merge-CIPolicy cmdlet:
|
||||||
|
|
||||||
|
```
|
||||||
|
<?xml version="1.0" encoding="utf-8"?>
|
||||||
|
<SiPolicy xmlns="urn:schemas-microsoft-com:sipolicy">
|
||||||
|
<VersionEx>10.0.0.0</VersionEx>
|
||||||
|
<PolicyTypeID>{A244370E-44C9-4C06-B551-F6016E563076}</PolicyTypeID>
|
||||||
|
<PlatformID>{2E07F7E4-194C-4D20-B7C9-6F44A6C5A234}</PlatformID>
|
||||||
|
<Rules>
|
||||||
|
<Rule>
|
||||||
|
<Option>Enabled:Unsigned System Integrity Policy</Option>
|
||||||
|
</Rule>
|
||||||
|
<Rule>
|
||||||
|
<Option>Enabled:Audit Mode</Option>
|
||||||
|
</Rule>
|
||||||
|
<Rule>
|
||||||
|
<Option>Enabled:Advanced Boot Options Menu</Option>
|
||||||
|
</Rule>
|
||||||
|
<Rule>
|
||||||
|
<Option>Required:Enforce Store Applications</Option>
|
||||||
|
</Rule>
|
||||||
|
<Rule>
|
||||||
|
<Option>Enabled:UMCI</Option>
|
||||||
|
</Rule>
|
||||||
|
</Rules>
|
||||||
|
<!--EKUS-->
|
||||||
|
<EKUs />
|
||||||
|
<!--File Rules-->
|
||||||
|
<FileRules>
|
||||||
|
<Deny ID="ID_DENY_BGINFO" FriendlyName="bginfo.exe" FileName="BGINFO.Exe" MinimumFileVersion = "4.21.0.0" />
|
||||||
|
<Deny ID="ID_DENY_CBD" FriendlyName="cdb.exe" FileName="CDB.Exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_KD" FriendlyName="kd.exe" FileName="kd.Exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_WINDBG" FriendlyName="windbg.exe" FileName="windbg.Exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_MSBUILD" FriendlyName="MSBuild.exe" FileName="MSBuild.Exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_CSI" FriendlyName="csi.exe" FileName="csi.Exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_DNX" FriendlyName="dnx.exe" FileName="dnx.Exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_RCSI" FriendlyName="rcsi.exe" FileName="rcsi.Exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_NTSD" FriendlyName="ntsd.exe" FileName="ntsd.Exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_LXSS" FriendlyName="LxssManager.dll" FileName="LxssManager.dll" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_BASH" FriendlyName="bash.exe" FileName="bash.exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_FSI" FriendlyName="fsi.exe" FileName="fsi.exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_MSHTA" FriendlyName="mshta.exe" FileName="mshta.exe" MinimumFileVersion = "65535.65535.65535.65535" />
|
||||||
|
<Deny ID="ID_DENY_SMA" FriendlyName="System.Management.Automation.dll" FileName="System.Management.Automation.dll" MinimumFileVersion = "10.0.16215.999" />
|
||||||
|
|
||||||
|
|
||||||
|
<Deny ID="ID_DENY_D_1" FriendlyName="Powershell 1" Hash="DED853481A176999723413685A79B36DD0F120F9" />
|
||||||
|
<Deny ID="ID_DENY_D_2" FriendlyName="Powershell 2" Hash="D027E09D9D9828A87701288EFC91D240C0DEC2C3" />
|
||||||
|
<Deny ID="ID_DENY_D_3" FriendlyName="Powershell 3" Hash="46936F4F0AFE4C87D2E55595F74DDDFFC9AD94EE" />
|
||||||
|
<Deny ID="ID_DENY_D_4" FriendlyName="Powershell 4" Hash="5090F22BB9C0B168C7F5E9E800784A05AFCCBC4F" />
|
||||||
|
<Deny ID="ID_DENY_D_5" FriendlyName="Powershell 5" Hash="A920D0706FCEA648D28638E9198BCC368996B8FD" />
|
||||||
|
<Deny ID="ID_DENY_D_6" FriendlyName="Powershell 6" Hash="93E22F2BA6C8B1C09F100F9C0E3B06FAF2D1DDB6" />
|
||||||
|
<Deny ID="ID_DENY_D_7" FriendlyName="Powershell 7" Hash="943E307BE7B0B381715CA5CC0FAB7B558025BA80" />
|
||||||
|
<Deny ID="ID_DENY_D_8" FriendlyName="Powershell 8" Hash="DE6A02520E1D7325025F2761A97D36E407E8490C" />
|
||||||
|
<Deny ID="ID_DENY_D_9" FriendlyName="Powershell 9" Hash="CC968868EDC6718DA14DDDB11228A04D5D5BD9A5" />
|
||||||
|
<Deny ID="ID_DENY_D_10" FriendlyName="Powershell 10" Hash="789D0657689DB6F0900A787BEF52A449585A92B5" />
|
||||||
|
<Deny ID="ID_DENY_D_11" FriendlyName="Powershell 11" Hash="F29A958287788A6EEDE6035D49EF5CB85EEC40D214FDDE5A0C6CAA65AFC00EEC" />
|
||||||
|
<Deny ID="ID_DENY_D_12" FriendlyName="Powershell 12" Hash="84BB081141DA50B3839CD275FF34854F53AECB96CA9AEB8BCD24355C33C1E73E" />
|
||||||
|
<Deny ID="ID_DENY_D_13" FriendlyName="Powershell 13" Hash="8D396FEAEED1F0CA709B62B1F27EDC9CCEFF95E3473C923624362A042E91D787" />
|
||||||
|
<Deny ID="ID_DENY_D_14" FriendlyName="Powershell 14" Hash="7BF44433D3A606104778F64B11B92C52FC99C4BA570C50B70438275D0B587B8E" />
|
||||||
|
<Deny ID="ID_DENY_D_15" FriendlyName="Powershell 15" Hash="6B3CB996EC5129D345830C3D6D5C7C009372FFD9F08837E8B2572AB31E9648A5" />
|
||||||
|
<Deny ID="ID_DENY_D_16" FriendlyName="Powershell 16" Hash="C3A5DAB20947CA8FD092E75C25177E7BAE7884CA58710F14827144C09EA1F94B" />
|
||||||
|
<Deny ID="ID_DENY_D_17" FriendlyName="Powershell 17" Hash="BE3FFE10CDE8B62C3E8FD4D8198F272B6BD15364A33362BB07A0AFF6731DABA1" />
|
||||||
|
<Deny ID="ID_DENY_D_18" FriendlyName="Powershell 18" Hash="75288A0CF0806A68D8DA721538E64038D755BBE74B52F4B63FEE5049AE868AC0" />
|
||||||
|
<Deny ID="ID_DENY_D_19" FriendlyName="Powershell 19" Hash="F875E43E12685ECE0BA2D42D55A13798CE9F1FFDE3CAE253D2529F4304811A52" />
|
||||||
|
<Deny ID="ID_DENY_D_20" FriendlyName="Powershell 20" Hash="6D89FDD29D50C07801FB01F031CDB96E2E14288F066BD895356AE0517ABB09CE" />
|
||||||
|
<Deny ID="ID_DENY_D_21" FriendlyName="Powershell 21" Hash="326669C4A31E2049E3750BCF4287241BB8B555B3670D31A1ACA74C3AC598DF81" />
|
||||||
|
<Deny ID="ID_DENY_D_22" FriendlyName="Powershell 22" Hash="38DC1956313B160696A172074C6F5DA9852BF508F55AFB7FA079B98F2849AFB5" />
|
||||||
|
<Deny ID="ID_DENY_D_23" FriendlyName="Powershell 23" Hash="C6C073A80A8E76DC13E724B5E66FE4035A19CCA0C1AF3FABBC18E5185D1B66CB" />
|
||||||
|
<Deny ID="ID_DENY_D_24" FriendlyName="Powershell 24" Hash="9EA4BD3D8FB8F490E8099E0412F091E545AF028E3C4CAF179324B679124D1742" />
|
||||||
|
<Deny ID="ID_DENY_D_25" FriendlyName="Powershell 25" Hash="CD83C3C293EC4D24D3328C74881FA04AAF9CCF73E099631A9EB100BD0F384F58" />
|
||||||
|
<Deny ID="ID_DENY_D_26" FriendlyName="Powershell 26" Hash="74E207F539C4EAC648A5507EB158AEE9F6EA401E51808E83E73709CFA0820FDD" />
|
||||||
|
<Deny ID="ID_DENY_D_27" FriendlyName="Powershell 27" Hash="148972F670E18790D62D753E01ED8D22B351A57E45544D88ACE380FEDAF24A40" />
|
||||||
|
<Deny ID="ID_DENY_D_28" FriendlyName="Powershell 28" Hash="72E4EC687CFE357F3E681A7500B6FF009717A2E9538956908D3B52B9C865C189" />
|
||||||
|
<Deny ID="ID_DENY_D_29" FriendlyName="Powershell 29" Hash="F16E605B55774CDFFDB0EB99FAFF43A40622ED2AB1C011D1195878F4B20030BC" />
|
||||||
|
<Deny ID="ID_DENY_D_30" FriendlyName="Powershell 30" Hash="BD3139CE7553AC7003C96304F08EAEC2CDB2CC6A869D36D6F1E478DA02D3AA16" />
|
||||||
|
<Deny ID="ID_DENY_D_31" FriendlyName="Powershell 31" Hash="71FC552E66327EDAA72D72C362846BD80CB65EECFAE95C4D790C9A2330D95EE6" />
|
||||||
|
<Deny ID="ID_DENY_D_32" FriendlyName="Powershell 32" Hash="A1D1AF7675C2596D0DF977F57B54372298A56EE0F3E1FF2D974D387D7F69DD4E" />
|
||||||
|
<Deny ID="ID_DENY_D_33" FriendlyName="Powershell 33" Hash="0D905709AB1174F8E12A063F259A52DABE85CAEB8018985F5411F1CE9C6C99C3" />
|
||||||
|
<Deny ID="ID_DENY_D_34" FriendlyName="Powershell 34" Hash="939C291D4A2592209EC7664EC832670FA0AC1009F974F47489D866751F4B862F" />
|
||||||
|
</FileRules>
|
||||||
|
<!--Signers-->
|
||||||
|
<Signers />
|
||||||
|
<!--Driver Signing Scenarios-->
|
||||||
|
<SigningScenarios>
|
||||||
|
<SigningScenario Value="131" ID="ID_SIGNINGSCENARIO_DRIVERS_1" FriendlyName="Driver Signing Scenarios">
|
||||||
|
<ProductSigners>
|
||||||
|
<FileRulesRef>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_KD" />
|
||||||
|
</FileRulesRef>
|
||||||
|
</ProductSigners>
|
||||||
|
</SigningScenario>
|
||||||
|
<SigningScenario Value="12" ID="ID_SIGNINGSCENARIO_WINDOWS" FriendlyName="User Mode Signing Scenarios">
|
||||||
|
<ProductSigners>
|
||||||
|
<FileRulesRef>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_BGINFO"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_CBD"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_KD"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_WINDBG"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_MSBUILD"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_CSI"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_DNX"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_RCSI"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_NTSD"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_LXSS"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_BASH"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_FSI"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_MSHTA"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_SMA"/>
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_1" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_2" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_3" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_4" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_5" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_6" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_7" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_8" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_9" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_10" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_11" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_12" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_13" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_14" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_15" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_16" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_17" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_18" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_19" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_20" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_21" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_22" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_23" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_24" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_25" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_26" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_27" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_28" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_29" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_30" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_31" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_32" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_33" />
|
||||||
|
<FileRuleRef RuleID="ID_DENY_D_34" />
|
||||||
|
</FileRulesRef>
|
||||||
|
</ProductSigners>
|
||||||
|
</SigningScenario>
|
||||||
|
</SigningScenarios>
|
||||||
|
<UpdatePolicySigners />
|
||||||
|
<CiSigners />
|
||||||
|
<HvciOptions>0</HvciOptions>
|
||||||
|
</SiPolicy>
|
||||||
|
|
||||||
|
```
|
||||||
|
<br />
|
||||||
|
|
||||||
To create a code integrity policy, copy each of the following commands into an elevated Windows PowerShell session, in order:
|
To create a code integrity policy, copy each of the following commands into an elevated Windows PowerShell session, in order:
|
||||||
|
|
||||||
@ -36,7 +237,7 @@ To create a code integrity policy, copy each of the following commands into an e
|
|||||||
|
|
||||||
` New-CIPolicy -Level PcaCertificate -FilePath $InitialCIPolicy –UserPEs 3> CIPolicyLog.txt `
|
` New-CIPolicy -Level PcaCertificate -FilePath $InitialCIPolicy –UserPEs 3> CIPolicyLog.txt `
|
||||||
|
|
||||||
> **Notes**
|
> [!Notes]
|
||||||
|
|
||||||
> - When you specify the **-UserPEs** parameter (to include user mode executables in the scan), rule option **0 Enabled:UMCI** is automatically added to the code integrity policy. In contrast, if you do not specify **-UserPEs**, the policy will be empty of user mode executables and will only have rules for kernel mode binaries like drivers, in other words, the whitelist will not include applications. If you create such a policy and later add rule option **0 Enabled:UMCI**, all attempts to start applications will cause a response from Device Guard. In audit mode, the response is logging an event, and in enforced mode, the response is blocking the application.
|
> - When you specify the **-UserPEs** parameter (to include user mode executables in the scan), rule option **0 Enabled:UMCI** is automatically added to the code integrity policy. In contrast, if you do not specify **-UserPEs**, the policy will be empty of user mode executables and will only have rules for kernel mode binaries like drivers, in other words, the whitelist will not include applications. If you create such a policy and later add rule option **0 Enabled:UMCI**, all attempts to start applications will cause a response from Device Guard. In audit mode, the response is logging an event, and in enforced mode, the response is blocking the application.
|
||||||
|
|
||||||
@ -52,7 +253,8 @@ To create a code integrity policy, copy each of the following commands into an e
|
|||||||
|
|
||||||
After you complete these steps, the Device Guard binary file (DeviceGuardPolicy.bin) and original .xml file (IntialScan.xml) will be available on your desktop. You can use the binary version as a code integrity policy or sign it for additional security.
|
After you complete these steps, the Device Guard binary file (DeviceGuardPolicy.bin) and original .xml file (IntialScan.xml) will be available on your desktop. You can use the binary version as a code integrity policy or sign it for additional security.
|
||||||
|
|
||||||
> **Note** We recommend that you keep the original .xml file of the policy for use when you need to merge the code integrity policy with another policy or update its rule options. Alternatively, you would have to create a new policy from a new scan for servicing. For more information about how to merge code integrity policies, see [Merge code integrity policies](#merge-code-integrity-policies).
|
> [!Note]
|
||||||
|
> We recommend that you keep the original .xml file of the policy for use when you need to merge the code integrity policy with another policy or update its rule options. Alternatively, you would have to create a new policy from a new scan for servicing. For more information about how to merge code integrity policies, see [Merge code integrity policies](#merge-code-integrity-policies).
|
||||||
|
|
||||||
We recommend that every code integrity policy be run in audit mode before being enforced. Doing so allows administrators to discover any issues with the policy without receiving error message dialog boxes. For information about how to audit a code integrity policy, see the next section, [Audit code integrity policies](#audit-code-integrity-policies).
|
We recommend that every code integrity policy be run in audit mode before being enforced. Doing so allows administrators to discover any issues with the policy without receiving error message dialog boxes. For information about how to audit a code integrity policy, see the next section, [Audit code integrity policies](#audit-code-integrity-policies).
|
||||||
|
|
||||||
@ -60,7 +262,8 @@ We recommend that every code integrity policy be run in audit mode before being
|
|||||||
|
|
||||||
When code integrity policies are run in audit mode, it allows administrators to discover any applications that were missed during an initial policy scan and to identify any new applications that have been installed and run since the original policy was created. While a code integrity policy is running in audit mode, any binary that runs and would have been denied had the policy been enforced is logged in the **Applications and Services Logs\\Microsoft\\Windows\\CodeIntegrity\\Operational** event log. When these logged binaries have been validated, they can easily be added to a new code integrity policy. When the new exception policy is created, you can merge it with your existing code integrity policies.
|
When code integrity policies are run in audit mode, it allows administrators to discover any applications that were missed during an initial policy scan and to identify any new applications that have been installed and run since the original policy was created. While a code integrity policy is running in audit mode, any binary that runs and would have been denied had the policy been enforced is logged in the **Applications and Services Logs\\Microsoft\\Windows\\CodeIntegrity\\Operational** event log. When these logged binaries have been validated, they can easily be added to a new code integrity policy. When the new exception policy is created, you can merge it with your existing code integrity policies.
|
||||||
|
|
||||||
> **Note** Before you begin this process, you need to create a code integrity policy binary file. If you have not already done so, see [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer), earlier in this topic, for a step-by-step walkthrough of the process to create a code integrity policy and convert it to binary format.
|
> [!Note]
|
||||||
|
> Before you begin this process, you need to create a code integrity policy binary file. If you have not already done so, see [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer), earlier in this topic, for a step-by-step walkthrough of the process to create a code integrity policy and convert it to binary format.
|
||||||
|
|
||||||
**To audit a code integrity policy with local policy:**
|
**To audit a code integrity policy with local policy:**
|
||||||
|
|
||||||
@ -68,7 +271,7 @@ When code integrity policies are run in audit mode, it allows administrators to
|
|||||||
|
|
||||||
2. On the computer you want to run in audit mode, open the Local Group Policy Editor by running **GPEdit.msc**.
|
2. On the computer you want to run in audit mode, open the Local Group Policy Editor by running **GPEdit.msc**.
|
||||||
|
|
||||||
> **Notes**
|
> [!Note]
|
||||||
|
|
||||||
> - The computer that you will run in audit mode must be clean of viruses or malware. Otherwise, in the process that you follow after auditing the system, you might unintentionally merge in a code integrity policy that allows viruses or malware to run.
|
> - The computer that you will run in audit mode must be clean of viruses or malware. Otherwise, in the process that you follow after auditing the system, you might unintentionally merge in a code integrity policy that allows viruses or malware to run.
|
||||||
|
|
||||||
@ -76,7 +279,7 @@ When code integrity policies are run in audit mode, it allows administrators to
|
|||||||
|
|
||||||
3. Navigate to **Computer Configuration\\Administrative Templates\\System\\Device Guard**, and then select **Deploy Code Integrity Policy**. Enable this setting by using the appropriate file path, for example, C:\\Windows\\System32\\CodeIntegrity\\DeviceGuardPolicy.bin, as shown in Figure 1.
|
3. Navigate to **Computer Configuration\\Administrative Templates\\System\\Device Guard**, and then select **Deploy Code Integrity Policy**. Enable this setting by using the appropriate file path, for example, C:\\Windows\\System32\\CodeIntegrity\\DeviceGuardPolicy.bin, as shown in Figure 1.
|
||||||
|
|
||||||
> **Notes**
|
> [!Note]
|
||||||
|
|
||||||
> - The illustration shows the example file name *DeviceGuardPolicy.bin* because this name was used earlier in this topic, in [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). Also, this policy file does not need to be copied to every system. You can instead copy the code integrity policies to a file share to which all computer accounts have access.
|
> - The illustration shows the example file name *DeviceGuardPolicy.bin* because this name was used earlier in this topic, in [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). Also, this policy file does not need to be copied to every system. You can instead copy the code integrity policies to a file share to which all computer accounts have access.
|
||||||
|
|
||||||
@ -124,7 +327,8 @@ Use the following procedure after you have been running a computer with a code i
|
|||||||
|
|
||||||
` New-CIPolicy -Audit -Level Hash -FilePath $CIAuditPolicy –UserPEs 3> CIPolicylog.txt`
|
` New-CIPolicy -Audit -Level Hash -FilePath $CIAuditPolicy –UserPEs 3> CIPolicylog.txt`
|
||||||
|
|
||||||
> **Note** When you create policies from audit events, you should carefully consider the file rule level that you select to trust. The preceding example uses the **Hash** rule level, which is the most specific. Any change to the file (such as replacing the file with a newer version of the same file) will change the Hash value, and require an update to the policy.
|
> [!Note]
|
||||||
|
> When you create policies from audit events, you should carefully consider the file rule level that you select to trust. The preceding example uses the **Hash** rule level, which is the most specific. Any change to the file (such as replacing the file with a newer version of the same file) will change the Hash value, and require an update to the policy.
|
||||||
|
|
||||||
4. Find and review the Device Guard audit policy .xml file that you created. If you used the example variables as shown, the filename will be **DeviceGuardAuditPolicy.xml**, and it will be on your desktop. Look for the following:
|
4. Find and review the Device Guard audit policy .xml file that you created. If you used the example variables as shown, the filename will be **DeviceGuardAuditPolicy.xml**, and it will be on your desktop. Look for the following:
|
||||||
|
|
||||||
@ -134,7 +338,8 @@ Use the following procedure after you have been running a computer with a code i
|
|||||||
|
|
||||||
You can now use this file to update the existing code integrity policy that you ran in audit mode by merging the two policies. For instructions on how to merge this audit policy with the existing code integrity policy, see the next section, [Merge code integrity policies](#merge-code-integrity-policies).
|
You can now use this file to update the existing code integrity policy that you ran in audit mode by merging the two policies. For instructions on how to merge this audit policy with the existing code integrity policy, see the next section, [Merge code integrity policies](#merge-code-integrity-policies).
|
||||||
|
|
||||||
> **Note** You may have noticed that you did not generate a binary version of this policy as you did in [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). This is because code integrity policies created from an audit log are not intended to run as stand-alone policies but rather to update existing code integrity policies.
|
> [!Note]
|
||||||
|
> You may have noticed that you did not generate a binary version of this policy as you did in [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). This is because code integrity policies created from an audit log are not intended to run as stand-alone policies but rather to update existing code integrity policies.
|
||||||
|
|
||||||
## <a href="" id="plug-ins"></a>Use a code integrity policy to control specific plug-ins, add-ins, and modules
|
## <a href="" id="plug-ins"></a>Use a code integrity policy to control specific plug-ins, add-ins, and modules
|
||||||
|
|
||||||
@ -166,7 +371,8 @@ New-CIPolicy -Rules $rule -FilePath ".\BlockAddins.xml" -UserPEs
|
|||||||
|
|
||||||
When you develop code integrity policies, you will occasionally need to merge two policies. A common example is when a code integrity policy is initially created and audited. Another example is when you create a single master policy by using multiple code integrity policies previously created from golden computers. Because each computer running Windows 10 can have only one code integrity policy, it is important to properly maintain these policies. In this example, audit events have been saved into a secondary code integrity policy that you then merge with the initial code integrity policy.
|
When you develop code integrity policies, you will occasionally need to merge two policies. A common example is when a code integrity policy is initially created and audited. Another example is when you create a single master policy by using multiple code integrity policies previously created from golden computers. Because each computer running Windows 10 can have only one code integrity policy, it is important to properly maintain these policies. In this example, audit events have been saved into a secondary code integrity policy that you then merge with the initial code integrity policy.
|
||||||
|
|
||||||
> **Note** The following example uses several of the code integrity policy .xml files that you created in earlier sections in this topic. You can follow this process, however, with any two code integrity policies you would like to combine.
|
> [!Note]
|
||||||
|
> The following example uses several of the code integrity policy .xml files that you created in earlier sections in this topic. You can follow this process, however, with any two code integrity policies you would like to combine.
|
||||||
|
|
||||||
To merge two code integrity policies, complete the following steps in an elevated Windows PowerShell session:
|
To merge two code integrity policies, complete the following steps in an elevated Windows PowerShell session:
|
||||||
|
|
||||||
@ -182,7 +388,8 @@ To merge two code integrity policies, complete the following steps in an elevate
|
|||||||
|
|
||||||
` $CIPolicyBin=$CIPolicyPath+"NewDeviceGuardPolicy.bin"`
|
` $CIPolicyBin=$CIPolicyPath+"NewDeviceGuardPolicy.bin"`
|
||||||
|
|
||||||
> **Note** The variables in this section specifically expect to find an initial policy on your desktop called **InitialScan.xml** and an audit code integrity policy called **DeviceGuardAuditPolicy.xml**. If you want to merge other code integrity policies, update the variables accordingly.
|
> [!Note]
|
||||||
|
> The variables in this section specifically expect to find an initial policy on your desktop called **InitialScan.xml** and an audit code integrity policy called **DeviceGuardAuditPolicy.xml**. If you want to merge other code integrity policies, update the variables accordingly.
|
||||||
|
|
||||||
2. Use [Merge-CIPolicy](https://technet.microsoft.com/library/mt634485.aspx) to merge two policies and create a new code integrity policy:
|
2. Use [Merge-CIPolicy](https://technet.microsoft.com/library/mt634485.aspx) to merge two policies and create a new code integrity policy:
|
||||||
|
|
||||||
@ -198,7 +405,8 @@ Now that you have created a new code integrity policy (for example, called **New
|
|||||||
|
|
||||||
Every code integrity policy is created with audit mode enabled. After you have successfully deployed and tested a code integrity policy in audit mode and are ready to test the policy in enforced mode, complete the following steps in an elevated Windows PowerShell session:
|
Every code integrity policy is created with audit mode enabled. After you have successfully deployed and tested a code integrity policy in audit mode and are ready to test the policy in enforced mode, complete the following steps in an elevated Windows PowerShell session:
|
||||||
|
|
||||||
> **Note** Every code integrity policy should be tested in audit mode first. For information about how to audit code integrity policies, see [Audit code integrity policies](#audit-code-integrity-policies), earlier in this topic.
|
> [!Note]
|
||||||
|
> Every code integrity policy should be tested in audit mode first. For information about how to audit code integrity policies, see [Audit code integrity policies](#audit-code-integrity-policies), earlier in this topic.
|
||||||
|
|
||||||
1. Initialize the variables that will be used:
|
1. Initialize the variables that will be used:
|
||||||
|
|
||||||
@ -210,7 +418,8 @@ Every code integrity policy is created with audit mode enabled. After you have s
|
|||||||
|
|
||||||
` $CIPolicyBin=$CIPolicyPath+"EnforcedDeviceGuardPolicy.bin"`
|
` $CIPolicyBin=$CIPolicyPath+"EnforcedDeviceGuardPolicy.bin"`
|
||||||
|
|
||||||
> **Note** The initial code integrity policy that this section refers to was created in the [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer) section. If you are using a different code integrity policy, update the **CIPolicyPath** and **InitialCIPolicy** variables.
|
> [!Note]
|
||||||
|
> The initial code integrity policy that this section refers to was created in the [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer) section. If you are using a different code integrity policy, update the **CIPolicyPath** and **InitialCIPolicy** variables.
|
||||||
|
|
||||||
2. Ensure that rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) are set the way that you intend for this policy. We strongly recommend that you enable these rule options before you run any enforced policy for the first time. Enabling these options provides administrators with a pre-boot command prompt, and allows Windows to start even if the code integrity policy blocks a kernel-mode driver from running. When ready for enterprise deployment, you can remove these options.
|
2. Ensure that rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) are set the way that you intend for this policy. We strongly recommend that you enable these rule options before you run any enforced policy for the first time. Enabling these options provides administrators with a pre-boot command prompt, and allows Windows to start even if the code integrity policy blocks a kernel-mode driver from running. When ready for enterprise deployment, you can remove these options.
|
||||||
|
|
||||||
@ -228,7 +437,8 @@ Every code integrity policy is created with audit mode enabled. After you have s
|
|||||||
|
|
||||||
` Set-RuleOption -FilePath $EnforcedCIPolicy -Option 3 -Delete`
|
` Set-RuleOption -FilePath $EnforcedCIPolicy -Option 3 -Delete`
|
||||||
|
|
||||||
> **Note** To enforce a code integrity policy, you delete option 3, the **Audit Mode Enabled** option. There is no “enforced” option that can be placed in a code integrity policy.
|
> [!Note]
|
||||||
|
> To enforce a code integrity policy, you delete option 3, the **Audit Mode Enabled** option. There is no “enforced” option that can be placed in a code integrity policy.
|
||||||
|
|
||||||
5. Use [ConvertFrom-CIPolicy](https://technet.microsoft.com/library/mt733073.aspx) to convert the new code integrity policy to binary format:
|
5. Use [ConvertFrom-CIPolicy](https://technet.microsoft.com/library/mt733073.aspx) to convert the new code integrity policy to binary format:
|
||||||
|
|
||||||
@ -244,7 +454,8 @@ Signing code integrity policies by using an on-premises CA-generated certificate
|
|||||||
|
|
||||||
Before signing code integrity policies for the first time, be sure to enable rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) to leave troubleshooting options available to administrators. To ensure that a rule option is enabled, you can run a command such as `Set-RuleOption -FilePath <PathAndFilename> -Option 9` even if you're not sure whether the option is already enabled—if so, the command has no effect. When validated and ready for enterprise deployment, you can remove these options. For more information about rule options, see [Code integrity policy rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md#code-integrity-policy-rules) in "Deploy code integrity policies: policy rules and file rules."
|
Before signing code integrity policies for the first time, be sure to enable rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) to leave troubleshooting options available to administrators. To ensure that a rule option is enabled, you can run a command such as `Set-RuleOption -FilePath <PathAndFilename> -Option 9` even if you're not sure whether the option is already enabled—if so, the command has no effect. When validated and ready for enterprise deployment, you can remove these options. For more information about rule options, see [Code integrity policy rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md#code-integrity-policy-rules) in "Deploy code integrity policies: policy rules and file rules."
|
||||||
|
|
||||||
> **Note** Signing code integrity policies is the last step in a code integrity deployment. It is much more difficult to remove a signed code integrity policy than an unsigned one. Before you deploy a signed code integrity policy to deployed client computers, be sure to test its effect on a subset of computers.
|
> [!Note]
|
||||||
|
> Signing code integrity policies is the last step in a code integrity deployment. It is much more difficult to remove a signed code integrity policy than an unsigned one. Before you deploy a signed code integrity policy to deployed client computers, be sure to test its effect on a subset of computers.
|
||||||
|
|
||||||
To sign a code integrity policy with SignTool.exe, you need the following components:
|
To sign a code integrity policy with SignTool.exe, you need the following components:
|
||||||
|
|
||||||
@ -264,7 +475,8 @@ If you do not have a code signing certificate, see the [Optional: Create a code
|
|||||||
|
|
||||||
` $CIPolicyBin=$CIPolicyPath+"DeviceGuardPolicy.bin"`
|
` $CIPolicyBin=$CIPolicyPath+"DeviceGuardPolicy.bin"`
|
||||||
|
|
||||||
> **Note** This example uses the code integrity policy that you created in the [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer) section. If you are signing another policy, be sure to update the **$CIPolicyPath** and **$CIPolicyBin** variables with the correct information.
|
> [!Note]
|
||||||
|
> This example uses the code integrity policy that you created in the [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer) section. If you are signing another policy, be sure to update the **$CIPolicyPath** and **$CIPolicyBin** variables with the correct information.
|
||||||
|
|
||||||
2. Import the .pfx code signing certificate. Import the code signing certificate that you will use to sign the code integrity policy into the signing user’s personal store on the computer that will be doing the signing. In this example, you use the certificate that was created in [Optional: Create a code signing certificate for code integrity policies](optional-create-a-code-signing-certificate-for-code-integrity-policies.md).
|
2. Import the .pfx code signing certificate. Import the code signing certificate that you will use to sign the code integrity policy into the signing user’s personal store on the computer that will be doing the signing. In this example, you use the certificate that was created in [Optional: Create a code signing certificate for code integrity policies](optional-create-a-code-signing-certificate-for-code-integrity-policies.md).
|
||||||
|
|
||||||
@ -278,9 +490,9 @@ If you do not have a code signing certificate, see the [Optional: Create a code
|
|||||||
|
|
||||||
` Add-SignerRule -FilePath $InitialCIPolicy -CertificatePath <Path to exported .cer certificate> -Kernel -User –Update`
|
` Add-SignerRule -FilePath $InitialCIPolicy -CertificatePath <Path to exported .cer certificate> -Kernel -User –Update`
|
||||||
|
|
||||||
> **Notes** *<Path to exported .cer certificate>* should be the full path to the certificate that you exported in step 3.
|
> [!Note]
|
||||||
|
> *<Path to exported .cer certificate>* should be the full path to the certificate that you exported in step 3.
|
||||||
> Also, adding update signers is crucial to being able to modify or disable this policy in the future. For more information about how to disable signed code integrity policies, see the [Disable signed code integrity policies within Windows](#disable-signed-code-integrity-policies-within-windows) section.
|
Also, adding update signers is crucial to being able to modify or disable this policy in the future. For more information about how to disable signed code integrity policies, see the [Disable signed code integrity policies within Windows](#disable-signed-code-integrity-policies-within-windows) section.
|
||||||
|
|
||||||
6. Use [Set-RuleOption](https://technet.microsoft.com/library/mt634483.aspx) to remove the unsigned policy rule option:
|
6. Use [Set-RuleOption](https://technet.microsoft.com/library/mt634483.aspx) to remove the unsigned policy rule option:
|
||||||
|
|
||||||
@ -294,7 +506,8 @@ If you do not have a code signing certificate, see the [Optional: Create a code
|
|||||||
|
|
||||||
` <Path to signtool.exe> sign -v /n "ContosoDGSigningCert" -p7 . -p7co 1.3.6.1.4.1.311.79.1 -fd sha256 $CIPolicyBin`
|
` <Path to signtool.exe> sign -v /n "ContosoDGSigningCert" -p7 . -p7co 1.3.6.1.4.1.311.79.1 -fd sha256 $CIPolicyBin`
|
||||||
|
|
||||||
> **Note** The *<Path to signtool.exe>* variable should be the full path to the SignTool.exe utility. **ContosoDGSigningCert** is the subject name of the certificate that will be used to sign the code integrity policy. You should import this certificate to your personal certificate store on the computer you use to sign the policy.
|
> [!Note]
|
||||||
|
> The *<Path to signtool.exe>* variable should be the full path to the SignTool.exe utility. **ContosoDGSigningCert** is the subject name of the certificate that will be used to sign the code integrity policy. You should import this certificate to your personal certificate store on the computer you use to sign the policy.
|
||||||
|
|
||||||
9. Validate the signed file. When complete, the commands should output a signed policy file called DeviceGuardPolicy.bin.p7 to your desktop. You can deploy this file the same way you deploy an enforced or non-enforced policy. For information about how to deploy code integrity policies, see [Deploy and manage code integrity policies with Group Policy](#deploy-and-manage-code-integrity-policies-with-group-policy).
|
9. Validate the signed file. When complete, the commands should output a signed policy file called DeviceGuardPolicy.bin.p7 to your desktop. You can deploy this file the same way you deploy an enforced or non-enforced policy. For information about how to deploy code integrity policies, see [Deploy and manage code integrity policies with Group Policy](#deploy-and-manage-code-integrity-policies-with-group-policy).
|
||||||
|
|
||||||
@ -312,7 +525,8 @@ If the code integrity policy was deployed by using Group Policy, the GPO that is
|
|||||||
|
|
||||||
Signed policies protect Windows from administrative manipulation as well as malware that has gained administrative-level access to the system. For this reason, signed code integrity policies are intentionally more difficult to remove than unsigned policies. They inherently protect themselves from modification or removal and therefore are difficult even for administrators to remove successfully. If the signed code integrity policy is manually enabled and copied to the CodeIntegrity folder, to remove the policy, you must complete the following steps.
|
Signed policies protect Windows from administrative manipulation as well as malware that has gained administrative-level access to the system. For this reason, signed code integrity policies are intentionally more difficult to remove than unsigned policies. They inherently protect themselves from modification or removal and therefore are difficult even for administrators to remove successfully. If the signed code integrity policy is manually enabled and copied to the CodeIntegrity folder, to remove the policy, you must complete the following steps.
|
||||||
|
|
||||||
> **Note** For reference, signed code integrity policies should be replaced and removed from the following locations:
|
> [!Note]
|
||||||
|
> For reference, signed code integrity policies should be replaced and removed from the following locations:
|
||||||
|
|
||||||
- <EFI System Partition>\\Microsoft\\Boot\\
|
- <EFI System Partition>\\Microsoft\\Boot\\
|
||||||
|
|
||||||
@ -363,9 +577,11 @@ There may be a time when signed code integrity policies cause a boot failure. Be
|
|||||||
|
|
||||||
Code integrity policies can easily be deployed and managed with Group Policy. A Device Guard administrative template will be available in Windows Server 2016 that allows you to simplify deployment of Device Guard hardware-based security features and code integrity policies. The following procedure walks you through how to deploy a code integrity policy called **DeviceGuardPolicy.bin** to a test OU called *DG Enabled PCs* by using a GPO called **Contoso GPO Test**.
|
Code integrity policies can easily be deployed and managed with Group Policy. A Device Guard administrative template will be available in Windows Server 2016 that allows you to simplify deployment of Device Guard hardware-based security features and code integrity policies. The following procedure walks you through how to deploy a code integrity policy called **DeviceGuardPolicy.bin** to a test OU called *DG Enabled PCs* by using a GPO called **Contoso GPO Test**.
|
||||||
|
|
||||||
> **Note** This walkthrough requires that you have previously created a code integrity policy and have a computer running Windows 10 on which to test a Group Policy deployment. For more information about how to create a code integrity policy, see [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer), earlier in this topic.
|
> [!Note]
|
||||||
|
> This walkthrough requires that you have previously created a code integrity policy and have a computer running Windows 10 on which to test a Group Policy deployment. For more information about how to create a code integrity policy, see [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer), earlier in this topic.
|
||||||
|
|
||||||
> **Note** Signed code integrity policies can cause boot failures when deployed. We recommend that signed code integrity policies be thoroughly tested on each hardware platform before enterprise deployment.
|
> [!Note]
|
||||||
|
> Signed code integrity policies can cause boot failures when deployed. We recommend that signed code integrity policies be thoroughly tested on each hardware platform before enterprise deployment.
|
||||||
|
|
||||||
To deploy and manage a code integrity policy with Group Policy:
|
To deploy and manage a code integrity policy with Group Policy:
|
||||||
|
|
||||||
@ -393,13 +609,15 @@ To deploy and manage a code integrity policy with Group Policy:
|
|||||||
|
|
||||||
In this policy setting, you specify either the local path in which the policy will exist on the client computer or a Universal Naming Convention (UNC) path that the client computers will look to retrieve the latest version of the policy. For example, with DeviceGuardPolicy.bin on the test computer, the example file path would be C:\\Windows\\System32\\CodeIntegrity\\DeviceGuardPolicy.bin, as shown in Figure 5.
|
In this policy setting, you specify either the local path in which the policy will exist on the client computer or a Universal Naming Convention (UNC) path that the client computers will look to retrieve the latest version of the policy. For example, with DeviceGuardPolicy.bin on the test computer, the example file path would be C:\\Windows\\System32\\CodeIntegrity\\DeviceGuardPolicy.bin, as shown in Figure 5.
|
||||||
|
|
||||||
> **Note** The illustration shows the example file name *DeviceGuardPolicy.bin* because this name was used earlier in this topic, in [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). Also, this policy file does not need to be copied to every computer. You can instead copy the code integrity policies to a file share to which all computer accounts have access. Any policy selected here is converted to SIPolicy.p7b when it is deployed to the individual client computers.
|
> [!Note]
|
||||||
|
> The illustration shows the example file name *DeviceGuardPolicy.bin* because this name was used earlier in this topic, in [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). Also, this policy file does not need to be copied to every computer. You can instead copy the code integrity policies to a file share to which all computer accounts have access. Any policy selected here is converted to SIPolicy.p7b when it is deployed to the individual client computers.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Figure 5. Enable the code integrity policy
|
Figure 5. Enable the code integrity policy
|
||||||
|
|
||||||
> **Note** You may have noticed that the GPO setting references a .p7b file and this example uses a .bin file for the policy. Regardless of the type of policy you deploy (.bin, .p7b, or .p7), they are all converted to SIPolicy.p7b when dropped on the client computer running Windows 10. Make your code integrity policies friendly and allow the system to convert the policy names for you to ensure that the policies are easily distinguishable when viewed in a share or any other central repository.
|
> [!Note]
|
||||||
|
> You may have noticed that the GPO setting references a .p7b file and this example uses a .bin file for the policy. Regardless of the type of policy you deploy (.bin, .p7b, or .p7), they are all converted to SIPolicy.p7b when dropped on the client computer running Windows 10. Make your code integrity policies friendly and allow the system to convert the policy names for you to ensure that the policies are easily distinguishable when viewed in a share or any other central repository.
|
||||||
|
|
||||||
7. Close the Group Policy Management Editor, and then restart the Windows 10 test computer. Restarting the computer updates the code integrity policy. For information about how to audit code integrity policies, see the [Audit code integrity policies](#audit-code-integrity-policies) section.
|
7. Close the Group Policy Management Editor, and then restart the Windows 10 test computer. Restarting the computer updates the code integrity policy. For information about how to audit code integrity policies, see the [Audit code integrity policies](#audit-code-integrity-policies) section.
|
||||||
|
|
||||||
|
@ -25,12 +25,26 @@ This topic provides a roadmap for planning and getting started on the Device Gua
|
|||||||
3. **Review how much variety in software and hardware is needed by roles or departments**. When several departments all use the same hardware and software, you might need to deploy only one code integrity policy for them. More variety across departments might mean you need to create and manage more code integrity policies. The following questions can help you clarify how many code integrity policies to create:
|
3. **Review how much variety in software and hardware is needed by roles or departments**. When several departments all use the same hardware and software, you might need to deploy only one code integrity policy for them. More variety across departments might mean you need to create and manage more code integrity policies. The following questions can help you clarify how many code integrity policies to create:
|
||||||
- How standardized is the hardware?<br>This can be relevant because of drivers. You could create a code integrity policy on hardware that uses a particular set of drivers, and if other drivers in your environment use the same signature, they would also be allowed to run. However, you might need to create several code integrity policies on different "reference" hardware, then merge the policies together, to ensure that the resulting policy recognizes all the drivers in your environment.
|
- How standardized is the hardware?<br>This can be relevant because of drivers. You could create a code integrity policy on hardware that uses a particular set of drivers, and if other drivers in your environment use the same signature, they would also be allowed to run. However, you might need to create several code integrity policies on different "reference" hardware, then merge the policies together, to ensure that the resulting policy recognizes all the drivers in your environment.
|
||||||
|
|
||||||
- Is there already a list of accepted applications?<br>A list of accepted applications can be used to help create a baseline code integrity policy.<br>As of Windows 10, version 1703, it might also be useful to have a list of plug-ins, add-ins, or modules that you want to allow only in a specific app (such as a line-of-business app). Similarly, it might be useful to have a list of plug-ins, add-ins, or modules that you want to block in a specific app (such as a browser).
|
|
||||||
|
|
||||||
- What software does each department or role need? Should they be able to install and run other departments’ software?<br>If multiple departments are allowed to run the same list of software, you might be able to merge several code integrity policies to simplify management.
|
- What software does each department or role need? Should they be able to install and run other departments’ software?<br>If multiple departments are allowed to run the same list of software, you might be able to merge several code integrity policies to simplify management.
|
||||||
|
|
||||||
- Are there departments or roles where unique, restricted software is used?<br>If one department needs to run an application that no other department is allowed, it might require a separate code integrity policy. Similarly, if only one department must run an old version of an application (while other departments allow only the newer version), it might require a separate code integrity policy.
|
- Are there departments or roles where unique, restricted software is used?<br>If one department needs to run an application that no other department is allowed, it might require a separate code integrity policy. Similarly, if only one department must run an old version of an application (while other departments allow only the newer version), it might require a separate code integrity policy.
|
||||||
|
|
||||||
|
- Is there already a list of accepted applications?<br>A list of accepted applications can be used to help create a baseline code integrity policy.<br>As of Windows 10, version 1703, it might also be useful to have a list of plug-ins, add-ins, or modules that you want to allow only in a specific app (such as a line-of-business app). Similarly, it might be useful to have a list of plug-ins, add-ins, or modules that you want to block in a specific app (such as a browser).
|
||||||
|
|
||||||
|
- As part of a threat review process, have you reviewed systems for software that can load arbitrary DLLs or run code or scripts?
|
||||||
|
In day-to-day operations, your organization’s security policy may allow certain applications, code, or scripts to run on your systems depending on their role and the context. However, if your security policy requires that you run only trusted applications, code, and scripts on your systems, you may decide to lock these systems down securely with Device Guard code integrity policies. You can also fine-tune your control by using Device Guard in combination with AppLocker, as described in [Device Guard with AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies#device-guard-with-applocker).
|
||||||
|
|
||||||
|
Legitimate applications from trusted vendors provide valid functionality. However, an attacker could also potentially use that same functionality to run malicious executable code that could bypass code integrity policies.
|
||||||
|
|
||||||
|
For operational scenarios that require elevated security, certain applications with known Code Integrity bypasses may represent a security risk if you whitelist them in your code integrity policies. Other applications where older versions of the application had vulnerabilities also represent a risk. Therefore, you may want to deny or block such applications from your code integrity policies. For applications with vulnerabilities, once the vulnerabilities are fixed you can create a rule that only allows the fixed or newer versions of that application. The decision to allow or block applications depends on the context and on how the reference system is being used.
|
||||||
|
|
||||||
|
Security professionals collaborate with Microsoft continuously to help protect customers. With the help of their valuable reports, Microsoft has identified a list of known applications that an attacker could potentially use to bypass Device Guard code integrity policies. Depending on the context, you may want to block these applications. To view this list of applications and for use case examples, such as disabling msbuild.exe, see [Deploy code integrity policies: steps](https://technet.microsoft.com/itpro/windows/keep-secure/deploy-code-integrity-policies-steps).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
4. **Identify LOB applications that are currently unsigned**. Although requiring signed code (through code integrity policies) protects against many threats, your organization might use unsigned LOB applications, for which the process of signing might be difficult. You might also have applications that are signed, but you want to add a secondary signature to them. If so, identify these applications, because you will need to create a catalog file for them. For a basic description of catalog files, see the table in [Introduction to Device Guard: virtualization-based security and code integrity policies](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md). For more background information about catalog files, see [Reviewing your applications: application signing and catalog files](requirements-and-deployment-planning-guidelines-for-device-guard.md#reviewing-your-applications-application-signing-and-catalog-files).
|
4. **Identify LOB applications that are currently unsigned**. Although requiring signed code (through code integrity policies) protects against many threats, your organization might use unsigned LOB applications, for which the process of signing might be difficult. You might also have applications that are signed, but you want to add a secondary signature to them. If so, identify these applications, because you will need to create a catalog file for them. For a basic description of catalog files, see the table in [Introduction to Device Guard: virtualization-based security and code integrity policies](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md). For more background information about catalog files, see [Reviewing your applications: application signing and catalog files](requirements-and-deployment-planning-guidelines-for-device-guard.md#reviewing-your-applications-application-signing-and-catalog-files).
|
||||||
|
|
||||||
## Getting started on the deployment process
|
## Getting started on the deployment process
|
||||||
@ -59,3 +73,5 @@ This topic provides a roadmap for planning and getting started on the Device Gua
|
|||||||
> Virtualization-based protection of code integrity may be incompatible with some devices and applications. We strongly recommend testing this configuration in your lab before enabling virtualization-based protection of code integrity on production systems. Failure to do so may result in unexpected failures up to and including data loss or a blue screen error (also called a stop error).
|
> Virtualization-based protection of code integrity may be incompatible with some devices and applications. We strongly recommend testing this configuration in your lab before enabling virtualization-based protection of code integrity on production systems. Failure to do so may result in unexpected failures up to and including data loss or a blue screen error (also called a stop error).
|
||||||
|
|
||||||
For information about enabling VBS features, see [Deploy Device Guard: enable virtualization-based security](deploy-device-guard-enable-virtualization-based-security.md).
|
For information about enabling VBS features, see [Deploy Device Guard: enable virtualization-based security](deploy-device-guard-enable-virtualization-based-security.md).
|
||||||
|
|
||||||
|
<br />
|
@ -136,9 +136,12 @@
|
|||||||
|
|
||||||
## [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection\protect-enterprise-data-using-wip.md)
|
## [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection\protect-enterprise-data-using-wip.md)
|
||||||
### [Create a Windows Information Protection (WIP) policy](windows-information-protection\overview-create-wip-policy.md)
|
### [Create a Windows Information Protection (WIP) policy](windows-information-protection\overview-create-wip-policy.md)
|
||||||
#### [Create a Windows Information Protection (WIP) policy using Microsoft Intune](windows-information-protection\create-wip-policy-using-intune.md)
|
#### [Create a Windows Information Protection (WIP) using the classic console for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune.md)
|
||||||
##### [Deploy your Windows Information Protection (WIP) policy](windows-information-protection\deploy-wip-policy-using-intune.md)
|
##### [Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune.md)
|
||||||
##### [Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune.md)
|
##### [Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune.md)
|
||||||
|
#### [Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md)
|
||||||
|
##### [Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md)
|
||||||
|
##### [Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md)
|
||||||
#### [Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](windows-information-protection\create-wip-policy-using-sccm.md)
|
#### [Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](windows-information-protection\create-wip-policy-using-sccm.md)
|
||||||
#### [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md)
|
#### [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md)
|
||||||
#### [Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](windows-information-protection\wip-app-enterprise-context.md)
|
#### [Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](windows-information-protection\wip-app-enterprise-context.md)
|
||||||
|
@ -11,10 +11,19 @@ author: brianlic-msft
|
|||||||
# Change history for threat protection
|
# Change history for threat protection
|
||||||
This topic lists new and updated topics in the [Threat protection](index.md) documentation.
|
This topic lists new and updated topics in the [Threat protection](index.md) documentation.
|
||||||
|
|
||||||
|
## June 2017
|
||||||
|
|New or changed topic |Description |
|
||||||
|
|---------------------|------------|
|
||||||
|
[Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md)|New topic for MDM using the Azure portal.|
|
||||||
|
[Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md)|New topic for MDM using the Azure portal.|
|
||||||
|
[Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md)|New topic for MDM using the Azure portal.|
|
||||||
|
|[List of enlightened Microsoft apps for use with Windows Information Protection (WIP)](windows-information-protection\enlightened-microsoft-apps-and-wip.md)|Updated to include newly enlightened and supported apps.|
|
||||||
|
|
||||||
|
|
||||||
## March 2017
|
## March 2017
|
||||||
|New or changed topic |Description |
|
|New or changed topic |Description |
|
||||||
|---------------------|------------|
|
|---------------------|------------|
|
||||||
|[How to collect Windows Information Protection (WIP) audit event logs](windows-information-protection\collect-wip-audit-event-logs.md) |New |
|
||[How to collect Windows Information Protection (WIP) audit event logs](windows-information-protection\collect-wip-audit-event-logs.md) |New |
|
||||||
|[Mandatory tasks and settings required to turn on Windows Information Protection (WIP)](windows-information-protection\mandatory-settings-for-wip.md) |Updated based on Windows 10, version 1703. |
|
|[Mandatory tasks and settings required to turn on Windows Information Protection (WIP)](windows-information-protection\mandatory-settings-for-wip.md) |Updated based on Windows 10, version 1703. |
|
||||||
|[Limitations while using Windows Information Protection (WIP)](windows-information-protection\limitations-with-wip.md) |Added additional limitations for Windows 10, version 1703.|
|
|[Limitations while using Windows Information Protection (WIP)](windows-information-protection\limitations-with-wip.md) |Added additional limitations for Windows 10, version 1703.|
|
||||||
|[Windows Defender SmartScreen overview](windows-defender-smartscreen\windows-defender-smartscreen-overview.md)|New |
|
|[Windows Defender SmartScreen overview](windows-defender-smartscreen\windows-defender-smartscreen-overview.md)|New |
|
||||||
|
@ -0,0 +1,72 @@
|
|||||||
|
---
|
||||||
|
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune (Windows 10)
|
||||||
|
description: After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to associate and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy.
|
||||||
|
keywords: WIP, Enterprise Data Protection
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: explore
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
author: eross-msft
|
||||||
|
localizationpriority: high
|
||||||
|
---
|
||||||
|
|
||||||
|
# Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10, version 1607 and later
|
||||||
|
- Windows 10 Mobile, version 1607 and later (except Microsoft Azure Rights Management, which is only available on the desktop)
|
||||||
|
|
||||||
|
After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to associate and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy.
|
||||||
|
|
||||||
|
## Associate your WIP policy to your VPN policy by using Microsoft Intune
|
||||||
|
Follow these steps to associate your WIP policy with your organization's existing VPN policy.
|
||||||
|
|
||||||
|
**To associate your policies**
|
||||||
|
|
||||||
|
1. Create your VPN profile. For info about how to do this, see [How to configure VPN settings in Microsoft Intune](https://docs.microsoft.com/en-us/intune-azure/configure-devices/how-to-configure-vpn-settings) and [How to create custom VPN profiles in Microsoft Intune](https://docs.microsoft.com/en-us/intune-azure/configure-devices/create-custom-vpn-profiles#create-a-custom-configuration).
|
||||||
|
|
||||||
|
2. Open the Microsoft Intune mobile application management console, click **Device configuration**, and then click **Create Profile**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. In the **Create Profile** blade, type a name for your profile, such as *Contoso_VPN_Win10*, into the **Name** box, add an optional description for your policy into the **Description** box, select **Windows 10 and later** from the **Platform** dropdown box, select **Custom** from the **Profile type** dropdown box, and then click **Configure**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. In the **Custom OMA-URI Settings** blade, click **Add**.
|
||||||
|
|
||||||
|
5. In the **Add Row** blade, type:
|
||||||
|
|
||||||
|
- **Name.** Type a name for your setting, such as *EDPModeID*.
|
||||||
|
|
||||||
|
- **Description.** Type an optional description for your setting.
|
||||||
|
|
||||||
|
- **OMA-URI.** Type _./Vendor/MSFT/VPNv2/<VPNProfileName>/EDPModeId_ into the box.
|
||||||
|
|
||||||
|
- **Data type.** Select **String** from the dropdown box
|
||||||
|
|
||||||
|
- **Value.** Type your fully-qualified domain that should be used by the OMA-URI setting. For example, _corp.contoso.com_.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Click **OK** to save your setting info in the **Add Row** blade, and then click **OK** in the **Custom OMA-URI Settings** blade to save the setting with your policy.
|
||||||
|
|
||||||
|
7. Click **Create** to create the policy, including your OMA_URI info.
|
||||||
|
|
||||||
|
## Deploy your VPN policy using Microsoft Intune
|
||||||
|
After you’ve created your VPN policy, you'll need to deploy it to the same group you deployed your Windows Information Protection (WIP) policy.
|
||||||
|
|
||||||
|
**To deploy your Custom VPN policy**
|
||||||
|
|
||||||
|
1. On the **App policy** blade, click your newly-created policy, click **User groups** from the menu that appears, and then click **Add user group**.
|
||||||
|
|
||||||
|
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** blade.
|
||||||
|
|
||||||
|
2. Choose the group you want your policy to apply to, and then click **Select** to deploy the policy.
|
||||||
|
|
||||||
|
The policy is deployed to the selected users' devices.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune (Windows 10)
|
title: Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune (Windows 10)
|
||||||
description: After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy.
|
description: After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy.
|
||||||
ms.assetid: d0eaba4f-6d7d-4ae4-8044-64680a40cf6b
|
ms.assetid: d0eaba4f-6d7d-4ae4-8044-64680a40cf6b
|
||||||
keywords: WIP, Enterprise Data Protection
|
keywords: WIP, Enterprise Data Protection
|
||||||
@ -11,11 +11,11 @@ author: eross-msft
|
|||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune
|
# Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10, version 1607
|
- Windows 10, version 1607 and later
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile, version 1607 and later
|
||||||
|
|
||||||
After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy.
|
After you've created and deployed your Windows Information Protection (WIP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your WIP policy.
|
||||||
|
|
||||||
|
@ -0,0 +1,532 @@
|
|||||||
|
---
|
||||||
|
title: Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune (Windows 10)
|
||||||
|
description: Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: explore
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
author: eross-msft
|
||||||
|
localizationpriority: high
|
||||||
|
---
|
||||||
|
|
||||||
|
# Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10, version 1607 and later
|
||||||
|
- Windows 10 Mobile, version 1607 and later (except Microsoft Azure Rights Management, which is only available on the desktop)
|
||||||
|
|
||||||
|
Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your allowed apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>This topic covers creating a Windows Information Protection (WIP) policy for organizations already managing devices by using Mobile Device Management (MDM) solutions. If your organization uses a mobile application management (MAM) solution to deploy your WIP policy to Intune apps without managing devices, you must follow the instructions in the [Create and deploy Windows Information Protection (WIP) app protection policy with Intune](https://docs.microsoft.com/en-us/intune/deploy-use/create-windows-information-protection-policy-with-intune) topic.
|
||||||
|
|
||||||
|
## Add a WIP policy
|
||||||
|
After you’ve set up Intune for your organization, you must create a WIP-specific policy.
|
||||||
|
|
||||||
|
**To add a WIP policy**
|
||||||
|
1. Open the Microsoft Intune mobile application management console, click **All settings**, and then click **App policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. In the **App policy** screen, click **Add a policy**, and then fill out the fields:
|
||||||
|
- **Name.** Type a name (required) for your new policy.
|
||||||
|
|
||||||
|
- **Description.** Type an optional description.
|
||||||
|
|
||||||
|
- **Platform.** Choose **Windows 10** as the supported platform for your policy.
|
||||||
|
|
||||||
|
- **Enrollment state.** Choose **With enrollment** as the enrollment state for your policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Choosing **With enrollment** only applies for organizations using MDM. If you're using MAM, you must use these instructions, [Create and deploy Windows Information Protection (WIP) app protection policy with Intune](https://docs.microsoft.com/en-us/intune/deploy-use/create-windows-information-protection-policy-with-intune), instead.
|
||||||
|
|
||||||
|
3. Click **Create**.
|
||||||
|
|
||||||
|
The policy is created and appears in the table on the **App Policy** screen.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Optionally, you can also add your apps and set your settings from the **Add a policy** blade, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available.
|
||||||
|
|
||||||
|
### Add apps to your Allowed apps list
|
||||||
|
During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
||||||
|
|
||||||
|
The steps to add your apps are based on the type of template being applied. You can add a recommended app, a store app (also known as a Universal Windows Platform (UWP) app), or a signed Windows desktop app.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<br><br>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **Allowed apps** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
||||||
|
|
||||||
|
#### Add a Recommended app to your Allowed apps list
|
||||||
|
For this example, we’re going to add Microsoft Edge, a recommended app, to the **Allowed apps** list.
|
||||||
|
|
||||||
|
**To add a recommended app**
|
||||||
|
1. From the **App policy** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||||
|
|
||||||
|
The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. From the **Allowed apps** blade, click **Add apps**.
|
||||||
|
|
||||||
|
The **Add apps** blade appears, showing you all **Recommended apps**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Select each app you want to access your enterprise data, and then click **OK**.
|
||||||
|
|
||||||
|
The **Allowed apps** blade updates to show you your selected apps.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
#### Add a Store app to your Allowed apps list
|
||||||
|
For this example, we’re going to add Microsoft Power BI, a store app, to the **Allowed apps** list.
|
||||||
|
|
||||||
|
**To add a Store app**
|
||||||
|
1. From the **App policy** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||||
|
|
||||||
|
The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||||
|
|
||||||
|
2. From the **Allowed apps** blade, click **Add apps**.
|
||||||
|
|
||||||
|
3. On the **Add apps** blade, click **Store apps** from the dropdown list.
|
||||||
|
|
||||||
|
The blade changes to show boxes for you to add a publisher and app name.
|
||||||
|
|
||||||
|
4. Type the name of the app and the name of its publisher, and then click **OK**. For this UWP app example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the Product **name** is `Microsoft.MicrosoftPowerBIForWindows`.
|
||||||
|
|
||||||
|
5. After you’ve entered the info into the fields, click **OK** to add the app to your **Allowed apps** list.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>To add multiple Store apps at the same time, you can click the menu **(…)** at the end of the app row, and then continue to add more apps. When you’re done, click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
If you don't know the publisher or product name, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps.
|
||||||
|
|
||||||
|
**To find the publisher and product name values for Store apps without installing them**
|
||||||
|
1. Go to the [Windows Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, *Microsoft Power BI*.
|
||||||
|
|
||||||
|
2. Copy the ID value from the app URL. For example, Microsoft Power BI ID URL is https://www.microsoft.com/en-us/store/p/microsoft-power-bi/9nblgggzlxn1, and you'd copy the ID value, `9nblgggzlxn1`.
|
||||||
|
|
||||||
|
3. In a browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9nblgggzlxn1/applockerdata, where `9nblgggzlxn1` is replaced with your ID value.
|
||||||
|
|
||||||
|
The API runs and opens a text editor with the app details.
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"packageIdentityName": "Microsoft.MicrosoftPowerBIForWindows",
|
||||||
|
"publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
4. Copy the `publisherCertificateName` value into the **Publisher** box and copy the `packageIdentityName` value into the **Name** box of Intune.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<br><br>For example:<br>
|
||||||
|
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
||||||
|
|
||||||
|
**To find the publisher and product name values for apps installed on Windows 10 mobile phones**
|
||||||
|
1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature.
|
||||||
|
|
||||||
|
>**Note**<br>Your PC and phone must be on the same wireless network.
|
||||||
|
|
||||||
|
2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**.
|
||||||
|
|
||||||
|
3. In the **For developers** screen, turn on **Developer mode**, turn on **Device Discovery**, and then turn on **Device Portal**.
|
||||||
|
|
||||||
|
4. Copy the URL in the **Device Portal** area into your device's browser, and then accept the SSL certificate.
|
||||||
|
|
||||||
|
5. In the **Device discovery** area, press **Pair**, and then enter the PIN into the website from the previous step.
|
||||||
|
|
||||||
|
6. On the **Apps** tab of the website, you can see details for the running apps, including the publisher and product names.
|
||||||
|
|
||||||
|
7. Start the app for which you're looking for the publisher and product name values.
|
||||||
|
|
||||||
|
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<br><br>For example:<br>
|
||||||
|
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
||||||
|
|
||||||
|
#### Add a Desktop app to your Allowed apps list
|
||||||
|
For this example, we’re going to add WordPad, a desktop app, to the **Allowed apps** list.
|
||||||
|
|
||||||
|
**To add a Desktop app**
|
||||||
|
1. From the **App policy** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||||
|
|
||||||
|
The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||||
|
|
||||||
|
2. From the **Allowed apps** blade, click **Add apps**.
|
||||||
|
|
||||||
|
3. On the **Add apps** blade, click **Desktop apps** from the dropdown list.
|
||||||
|
|
||||||
|
The blade changes to show boxes for you to add the following, based on what results you want returned:
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Field</th>
|
||||||
|
<th>Manages</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>All fields marked as “*”</td>
|
||||||
|
<td>All files signed by any publisher. (Not recommended)</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher only</td>
|
||||||
|
<td>If you only fill out this field, you’ll get all files signed by the named publisher.<br><br>This might be useful if your company is the publisher and signer of internal line-of-business apps.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher and Name only</td>
|
||||||
|
<td>If you only fill out these fields, you’ll get all files for the specified product, signed by the named publisher.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher, Name, and File only</td>
|
||||||
|
<td>If you only fill out these fields, you’ll get any version of the named file or package for the specified product, signed by the named publisher.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher, Name, File, and Min version only</td>
|
||||||
|
<td>If you only fill out these fields, you’ll get the specified version or newer releases of the named file or package for the specified product, signed by the named publisher.<br><br>This option is recommended for enlightened apps that weren't previously enlightened.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher, Name, File, and Max version only</td>
|
||||||
|
<td>If you only fill out these fields, you’ll get the specified version or older releases of the named file or package for the specified product, signed by the named publisher.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>All fields completed</td>
|
||||||
|
<td>If you fill out all fields, you’ll get the specified version of the named file or package for the specified product, signed by the named publisher.</td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
4. After you’ve entered the info into the fields, click **OK** to add the app to your **Allowed apps** list.
|
||||||
|
|
||||||
|
>[!Note]
|
||||||
|
>To add multiple Desktop apps at the same time, you can click the menu **(…)** at the end of the app row, and then continue to add more apps. When you’re done, click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
**To find the Publisher values for Desktop apps**
|
||||||
|
If you’re unsure about what to include for the publisher, you can run this PowerShell command:
|
||||||
|
|
||||||
|
```ps1
|
||||||
|
Get-AppLockerFileInformation -Path "<path_of_the_exe>"
|
||||||
|
```
|
||||||
|
Where `"<path_of_the_exe>"` goes to the location of the app on the device. For example, `Get-AppLockerFileInformation -Path "C:\Program Files\Windows NT\Accessories\wordpad.exe"`.
|
||||||
|
|
||||||
|
In this example, you'd get the following info:
|
||||||
|
|
||||||
|
``` json
|
||||||
|
Path Publisher
|
||||||
|
---- ---------
|
||||||
|
%PROGRAMFILES%\WINDOWS NT\ACCESSORIES\WORDPAD.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US
|
||||||
|
```
|
||||||
|
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter into the **Publisher** box and `WORDPAD.EXE` is the text to enter into the **File** box.
|
||||||
|
|
||||||
|
#### Import a list of apps to your Allowed apps list
|
||||||
|
For this example, we’re going to add an AppLocker XML file to the **Allowed apps** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
||||||
|
|
||||||
|
**To create a list of Allowed apps using the AppLocker tool**
|
||||||
|
1. Open the Local Security Policy snap-in (SecPol.msc).
|
||||||
|
|
||||||
|
2. In the left blade, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Right-click in the right-hand blade, and then click **Create New Rule**.
|
||||||
|
|
||||||
|
The **Create Packaged app Rules** wizard appears.
|
||||||
|
|
||||||
|
4. On the **Before You Begin** page, click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we’re using Microsoft Dynamics 365.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. On the updated **Publisher** page, click **Create**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. Click **No** in the dialog box that appears, asking if you want to create the default rules. You must not create default rules for your WIP policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. Review the Local Security Policy snap-in to make sure your rule is correct.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
10. In the left blade, right-click on **AppLocker**, and then click **Export policy**.
|
||||||
|
|
||||||
|
The **Export policy** box opens, letting you export and save your new policy as XML.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**.
|
||||||
|
|
||||||
|
The policy is saved and you’ll see a message that says 1 rule was exported from the policy.
|
||||||
|
|
||||||
|
**Example XML file**<br>
|
||||||
|
This is the XML file that AppLocker creates for Microsoft Dynamics 365.
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<?xml version="1.0"?>
|
||||||
|
<AppLockerPolicy Version="1">
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Appx">
|
||||||
|
<FilePublisherRule Action="Allow" UserOrGroupSid="S-1-1-0" Description="" Name="Microsoft.MicrosoftDynamicsCRMforWindows10, version 3.2.0.0 and above, from Microsoft Corporation" Id="3da34ed9-aec6-4239-88ba-0afdce252ab4">
|
||||||
|
<Conditions>
|
||||||
|
<FilePublisherCondition BinaryName="*" ProductName="Microsoft.MicrosoftDynamicsCRMforWindows10" PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US">
|
||||||
|
<BinaryVersionRange HighSection="*" LowSection="3.2.0.0"/>
|
||||||
|
</FilePublisherCondition>
|
||||||
|
</Conditions>
|
||||||
|
</FilePublisherRule>
|
||||||
|
</RuleCollection>
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Dll"/>
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Exe"/>
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Msi"/>
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Script"/>
|
||||||
|
</AppLockerPolicy>
|
||||||
|
```
|
||||||
|
|
||||||
|
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
||||||
|
|
||||||
|
**To import your list of Allowed apps using Microsoft Intune**
|
||||||
|
|
||||||
|
1. From the **Allowed apps** area, click **Import apps**.
|
||||||
|
|
||||||
|
The blade changes to let you add your import file.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Browse to your exported AppLocker policy file, and then click **Open**.
|
||||||
|
|
||||||
|
The file imports and the apps are added to your **Allowed app** list.
|
||||||
|
|
||||||
|
#### Add exempt apps to your policy
|
||||||
|
If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
||||||
|
|
||||||
|
**To exempt a Store app, a Desktop app, or an AppLocker policy file from the Allowed apps list**
|
||||||
|
|
||||||
|
1. From the **App policy** blade, click the name of your policy, and then click **Exempt apps** from the menu that appears.
|
||||||
|
|
||||||
|
The **Exempt apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||||
|
|
||||||
|
2. From the **Exempt apps** blade, click **Add apps**.
|
||||||
|
|
||||||
|
Be aware that when you exempt apps, they’re allowed to bypass the WIP restrictions and access your corporate data. To allow apps, see the [Add app rules to your policy](#add-apps-to_your-allowed-apps-list) section of this topic.
|
||||||
|
|
||||||
|
3. Fill out the rest of the app info, based on the type of app you’re adding:
|
||||||
|
|
||||||
|
- **Recommended app.** Follow the instructions in the [Add a Recommended app to your Allowed apps list](#add-a-recommended-app-to_your-allowed-apps-list) section of this topic.
|
||||||
|
|
||||||
|
- **Store app.** Follow the instructions in the [Add a Store app to your Allowed apps list](#add-a-store-app-to_your-allowed-apps-list) section of this topic.
|
||||||
|
|
||||||
|
- **Desktop app.** Follow the instructions in the [Add a Desktop app to your Allowed apps list](#add-a-desktop-app-to_your-allowed-apps-list) section of this topic.
|
||||||
|
|
||||||
|
- **AppLocker policy file.** Follow the instructions to create your app list in the [Import a list of apps to your Allowed apps list](#import-a-list-of-apps-to_your-allowed-apps-list) section of this topic, using a list of exempted apps.
|
||||||
|
|
||||||
|
4. Click **OK**.
|
||||||
|
|
||||||
|
### Manage the WIP protection mode for your enterprise data
|
||||||
|
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
||||||
|
|
||||||
|
We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Hide Overrides**.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).
|
||||||
|
|
||||||
|
**To add your protection mode**
|
||||||
|
|
||||||
|
1. From the **App policy** blade, click the name of your policy, and then click **Required settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Required settings** blade appears.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|Mode |Description |
|
||||||
|
|-----|------------|
|
||||||
|
|Hide Overrides |WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.|
|
||||||
|
|Allow Overrides |WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).|
|
||||||
|
|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would’ve been prompted for employee interaction while in Allow Override mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still stopped.|
|
||||||
|
|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.<br><br>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.|
|
||||||
|
|
||||||
|
2. Click **Save**.
|
||||||
|
|
||||||
|
### Define your enterprise-managed corporate identity
|
||||||
|
Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
||||||
|
|
||||||
|
Starting with Windows 10, version 1703, Intune automatically determines your corporate identity and adds it to the Corporate identity field. You can specify multiple domains owned by your enterprise by separating them with the "|" character. For example, (`contoso.com|newcontoso.com`). With multiple domains, the first one is designated as your corporate identity and all of the additional ones as being owned by the first one. We strongly recommend that you include all of your email address domains in this list.
|
||||||
|
|
||||||
|
**To change your corporate identity**
|
||||||
|
|
||||||
|
1. From the **App policy** blade, click the name of your policy, and then click **Required settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Required settings** blade appears.
|
||||||
|
|
||||||
|
2. If the identity isn’t correct, or if you need to add additional domains, type info into the **Corporate identity** field. For example, `contoso.com|newcontoso.com`.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Choose where apps can access enterprise data
|
||||||
|
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
||||||
|
|
||||||
|
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Every WIP policy should include policy that defines your enterprise network locations.<br>Classless Inter-Domain Routing (CIDR) notation isn’t supported for WIP configurations.
|
||||||
|
|
||||||
|
**To define where your allowed apps can find and send enterprise data on you network**
|
||||||
|
|
||||||
|
1. From the **App policy** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Advanced settings** blade appears.
|
||||||
|
|
||||||
|
2. Click **Add network boundary** from the Network perimeter area.
|
||||||
|
|
||||||
|
The **Add network boundary** blade appears.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Select the type of network boundary to add from the **Boundary type** box.
|
||||||
|
|
||||||
|
4. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the following options, and then click **OK**.
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Boundary type</th>
|
||||||
|
<th>Value format</th>
|
||||||
|
<th>Description</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Cloud Resources</td>
|
||||||
|
<td><strong>With proxy:</strong> contoso.sharepoint.com,contoso.internalproxy1.com|<br>contoso.visualstudio.com,contoso.internalproxy2.com<br><br><strong>Without proxy:</strong> contoso.sharepoint.com|contoso.visualstudio.com</td>
|
||||||
|
<td>Specify the cloud resources to be treated as corporate and protected by WIP.<br><br>For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.<br><br>If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: <code>URL <,proxy>|URL <,proxy></code>.<br><br><strong>Important</strong><br>In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the <code>/*AppCompat*/</code> string to the setting. For example: <code>URL <,proxy>|URL <,proxy>|/*AppCompat*/</code>.<br><br>When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access), using the <strong>Domain joined or marked as compliant</strong> option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Network domain names</td>
|
||||||
|
<td>corp.contoso.com,region.contoso.com</td>
|
||||||
|
<td>Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.<br><br>If you have multiple resources, you must separate them using the "," delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Proxy servers</td>
|
||||||
|
<td>proxy.contoso.com:80;proxy2.contoso.com:443</td>
|
||||||
|
<td>Specify the proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.<br><br>This list shouldn’t include any servers listed in your Internal proxy servers list. Internal proxy servers must be used only for WIP-protected (enterprise) traffic.<br><br>If you have multiple resources, you must separate them using the ";" delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Internal proxy servers</td>
|
||||||
|
<td>contoso.internalproxy1.com;contoso.internalproxy2.com</td>
|
||||||
|
<td>Specify the internal proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.<br><br>This list shouldn’t include any servers listed in your Proxy servers list. Proxy servers must be used only for non-WIP-protected (non-enterprise) traffic.<br><br>If you have multiple resources, you must separate them using the ";" delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>IPv4 ranges</td>
|
||||||
|
<td>**Starting IPv4 Address:** 3.4.0.1<br>**Ending IPv4 Address:** 3.4.255.254<br>**Custom URI:** 3.4.0.1-3.4.255.254,<br>10.0.0.1-10.255.255.254</td>
|
||||||
|
<td>Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the addresses for a valid IPv4 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.<br><br>If you have multiple ranges, you must separate them using the "," delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>IPv6 ranges</td>
|
||||||
|
<td>**Starting IPv6 Address:** 2a01:110::<br>**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff<br>**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,<br>fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff</td>
|
||||||
|
<td>Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.<br><br>If you have multiple ranges, you must separate them using the "," delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Neutral resources</td>
|
||||||
|
<td>sts.contoso.com,sts.contoso2.com</td>
|
||||||
|
<td>Specify your authentication redirection endpoints for your company.<br><br>These locations are considered enterprise or personal, based on the context of the connection before the redirection.<br><br>If you have multiple resources, you must separate them using the "," delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
5. Repeat steps 1-4 to add any additional network boundaries.
|
||||||
|
|
||||||
|
6. Decide if you want to Windows to look for additional network settings:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you clear this box, Windows will search for additional proxy servers in your immediate network.
|
||||||
|
|
||||||
|
- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you clear this box, Windows will search for additional IP ranges on any domain-joined devices connected to your network.
|
||||||
|
|
||||||
|
### Upload your Data Recovery Agent (DRA) certificate
|
||||||
|
After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Using a DRA certificate isn’t mandatory. However, we strongly recommend it. For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](https://tnstage.redmond.corp.microsoft.com/en-us/itpro/windows/keep-secure/create-and-verify-an-efs-dra-certificate) topic.
|
||||||
|
|
||||||
|
**To upload your DRA certificate**
|
||||||
|
1. From the **App policy** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Advanced settings** blade appears.
|
||||||
|
|
||||||
|
2. In the **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, click **Browse** to add a data recovery certificate for your policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Choose your optional WIP-related settings
|
||||||
|
After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings.
|
||||||
|
|
||||||
|
**To set your optional settings**
|
||||||
|
|
||||||
|
1. Choose to set any or all optional settings:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are:
|
||||||
|
|
||||||
|
- **On (recommended).** Turns on the feature and provides the additional protection.
|
||||||
|
|
||||||
|
- **Off, or not configured.** Doesn't enable this feature.
|
||||||
|
|
||||||
|
- **Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are:
|
||||||
|
|
||||||
|
- **On, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment.
|
||||||
|
|
||||||
|
- **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example if you’re migrating between Mobile Device Management (MDM) solutions.
|
||||||
|
|
||||||
|
- **Show the Windows Information Protection icon overlay.** Determines whether the Windows Information Protection icon overlay appears on corporate files in the Save As and File Explorer views. The options are:
|
||||||
|
|
||||||
|
- **On.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Additionally, for unenlightened but allowed apps, the icon overlay also appears on the app tile and with Managed text on the app name in the **Start** menu.
|
||||||
|
|
||||||
|
- **Off, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but allowed apps. Not configured is the default option.
|
||||||
|
|
||||||
|
- **Use Azure RMS for WIP.** Determines whether to use Azure Rights Management encryption with Windows Information Protection.
|
||||||
|
|
||||||
|
- **On.** Starts using Azure Rights Management encryption with WIP. By turning this option on, you can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. For more info about setting up Azure Rights management and using a template ID with WIP, see the [Choose to set up Azure Rights Management with WIP](#choose-to-set-up-azure-rights-management-with-wip) section of this topic.
|
||||||
|
|
||||||
|
- **Off, or not configured.** Stops using Azure Rights Management encryption with WIP.
|
||||||
|
|
||||||
|
### Choose to set up Azure Rights Management with WIP
|
||||||
|
WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files by using removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/en-us/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up.
|
||||||
|
|
||||||
|
To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703.
|
||||||
|
|
||||||
|
Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>For more info about setting the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings, see the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp) topic. For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-custom-templates) topic.
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
- [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md)
|
||||||
|
|
||||||
|
- [Deploy your Windows Information Protection (WIP) policy](deploy-wip-policy-using-intune.md)
|
||||||
|
|
||||||
|
- [Associate and deploy your Windows Information Protection (WIP) and VPN policies by using Microsoft Intune](create-vpn-and-wip-policy-using-intune.md)
|
||||||
|
|
||||||
|
- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)
|
||||||
|
|
||||||
|
- [What is Azure Rights Management?]( https://docs.microsoft.com/en-us/information-protection/understand-explore/what-is-azure-rms)
|
||||||
|
|
||||||
|
- [Create and deploy Windows Information Protection (WIP) app protection policy with Intune and MAM](https://docs.microsoft.com/en-us/intune/deploy-use/create-windows-information-protection-policy-with-intune)
|
||||||
|
|
||||||
|
- [Intune MAM Without Enrollment](https://blogs.technet.microsoft.com/configmgrdogs/2016/02/04/intune-mam-without-enrollment/)
|
||||||
|
|
||||||
|
- [Azure RMS Documentation Update for May 2016](https://blogs.technet.microsoft.com/enterprisemobility/2016/05/31/azure-rms-documentation-update-for-may-2016/)
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune (Windows 10)
|
title: Create a Windows Information Protection (WIP) with enrollment policy using the classic console for Microsoft Intune (Windows 10)
|
||||||
description: Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
description: Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
ms.assetid: 4b307c99-3016-4d6a-9ae7-3bbebd26e721
|
ms.assetid: 4b307c99-3016-4d6a-9ae7-3bbebd26e721
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -10,12 +10,12 @@ author: eross-msft
|
|||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Information Protection (WIP) policy using Microsoft Intune
|
# Create a Windows Information Protection (WIP) using the classic console for Microsoft Intune
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10, version 1703
|
- Windows 10, version 1607 and later
|
||||||
- Windows 10 Mobile (except Microsoft Azure Rights Management, which is only available on the desktop)
|
- Windows 10 Mobile, version 1607 and later
|
||||||
|
|
||||||
Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your allowed apps, your WIP-protection level, and how to find enterprise data on the network.
|
Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your allowed apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
|
|
||||||
@ -39,7 +39,7 @@ During the policy-creation process in Intune, you can choose the apps you want t
|
|||||||
The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file.
|
The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file.
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
>WIP-aware apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<p>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App Rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<p>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App Rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
||||||
|
|
||||||
#### Add a store app rule to your policy
|
#### Add a store app rule to your policy
|
||||||
For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list.
|
For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list.
|
||||||
@ -309,13 +309,13 @@ If you're running into compatibility issues where your app is incompatible with
|
|||||||
### Manage the WIP protection mode for your enterprise data
|
### Manage the WIP protection mode for your enterprise data
|
||||||
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
||||||
|
|
||||||
We recommend that you start with **Silent** or **Override** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, either **Override** or **Block**.
|
We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, either **Allow Overrides** or **Hide Overrides**.
|
||||||
|
|
||||||
|Mode |Description |
|
|Mode |Description |
|
||||||
|-----|------------|
|
|-----|------------|
|
||||||
|Block |WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.|
|
|Hide Overrides|WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.|
|
||||||
|Override |WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log, accessible through the [Reporting CSP](https://go.microsoft.com/fwlink/p/?LinkID=746459). |
|
|Allow Overrides|WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log, accessible through the [Reporting CSP](https://go.microsoft.com/fwlink/p/?LinkID=746459). |
|
||||||
|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would’ve been prompted for employee interaction while in Override mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still blocked.|
|
|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would’ve been prompted for employee interaction while in Allow Overrides mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still blocked.|
|
||||||
|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.<p>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.|
|
|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.<p>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.|
|
||||||
|
|
||||||

|

|
||||||
|
@ -63,7 +63,7 @@ During the policy-creation process in System Center Configuration Manager, you c
|
|||||||
The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file.
|
The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>WIP-aware apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process. <p>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<p>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
||||||
|
|
||||||
#### Add a store app rule to your policy
|
#### Add a store app rule to your policy
|
||||||
For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list.
|
For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list.
|
||||||
@ -94,7 +94,9 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
|
|
||||||
1. Go to the [Windows Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, Microsoft OneNote.
|
1. Go to the [Windows Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, Microsoft OneNote.
|
||||||
|
|
||||||
>**Note**<br>If your app is already installed on desktop devices, you can use the AppLocker local security policy MMC snap-in to gather the info for adding the app to the protected apps list. For info about how to do this, see the steps in the [Add an AppLocker policy file](#add-an-applocker-policy-file) section.
|
>[!NOTE]
|
||||||
|
|
||||||
|
>If your app is already installed on desktop devices, you can use the AppLocker local security policy MMC snap-in to gather the info for adding the app to the protected apps list. For info about how to do this, see the steps in the [Add an AppLocker policy file](#add-an-applocker-policy-file) section.
|
||||||
|
|
||||||
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, `9wzdncrfhvjl`.
|
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, `9wzdncrfhvjl`.
|
||||||
|
|
||||||
@ -111,7 +113,8 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
|
|
||||||
4. Copy the `publisherCertificateName` value and paste them into the **Publisher Name** box, copy the `packageIdentityName` value into the **Product Name** box of Intune.
|
4. Copy the `publisherCertificateName` value and paste them into the **Publisher Name** box, copy the `packageIdentityName` value into the **Product Name** box of Intune.
|
||||||
|
|
||||||
>**Important**<br>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`.<p>For example:<p>
|
>[!IMPORTANT]
|
||||||
|
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`.<p>For example:<p>
|
||||||
```json
|
```json
|
||||||
{
|
{
|
||||||
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
||||||
@ -121,7 +124,8 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
**To find the Publisher and Product Name values for apps installed on Windows 10 mobile phones**
|
**To find the Publisher and Product Name values for apps installed on Windows 10 mobile phones**
|
||||||
1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature.
|
1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature.
|
||||||
|
|
||||||
>**Note**<br>Your PC and phone must be on the same wireless network.
|
>[!NOTE]
|
||||||
|
>Your PC and phone must be on the same wireless network.
|
||||||
|
|
||||||
2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**.
|
2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**.
|
||||||
|
|
||||||
@ -137,7 +141,8 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
|
|
||||||
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
||||||
|
|
||||||
>**Important**<br>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`.
|
>[!IMPORTANT]
|
||||||
|
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as “CN=” followed by the `windowsPhoneLegacyId`.
|
||||||
>For example:<p>
|
>For example:<p>
|
||||||
```json
|
```json
|
||||||
{
|
{
|
||||||
@ -460,6 +465,9 @@ After you've decided where your protected apps can access enterprise data on you
|
|||||||
|
|
||||||
- **No.** Hides the **Personal** option from employees. Be aware that if you pick this option, apps that use the **Save As** dialog box might encrypt new files as corporate data unless a different file path is given during the original file creation. After this happens, decryption of work files becomes more difficult.
|
- **No.** Hides the **Personal** option from employees. Be aware that if you pick this option, apps that use the **Save As** dialog box might encrypt new files as corporate data unless a different file path is given during the original file creation. After this happens, decryption of work files becomes more difficult.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>The **Show the Personal option in the File ownership menus of File Explorer and the Save As dialog box** option is only available for Configuration Manager versions 1610 and below.
|
||||||
|
|
||||||
- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile**. Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are:
|
- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile**. Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are:
|
||||||
|
|
||||||
- **Yes (recommended).** Turns on the feature and provides the additional protection.
|
- **Yes (recommended).** Turns on the feature and provides the additional protection.
|
||||||
|
@ -0,0 +1,43 @@
|
|||||||
|
---
|
||||||
|
title: Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune (Windows 10)
|
||||||
|
description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
||||||
|
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, Intune
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: explore
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
author: eross-msft
|
||||||
|
localizationpriority: high
|
||||||
|
---
|
||||||
|
|
||||||
|
# Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10, version 1607 and later
|
||||||
|
- Windows 10 Mobile, version 1607 and later (except Microsoft Azure Rights Management, which is only available on the desktop)
|
||||||
|
|
||||||
|
After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices. Enrollment can be done for business or personal devices, allowing the devices to use your managed apps and to sync with your managed content and information.
|
||||||
|
|
||||||
|
**To deploy your WIP policy**
|
||||||
|
|
||||||
|
1. On the **App policy** pane, click your newly-created policy, click **User groups** from the menu that appears, and then click **Add user group**.
|
||||||
|
|
||||||
|
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** pane.
|
||||||
|
|
||||||
|
2. Choose the group you want your policy to apply to, and then click **Select** to deploy the policy.
|
||||||
|
|
||||||
|
The policy is deployed to the selected users' devices.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
- [Create a Windows Information Protection (WIP) policy using Microsoft Intune](create-wip-policy-using-intune.md)
|
||||||
|
|
||||||
|
- [Associate and deploy your Windows Information Protection (WIP) and VPN policies by using Microsoft Intune](create-vpn-and-wip-policy-using-intune.md)
|
||||||
|
|
||||||
|
- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Deploy your Windows Information Protection (WIP) policy using Microsoft Intune (Windows 10)
|
title: Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune (Windows 10)
|
||||||
description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
description: After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices.
|
||||||
ms.assetid: 9c4a01e7-0b1c-4f15-95d0-0389f0686211
|
ms.assetid: 9c4a01e7-0b1c-4f15-95d0-0389f0686211
|
||||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, Intune
|
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, Intune
|
||||||
@ -11,11 +11,11 @@ author: eross-msft
|
|||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy your Windows Information Protection (WIP) policy using Microsoft Intune
|
# Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10, version 1607
|
- Windows 10, version 1607 and later
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile, version 1607 and later
|
||||||
|
|
||||||
After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices. Enrollment can be done for business or personal devices, allowing the devices to use your managed apps and to sync with your managed content and information.
|
After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices. Enrollment can be done for business or personal devices, allowing the devices to use your managed apps and to sync with your managed content and information.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10)
|
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10)
|
||||||
description: Learn the difference between enlightened and unenlightened apps, and then review the list of enlightened apps provided by Microsoft along with the text you will need to use to add them to your Protected Apps list.
|
description: Learn the difference between enlightened and unenlightened apps, and then review the list of enlightened apps provided by Microsoft along with the text you will need to use to add them to your allowed apps list.
|
||||||
ms.assetid: 17c85ea3-9b66-4b80-b511-8f277cb4345f
|
ms.assetid: 17c85ea3-9b66-4b80-b511-8f277cb4345f
|
||||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -21,7 +21,7 @@ localizationpriority: high
|
|||||||
Learn the difference between enlightened and unenlightened apps, and then review the list of enlightened apps provided by Microsoft along with the text you will need to use to add them to your allowed apps list.
|
Learn the difference between enlightened and unenlightened apps, and then review the list of enlightened apps provided by Microsoft along with the text you will need to use to add them to your allowed apps list.
|
||||||
|
|
||||||
## Enlightened versus unenlightened apps
|
## Enlightened versus unenlightened apps
|
||||||
Apps can be enlightened (also referred to as WIP-aware) or unenlightened (also referred to as WIP-unaware).
|
Apps can be enlightened or unenlightened:
|
||||||
|
|
||||||
- **Enlightened apps** can differentiate between corporate and personal data, correctly determining which to protect, based on your policies.
|
- **Enlightened apps** can differentiate between corporate and personal data, correctly determining which to protect, based on your policies.
|
||||||
|
|
||||||
@ -31,6 +31,8 @@ Apps can be enlightened (also referred to as WIP-aware) or unenlightened (also r
|
|||||||
|
|
||||||
- Windows **Save As** experiences only allow you to save your files as enterprise.
|
- Windows **Save As** experiences only allow you to save your files as enterprise.
|
||||||
|
|
||||||
|
- **WIP-work only apps** are unenlightened line-of-business apps that have been tested and deemed safe for use in an enterprise with WIP and Mobile App Management (MAM) solutions.
|
||||||
|
|
||||||
## List of enlightened Microsoft apps
|
## List of enlightened Microsoft apps
|
||||||
Microsoft has made a concerted effort to enlighten several of our more popular apps, including the following:
|
Microsoft has made a concerted effort to enlighten several of our more popular apps, including the following:
|
||||||
|
|
||||||
@ -42,9 +44,13 @@ Microsoft has made a concerted effort to enlighten several of our more popular a
|
|||||||
|
|
||||||
- Mobile Office apps, including Word, Excel, PowerPoint, OneNote, and Outlook Mail and Calendar
|
- Mobile Office apps, including Word, Excel, PowerPoint, OneNote, and Outlook Mail and Calendar
|
||||||
|
|
||||||
- Microsoft Photos
|
- Office 365 ProPlus apps, including Word, Excel, PowerPoint, OneNote, and Outlook
|
||||||
|
|
||||||
<!-- Microsoft OneDrive -->
|
- OneDrive app
|
||||||
|
|
||||||
|
- OneDrive sync client (OneDrive.exe, the next generation sync client)
|
||||||
|
|
||||||
|
- Microsoft Photos
|
||||||
|
|
||||||
- Groove Music
|
- Groove Music
|
||||||
|
|
||||||
@ -58,6 +64,11 @@ Microsoft has made a concerted effort to enlighten several of our more popular a
|
|||||||
|
|
||||||
- Microsoft Remote Desktop
|
- Microsoft Remote Desktop
|
||||||
|
|
||||||
|
## List of WIP-work only apps from Microsoft
|
||||||
|
Microsoft still has apps that are unenlightened, but which have been tested and deemed safe for use in an enterprise with WIP and MAM solutions.
|
||||||
|
|
||||||
|
- Skype for Business
|
||||||
|
|
||||||
## Adding enlightened Microsoft apps to the allowed apps list
|
## Adding enlightened Microsoft apps to the allowed apps list
|
||||||
You can add any or all of the enlightened Microsoft apps to your allowed apps list. Included here is the **Publisher name**, **Product or File name**, and **App Type** info for both Microsoft Intune and System Center Configuration Manager.
|
You can add any or all of the enlightened Microsoft apps to your allowed apps list. Included here is the **Publisher name**, **Product or File name**, and **App Type** info for both Microsoft Intune and System Center Configuration Manager.
|
||||||
|
|
||||||
@ -70,12 +81,14 @@ You can add any or all of the enlightened Microsoft apps to your allowed apps li
|
|||||||
|PowerPoint Mobile |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.Office.PowerPoint<br>**App Type:** Universal app |
|
|PowerPoint Mobile |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.Office.PowerPoint<br>**App Type:** Universal app |
|
||||||
|OneNote |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.Office.OneNote<br>**App Type:** Universal app |
|
|OneNote |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.Office.OneNote<br>**App Type:** Universal app |
|
||||||
|Outlook Mail and Calendar |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** microsoft.windowscommunicationsapps<br>**App Type:** Universal app |
|
|Outlook Mail and Calendar |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** microsoft.windowscommunicationsapps<br>**App Type:** Universal app |
|
||||||
|
|Office 365 ProPlus|Office 365 ProPlus apps are set up as a suite. You must use the [O365 ProPlus - Allow and Exempt AppLocker policy files (.zip files)](http://download.microsoft.com/download/7/0/D/70D72459-D72D-4673-B309-F480E3BEBCC9/O365%20ProPlus%20-%20WIP%20Enterprise%20AppLocker%20Policy%20Files.zip) to turn the suite on for WIP.<br>We don't recommend setting up Office by using individual paths or publisher rules.|
|
||||||
|Microsoft Photos |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.Windows.Photos<br>**App Type:** Universal app |
|
|Microsoft Photos |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.Windows.Photos<br>**App Type:** Universal app |
|
||||||
|Groove Music |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.ZuneMusic<br>**App Type:** Universal app |
|
|Groove Music |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.ZuneMusic<br>**App Type:** Universal app |
|
||||||
|Microsoft Movies & TV |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.ZuneVideo<br>**App Type:** Universal app |
|
|Microsoft Movies & TV |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.ZuneVideo<br>**App Type:** Universal app |
|
||||||
|Microsoft Messaging |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.Messaging<br>**App Type:** Universal app |
|
|Microsoft Messaging |**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.Messaging<br>**App Type:** Universal app |
|
||||||
|IE11 |**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** iexplore.exe<br>**App Type:** Desktop app |
|
|IE11 |**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** iexplore.exe<br>**App Type:** Desktop app |
|
||||||
|Microsoft OneDrive |**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** onedrive.exe<br>**App Type:** Desktop app|
|
|OneDrive Sync Client|**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** onedrive.exe<br>**App Type:** Desktop app|
|
||||||
|
|OneDrive app|**Publisher:** `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Product Name:** Microsoft.Microsoftskydrive<br>**Product Version:**Product version: 17.21.0.0 (and later)<br>**App Type:** Universal app |
|
||||||
|Notepad |**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** notepad.exe<br>**App Type:** Desktop app |
|
|Notepad |**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** notepad.exe<br>**App Type:** Desktop app |
|
||||||
|Microsoft Paint |**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** mspaint.exe<br>**App Type:** Desktop app |
|
|Microsoft Paint |**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** mspaint.exe<br>**App Type:** Desktop app |
|
||||||
|Microsoft Remote Desktop |**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** mstsc.exe<br>**App Type:** Desktop app |
|
|Microsoft Remote Desktop |**Publisher:** `O=Microsoft Corporation, L=Redmond, S=Washington, C=US`<br>**Binary Name:** mstsc.exe<br>**App Type:** Desktop app |
|
||||||
|
@ -24,7 +24,7 @@ This list provides all of the tasks and settings that are required for the opera
|
|||||||
|Task|Description|
|
|Task|Description|
|
||||||
|----|-----------|
|
|----|-----------|
|
||||||
|Add at least one app to the **Allowed apps** list in your WIP policy.|You must have at least one app added to your **Allowed apps** list. For more info about where this area is and how to add apps, see the **Add apps to your Allowed apps list** section of the policy creation topics.|
|
|Add at least one app to the **Allowed apps** list in your WIP policy.|You must have at least one app added to your **Allowed apps** list. For more info about where this area is and how to add apps, see the **Add apps to your Allowed apps list** section of the policy creation topics.|
|
||||||
|Choose your WIP protection level.|You must choose the level of protection you want to apply to your WIP-protected content, including **Override**, **Silent**, or **Block**. For more info about where this area is and how to decide on your protection level, see the **Manage the WIP protection mode for your enterprise data** section of the policy creation topics. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).|
|
|Choose your WIP protection level.|You must choose the level of protection you want to apply to your WIP-protected content, including **Allow Overrides**, **Silent**, or **Hide Overrides**. For more info about where this area is and how to decide on your protection level, see the **Manage the WIP protection mode for your enterprise data** section of the policy creation topics. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).|
|
||||||
|Specify your corporate identity.|This field is automatically filled out for you by Microsoft Intune. However, you must manually correct it if it’s incorrect or if you need to add additional domains. For more info about where this area is and what it means, see the **Define your enterprise-managed corporate identity** section of the policy creation topics.
|
|Specify your corporate identity.|This field is automatically filled out for you by Microsoft Intune. However, you must manually correct it if it’s incorrect or if you need to add additional domains. For more info about where this area is and what it means, see the **Define your enterprise-managed corporate identity** section of the policy creation topics.
|
||||||
|Specify your network domain names.|Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected. For more info about where this area is and how to add your suffixes, see the table that appears in the **Choose where apps can access enterprise data** section of the policy creation topics.|
|
|Specify your network domain names.|Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected. For more info about where this area is and how to add your suffixes, see the table that appears in the **Choose where apps can access enterprise data** section of the policy creation topics.|
|
||||||
|Specify your enterprise IPv4 or IPv6 ranges.|Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the addresses for a valid IPv4 or IPv6 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries. For more info about where this area is and what it means, see the table that appears in the **Define your enterprise-managed corporate identity** section of the policy creation topics.|
|
|Specify your enterprise IPv4 or IPv6 ranges.|Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the addresses for a valid IPv4 or IPv6 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries. For more info about where this area is and what it means, see the table that appears in the **Define your enterprise-managed corporate identity** section of the policy creation topics.|
|
||||||
|
@ -21,7 +21,8 @@ Microsoft Intune and System Center Configuration Manager helps you create and de
|
|||||||
## In this section
|
## In this section
|
||||||
|Topic |Description |
|
|Topic |Description |
|
||||||
|------|------------|
|
|------|------------|
|
||||||
|[Create a Windows Information Protection (WIP) policy using Microsoft Intune](create-wip-policy-using-intune.md) |Intune helps you create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
|[Create a Windows Information Protection (WIP) policy using the classic console for Microsoft Intune](create-wip-policy-using-intune.md) |Details about how to use the classic console for Microsoft Intune to create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
||||||
|
|[Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
||||||
|[Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](create-wip-policy-using-sccm.md) |System Center Configuration Manager helps you create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
|[Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](create-wip-policy-using-sccm.md) |System Center Configuration Manager helps you create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
||||||
|[Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) |Steps to create, verify, and perform a quick recovery using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate. |
|
|[Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) |Steps to create, verify, and perform a quick recovery using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate. |
|
||||||
|[Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](wip-app-enterprise-context.md) |Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP). |
|
|[Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](wip-app-enterprise-context.md) |Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP). |
|
||||||
|
@ -76,13 +76,13 @@ WIP gives you a new way to manage data policy enforcement for apps and documents
|
|||||||
|
|
||||||
- **Copying or downloading enterprise data.** When an employee or an app downloads content from a location like SharePoint, a network share, or an enterprise web location, while using a WIP-protected device, WIP encrypts the data on the device.
|
- **Copying or downloading enterprise data.** When an employee or an app downloads content from a location like SharePoint, a network share, or an enterprise web location, while using a WIP-protected device, WIP encrypts the data on the device.
|
||||||
|
|
||||||
- **Using allowed apps.** Managed apps (apps that you've included on the **Allowed apps** list in your WIP policy) are allowed to access your enterprise data and will interact differently when used with unallowed, non-enterprise aware, or personal-only apps. For example, if WIP management is set to **Block**, your employees can copy and paste from one protected app to another allowed app, but not to personal apps. Imagine an HR person wants to copy a job description from an allowed app to the internal career website, an enterprise-protected location, but goofs and tries to paste into a personal app instead. The paste action fails and a notification pops up, saying that the app couldn’t paste because of a policy restriction. The HR person then correctly pastes to the career website without a problem.
|
- **Using allowed apps.** Managed apps (apps that you've included on the **Allowed apps** list in your WIP policy) are allowed to access your enterprise data and will interact differently when used with unallowed, non-enterprise aware, or personal-only apps. For example, if WIP management is set to **Hide overrides**, your employees can copy and paste from one protected app to another allowed app, but not to personal apps. Imagine an HR person wants to copy a job description from an allowed app to the internal career website, an enterprise-protected location, but goofs and tries to paste into a personal app instead. The paste action fails and a notification pops up, saying that the app couldn’t paste because of a policy restriction. The HR person then correctly pastes to the career website without a problem.
|
||||||
|
|
||||||
- **Managed apps and restrictions.** With WIP you can control which apps can access and use your enterprise data. After adding an app to your allowed apps list, the app is trusted with enterprise data. All apps not on this list are stopped from accessing your enterprise data, depending on your WIP management-mode.
|
- **Managed apps and restrictions.** With WIP you can control which apps can access and use your enterprise data. After adding an app to your allowed apps list, the app is trusted with enterprise data. All apps not on this list are stopped from accessing your enterprise data, depending on your WIP management-mode.
|
||||||
|
|
||||||
You don’t have to modify line-of-business apps that never touch personal data to list them as allowed apps; just include them in the allowed apps list.
|
You don’t have to modify line-of-business apps that never touch personal data to list them as allowed apps; just include them in the allowed apps list.
|
||||||
|
|
||||||
- **Deciding your level of data access.** WIP lets you block overrides, allow overrides, or audit employees' data sharing actions. Blocking overrides stops the action immediately. Allowing overrides lets the employee know there's a risk, but lets him or her continue to share the data while recording and auditing the action. Silent just logs the action without stopping anything that the employee could've overridden while using that setting; collecting info that can help you to see patterns of inappropriate sharing so you can take educative action or find apps that should be added to your allowed apps list. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).
|
- **Deciding your level of data access.** WIP lets you hide overrides, allow overrides, or audit employees' data sharing actions. Hiding overrides stops the action immediately. Allowing overrides lets the employee know there's a risk, but lets him or her continue to share the data while recording and auditing the action. Silent just logs the action without stopping anything that the employee could've overridden while using that setting; collecting info that can help you to see patterns of inappropriate sharing so you can take educative action or find apps that should be added to your allowed apps list. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).
|
||||||
|
|
||||||
|
|
||||||
- **Data encryption at rest.** WIP helps protect enterprise data on local files and on removable media.
|
- **Data encryption at rest.** WIP helps protect enterprise data on local files and on removable media.
|
||||||
@ -131,8 +131,8 @@ You can set your WIP policy to use 1 of 4 protection and management modes:
|
|||||||
|
|
||||||
|Mode|Description|
|
|Mode|Description|
|
||||||
|----|-----------|
|
|----|-----------|
|
||||||
|Block |WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing enterprise data to non-enterprise-protected apps in addition to sharing enterprise data between apps or attempting to share outside of your organization’s network.|
|
|Hide overrides |WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing enterprise data to non-enterprise-protected apps in addition to sharing enterprise data between apps or attempting to share outside of your organization’s network.|
|
||||||
|Override |WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log.|
|
|Allow overrides |WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log.|
|
||||||
|Silent |WIP runs silently, logging inappropriate data sharing, without stopping anything that would’ve been prompted for employee interaction while in Allow overrides mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still stopped.|
|
|Silent |WIP runs silently, logging inappropriate data sharing, without stopping anything that would’ve been prompted for employee interaction while in Allow overrides mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still stopped.|
|
||||||
|Off |WIP is turned off and doesn't help to protect or audit your data.<p>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.<p>**Note**<br>For more info about setting your WIP-protection modes, see either [Create a Windows Information Protection (WIP) policy using Intune](create-wip-policy-using-intune.md) or [Create and deploy a Windows Information Protection (WIP) policy using Configuration Manager](create-wip-policy-using-sccm.md), depending on your management solution. |
|
|Off |WIP is turned off and doesn't help to protect or audit your data.<p>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.<p>**Note**<br>For more info about setting your WIP-protection modes, see either [Create a Windows Information Protection (WIP) policy using Intune](create-wip-policy-using-intune.md) or [Create and deploy a Windows Information Protection (WIP) policy using Configuration Manager](create-wip-policy-using-sccm.md), depending on your management solution. |
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ We recommend that you add the following URLs to the Enterprise Cloud Resources a
|
|||||||
## Recommended Enterprise Cloud Resources
|
## Recommended Enterprise Cloud Resources
|
||||||
This table includes the recommended URLs to add to your Enterprise Cloud Resources network setting, based on the apps you use in your organization.
|
This table includes the recommended URLs to add to your Enterprise Cloud Resources network setting, based on the apps you use in your organization.
|
||||||
|
|
||||||
|If your organization uses... |Add these entries to your Enterprise Cloud Resources network setting<br>(Replace "contoso" with your domain name(s) |
|
|If your organization uses... |Add these entries to your Enterprise Cloud Resources network setting<br>(Replace "contoso" with your domain name(s)|
|
||||||
|-----------------------------|---------------------------------------------------------------------|
|
|-----------------------------|---------------------------------------------------------------------|
|
||||||
|Office 365 for Business |<ul><li>contoso.sharepoint.com</li><li>contoso-my.sharepoint.com</li><li>contoso-files.sharepoint.com</li><li>tasks.office.com</li><li>protection.office.com</li><li>meet.lync.com</li><li>teams.microsoft.com</li></ul> |
|
|Office 365 for Business |<ul><li>contoso.sharepoint.com</li><li>contoso-my.sharepoint.com</li><li>contoso-files.sharepoint.com</li><li>tasks.office.com</li><li>protection.office.com</li><li>meet.lync.com</li><li>teams.microsoft.com</li></ul> |
|
||||||
|Yammer |<ul><li>www.yammer.com</li><li>yammer.com</li><li>persona.yammer.com</li></ul> |
|
|Yammer |<ul><li>www.yammer.com</li><li>yammer.com</li><li>persona.yammer.com</li></ul> |
|
||||||
|
Loading…
x
Reference in New Issue
Block a user