mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge branch 'main' into cz-20220512-evalcenter
This commit is contained in:
commit
dd0ac80f9f
@ -13,7 +13,6 @@ manager: dansimp
|
||||
|
||||
# AccountManagement CSP
|
||||
|
||||
|
||||
AccountManagement CSP is used to configure setting in the Account Manager service in Windows Holographic for Business edition. Added in Windows 10, version 1803.
|
||||
|
||||
> [!NOTE]
|
||||
@ -41,7 +40,9 @@ Interior node.
|
||||
<a href="" id="accountmanagement-userprofilemanagement-deletionpolicy"></a>**UserProfileManagement/EnableProfileManager**
|
||||
Enable profile lifetime management for shared or communal device scenarios. Default value is false.
|
||||
|
||||
Supported operations are Add, Get, Replace, and Delete. Value type is bool.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
Value type is bool.
|
||||
|
||||
<a href="" id="accountmanagement-userprofilemanagement-storagecapacitystartdeletion"></a>**UserProfileManagement/DeletionPolicy**
|
||||
Configures when profiles will be deleted. Default value is 1.
|
||||
@ -52,19 +53,29 @@ Valid values:
|
||||
- 1 - delete at storage capacity threshold
|
||||
- 2 - delete at both storage capacity threshold and profile inactivity threshold
|
||||
|
||||
Supported operations are Add, Get, Replace, and Delete. Value type is integer.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
Value type is integer.
|
||||
|
||||
<a href="" id="accountmanagement-userprofilemanagement-storagecapacitystopdeletion"></a>**UserProfileManagement/StorageCapacityStartDeletion**
|
||||
Start deleting profiles when available storage capacity falls below this threshold, given as percent of total storage available for profiles. Profiles that have been inactive the longest will be deleted first. Default value is 25.
|
||||
|
||||
Supported operations are Add, Get, Replace, and Delete. Value type is integer.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
Value type is integer.
|
||||
|
||||
<a href="" id="accountmanagement-userprofilemanagement-storagecapacitystopdeletion"></a>**UserProfileManagement/StorageCapacityStopDeletion**
|
||||
Stop deleting profiles when available storage capacity is brought up to this threshold, given as percent of total storage available for profiles. Default value is 50.
|
||||
|
||||
Supported operations are Add, Get, Replace, and Delete. Value type is integer.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
Value type is integer.
|
||||
|
||||
<a href="" id="accountmanagement-userprofilemanagement-profileinactivitythreshold"></a>**UserProfileManagement/ProfileInactivityThreshold**
|
||||
Start deleting profiles when they haven't been logged on during the specified period, given as number of days. Default value is 30.
|
||||
|
||||
Supported operations are Add, Get, Replace, and Delete. Value type is integer.
|
||||
|
||||
## Related topics
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
@ -13,7 +13,6 @@ manager: dansimp
|
||||
|
||||
# AccountManagement DDF file
|
||||
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **AccountManagement** configuration service provider.
|
||||
|
||||
The XML below is for Windows 10, version 1803.
|
||||
@ -74,7 +73,7 @@ The XML below is for Windows 10, version 1803.
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>false</DefaultValue>
|
||||
<Description>Enable profile lifetime mangement for shared or communal device scenarios.</Description>
|
||||
<Description>Enable profile lifetime management for shared or communal device scenarios.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -198,3 +197,7 @@ The XML below is for Windows 10, version 1803.
|
||||
</Node>
|
||||
</MgmtTree>
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[AccountManagement configuration service provider](accountmanagement-csp.md)
|
@ -11,15 +11,23 @@ ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# Accounts Configuration Service Provider
|
||||
# Accounts CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and join it to a local user group. This CSP was added in Windows 10, version 1803.
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|No|No|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and join it to a local user group. This CSP was added in Windows 10, version 1803, and later.
|
||||
|
||||
The following syntax shows the Accounts configuration service provider in tree format.
|
||||
|
||||
```
|
||||
```console
|
||||
./Device/Vendor/MSFT
|
||||
Accounts
|
||||
----Domain
|
||||
@ -55,10 +63,10 @@ Supported operation is Add.
|
||||
Interior node for the user account information.
|
||||
|
||||
<a href="" id="users-username"></a>**Users/_UserName_**
|
||||
This node specifies the username for a new local user account. This setting can be managed remotely.
|
||||
This node specifies the username for a new local user account. This setting can be managed remotely.
|
||||
|
||||
<a href="" id="users-username-password"></a>**Users/_UserName_/Password**
|
||||
This node specifies the password for a new local user account. This setting can be managed remotely.
|
||||
This node specifies the password for a new local user account. This setting can be managed remotely.
|
||||
|
||||
Supported operation is Add.
|
||||
GET operation isn't supported. This setting will report as failed when deployed from the Endpoint Manager.
|
||||
@ -67,3 +75,7 @@ GET operation isn't supported. This setting will report as failed when deployed
|
||||
This optional node specifies the local user group that a local user account should be joined to. If the node isn't set, the new local user account is joined just to the Standard Users group. Set the value to 2 for Administrators group. This setting can be managed remotely.
|
||||
|
||||
Supported operation is Add.
|
||||
|
||||
## Related topics
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Accounts DDF file
|
||||
description: XML file containing the device description framework (DDF) for the Accounts configuration service provider.
|
||||
description: View the XML file containing the device description framework (DDF) for the Accounts configuration service provider.
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
@ -11,12 +11,11 @@ ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# Accounts CSP
|
||||
|
||||
# Accounts DDF file
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **Accounts** configuration service provider.
|
||||
|
||||
The XML below is for Windows 10, version 1803.
|
||||
The XML below is for Windows 10, version 1803 and later.
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
@ -157,7 +156,7 @@ The XML below is for Windows 10, version 1803.
|
||||
<Add />
|
||||
</AccessType>
|
||||
<DefaultValue>1</DefaultValue>
|
||||
<Description>This optional node specifies the local user group that a local user account should be joined to. If the node is not set, the new local user account is joined just to the Standard Users group. Set the value to 2 for Administrators group. This setting can be managed remotely.</Description>
|
||||
<Description>This optional node specifies the local user group that a local user account should be joined. If the node is not set, the new local user account is joined just to the Standard Users group. Set the value to 2 for Administrators group. This setting can be managed remotely.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -177,3 +176,7 @@ The XML below is for Windows 10, version 1803.
|
||||
</Node>
|
||||
</MgmtTree>
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[Accounts configuration service provider](accounts-csp.md)
|
@ -14,23 +14,30 @@ ms.date: 06/26/2017
|
||||
|
||||
# ActiveSync CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The ActiveSync configuration service provider is used to set up and change settings for Exchange ActiveSync. After an Exchange account has been updated over-the-air by the ActiveSync configuration service provider, the device must be powered off and then powered back on to see sync status.
|
||||
|
||||
Configuring Windows Live ActiveSync accounts through this configuration service provider isn't supported.
|
||||
|
||||
> [!NOTE]
|
||||
> The target user must be logged in for the CSP to succeed. The correct way to configure an account is to use the ./User/Vendor/MSFT/ActiveSync path.
|
||||
> The target user must be logged in for the CSP to succeed. The correct way to configure an account is to use the `./User/Vendor/MSFT/ActiveSync` path.
|
||||
|
||||
On the desktop, only per user configuration (./User/Vendor/MSFT/ActiveSync) is supported. However, the ./Vendor/MSFT/ActiveSync path will work if the user is logged in. The CSP fails when no user is logged in.
|
||||
On the desktop, only per user configuration `./User/Vendor/MSFT/ActiveSync` is supported. However, the `./Vendor/MSFT/ActiveSync` path will work if the user is logged in. The CSP fails when no user is logged in.
|
||||
|
||||
The ./Vendor/MSFT/ActiveSync path is deprecated, but will continue to work in the short term.
|
||||
|
||||
|
||||
The `./Vendor/MSFT/ActiveSync path` is deprecated, but will continue to work in the short term.
|
||||
|
||||
The following example shows the ActiveSync configuration service provider management objects in tree format as used by Open Mobile Alliance Device Management (OMA DM), OMA Client Provisioning, and Enterprise DM.
|
||||
|
||||
```
|
||||
```console
|
||||
./Vendor/MSFT
|
||||
ActiveSync
|
||||
----Accounts
|
||||
@ -66,13 +73,11 @@ ActiveSync
|
||||
The root node for the ActiveSync configuration service provider.
|
||||
|
||||
> [!NOTE]
|
||||
> The target user must be logged in for the CSP to succeed. The correct way to configure an account is to use the ./User/Vendor/MSFT/ActiveSync path.
|
||||
> The target user must be logged in for the CSP to succeed. The correct way to configure an account is to use the `./User/Vendor/MSFT/ActiveSync` path.
|
||||
|
||||
On the desktop, only per user configuration (./User/Vendor/MSFT/ActiveSync) is supported. However, the ./Vendor/MSFT/ActiveSync will work if the user is logged in. The CSP fails when no user is logged in.
|
||||
On the desktop, only per user configuration `./User/Vendor/MSFT/ActiveSync` is supported. However, the ./Vendor/MSFT/ActiveSync will work if the user is logged in. The CSP fails when no user is logged in.
|
||||
|
||||
The ./Vendor/MSFT/ActiveSync path is deprecated, but will continue to work in the short term.
|
||||
|
||||
|
||||
The `./Vendor/MSFT/ActiveSync` path is deprecated, but will continue to work in the short term.
|
||||
|
||||
The supported operation is Get.
|
||||
|
||||
@ -264,7 +269,6 @@ Required. A character string that specifies the name of the content type.
|
||||
> [!NOTE]
|
||||
> In Windows 10, this node is currently not working.
|
||||
|
||||
|
||||
Supported operations are Get, Replace, and Add (can't Add after the account is created).
|
||||
|
||||
When you use Add or Replace inside an atomic block in the SyncML, the CSP returns an error and provisioning fails. When you use Add or Replace outside of the atomic block, the error is ignored and the account is provisioned as expected.
|
||||
@ -275,7 +279,9 @@ Node for mail body type and email age filter.
|
||||
<a href="" id="policies-mailbodytype"></a>**Policies/MailBodyType**
|
||||
Required. Specifies the email body type: HTML or plain.
|
||||
|
||||
Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is string.
|
||||
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
<a href="" id="policies-maxmailagefilter"></a>**Policies/MaxMailAgeFilter**
|
||||
Required. Specifies the time window used for syncing mail items to the device.
|
||||
@ -284,7 +290,6 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
@ -14,7 +14,6 @@ ms.date: 12/05/2017
|
||||
|
||||
# ActiveSync DDF file
|
||||
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **ActiveSync** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
@ -533,7 +532,7 @@ The XML below is the current version for this CSP.
|
||||
<Replace />
|
||||
<Delete />
|
||||
</AccessType>
|
||||
<Description>Enables or disables syncing email, contacts, task, and calendar.Each is represented by a GUID.Email: {c6d47067-6e92-480e-b0fc-4ba82182fac7}. Contacts: {0dd8685c-e272-4fcb-9ecf-2ead7ea2497b}.Calendar: {4a5d9fe0-f139-4a63-a5a4-4f31ceea02ad}. Tasks:{783ae4f6-4c12-4423-8270-66361260d4f1}</Description>
|
||||
<Description>Enables or disables syncing email, contacts, task, and calendar. Each is represented by a GUID.Email: {c6d47067-6e92-480e-b0fc-4ba82182fac7}. Contacts: {0dd8685c-e272-4fcb-9ecf-2ead7ea2497b}.Calendar: {4a5d9fe0-f139-4a63-a5a4-4f31ceea02ad}. Tasks:{783ae4f6-4c12-4423-8270-66361260d4f1}</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -679,15 +678,4 @@ The XML below is the current version for this CSP.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[ActiveSync configuration service provider](activesync-csp.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -14,21 +14,18 @@ ms.date: 06/26/2017
|
||||
|
||||
# AllJoynManagement CSP
|
||||
|
||||
|
||||
The AllJoynManagement configuration service provider (CSP) allows an IT administrator to enumerate the AllJoyn devices that are connected to the AllJoyn bus. The devices must support the Microsoft AllJoyn configuration interface (com.microsoft.alljoynmanagement.config). You can also push configuration files to the same devices. To populate the various nodes when setting new configuration, we recommend that you do a query first, to get the actual values for all the nodes in all the attached devices. You can then use the information from the query to set the node values when pushing the new configuration.
|
||||
The AllJoynManagement configuration service provider (CSP) allows an IT administrator to enumerate the AllJoyn devices that are connected to the AllJoyn bus. The devices must support the Microsoft AllJoyn configuration interface (`com.microsoft.alljoynmanagement.config`). You can also push configuration files to the same devices. To populate the various nodes when setting new configuration, we recommend that you do a query first, to get the actual values for all the nodes in all the attached devices. You can then use the information from the query to set the node values when pushing the new configuration.
|
||||
|
||||
> [!NOTE]
|
||||
> The AllJoynManagement configuration service provider (CSP) is only supported in Windows 10 IoT Core (IoT Core).
|
||||
|
||||
This CSP was added in Windows 10, version 1511.
|
||||
|
||||
|
||||
|
||||
For the firewall settings, note that PublicProfile and PrivateProfile are mutually exclusive. The Private Profile must be set on the directly on the device itself, and the only supported operation is Get. For PublicProfile, both Add and Get are supported. This CSP is intended to be used in conjunction with the AllJoyn Device System Bridge, and an understanding of the bridge will help when determining when and how to use this CSP. For more information, see [Device System Bridge (DSB)](https://wikipedia.org/wiki/AllJoyn). For more information, see [AllJoyn - Wikipedia](https://wikipedia.org/wiki/AllJoyn).
|
||||
For the firewall settings, note that PublicProfile and PrivateProfile are mutually exclusive. The Private Profile must be set directly on the device itself, and the only supported operation is Get. For PublicProfile, both Add and Get are supported. This CSP is intended to be used with the AllJoyn Device System Bridge, and an understanding of the bridge will help when determining when and how to use this CSP. For more information, see [Device System Bridge (DSB)](https://wikipedia.org/wiki/AllJoyn). For more information, see [AllJoyn - Wikipedia](https://wikipedia.org/wiki/AllJoyn).
|
||||
|
||||
The following example shows the AllJoynManagement configuration service provider in tree format
|
||||
|
||||
```
|
||||
```console
|
||||
./Vendor/MSFT
|
||||
AllJoynManagement
|
||||
----Configurations
|
||||
@ -64,7 +61,7 @@ The following list describes the characteristics and parameters.
|
||||
The root node for the AllJoynManagement configuration service provider.
|
||||
|
||||
<a href="" id="services"></a>**Services**
|
||||
List of all AllJoyn objects that are discovered on the AllJoyn bus. All AllJoyn objects that expose the "com.microsoft.alljoynmanagement.config" are included.
|
||||
List of all AllJoyn objects that are discovered on the AllJoyn bus. All AllJoyn objects that expose the "`com.microsoft.alljoynmanagement.config`" are included.
|
||||
|
||||
<a href="" id="services-node-name"></a>**Services/**<strong>*Node name*</strong>
|
||||
The unique AllJoyn device ID (a GUID) that hosts one or more configurable objects.
|
||||
@ -81,7 +78,7 @@ The set of configurable interfaces that are available on the port of the AllJoyn
|
||||
<a href="" id="services-node-name-port-node-name-cfgobject-node-name"></a>**Services/*Node name*/Port/*Node name*/CfgObject/**<strong>*Node name*</strong>
|
||||
The remainder of this URI is an escaped path to the configurable AllJoyn object hosted by the parent ServiceID and accessible by the parent PortNum.
|
||||
|
||||
For example an AllJoyn Bridge with the Microsoft specific AllJoyn configuration interface "\\FabrikamService\\BridgeConfig" would be specified in the URI as: %2FFabrikamService%2FBridgeConfig.
|
||||
For example an AllJoyn Bridge with the Microsoft specific AllJoyn configuration interface "`\\FabrikamService\\BridgeConfig`" would be specified in the URI as: `%2FFabrikamService%2FBridgeConfig`.
|
||||
|
||||
<a href="" id="credentials"></a>**Credentials**
|
||||
This is the credential store. An administrator can set credentials for each AllJoyn device that requires authentication at this node.
|
||||
@ -105,7 +102,6 @@ Boolean value indicating whether AllJoyn router service (AJRouter.dll) is enable
|
||||
|
||||
## Examples
|
||||
|
||||
|
||||
Set adapter configuration
|
||||
|
||||
```xml
|
||||
@ -167,7 +163,9 @@ Get the firewall PrivateProfile
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
|
||||
## Related topics
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
||||
|
@ -14,7 +14,6 @@ ms.date: 12/05/2017
|
||||
|
||||
# AllJoynManagement DDF
|
||||
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **AllJoynManagement** configuration service provider. This CSP was added in Windows 10, version 1511.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
@ -238,7 +237,7 @@ It is typically implemented as a GUID.</Description>
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>An Alphanumeric KEY value that conforms to the AllJoyn SRP KEYX Authentication Standard</Description>
|
||||
<Description>An Alphanumeric KEY value that conforms to the AllJoyn SRP KEYX Authentication Standard.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -328,15 +327,4 @@ It is typically implemented as a GUID.</Description>
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[AllJoynManagement configuration service provider](alljoynmanagement-csp.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: APPLICATION configuration service provider
|
||||
title: APPLICATION CSP
|
||||
description: Learn how the APPLICATION configuration service provider is used to configure an application transport using Open Mobile Alliance (OMA) Client Provisioning.
|
||||
ms.assetid: 0705b5e9-a1e7-4d70-a73d-7f758ffd8099
|
||||
ms.reviewer:
|
||||
@ -12,16 +12,27 @@ author: dansimp
|
||||
ms.date: 06/26/2017
|
||||
---
|
||||
|
||||
# APPLICATION configuration service provider
|
||||
# APPLICATION CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|No|No|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The APPLICATION configuration service provider is used to configure an application transport using Open Mobile Alliance (OMA) Client Provisioning.
|
||||
|
||||
OMA considers each transport to be an application and requires a corresponding APPLICATION configuration service provider. The following list shows the supported transports.
|
||||
OMA considers each transport to be an application and requires a corresponding APPLICATION configuration service provider.
|
||||
|
||||
- w7, for bootstrapping a device with an OMA Device Management (OMA DM) account. For more information, see [w7 APPLICATION configuration service provider](w7-application-csp.md)
|
||||
The following list shows the supported transports:
|
||||
|
||||
- w4, for configuring Multimedia Messaging Service (MMS). For more information, see [w4 APPLICATION configuration service provider](w4-application-csp.md)
|
||||
- w7, for bootstrapping a device with an OMA Device Management (OMA DM) account. For more information, see [w7 APPLICATION configuration service provider](w7-application-csp.md).
|
||||
|
||||
- w4, for configuring Multimedia Messaging Service (MMS). For more information, see [w4 APPLICATION configuration service provider](w4-application-csp.md).
|
||||
|
||||
The APPID parameter differentiates these application transports. Each APPID must be registered with OMA, and any APPLICATION configuration service provider must be in the root of the provisioning document.
|
||||
|
||||
@ -29,15 +40,5 @@ For the device to decode correctly, provisioning XML that contains the APPLICATI
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -11,13 +11,10 @@ ms.date: 07/10/2019
|
||||
|
||||
# ApplicationControl CSP DDF
|
||||
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **ApplicationControl** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
|
||||
### ApplicationControl CSP
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE MgmtTree PUBLIC " -//OMA//DTD-DM-DDF 1.2//EN"
|
||||
@ -32,7 +29,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Root Node of the ApplicationControl CSP</Description>
|
||||
<Description>Root Node of the ApplicationControl CSP.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -73,7 +70,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>The GUID of the Policy</Description>
|
||||
<Description>The GUID of the Policy.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -97,7 +94,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>The policy binary encoded as base64</Description>
|
||||
<Description>The policy binary encoded as base64.</Description>
|
||||
<DFFormat>
|
||||
<b64 />
|
||||
</DFFormat>
|
||||
@ -119,7 +116,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Information Describing the Policy indicated by the GUID</Description>
|
||||
<Description>Information Describing the Policy indicated by the GUID.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -140,7 +137,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Version of the Policy indicated by the GUID, as a string. When parsing use a uint64 as the containing data type</Description>
|
||||
<Description>Version of the Policy indicated by the GUID, as a string. When parsing, use a uint64 as the containing data type.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -162,7 +159,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Whether the Policy indicated by the GUID is Effective on the system (loaded by the enforcement engine and in effect)</Description>
|
||||
<Description>Whether the Policy indicated by the GUID is effective on the system (loaded by the enforcement engine and in effect).</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -184,7 +181,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Whether the Policy indicated by the GUID is deployed on the system (on the physical machine)</Description>
|
||||
<Description>Whether the Policy indicated by the GUID is deployed on the system (on the physical machine).</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -206,7 +203,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Whether the Policy indicated by the GUID is authorized to be loaded by the enforcement engine on the system </Description>
|
||||
<Description>Whether the Policy indicated by the GUID is authorized to be loaded by the enforcement engine on the system. </Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -228,7 +225,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>The Current Status of the Policy Indicated by the Policy GUID</Description>
|
||||
<Description>The Current Status of the Policy Indicated by the Policy GUID.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -250,7 +247,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>The FriendlyName of the Policy Indicated by the Policy GUID</Description>
|
||||
<Description>The FriendlyName of the Policy Indicated by the Policy GUID.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -271,4 +268,8 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
</Node>
|
||||
</Node>
|
||||
</MgmtTree>
|
||||
```
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[ApplicationControl configuration service provider](applicationcontrol-csp.md)
|
@ -13,12 +13,23 @@ ms.date: 09/10/2020
|
||||
|
||||
# ApplicationControl CSP
|
||||
|
||||
Windows Defender Application Control (WDAC) policies can be managed from an MDM server or locally using PowerShell via the WMI Bridge through the ApplicationControl configuration service provider (CSP). The ApplicationControl CSP was added in Windows 10, version 1903. This CSP provides expanded diagnostic capabilities and support for [multiple policies](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies) (introduced in Windows 10, version 1903). It also provides support for rebootless policy deployment (introduced in Windows 10, version 1709). Unlike the [AppLocker CSP](applocker-csp.md), the ApplicationControl CSP correctly detects the presence of no-reboot option and hence doesn't schedule a reboot.
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
Windows Defender Application Control (WDAC) policies can be managed from an MDM server, or locally by using PowerShell via the WMI Bridge through the ApplicationControl configuration service provider (CSP). The ApplicationControl CSP was added in Windows 10, version 1903. This CSP provides expanded diagnostic capabilities and support for [multiple policies](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies) (introduced in Windows 10, version 1903). It also provides support for rebootless policy deployment (introduced in Windows 10, version 1709). Unlike the [AppLocker CSP](applocker-csp.md), the ApplicationControl CSP correctly detects the presence of no-reboot option and consequently doesn't schedule a reboot.
|
||||
|
||||
Existing WDAC policies deployed using the AppLocker CSP's CodeIntegrity node can now be deployed using the ApplicationControl CSP URI. Although WDAC policy deployment via the AppLocker CSP will continue to be supported, all new feature work will be done in the ApplicationControl CSP only.
|
||||
|
||||
The following example shows the ApplicationControl CSP in tree format.
|
||||
|
||||
```
|
||||
```console
|
||||
./Vendor/MSFT
|
||||
ApplicationControl
|
||||
----Policies
|
||||
@ -43,6 +54,7 @@ ApplicationControl
|
||||
----TenantID
|
||||
----DeviceID
|
||||
```
|
||||
|
||||
<a href="" id="vendor-msft-applicationcontrol"></a>**./Vendor/MSFT/ApplicationControl**
|
||||
Defines the root node for the ApplicationControl CSP.
|
||||
|
||||
@ -73,7 +85,7 @@ An interior node that contains the nodes that describe the policy indicated by t
|
||||
Scope is dynamic. Supported operation is Get.
|
||||
|
||||
<a href="" id="applicationcontrol-policies-policyguid-policyinfo-version"></a>**ApplicationControl/Policies/_Policy GUID_/PolicyInfo/Version**
|
||||
This node provides the version of the policy indicated by the GUID. Stored as a string, but when parsing use a uint64 as the containing data type.
|
||||
This node provides the version of the policy indicated by the GUID. Stored as a string, but when parsing uses a uint64 as the containing data type.
|
||||
|
||||
Scope is dynamic. Supported operation is Get.
|
||||
|
||||
@ -113,7 +125,7 @@ The following table provides the result of this policy based on different values
|
||||
|
||||
|IsAuthorized | IsDeployed | IsEffective | Resultant |
|
||||
|------------ | ---------- | ----------- | --------- |
|
||||
|True|True|True|Policy is currently running and in effect.|
|
||||
|True|True|True|Policy is currently running and is in effect.|
|
||||
|True|True|False|Policy requires a reboot to take effect.|
|
||||
|True|False|True|Policy requires a reboot to unload from CI.|
|
||||
|False|True|True|Not Reachable.|
|
||||
@ -122,14 +134,14 @@ The following table provides the result of this policy based on different values
|
||||
|False|False|True|Not Reachable.|
|
||||
|False|False|False|*Not Reachable.|
|
||||
|
||||
\* denotes a valid intermediary state; however, if an MDM transaction results in this state configuration, the END_COMMAND_PROCESSING will result in a fail.
|
||||
\* denotes a valid intermediary state; however, if an MDM transaction results in this state configuration, the `END_COMMAND_PROCESSING` will result in a fail.
|
||||
|
||||
<a href="" id="applicationcontrol-policies-policyguid-policyinfo-status"></a>**ApplicationControl/Policies/_Policy GUID_/PolicyInfo/Status**
|
||||
This node specifies whether the deployment of the policy indicated by the GUID was successful.
|
||||
|
||||
Scope is dynamic. Supported operation is Get.
|
||||
|
||||
Value type is integer. Default value is 0 == OK.
|
||||
Value type is integer. Default value is 0 = OK.
|
||||
|
||||
<a href="" id="applicationcontrol-policies-policyguid-policyinfo-friendlyname"></a>**ApplicationControl/Policies/_Policy GUID_/PolicyInfo/FriendlyName**
|
||||
This node provides the friendly name of the policy indicated by the policy GUID.
|
||||
@ -140,15 +152,15 @@ Value type is char.
|
||||
|
||||
## Microsoft Endpoint Manager (MEM) Intune Usage Guidance
|
||||
|
||||
For customers using Intune standalone or hybrid management with Configuration Manager (MEMCM) to deploy custom policies via the ApplicationControl CSP, refer to [Deploy Windows Defender Application Control policies by using Microsoft Intune](/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune).
|
||||
For customers using Intune standalone or hybrid management with Microsoft Endpoint Manager Configuration Manager (MEMCM) to deploy custom policies via the ApplicationControl CSP, refer to [Deploy Windows Defender Application Control policies by using Microsoft Intune](/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune).
|
||||
|
||||
## Generic MDM Server Usage Guidance
|
||||
|
||||
In order to use the ApplicationControl CSP without using Intune, you must:
|
||||
|
||||
1. Know a generated policy's GUID, which can be found in the policy xml as `<PolicyID>` or `<PolicyTypeID>` for pre-1903 systems.
|
||||
2. Convert the policies to binary format using the ConvertFrom-CIPolicy cmdlet in order to be deployed. The binary policy may be signed or unsigned.
|
||||
3. Create a policy node (a Base64-encoded blob of the binary policy representation) using the certutil -encode command-line tool.
|
||||
2. Convert the policies to binary format using the `ConvertFrom-CIPolicy` cmdlet in order to be deployed. The binary policy may be signed or unsigned.
|
||||
3. Create a policy node (a Base64-encoded blob of the binary policy representation) using the `certutil -encode` command-line tool.
|
||||
|
||||
Below is a sample certutil invocation:
|
||||
|
||||
@ -293,8 +305,8 @@ The ApplicationControl CSP can also be managed locally from PowerShell or via Mi
|
||||
|
||||
### Setup for using the WMI Bridge
|
||||
|
||||
1. Convert your WDAC policy to Base64
|
||||
2. Open PowerShell in Local System context (through PSExec or something similar)
|
||||
1. Convert your WDAC policy to Base64.
|
||||
2. Open PowerShell in Local System context (through PSExec or something similar).
|
||||
3. Use WMI Interface:
|
||||
|
||||
```powershell
|
||||
@ -315,4 +327,8 @@ New-CimInstance -Namespace $namespace -ClassName $policyClassName -Property @{Pa
|
||||
|
||||
```powershell
|
||||
Get-CimInstance -Namespace $namespace -ClassName $policyClassName
|
||||
```
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
@ -14,6 +14,15 @@ ms.date: 11/19/2019
|
||||
|
||||
# AppLocker CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The AppLocker configuration service provider is used to specify which applications are allowed or disallowed. There's no user interface shown for apps that are blocked.
|
||||
|
||||
@ -74,13 +83,11 @@ Defines restrictions for applications.
|
||||
|
||||
> [!NOTE]
|
||||
> When you create a list of allowed apps, all [inbox apps](#inboxappsandcomponents) are also blocked, and you must include them in your list of allowed apps. Don't forget to add the inbox apps for Phone, Messaging, Settings, Start, Email and accounts, Work and school, and other apps that you need.
|
||||
|
||||
>
|
||||
> Delete/unenrollment is not properly supported unless Grouping values are unique across enrollments. If multiple enrollments use the same Grouping value, then unenrollment will not work as expected since there are duplicate URIs that get deleted by the resource manager. To prevent this problem, the Grouping value should include some randomness. The best practice is to use a randomly generated GUID. However, there's no requirement on the exact value of the node.
|
||||
|
||||
> [!NOTE]
|
||||
> The AppLocker CSP will schedule a reboot when a policy is applied or a deletion occurs using the AppLocker/ApplicationLaunchRestrictions/Grouping/CodeIntegrity/Policy URI.
|
||||
|
||||
Additional information:
|
||||
> The AppLocker CSP will schedule a reboot when a policy is applied or when a deletion occurs using the AppLocker/ApplicationLaunchRestrictions/Grouping/CodeIntegrity/Policy URI.
|
||||
|
||||
<a href="" id="applocker-applicationlaunchrestrictions-grouping"></a>**AppLocker/ApplicationLaunchRestrictions/_Grouping_**
|
||||
Grouping nodes are dynamic nodes, and there may be any number of them for a given enrollment (or a given context). The actual identifiers are selected by the management endpoint, whose job it's to determine what their purpose is, and to not conflict with other identifiers that they define.
|
||||
@ -96,14 +103,14 @@ Supported operations are Get, Add, Delete, and Replace.
|
||||
<a href="" id="applocker-applicationlaunchrestrictions-grouping-exe-policy"></a>**AppLocker/ApplicationLaunchRestrictions/_Grouping_/EXE/Policy**
|
||||
Policy nodes define the policy for launching executables, Windows Installer files, scripts, store apps, and DLL files. The contents of a given Policy node is precisely the XML format for a RuleCollection node in the corresponding AppLocker XML policy.
|
||||
|
||||
Data type is string.
|
||||
Data type is string.
|
||||
|
||||
Supported operations are Get, Add, Delete, and Replace.
|
||||
|
||||
<a href="" id="applocker-applicationlaunchrestrictions-grouping-exe-enforcementmode"></a>**AppLocker/ApplicationLaunchRestrictions/_Grouping_/EXE/EnforcementMode**
|
||||
The EnforcementMode node for Windows Information Protection (formerly known as Enterprise Data Protection) doesn't affect the behavior of EnterpriseDataProtection. The EDPEnforcementLevel from Policy CSP should be used to enable and disable Windows Information Protection (formerly known as Enterprise Data Protection).
|
||||
|
||||
The data type is a string.
|
||||
The data type is a string.
|
||||
|
||||
Supported operations are Get, Add, Delete, and Replace.
|
||||
|
||||
@ -206,22 +213,25 @@ Data type is Base64.
|
||||
Supported operations are Get, Add, Delete, and Replace.
|
||||
|
||||
> [!NOTE]
|
||||
> To use Code Integrity Policy, you first need to convert the policies to binary format using the ConvertFrom-CIPolicy cmdlet. Then a Base64-encoded blob of the binary policy representation should be created (for example, using the [certutil -encode](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/cc732443(v=ws.11)) command line tool) and added to the Applocker-CSP.
|
||||
> To use Code Integrity Policy, you first need to convert the policies to binary format using the `ConvertFrom-CIPolicy` cmdlet. Then a Base64-encoded blob of the binary policy representation should be created (for example, using the [certutil -encode](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/cc732443(v=ws.11)) command line tool) and added to the Applocker-CSP.
|
||||
|
||||
<a href="" id="applocker-enterprisedataprotection"></a>**AppLocker/EnterpriseDataProtection**
|
||||
Captures the list of apps that are allowed to handle enterprise data. Should be used in conjunction with the settings in **./Device/Vendor/MSFT/EnterpriseDataProtection** in [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md).
|
||||
Captures the list of apps that are allowed to handle enterprise data. Should be used with the settings in **./Device/Vendor/MSFT/EnterpriseDataProtection** in [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md).
|
||||
|
||||
In Windows 10, version 1607 the Windows Information Protection has a concept for allowed and exempt applications. Allowed applications can access enterprise data and the data handled by those applications are protected with encryption. Exempt applications can also access enterprise data, but the data handled by those applications aren't protected. This is because some critical enterprise applications may have compatibility problems with encrypted data.
|
||||
|
||||
You can set the allowed list using the following URI:
|
||||
|
||||
- ./Vendor/MSFT/AppLocker/EnterpriseDataProtection/_Grouping_/EXE/Policy
|
||||
- ./Vendor/MSFT/AppLocker/EnterpriseDataProtection/_Grouping_/StoreApps/Policy
|
||||
|
||||
You can set the exempt list using the following URI. The _Grouping_ string must contain the keyword "EdpExempt" anywhere to help distinguish the exempt list from the allowed list. The "EdpExempt" keyword is also evaluated in a case-insensitive manner:
|
||||
|
||||
- ./Vendor/MSFT/AppLocker/EnterpriseDataProtection/_Grouping includes "EdpExempt"_/EXE/Policy
|
||||
- ./Vendor/MSFT/AppLocker/EnterpriseDataProtection/_Grouping includes "EdpExempt"_/StoreApps/Policy
|
||||
|
||||
Exempt examples:
|
||||
|
||||
- ./Vendor/MSFT/AppLocker/EnterpriseDataProtection/ContosoEdpExempt/EXE/Policy
|
||||
- ./Vendor/MSFT/AppLocker/EnterpriseDataProtection/xxxxxEdpExemptxxxxx/EXE/Policy
|
||||
|
||||
@ -259,15 +269,15 @@ Data type is string.
|
||||
|
||||
Supported operations are Get, Add, Delete, and Replace.
|
||||
|
||||
1. On your phone under **Device discovery**, tap **Pair**. You'll get a code (case sensitive).
|
||||
2. On the browser on the **Set up access page**, enter the code (case sensitive) into the text box and click **Submit**.
|
||||
1. On your phone under **Device discovery**, tap **Pair**. You'll get a code (case sensitive).
|
||||
2. On the browser on the **Set up access page**, enter the code (case sensitive) into the text box and click **Submit**.
|
||||
|
||||
The **Device Portal** page opens on your browser.
|
||||
|
||||

|
||||
|
||||
3. On the desktop **Device Portal** page, click **Apps** to open the **App Manager**.
|
||||
4. On the **App Manager** page under **Running apps**, you'll see the **Publisher** and **PackageFullName** of apps.
|
||||
3. On the desktop **Device Portal** page, click **Apps** to open the **App Manager**.
|
||||
4. On the **App Manager** page under **Running apps**, you'll see the **Publisher** and **PackageFullName** of apps.
|
||||
|
||||

|
||||
|
||||
@ -279,7 +289,7 @@ The following table shows the mapping of information to the AppLocker publisher
|
||||
|
||||
|Device portal data|AppLocker publisher rule field|
|
||||
|--- |--- |
|
||||
|PackageFullName|ProductName<br><br> The product name is first part of the PackageFullName followed by the version number. In the Windows Camera example, the ProductName is Microsoft.WindowsCamera.|
|
||||
|PackageFullName|ProductName: The product name is first part of the PackageFullName followed by the version number. In the Windows Camera example, the ProductName is Microsoft.WindowsCamera.|
|
||||
|Publisher|Publisher|
|
||||
|Version|Version<br> <br>The version can be used either in the HighSection or LowSection of the BinaryVersionRange.<br> <br>HighSection defines the highest version number and LowSection defines the lowest version number that should be trusted. You can use a wildcard for both versions to make a version- independent rule. Using a wildcard for one of the values will provide higher than or lower than a specific version semantics.|
|
||||
|
||||
@ -293,13 +303,13 @@ Here's an example AppLocker publisher rule:
|
||||
|
||||
You can get the publisher name and product name of apps using a web API.
|
||||
|
||||
**To find publisher and product name for Microsoft apps in Microsoft Store for Business**
|
||||
**To find publisher and product name for Microsoft apps in Microsoft Store for Business:**
|
||||
|
||||
1. Go to the Microsoft Store for Business website, and find your app. For example, Microsoft OneNote.
|
||||
1. Go to the Microsoft Store for Business website, and find your app. For example, Microsoft OneNote.
|
||||
|
||||
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, **9wzdncrfhvjl**.
|
||||
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is [https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl](https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl), and you'd copy the ID value: **9wzdncrfhvjl**.
|
||||
|
||||
3. In your browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values.
|
||||
3. In your browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values.
|
||||
|
||||
Request URI:
|
||||
|
||||
@ -359,17 +369,13 @@ The product name is first part of the PackageFullName followed by the version nu
|
||||
| SettingsPagePhoneNfc | b0894dfd-4671-4bb9-bc17-a8b39947ffb6\_1.0.0.0\_neutral\_\_1prqnbg33c1tj | b0894dfd-4671-4bb9-bc17-a8b39947ffb6 |
|
||||
|
||||
|
||||
|
||||
## <a href="" id="inboxappsandcomponents"></a>Inbox apps and components
|
||||
|
||||
|
||||
The following list shows the apps that may be included in the inbox.
|
||||
|
||||
> [!NOTE]
|
||||
> This list identifies system apps that ship as part of Windows that you can add to your AppLocker policy to ensure proper functioning of the operating system. If you decide to block some of these apps, we recommend a thorough testing before deploying to your production environment. Failure to do so may result in unexpected failures and can significantly degrade the user experience.
|
||||
|
||||
|
||||
|
||||
|App|Product ID|Product name|
|
||||
|--- |--- |--- |
|
||||
|3D Viewer|f41647c9-d567-4378-b2ab-7924e5a152f3|Microsoft.Microsoft3DViewer (Added in Windows 10, version 1703)|
|
||||
@ -1277,6 +1283,7 @@ The following example for Windows 10 Holographic for Business denies all apps an
|
||||
```
|
||||
|
||||
## Recommended blocklist for Windows Information Protection
|
||||
|
||||
The following example for Windows 10, version 1607 denies known unenlightened Microsoft apps from accessing enterprise data as an allowed app. (An administrator might still use an exempt rule, instead.) This prevention ensures an administrator doesn't accidentally make these apps Windows Information Protection allowed, and avoid known compatibility issues related to automatic file encryption with these applications.
|
||||
|
||||
In this example, Contoso is the node name. We recommend using a GUID for this node.
|
||||
@ -1460,5 +1467,4 @@ In this example, Contoso is the node name. We recommend using a GUID for this no
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
@ -14,7 +14,6 @@ ms.date: 12/05/2017
|
||||
|
||||
# AppLocker DDF file
|
||||
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **AppLocker** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
@ -672,15 +671,4 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[AppLocker configuration service provider](applocker-csp.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
[AppLocker configuration service provider](applocker-csp.md)
|
@ -13,7 +13,17 @@ ms.date: 05/03/2022
|
||||
|
||||
# AssignedAccess CSP
|
||||
|
||||
The AssignedAccess configuration service provider (CSP) is used to set the device to run in kiosk mode. Once the CSP has been executed, then the next user sign in that is associated with the kiosk mode puts the device into the kiosk mode running the application specified in the CSP configuration.
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|No|No|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The AssignedAccess configuration service provider (CSP) is used to set the device to run in kiosk mode. Once the CSP has been executed, the next user login that is associated with the kiosk mode puts the device into the kiosk mode running the application specified in the CSP configuration.
|
||||
|
||||
For a step-by-step guide for setting up devices to run in kiosk mode, see [Set up a kiosk on Windows 10 Pro, Enterprise, or Education.](/windows/configuration/kiosk-single-app)
|
||||
|
||||
@ -23,14 +33,14 @@ In Windows 10, version 1709, the AssignedAccess configuration service provider (
|
||||
> You can only assign one single app kiosk profile to an individual user account on a device. The single app profile does not support domain groups.
|
||||
|
||||
> [!Note]
|
||||
> If the application calls KeyCredentialManager.IsSupportedAsync when it is running in assigned access mode and it returns false on the first run, invoke the settings screen and select a appropriate PIN to use with Windows Hello. This is the settings screen that is hidden by the application running in assigned access mode. You can only use Windows Hello if you first leave assigned access mode, select your convenience pin, and then go back into assigned access mode again.
|
||||
> If the application calls `KeyCredentialManager.IsSupportedAsync` when it is running in assigned access mode and it returns false on the first run, invoke the settings screen and select an appropriate PIN to use with Windows Hello. This is the settings screen that is hidden by the application running in assigned access mode. You can only use Windows Hello if you first leave assigned access mode, select your convenience pin, and then go back into assigned access mode again.
|
||||
|
||||
> [!Note]
|
||||
> The AssignedAccess CSP is supported in Windows 10 Enterprise and Windows 10 Education. Starting from Windows 10, version 1709, it is supported in Windows 10 Pro and Windows 10 S. Starting from Windows 10, version 1803, it is also supported in Windows Holographic for Business edition.
|
||||
|
||||
The following example shows the AssignedAccess configuration service provider in tree format
|
||||
|
||||
```
|
||||
```console
|
||||
./Vendor/MSFT
|
||||
AssignedAccess
|
||||
----KioskModeApp
|
||||
@ -44,14 +54,14 @@ AssignedAccess
|
||||
Root node for the CSP.
|
||||
|
||||
<a href="" id="assignedaccess-kioskmodeapp"></a>**./Device/Vendor/MSFT/AssignedAccess/KioskModeApp**
|
||||
A JSON string that contains the user account name and Application User Model ID (AUMID) of the Kiosk mode app. For more information about how to get the AUMID, see [Find the Application User Model ID of an installed app](/windows-hardware/customize/enterprise/find-the-application-user-model-id-of-an-installed-app).
|
||||
A JSON string that contains the user account name and Application User Model ID (AUMID) of the Kiosk mode app. For more information about how to get the AUMID, see [Find the Application User Model ID of an installed app](/windows/configuration/find-the-application-user-model-id-of-an-installed-app).
|
||||
|
||||
For more information, see [Set up a kiosk on Windows 10 Pro, Enterprise, or Education.](/windows/configuration/kiosk-single-app)
|
||||
|
||||
> [!Note]
|
||||
> In Windows 10, version 1803 the Configuration node introduces single app kiosk profile to replace KioskModeApp CSP node. KioskModeApp node will be deprecated soon, so you should use the single app kiosk profile in config xml for Configuration node to configure public-facing single app Kiosk.
|
||||
> In Windows 10, version 1803, the Configuration node introduces single app kiosk profile to replace KioskModeApp CSP node. KioskModeApp node will be deprecated soon, so you should use the single app kiosk profile in config xml for Configuration node to configure public-facing single app Kiosk.
|
||||
>
|
||||
> Starting in Windows 10, version 1803 the KioskModeApp node becomes No-Op if Configuration node is configured on the device. That Add/Replace/Delete command on KioskModeApp node always returns SUCCESS to the MDM server if Configuration node is set, but the data of KioskModeApp will not take any effect on the device. Get command on KioskModeApp will return the configured JSON string even it’s not effective.
|
||||
> Starting in Windows 10, version 1803, the KioskModeApp node becomes No-Op if Configuration node is configured on the device. That Add/Replace/Delete command on KioskModeApp node always returns SUCCESS to the MDM server if Configuration node is set, but the data of KioskModeApp will not take any effect on the device. Get command on KioskModeApp will return the configured JSON string even it’s not effective.
|
||||
|
||||
> [!Note]
|
||||
> You can't set both KioskModeApp and ShellLauncher at the same time on the device.
|
||||
@ -453,7 +463,7 @@ The schema below is for AssignedAccess Configuration up to Windows 10 20H2 relea
|
||||
</xs:schema>);
|
||||
```
|
||||
|
||||
Here's the schema for new features introduced in Windows 10 1809 release
|
||||
Here's the schema for new features introduced in Windows 10 1809 release:
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
@ -500,6 +510,7 @@ Here's the schema for new features introduced in Windows 10 1809 release
|
||||
```
|
||||
|
||||
Schema for Windows 10 prerelease
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<xs:schema
|
||||
@ -675,7 +686,7 @@ XML encoding (escaped) and CDATA of the XML in the Data node will both ensure th
|
||||
|
||||
Similarly, the StartLayout xml inside the configuration xml is using the same format, xml inside xml as string. In the sample Configuration xml provided above, CDATA is used to embed the StartLayout xml. If you use CDATA to embed configuration xml in SyncML as well, you’ll have nested CDATA, so pay attention to how CDATA is used in the provided CDATA sample. With that being said, when the Configuration xml is being constructed, MDM server can either escape start layout xml or put startlayout xml inside CDATA, when MDM server puts configuration xml inside SyncML, MDM server can also either escape it or wrap with CDATA.
|
||||
|
||||
Escape and CDATA are mechanisms when handling xml in xml. Consider it’s a transportation channel to send the configuration xml as payload from server to client. It’s transparent to both, the end user who configures the CSP and to our CSP. Both the customer on the server side and our CSP must only see the original configuration XML.
|
||||
Escape and CDATA are mechanisms used when handling xml in xml. Consider that it’s a transportation channel to send the configuration xml as payload from server to client. It’s transparent to both, the end user who configures the CSP and to our CSP. Both the customer on the server side and our CSP must only see the original configuration XML.
|
||||
|
||||
This example shows escaped XML of the Data node.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: AssignedAccess DDF
|
||||
description: Learn how the OMA DM device description framework (DDF) for the AssignedAccess configuration service provider.
|
||||
description: Learn about the OMA DM device description framework (DDF) for the AssignedAccess configuration service provider.
|
||||
ms.assetid: 224FADDB-0EFD-4E5A-AE20-1BD4ABE24306
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
@ -14,7 +14,6 @@ ms.date: 02/22/2018
|
||||
|
||||
# AssignedAccess DDF
|
||||
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **AssignedAccess** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
You can download the DDF files from the links below:
|
||||
@ -22,7 +21,8 @@ You can download the DDF files from the links below:
|
||||
- [Download all the DDF files for Windows 10, version 1703](https://download.microsoft.com/download/C/7/C/C7C94663-44CF-4221-ABCA-BC895F42B6C2/Windows10_1703_DDF_download.zip)
|
||||
- [Download all the DDF files for Windows 10, version 1607](https://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip)
|
||||
|
||||
The XML below is for Windows 10, version 1909.
|
||||
The XML below is for Windows 10, version 1803 and later.
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE MgmtTree PUBLIC " -//OMA//DTD-DM-DDF 1.2//EN"
|
||||
@ -118,7 +118,7 @@ This node supports Add, Delete, Replace and Get methods. When there's no configu
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>This read only node contains kiosk health event in xml</Description>
|
||||
<Description>This read only node contains kiosk health event in xml.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -196,14 +196,4 @@ This node supports Add, Delete, Replace and Get methods. When there's no configu
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[AssignedAccess configuration service provider](assignedaccess-csp.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -937,3 +937,7 @@ Supported Values: String form of request ID. Example format of request ID is GUI
|
||||
</Node>
|
||||
</MgmtTree>
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[BitLocker configuration service provider](bitlocker-csp.md)
|
||||
|
@ -14,10 +14,20 @@ ms.date: 06/26/2017
|
||||
|
||||
# CellularSettings CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The CellularSettings configuration service provider is used to configure cellular settings on a mobile device.
|
||||
|
||||
> [!Note]
|
||||
> Starting in Windows 10, version 1703 the CellularSettings CSP is supported in Windows 10 Home, Pro, Enterprise, and Education editions.
|
||||
> Starting in Windows 10, version 1703, the CellularSettings CSP is supported in Windows 10 and Windows 11 Home, Pro, Enterprise, and Education editions.
|
||||
|
||||
The following example shows the CellularSettings CSP in tree format as used by Open Mobile Alliance Client Provisioning (OMA CP). The OMA DM protocol isn't supported with this configuration service provider.
|
||||
|
||||
|
@ -14,6 +14,16 @@ ms.date: 02/28/2020
|
||||
|
||||
# CertificateStore CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The CertificateStore configuration service provider is used to add secure socket layers (SSL), intermediate, and self-signed certificates.
|
||||
|
||||
> [!Note]
|
||||
@ -24,7 +34,7 @@ For the CertificateStore CSP, you can't use the Replace command unless the node
|
||||
|
||||
The following example shows the CertificateStore configuration service provider management object in tree format as used by both Open Mobile Alliance Device Management (OMA DM) and OMA Client Provisioning.
|
||||
|
||||
```
|
||||
```console
|
||||
./Vendor/MSFT
|
||||
CertificateStore
|
||||
----ROOT
|
||||
@ -259,7 +269,7 @@ Optional. OID of certificate template name.
|
||||
Supported operations are Get, Add, and Delete.
|
||||
|
||||
<a href="" id="my-scep-uniqueid-install-keylength"></a>**My/SCEP/*UniqueID*/Install/KeyLength**
|
||||
Required for enrollment. Specify private key length (RSA). Value type is an integer. Valid values are 1024, 2048, 4096. NGC key lengths supported should be specified.
|
||||
Required for enrollment. Specifies private key length (RSA). Value type is an integer. Valid values are 1024, 2048, 4096. NGC key lengths supported should be specified.
|
||||
|
||||
Supported operations are Get, Add, Delete, and Replace.
|
||||
|
||||
@ -343,7 +353,7 @@ Required. Returns the URL of the SCEP server that responded to the enrollment re
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="my-wstep"></a>**My/WSTEP**
|
||||
Required for MDM enrolled device. The parent node that hosts the MDM enrollment client certificate related settings that are enrolled via WSTEP. The nodes under WSTEP are mostly for MDM client certificate renew requests. Value type is node.
|
||||
Required for MDM enrolled device. Specifies the parent node that hosts the MDM enrollment client certificate related settings that are enrolled via WSTEP. The nodes under WSTEP are mostly for MDM client certificate renew requests. Value type is node.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
@ -358,8 +368,6 @@ Optional. Specifies the URL of certificate renewal server. If this node doesn't
|
||||
> [!NOTE]
|
||||
> The renewal process follows the same steps as device enrollment, which means that it starts with Discovery service, followed by Enrollment policy service, and then Enrollment web service.
|
||||
|
||||
|
||||
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="my-wstep-renew-renewalperiod"></a>**My/WSTEP/Renew/RenewalPeriod**
|
||||
@ -414,7 +422,7 @@ Optional. If certificate renewal fails, this integer value indicates the HRESULT
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="my-wstep-renew-lastrenewalattempttime"></a>**My/WSTEP/Renew/LastRenewalAttemptTime**
|
||||
Added in Windows 10, version 1607. Time of the last attempted renewal.
|
||||
Added in Windows 10, version 1607. Specifies the time of the last attempted renewal.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
@ -424,7 +432,7 @@ Added in Windows 10, version 1607. Initiates a renewal now.
|
||||
Supported operation is Execute.
|
||||
|
||||
<a href="" id="my-wstep-renew-retryafterexpiryinterval"></a>**My/WSTEP/Renew/RetryAfterExpiryInterval**
|
||||
Added in Windows 10, version 1703. How long after the enrollment certificate has expired before trying to renew.
|
||||
Added in Windows 10, version 1703. Specifies how long after the enrollment certificate has expired before trying to renew.
|
||||
|
||||
Supported operations are Add, Get, and Replace.
|
||||
|
||||
@ -698,7 +706,6 @@ Configure the device to automatically renew an MDM client certificate with the s
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
@ -14,7 +14,6 @@ ms.date: 12/05/2017
|
||||
|
||||
# CertificateStore DDF file
|
||||
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **CertificateStore** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
@ -458,7 +457,7 @@ The XML below is the current version for this CSP.
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>The base64 Encoded X.509 certificate. Note that though during MDM enrollment, enrollment server could use WAP XML format to add public part of MDM client cert via EncodedCertificate node, properly enroll a client certificate including private needs a cert enroll protocol handle it or user installs it manually. In WP, the server cannot purely rely on CertificateStore CSP to install a client certificate including private key.</Description>
|
||||
<Description>The base64 Encoded X.509 certificate. Note that during MDM enrollment, enrollment server could use WAP XML format to add public part of MDM client cert via EncodedCertificate node and properly enroll a client certificate including private needs a cert enroll protocol to handle it or user installs it manually. In WP, the server cannot purely rely on CertificateStore CSP to install a client certificate including private key.</Description>
|
||||
<DFFormat>
|
||||
<b64 />
|
||||
</DFFormat>
|
||||
@ -585,7 +584,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>This store holds the SCEP portion of the MY store and handle operations related to SCEP certificate enrollment.</Description>
|
||||
<Description>This store holds the SCEP portion of the MY store and handles operations related to SCEP certificate enrollment.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -627,7 +626,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>The group to represent the install request</Description>
|
||||
<Description>The group to represent the install request.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -1241,7 +1240,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>If certificate renew fails, this node provide the last hresult code during renew process.</Description>
|
||||
<Description>If certificate renew fails, this node provides the last hresult code during renew process.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -1262,7 +1261,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Time of last attempted renew</Description>
|
||||
<Description>Time of last attempted renew.</Description>
|
||||
<DFFormat>
|
||||
<time />
|
||||
</DFFormat>
|
||||
@ -1283,7 +1282,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Exec />
|
||||
</AccessType>
|
||||
<Description>Initiate a renew now</Description>
|
||||
<Description>Initiate a renew now.</Description>
|
||||
<DFFormat>
|
||||
<null />
|
||||
</DFFormat>
|
||||
@ -1305,7 +1304,7 @@ The XML below is the current version for this CSP.
|
||||
<Get />
|
||||
<Set />
|
||||
</AccessType>
|
||||
<Description>How long after the enrollment cert has expiried to keep trying to renew</Description>
|
||||
<Description>How long after the enrollment cert has expired to keep trying to renew.</Description>
|
||||
<DFFormat>
|
||||
<null />
|
||||
</DFFormat>
|
||||
@ -1372,7 +1371,7 @@ The XML below is the current version for this CSP.
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>The base64 Encoded X.509 certificate</Description>
|
||||
<Description>The base64 Encoded X.509 certificate.</Description>
|
||||
<DFFormat>
|
||||
<b64 />
|
||||
</DFFormat>
|
||||
@ -1667,11 +1666,6 @@ The XML below is the current version for this CSP.
|
||||
</MgmtTree>
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
## Related topics
|
||||
|
||||
[CertificateStore configuration service provider](certificatestore-csp.md)
|
@ -13,6 +13,16 @@ manager: dansimp
|
||||
|
||||
# CleanPC CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|No|No|
|
||||
|Pro|No|No|
|
||||
|Business|No|No|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The CleanPC configuration service provider (CSP) allows removal of user-installed and pre-installed applications, with the option to persist user data. This CSP was added in Windows 10, version 1703.
|
||||
|
||||
The following shows the CleanPC configuration service provider in tree format.
|
||||
|
@ -34,7 +34,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Allow removal of user installed and pre-installed applications, with option to persist user data</Description>
|
||||
<Description>Allow removal of user installed and pre-installed applications, with option to persist user data.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -54,7 +54,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Exec />
|
||||
</AccessType>
|
||||
<Description>CleanPC operation without any retention of User data</Description>
|
||||
<Description>CleanPC operation without any retention of User data.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -75,7 +75,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Exec />
|
||||
</AccessType>
|
||||
<Description>CleanPC operation with retention of User data</Description>
|
||||
<Description>CleanPC operation with retention of User data.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -94,12 +94,6 @@ The XML below is the current version for this CSP.
|
||||
</MgmtTree>
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
## Related topics
|
||||
|
||||
[CleanPC configuration service provider](cleanpc-csp.md)
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: ClientCertificateInstall CSP
|
||||
description: The ClientCertificateInstall configuration service provider (CSP) enables the enterprise to install client certificates.
|
||||
description: Learn how the ClientCertificateInstall configuration service provider (CSP) enables the enterprise to install client certificates.
|
||||
ms.assetid: B624EB73-2972-47F2-9D7E-826D641BF8A7
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
@ -14,18 +14,28 @@ ms.date: 07/30/2021
|
||||
|
||||
# ClientCertificateInstall CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|---|---|---|
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The ClientCertificateInstall configuration service provider enables the enterprise to install client certificates. A client certificate has a unique ID, which is the *\[UniqueID\]* for this configuration. Each client certificate must have different UniqueIDs for the SCEP enrollment request.
|
||||
|
||||
For PFX certificate installation and SCEP installation, the SyncML commands must be wrapped in atomic commands to ensure that enrollment execution isn't triggered until all settings are configured. The Enroll command must be the last item in the atomic block.
|
||||
|
||||
> [!Note]
|
||||
> Currently in Windows 10, version 1511, when using the ClientCertificateInstall to install certificates to the device store and the user store and both certificates are sent to the device in the same MDM payload, the certificate intended for the device store will also get installed in the user store. This may cause issues with Wi-Fi or VPN when choosing the correct certificate to establish a connection. We are working to fix this issue.
|
||||
> Currently in Windows 10, version 1511, when using the ClientCertificateInstall to install certificates to the device store and the user store, both certificates are sent to the device in the same MDM payload and the certificate intended for the device store will also get installed in the user store. This may cause issues with Wi-Fi or VPN when choosing the correct certificate to establish a connection. We are working to fix this issue.
|
||||
|
||||
You can only set PFXKeyExportable to true if KeyLocation=3. For any other KeyLocation value, the CSP will fail.
|
||||
|
||||
The following example shows the ClientCertificateInstall configuration service provider in tree format.
|
||||
|
||||
```
|
||||
```console
|
||||
./Vendor/MSFT
|
||||
ClientCertificateInstall
|
||||
----PFXCertInstall
|
||||
@ -99,7 +109,7 @@ The data type is an integer corresponding to one of the following values:
|
||||
| 1 | Install to TPM if present, fail if not present. |
|
||||
| 2 | Install to TPM if present. If not present, fall back to software. |
|
||||
| 3 | Install to software. |
|
||||
| 4 | Install to Windows Hello for Business (formerly known as Microsoft Passport for Work) whose name is specified |
|
||||
| 4 | Install to Windows Hello for Business (formerly known as Microsoft Passport for Work) whose name is specified. |
|
||||
|
||||
<a href="" id="clientcertificateinstall-pfxcertinstall-uniqueid-containername"></a>**ClientCertificateInstall/PFXCertInstall/*UniqueID*/ContainerName**
|
||||
Optional. Specifies the Windows Hello for Business (formerly known as Microsoft Passport for Work) container name (if Windows Hello for Business storage provider (KSP) is chosen for the KeyLocation). If this node isn't specified when Windows Hello for Business KSP is chosen, enrollment will fail.
|
||||
@ -119,7 +129,7 @@ If a blob already exists, the Add operation will fail. If Replace is called on t
|
||||
|
||||
If Add is called on this node for a new PFX, the certificate will be added. When a certificate doesn't exist, Replace operation on this node will fail.
|
||||
|
||||
In other words, using Replace or Add will result in the effect of either overwriting the old certificate or adding a new certificate CRYPT_DATA_BLOB, which can be found in <a href="/previous-versions/windows/desktop/legacy/aa381414(v=vs.85)" data-raw-source="[CRYPT\_INTEGER\_BLOB](/previous-versions/windows/desktop/legacy/aa381414(v=vs.85))">CRYPT_INTEGER_BLOB</a>.
|
||||
In other words, using Replace or Add will result in the effect of either overwriting the old certificate or adding a new certificate CRYPT_DATA_BLOB, which can be found in [CRYPT\_INTEGER\_BLOB](/previous-versions/windows/desktop/legacy/aa381414(v=vs.85)).
|
||||
|
||||
<a href="" id="clientcertificateinstall-pfxcertinstall-uniqueid-pfxcertpassword"></a>**ClientCertificateInstall/PFXCertInstall/*UniqueID*/PFXCertPassword**
|
||||
Password that protects the PFX blob. This is required if the PFX is password protected.
|
||||
@ -133,9 +143,9 @@ Optional. Used to specify whether the PFX certificate password is encrypted with
|
||||
|
||||
The data type is int. Valid values:
|
||||
|
||||
- 0 - Password isn't encrypted.
|
||||
- 1 - Password is encrypted with the MDM certificate.
|
||||
- 2 - Password is encrypted with custom certificate.
|
||||
- 0 - Password isn't encrypted.
|
||||
- 1 - Password is encrypted with the MDM certificate.
|
||||
- 2 - Password is encrypted with custom certificate.
|
||||
|
||||
When PFXCertPasswordEncryptionType =2, you must specify the store name in PFXCertPasswordEncryptionStore setting.
|
||||
|
||||
@ -322,9 +332,9 @@ Data type is string.
|
||||
|
||||
Valid values are:
|
||||
|
||||
- Days (Default)
|
||||
- Months
|
||||
- Years
|
||||
- Days (Default)
|
||||
- Months
|
||||
- Years
|
||||
|
||||
> [!NOTE]
|
||||
> The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) to the SCEP server as part of certificate enrollment request. Depending on the server configuration, the server defines how to use this valid period to create the certificate.
|
||||
@ -608,7 +618,7 @@ Enroll a client certificate through SCEP.
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
Add a PFX certificate. The PFX certificate password is encrypted with a custom certificate fro "My" store.
|
||||
Add a PFX certificate. The PFX certificate password is encrypted with a custom certificate from "My" store.
|
||||
|
||||
```xml
|
||||
<SyncML>
|
||||
|
@ -107,7 +107,7 @@ Calling Delete on the this node, should delete the certificates and the keys tha
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Required for PFX certificate installation. Indicates the KeyStorage provider to target the private key installation to. Supported operations are Get, Add
|
||||
<Description>Required for PFX certificate installation. Indicates the KeyStorage provider to target the private key installation. Supported operations are Get, Add.
|
||||
Datatype will be int
|
||||
1- Install to TPM, fail if not present
|
||||
2 – Install to TPM if present, if not present fallback to Software
|
||||
@ -138,8 +138,8 @@ Calling Delete on the this node, should delete the certificates and the keys tha
|
||||
</AccessType>
|
||||
<Description>Optional.
|
||||
Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail.
|
||||
Format is chr
|
||||
Supported operations are Get, Add, Delete and Replace
|
||||
Format is chr.
|
||||
Supported operations are Get, Add, Delete and Replace.
|
||||
</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
@ -165,8 +165,8 @@ Supported operations are Get, Add, Delete and Replace
|
||||
</AccessType>
|
||||
<Description>Required.
|
||||
CRYPT_DATA_BLOB structure that contains a PFX packet with the exported and encrypted certificates and keys. Add on this node will trigger the addition to the PFX certificate. This requires that all the other nodes under UniqueID that are parameters for PFX installation (Container Name, KeyLocation, CertPassword, fKeyExportable) are present before this is called. This will also set the Status node to the current Status of the operation.
|
||||
Format is Binary64
|
||||
Supported operations are Get, Add, Replace
|
||||
Format is Binary64.
|
||||
Supported operations are Get, Add, Replace.
|
||||
If Add is called on this node and a blob already exists, it will fail. If Replace is called on this node, the certificates will be overwritten.
|
||||
If Add is called on this node for a new PFX, the certificate will be added. If Replace is called on this node when it does not exist, this will fail.
|
||||
In other words, using Replace or Add will result in the effect of either overwriting the old certificate or adding a new certificate
|
||||
@ -197,7 +197,7 @@ CRYPT_DATA_BLOB on MSDN can be found at https://msdn.microsoft.com/library/windo
|
||||
<Description>
|
||||
Required if PFX is password protected.
|
||||
Password that protects the PFX blob.
|
||||
Format is chr. Supported operations are Add, Get
|
||||
Format is chr. Supported operations are Add, Get.
|
||||
</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
@ -228,7 +228,7 @@ If the value is
|
||||
1- Password is encrypted using the MDM certificate by the MDM server
|
||||
2 - Password is encrypted by a Custom Certificate by the MDM server. When this value is used here, also specify the custom store name in the PFXCertPasswordEncryptionStore node.
|
||||
The datatype for this node is int.
|
||||
Supported operations are Add, Replace
|
||||
Supported operations are Add, Replace.
|
||||
</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
@ -254,7 +254,7 @@ Supported operations are Add, Replace
|
||||
</AccessType>
|
||||
<DefaultValue>true</DefaultValue>
|
||||
<Description>Optional. Used to specify if the private key installed is exportable (can be exported later). The datatype for this node is bool.
|
||||
Supported operations are Add, Get
|
||||
Supported operations are Add, Get.
|
||||
</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
@ -299,7 +299,7 @@ Supported operations are Add, Get
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Returns the error code of the PFX installation from the GetLastError command called after the PfxImportCertStore. Datatype is int.
|
||||
Support operations are Get
|
||||
Support operations are Get.
|
||||
</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
@ -374,7 +374,7 @@ Support operation are Add, Get and Replace.
|
||||
</AccessType>
|
||||
<Description>Required for SCEP certificate installation. A unique ID to differentiate different certificate install requests.
|
||||
Format is node.
|
||||
Supported operations are Get, Add, Delete
|
||||
Supported operations are Get, Add, Delete.
|
||||
Calling Delete on the this node, should delete the corresponding SCEP certificate</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
@ -401,7 +401,7 @@ Calling Delete on the this node, should delete the corresponding SCEP certificat
|
||||
</AccessType>
|
||||
<Description>Required for SCEP certificate enrollment. Parent node to group SCEP cert install related request. Format is node. Supported operation is Add, Delete.
|
||||
|
||||
NOTE: though the children nodes under Install support Replace commands, once the Exec command is sent to the device, the device will take the values which are set when the Exec command is accepted. The server should not expect the node value change after Exec command is accepted will impact the current undergoing enrollment. The server should check the Status node value and make sure the device is not at unknown stage before changing children node values.</Description>
|
||||
NOTE: Though the children nodes under Install support Replace commands, once the Exec command is sent to the device, the device will take the values which are set when the Exec command is accepted. The server should not expect the node value change after Exec command is accepted will impact the current undergoing enrollment. The server should check the Status node value and make sure the device is not at unknown stage before changing children node values.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -570,7 +570,7 @@ SCEP enrolled cert doesn’t support TPM PIN protection. Supported values:
|
||||
|
||||
Format is int.
|
||||
|
||||
Supported operations are Get, Add, Delete, Replace
|
||||
Supported operations are Get, Add, Delete, Replace.
|
||||
|
||||
</Description>
|
||||
<DFFormat>
|
||||
@ -604,7 +604,7 @@ The min value is 1.
|
||||
|
||||
Format is int.
|
||||
|
||||
Supported operations are Get, Add, Delete noreplace</Description>
|
||||
Supported operations are Get, Add, Delete noreplace.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -654,7 +654,7 @@ The min value is 0 which means no retry. Supported operations are Get, Add, Dele
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Optional. OID of certificate template name. Note that this name is typically ignored by the SCEP server, therefore the MDM server typically doesn’t need to provide it. Format is chr. Supported operations are Get, Add, Delete.noreplace</Description>
|
||||
<Description>Optional. OID of certificate template name. Note that this name is typically ignored by the SCEP server, therefore the MDM server typically doesn’t need to provide it. Format is chr. Supported operations are Get, Add, Delete.noreplace.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -819,7 +819,7 @@ NOTE: The device only sends the MDM server expected certificate validation perio
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. Note the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days.
|
||||
<Description>Optional. Specify desired number of units used in validity period. Subjected to SCEP server configuration. Default is 0. The units are defined in ValidPeriod node. Note that the valid period specified by MDM will overwrite the valid period specified in cert template. For example, if ValidPeriod is days and ValidPeriodUnits is 30, it means the total valid duration is 30 days.
|
||||
|
||||
Format is int.
|
||||
|
||||
@ -852,9 +852,9 @@ NOTE: The device only sends the MDM server expected certificate validation perio
|
||||
<Description>Optional.
|
||||
Specifies the NGC container name (if NGC KSP is chosen for above node). If this node is not specified when NGC KSP is chosen, enrollment will fail.
|
||||
|
||||
Format is chr
|
||||
Format is chr.
|
||||
|
||||
Supported operations are Get, Add, Delete and Replace</Description>
|
||||
Supported operations are Get, Add, Delete and Replace.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -880,9 +880,9 @@ Supported operations are Get, Add, Delete and Replace</Description>
|
||||
</AccessType>
|
||||
<Description>Optional. Specifies the custom text to show on the NGC PIN prompt during certificate enrollment. The admin can choose to provide more contextual information for why the user needs to enter the PIN and what the certificate will be used for through this.
|
||||
|
||||
Format is chr
|
||||
Format is chr.
|
||||
|
||||
Supported operations are Get, Add, Delete and Replace</Description>
|
||||
Supported operations are Get, Add, Delete and Replace.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -1029,9 +1029,9 @@ Supported operation is Get.</Description>
|
||||
</AccessType>
|
||||
<Description>Required. Returns the URL of the SCEP server that responded to the enrollment request.
|
||||
|
||||
Format is String
|
||||
Format is String.
|
||||
|
||||
Supported operation is Get</Description>
|
||||
Supported operation is Get.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -1054,15 +1054,4 @@ Supported operation is Get</Description>
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[ClientCertificateInstall configuration service provider](clientcertificateinstall-csp.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -14,6 +14,16 @@ ms.date: 08/02/2017
|
||||
|
||||
# CM\_CellularEntries CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The CM\_CellularEntries configuration service provider is used to configure the General Packet Radio Service (GPRS) entries on the device. It defines each GSM data access point.
|
||||
|
||||
This configuration service provider requires the ID\_CAP\_NETWORKING\_ADMIN capability to be accessed from a network configuration application.
|
||||
@ -76,13 +86,13 @@ Optional. Type: String. Specifies the type of connection used for the APN. The f
|
||||
|Cdma|Used for CDMA type connections (1XRTT + EVDO).|
|
||||
|Lte|Used for LTE type connections (eHRPD + LTE) when the device is registered HOME.|
|
||||
|Legacy|Used for GPRS + GSM + EDGE + UMTS connections.|
|
||||
|Lte_iwlan|Used for GPRS type connections that may be offloaded over WiFi|
|
||||
|Iwlan|Used for connections that are implemented over WiFi offload only|
|
||||
|Lte_iwlan|Used for GPRS type connections that may be offloaded over WiFi.|
|
||||
|Iwlan|Used for connections that are implemented over WiFi offload only.|
|
||||
|
||||
<a href="" id="desc-langid"></a>**Desc.langid**
|
||||
Optional. Specifies the UI display string used by the defined language ID.
|
||||
|
||||
A parameter name in the format of Desc.langid will be used as the language-specific identifier for the specified entry. For example, a parameter defined as <code>Desc.0409</code> with a value of <code>"GPRS Connection"</code> will force "GPRS Connection" to be displayed in the UI to represent this connection when the device is set to English language (language ID 0409). Descriptions for multiple languages may be provisioned using this mechanism, and the system will automatically switch among them if the user changes language preferences on the device. If no <strong>Desc</strong> parameter is provisioned for a given language, the system will default to the name used to create the entry.
|
||||
A parameter name in the format of Desc.langid will be used as the language-specific identifier for the specified entry. For example, a parameter defined as `Desc.0409` with a value of `"GPRS Connection"` will force "GPRS Connection" to be displayed in the UI to represent this connection when the device is set to English language (language ID 0409). Descriptions for multiple languages may be provisioned using this mechanism, and the system will automatically switch among them if the user changes language preferences on the device. If no **Desc** parameter is provisioned for a given language, the system will default to the name used to create the entry.
|
||||
|
||||
<a href="" id="enabled"></a>**Enabled**
|
||||
Specifies if the connection is enabled.
|
||||
@ -131,7 +141,7 @@ Optional. Type: Int. This parameter specifies the roaming conditions under which
|
||||
- 5 - Roaming only.
|
||||
|
||||
<a href="" id="oemconnectionid"></a>**OEMConnectionID**
|
||||
Optional. Type: GUID. Specifies a GUID to use to identify a specific connection in the modem. If a value isn't specified, the default value is 00000000-0000-0000-0000-000000000000. This parameter is only used on LTE devices.
|
||||
Optional. Type: GUID. Specifies a GUID that is used to identify a specific connection in the modem. If a value isn't specified, the default value is 00000000-0000-0000-0000-000000000000. This parameter is only used on LTE devices.
|
||||
|
||||
<a href="" id="apnid"></a>**ApnId**
|
||||
Optional. Type: Int. Specifies the purpose of the APN. If a value isn't specified, the default value is "0" (none). This parameter is only used on LTE devices.
|
||||
@ -174,7 +184,7 @@ Optional. Type: Int. Specifies how long an on-demand connection can be unused be
|
||||
> If tear-down/activation requests occur too frequently, this value should be set to greater than 5 seconds.
|
||||
|
||||
<a href="" id="simiccid"></a>**SimIccId**
|
||||
For single SIM phones, this parm isOptional. However, it is highly recommended to include this value when creating future updates. For dual SIM phones, this parm is required. Type: String. Specifies the SIM ICCID that services the connection.
|
||||
For single SIM phones, this parm is Optional. However, it is highly recommended to include this value when creating future updates. For dual SIM phones, this parm is required. Type: String. Specifies the SIM ICCID that services the connection.
|
||||
|
||||
<a href="" id="purposegroups"></a>**PurposeGroups**
|
||||
Required. Type: String. Specifies the purposes of the connection by a comma-separated list of GUIDs representing purpose values. The following purpose values are available:
|
||||
@ -271,17 +281,7 @@ The following table shows the Microsoft custom elements that this configuration
|
||||
|Characteristic-query|Yes|
|
||||
|Parm-query|Yes|
|
||||
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -14,13 +14,21 @@ ms.date: 06/26/2017
|
||||
|
||||
# CMPolicy CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The CMPolicy configuration service provider defines rules that the Connection Manager uses to identify the correct connection for a connection request.
|
||||
|
||||
> [!NOTE]
|
||||
> This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application.
|
||||
|
||||
|
||||
Each policy entry identifies one or more applications in combination with a host pattern. The policy entry is assigned a list of connection details that Connection Manager uses to satisfy connection requests matching the application and host patterns. CMPolicy configuration service provider can have multiple policies
|
||||
|
||||
**Policy Ordering**: There's no explicit ordering of policies. The general rule is that the most concrete or specific policy mappings take a higher precedence.
|
||||
@ -134,7 +142,6 @@ Specifies the type of connection being referenced. The following list describes
|
||||
|
||||
## OMA client provisioning examples
|
||||
|
||||
|
||||
Adding an application-based mapping policy. In this example, the ConnectionId for type CMST\_CONNECTION\_NAME is set to the name of the connection (“GPRSConn1”) that is configured with the CM\_CellularEntries configuration service provider.
|
||||
|
||||
```xml
|
||||
@ -180,7 +187,9 @@ Adding an application-based mapping policy. In this example, the ConnectionId fo
|
||||
</wap-provisioningdoc>
|
||||
```
|
||||
|
||||
Adding a host-based mapping policy. In this example, the ConnectionId for type CMST\_CONNECTION\_NAME is set to the name of the connection (“GPRSConn1”) that is configured with the CM\_CellularEntries configuration service provider.
|
||||
Adding a host-based mapping policy:
|
||||
|
||||
In this example, the ConnectionId for type CMST\_CONNECTION\_NAME is set to the name of the connection (“GPRSConn1”) that is configured with the CM\_CellularEntries configuration service provider.
|
||||
|
||||
```xml
|
||||
<wap-provisioningdoc>
|
||||
@ -364,7 +373,6 @@ Adding a host-based mapping policy:
|
||||
|
||||
## Microsoft Custom Elements
|
||||
|
||||
|
||||
|Element|Available|
|
||||
|--- |--- |
|
||||
|parm-query|Yes|
|
||||
@ -373,7 +381,6 @@ Adding a host-based mapping policy:
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
@ -1019,7 +1019,7 @@ Additional lists:
|
||||
|
||||
|Home|Pro|Business|Enterprise|Education|
|
||||
|--- |--- |--- |--- |--- |
|
||||
|No|Yes|Yes|Yes|Yes|
|
||||
|No|No|No|Yes|Yes|
|
||||
|
||||
<!--EndSKU-->
|
||||
<!--EndCSP-->
|
||||
|
@ -1714,7 +1714,7 @@ The following are the supported values:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see https://go.microsoft.com/fwlink/?LinkId=121720.
|
||||
This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see [How to use Data Protection](/dotnet/standard/security/how-to-use-data-protection).
|
||||
|
||||
If you configure this policy setting, an audit event is generated when an encryption or decryption request is made to DPAPI. Success audits record successful requests and Failure audits record unsuccessful requests.
|
||||
If you don't configure this policy setting, no audit event is generated when an encryption or decryption request is made to DPAPI.
|
||||
@ -2862,7 +2862,7 @@ If you don't configure this policy setting, no audit event is generated when an
|
||||
> [!Note]
|
||||
> Only the System Access Control List (SACL) for SAM_SERVER can be modified.
|
||||
|
||||
Volume: High on domain controllers. For information about reducing the number of events generated in this subcategory, see [article 841001 in the Microsoft Knowledge Base](https://go.microsoft.com/fwlink/?LinkId=121698).
|
||||
Volume: High on domain controllers. For more information about reducing the number of events generated by auditing the access of global system objects, see [Audit the access of global system objects](/windows/security/threat-protection/security-policy-settings/audit-audit-the-access-of-global-system-objects).
|
||||
|
||||
<!--/Description-->
|
||||
<!--DbMapped-->
|
||||
|
@ -7,7 +7,7 @@ ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 05/09/2022
|
||||
ms.date: 05/16/2022
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
@ -73,7 +73,7 @@ manager: dansimp
|
||||
<hr/>
|
||||
|
||||
> [!Important]
|
||||
> The DeviceLock CSP utilizes the [Exchange ActiveSync Policy Engine](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn282287(v=ws.11)). When password length and complexity rules are applied, all the local user and administrator accounts are marked to change their password at the next sign in to ensure complexity requirements are met. For additional information, see [Password length and complexity supported by account types](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn282287(v=ws.11)#password-length-and-complexity-supported-by-account-types)).
|
||||
> The DeviceLock CSP utilizes the [Exchange ActiveSync Policy Engine](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn282287(v=ws.11)). When password length and complexity rules are applied, all the local user and administrator accounts are marked to change their password at the next sign in to ensure complexity requirements are met. For additional information, see [Password length and complexity supported by account types](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn282287(v=ws.11)#password-length-and-complexity-supported-by-account-types).
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="devicelock-allowidlereturnwithoutpassword"></a>**DeviceLock/AllowIdleReturnWithoutPassword**
|
||||
|
@ -963,10 +963,10 @@ items:
|
||||
items:
|
||||
- name: WindowsAdvancedThreatProtection DDF file
|
||||
href: windowsadvancedthreatprotection-ddf.md
|
||||
- name: WindowsAutoPilot CSP
|
||||
- name: WindowsAutopilot CSP
|
||||
href: windowsautopilot-csp.md
|
||||
items:
|
||||
- name: WindowsAutoPilot DDF file
|
||||
- name: WindowsAutopilot DDF file
|
||||
href: windowsautopilot-ddf-file.md
|
||||
- name: WindowsDefenderApplicationGuard CSP
|
||||
href: windowsdefenderapplicationguard-csp.md
|
||||
|
@ -14,6 +14,16 @@ ms.date: 06/18/2019
|
||||
|
||||
# WiFi CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to pre-released products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
|
||||
|
||||
@ -41,11 +51,10 @@ WiFi
|
||||
---------WiFiCost
|
||||
```
|
||||
|
||||
|
||||
The following list shows the characteristics and parameters.
|
||||
|
||||
<a href="" id="wifi"></a>**Device or User profile**
|
||||
For user profile, use ./User/Vendor/MSFT/Wifi path and for device profile, use ./Device/Vendor/MSFT/Wifi path.
|
||||
For user profile, use .`/User/Vendor/MSFT/Wifi` path and for device profile, use `./Device/Vendor/MSFT/Wifi` path.
|
||||
|
||||
<a href="" id="profile"></a>**Profile**
|
||||
Identifies the Wi-Fi network configuration. Each Wi-Fi network configuration is represented by a profile object. This network profile includes all the information required for the device to connect to that network – for example, the SSID, authentication and encryption methods and passphrase if there's WEP or WPA2 networks.
|
||||
@ -94,6 +103,7 @@ Supported operations are Get, Add, Delete, and Replace.
|
||||
-->
|
||||
|
||||
<a href="" id="disableinternetconnectivitychecks"></a>**DisableInternetConnectivityChecks**
|
||||
|
||||
> [!Note]
|
||||
> This node has been deprecated since Windows 10, version 1607.
|
||||
|
||||
@ -101,8 +111,8 @@ Added in Windows 10, version 1511. Optional. Disable the internet connectivity c
|
||||
|
||||
Value type is chr.
|
||||
|
||||
- True - internet connectivity check is disabled.
|
||||
- False - internet connectivity check is enabled.
|
||||
- True - internet connectivity check is disabled.
|
||||
- False - internet connectivity check is enabled.
|
||||
|
||||
Supported operations are Get, Add, Delete, and Replace.
|
||||
|
||||
@ -139,7 +149,6 @@ Supported operations are Add, Get, Replace and Delete. Value type is integer.
|
||||
|
||||
## Examples
|
||||
|
||||
|
||||
These XML examples show how to perform various tasks using OMA DM.
|
||||
|
||||
### Add a network
|
||||
@ -241,8 +250,4 @@ The following example shows how to add PEAP-MSCHAPv2 network with SSID ‘MyNetw
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
||||
|
@ -15,11 +15,11 @@ ms.date: 06/28/2018
|
||||
# WiFi DDF file
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **WiFi** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
The XML below is for Windows 10, version 1809.
|
||||
The XML below is for Windows 10, version 1809 and later.
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
|
@ -14,6 +14,15 @@ ms.date: 06/26/2017
|
||||
|
||||
# Win32AppInventory CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|No|No|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The Win32AppInventory configuration service provider is used to provide an inventory of installed applications on a device.
|
||||
|
||||
|
@ -14,7 +14,6 @@ ms.date: 12/05/2017
|
||||
|
||||
# Win32AppInventory DDF file
|
||||
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **Win32AppInventory** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
@ -274,15 +273,4 @@ The XML below is the current version for this CSP.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Win32AppInventory configuration service provider](win32appinventory-csp.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
[Win32AppInventory configuration service provider](win32appinventory-csp.md)
|
@ -11,7 +11,17 @@ ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# Win32CompatibilityAppraiser CSP
|
||||
# Win32CompatibilityAppraiser CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|No|No|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
@ -45,52 +55,64 @@ Win32CompatibilityAppraiser
|
||||
------------MostRestrictiveSetting
|
||||
--------WerConnectionReport
|
||||
```
|
||||
|
||||
<a href="" id="accountmanagement"></a>**./Vendor/MSFT/Win32CompatibilityAppraiser**
|
||||
The root node for the Win32CompatibilityAppraiser configuration service provider.
|
||||
|
||||
<a href="" id="compatibilityappraiser"></a>**CompatibilityAppraiser**
|
||||
This represents the state of the Compatibility Appraiser.
|
||||
|
||||
|
||||
<a href="" id="compatibilityappraiser-appraiserconfigurationdiagnosis"></a>**CompatibilityAppraiser/AppraiserConfigurationDiagnosis**
|
||||
This represents various settings that affect whether the Compatibility Appraiser can collect and upload compatibility data.
|
||||
|
||||
|
||||
<a href="" id="compatibilityappraiser-appraiserconfigurationdiagnosis-commercialid"></a>**CompatibilityAppraiser/AppraiserConfigurationDiagnosis/CommercialId**
|
||||
The unique identifier specifying what organization owns this device. This helps correlate telemetry after it has been uploaded.
|
||||
|
||||
Value type is string. Supported operation is Get.
|
||||
Value type is string.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="compatibilityappraiser-appraiserconfigurationdiagnosiscommercialidsetandvalid"></a>**CompatibilityAppraiser/AppraiserConfigurationDiagnosis/CommercialIdSetAndValid**
|
||||
A boolean value representing whether the CommercialId is set to a valid value. Valid values are strings in the form of GUIDs, with no surrounding braces.
|
||||
|
||||
Value type is bool. Supported operation is Get.
|
||||
Value type is bool.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="compatibilityappraiser-appraiserconfigurationdiagnosis-alltargetosversionsrequested"></a>**CompatibilityAppraiser/AppraiserConfigurationDiagnosis/AllTargetOsVersionsRequested**
|
||||
A boolean value representing whether the flag to request that the Compatibility Appraiser check compatibility with all possible Windows 10 versions has been set. By default, versions 1507 and 1511, and any version equal to or less than the current version, are not checked.
|
||||
A boolean value representing whether the flag to request that the Compatibility Appraiser check compatibility with all possible Windows 10 versions has been set. By default, versions 1507 and 1511, and any version equal to or less than the current version, are not checked.
|
||||
|
||||
Value type is bool. Supported operation is Get.
|
||||
Value type is bool.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="compatibilityappraiser-appraiserconfigurationdiagnosis-osskuisvalidforappraiser"></a>**CompatibilityAppraiser/AppraiserConfigurationDiagnosis/OsSkuIsValidForAppraiser**
|
||||
A boolean value indicating whether the current Windows SKU is able to run the Compatibility Appraiser.
|
||||
|
||||
Value type is bool. Supported operation is Get.
|
||||
Value type is bool.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="compatibilityappraiser-appraiserconfigurationdiagnosis-appraisercodeanddataversionsaboveminimum"></a>**CompatibilityAppraiser/AppraiserConfigurationDiagnosis/AppraiserCodeAndDataVersionsAboveMinimum**
|
||||
An integer value representing whether the installed versions of the Compatibility Appraiser code and data meet the minimum requirement to provide useful data.
|
||||
|
||||
The values are:
|
||||
- 0 == Neither the code nor data is of a sufficient version
|
||||
- 1 == The code version is insufficient but the data version is sufficient
|
||||
- 2 == The code version is sufficient but the data version is insufficient
|
||||
- 3 == Both the code and data are of a sufficient version
|
||||
The values are:
|
||||
|
||||
- 0 == Neither the code nor data is of a sufficient version.
|
||||
- 1 == The code version is insufficient but the data version is sufficient.
|
||||
- 2 == The code version is sufficient but the data version is insufficient.
|
||||
- 3 == Both the code and data are of a sufficient version.
|
||||
|
||||
Value type is integer. Supported operation is Get.
|
||||
Value type is integer.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="compatibilityappraiser-appraiserconfigurationdiagnosis-rebootpending"></a>**CompatibilityAppraiser/AppraiserConfigurationDiagnosis/RebootPending**
|
||||
A boolean value representing whether a reboot is pending on this computer. A newly-installed version of the Compatibility Appraiser may require a reboot before useful data is able to be sent.
|
||||
A boolean value representing whether a reboot is pending on this computer. A newly-installed version of the Compatibility Appraiser may require a reboot before useful data is able to be sent.
|
||||
|
||||
Value type is bool. Supported operation is Get.
|
||||
Value type is bool.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="compatibilityappraiser-appraiserrunresultreport"></a>**CompatibilityAppraiser/AppraiserRunResultReport**
|
||||
This provides an XML representation of the last run of Appraiser and the last runs of Appraiser of certain types or configurations.
|
||||
@ -106,45 +128,58 @@ This represents various settings that affect whether the Universal Telemetry Cli
|
||||
<a href="" id="universaltelemetryclient-utcconfigurationdiagnosis-telemetryoptin"></a>**UniversalTelemetryClient/UtcConfigurationDiagnosis/TelemetryOptIn**
|
||||
An integer value representing what level of telemetry will be uploaded.
|
||||
|
||||
Value type is integer. Supported operation is Get.
|
||||
Value type is integer.
|
||||
|
||||
The values are:
|
||||
- 0 == Security data will be sent
|
||||
- 1 == Basic telemetry will be sent
|
||||
- 2 == Enhanced telemetry will be sent
|
||||
- 3 == Full telemetry will be sent
|
||||
Supported operation is Get.
|
||||
|
||||
The values are:
|
||||
|
||||
- 0 == Security data will be sent.
|
||||
- 1 == Basic telemetry will be sent.
|
||||
- 2 == Enhanced telemetry will be sent.
|
||||
- 3 == Full telemetry will be sent.
|
||||
|
||||
<a href="" id="universaltelemetryclient-utcconfigurationdiagnosis-commercialdataoptin"></a>**UniversalTelemetryClient/UtcConfigurationDiagnosis/CommercialDataOptIn**
|
||||
An integer value representing whether the CommercialDataOptIn setting is allowing any data to upload.
|
||||
|
||||
Value type is integer. Supported operation is Get.
|
||||
Value type is integer.
|
||||
|
||||
The values are:
|
||||
- 0 == Setting is disabled
|
||||
- 1 == Setting is enabled
|
||||
- 2 == Setting is not applicable to this version of Windows
|
||||
Supported operation is Get.
|
||||
|
||||
The values are:
|
||||
|
||||
- 0 == Setting is disabled.
|
||||
- 1 == Setting is enabled.
|
||||
- 2 == Setting is not applicable to this version of Windows.
|
||||
|
||||
<a href="" id="universaltelemetryclient-utcconfigurationdiagnosis-diagtrackservicerunning"></a>**UniversalTelemetryClient/UtcConfigurationDiagnosis/DiagTrackServiceRunning**
|
||||
A boolean value representing whether the DiagTrack service is running. This service must be running in order to upload UTC data.
|
||||
A boolean value representing whether the DiagTrack service is running. This service must be running in order to upload UTC data.
|
||||
|
||||
Value type is bool. Supported operation is Get.
|
||||
Value type is bool.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="universaltelemetryclient-utcconfigurationdiagnosis-msaserviceenabled"></a>**UniversalTelemetryClient/UtcConfigurationDiagnosis/MsaServiceEnabled**
|
||||
A boolean value representing whether the MSA service is enabled. This service must be enabled for UTC data to be indexed with Global Device IDs.
|
||||
A boolean value representing whether the MSA service is enabled. This service must be enabled for UTC data to be indexed with Global Device IDs.
|
||||
|
||||
Value type is bool. Supported operation is Get.
|
||||
Value type is bool.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="universaltelemetryclient-utcconfigurationdiagnosis-internetexplorertelemetryoptin"></a>**UniversalTelemetryClient/UtcConfigurationDiagnosis/InternetExplorerTelemetryOptIn**
|
||||
An integer value representing what websites Internet Explorer will collect telemetry data for.
|
||||
An integer value representing what websites Internet Explorer will collect telemetry data for.
|
||||
|
||||
Value type is integer. Supported operation is Get.
|
||||
Value type is integer.
|
||||
|
||||
The values are:
|
||||
- 0 == Telemetry collection is disabled
|
||||
- 1 == Telemetry collection is enabled for websites in the local intranet, trusted websites, and machine local zones
|
||||
- 2 == Telemetry collection is enabled for internet websites and restricted website zones
|
||||
- 3 == Telemetry collection is enabled for all websites
|
||||
- 0x7FFFFFFF == Telemetry collection is not configured
|
||||
Supported operation is Get.
|
||||
|
||||
The values are:
|
||||
|
||||
- 0 == Telemetry collection is disabled.
|
||||
- 1 == Telemetry collection is enabled for websites in the local intranet, trusted websites, and machine local zones.
|
||||
- 2 == Telemetry collection is enabled for internet websites and restricted website zones.
|
||||
- 3 == Telemetry collection is enabled for all websites.
|
||||
- 0x7FFFFFFF == Telemetry collection is not configured.
|
||||
|
||||
<a href="" id="universaltelemetryclient-utcconnectionreport"></a>**UniversalTelemetryClient/UtcConnectionReport**
|
||||
This provides an XML representation of the UTC connections during the most recent summary period.
|
||||
@ -160,26 +195,31 @@ This represents various settings that affect whether the Windows Error Reporting
|
||||
<a href="" id="windowserrorreporting-werconfigurationdiagnosis-wertelemetryoptin"></a>**WindowsErrorReporting/WerConfigurationDiagnosis/WerTelemetryOptIn**
|
||||
An integer value indicating the amount of WER data that will be uploaded.
|
||||
|
||||
Value type integer. Supported operation is Get.
|
||||
Value type is integer.
|
||||
|
||||
The values are:
|
||||
- 0 == Data will not send due to UTC opt-in
|
||||
- 1 == Data will not send due to WER opt-in
|
||||
- 2 == Basic WER data will send but not the complete set of data
|
||||
- 3 == The complete set of WER data will send
|
||||
Supported operation is Get.
|
||||
|
||||
The values are:
|
||||
|
||||
- 0 == Data will not send due to UTC opt-in.
|
||||
- 1 == Data will not send due to WER opt-in.
|
||||
- 2 == Basic WER data will send but not the complete set of data.
|
||||
- 3 == The complete set of WER data will send.
|
||||
|
||||
<a href="" id="windowserrorreporting-werconfigurationdiagnosis-mostrestrictivesetting"></a>**WindowsErrorReporting/WerConfigurationDiagnosis/MostRestrictiveSetting**
|
||||
An integer value representing which setting category (system telemetry, WER basic policies, WER advanced policies, and WER consent policies) is causing the overall WerTelemetryOptIn value to be restricted.
|
||||
|
||||
Value type integer. Supported operation is Get.
|
||||
Value type is integer.
|
||||
|
||||
The values are:
|
||||
- 0 == System telemetry settings are restricting uploads
|
||||
- 1 == WER basic policies are restricting uploads
|
||||
- 2 == WER advanced policies are restricting uploads
|
||||
- 3 == WER consent policies are restricting uploads
|
||||
- 4 == There are no restrictive settings
|
||||
Supported operation is Get.
|
||||
|
||||
The values are:
|
||||
|
||||
- 0 == System telemetry settings are restricting upload.
|
||||
- 1 == WER basic policies are restricting uploads.
|
||||
- 2 == WER advanced policies are restricting uploads.
|
||||
- 3 == WER consent policies are restricting uploads.
|
||||
- 4 == There are no restrictive settings.
|
||||
|
||||
<a href="" id="windowserrorreporting-werconnectionreport"></a>**WindowsErrorReporting/WerConnectionReport**
|
||||
This provides an XML representation of the most recent WER connections of various types.
|
||||
@ -190,7 +230,7 @@ For the report XML schema, see [Windows Error Reporting connection report](#wind
|
||||
|
||||
### Appraiser run result report
|
||||
|
||||
```
|
||||
```xml
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" >
|
||||
<xs:annotation>
|
||||
@ -362,7 +402,7 @@ For the report XML schema, see [Windows Error Reporting connection report](#wind
|
||||
|
||||
### UTC connection report
|
||||
|
||||
```
|
||||
```xml
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:fusion="urn:schemas-microsoft-com:asm.v1" elementFormDefault="qualified" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" >
|
||||
<xs:annotation>
|
||||
@ -440,7 +480,7 @@ For the report XML schema, see [Windows Error Reporting connection report](#wind
|
||||
|
||||
### Windows Error Reporting connection report
|
||||
|
||||
```
|
||||
```xml
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:fusion="urn:schemas-microsoft-com:asm.v1" elementFormDefault="qualified" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" >
|
||||
<xs:annotation>
|
||||
@ -638,3 +678,7 @@ For the report XML schema, see [Windows Error Reporting connection report](#wind
|
||||
<xs:element name="ConnectionReport" type="ConnectionReportType"/>
|
||||
</xs:schema>
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Win32CompatibilityAppraiser DDF file
|
||||
description: XML file containing the device description framework for the Win32CompatibilityAppraiser configuration service provider.
|
||||
description: Learn about the XML file containing the device description framework for the Win32CompatibilityAppraiser configuration service provider.
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
@ -14,13 +14,13 @@ manager: dansimp
|
||||
# Win32CompatibilityAppraiser DDF file
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **Win32CompatibilityAppraiser** configuration service provider.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
|
||||
The XML below is for Windows 10, version 1809.
|
||||
The XML below is for Windows 10, version 1809 and later.
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
@ -98,7 +98,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>The unique identifier specifying what organization owns this device. This helps correlate telemetry after it has been uploaded.</Description>
|
||||
<Description>The unique identifier specifying what organization owns this device. This helps correlate telemetry after it has been uploaded.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -120,7 +120,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>A boolean value representing whether the CommercialId is set to a valid value. Valid values are strings in the form of GUIDs, with no surrounding braces.</Description>
|
||||
<Description>A boolean value representing whether the CommercialId is set to a valid value. Valid values are strings in the form of GUIDs, with no surrounding braces.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -142,7 +142,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>A boolean value representing whether the flag to request that the Compatibility Appraiser check compatibility with all possible Windows 10 versions has been set. By default, versions 1507 and 1511, and any version equal to or less than the current version, are not checked.</Description>
|
||||
<Description>A boolean value representing whether the flag to request that the Compatibility Appraiser check compatibility with all possible Windows 10 versions has been set. By default, versions 1507 and 1511, and any version equal to or less than the current version, are not checked.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -186,7 +186,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>An integer value representing whether the installed versions of the Compatibility Appraiser code and data meet the minimum requirement to provide useful data. The values are: 0 == "Neither the code nor data is of a sufficient version", 1 == "The code version is insufficient but the data version is sufficient", 2 == "The code version is sufficient but the data version is insufficient", and 3 == "Both the code and data are of a sufficient version".</Description>
|
||||
<Description>An integer value representing whether the installed versions of the Compatibility Appraiser code and data meet the minimum requirement to provide useful data. The values are: 0 == "Neither the code nor data is of a sufficient version", 1 == "The code version is insufficient but the data version is sufficient", 2 == "The code version is sufficient but the data version is insufficient", and 3 == "Both the code and data are of a sufficient version".</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -208,7 +208,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>A boolean value representing whether a reboot is pending on this computer. A newly-installed version of the Compatibility Appraiser may require a reboot before useful data is able to be sent.</Description>
|
||||
<Description>A boolean value representing whether a reboot is pending on this computer. A newly-installed version of the Compatibility Appraiser may require a reboot before useful data is able to be sent.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -296,7 +296,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>An integer value representing what level of telemetry will be uploaded. The values are: 0 == "Security data will be sent", 1 == "Basic telemetry will be sent", 2 == "Enhanced telemetry will be sent", and 3 == "Full telemetry will be sent".</Description>
|
||||
<Description>An integer value representing what level of telemetry will be uploaded. The values are: 0 == "Security data will be sent", 1 == "Basic telemetry will be sent", 2 == "Enhanced telemetry will be sent", and 3 == "Full telemetry will be sent".</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -318,7 +318,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>An integer value representing whether the CommercialDataOptIn setting is allowing any data to upload. The values are: 0 == "Setting is disabled", 1 == "Setting is enabled", and 2 == "Setting is not applicable to this version of Windows".</Description>
|
||||
<Description>An integer value representing whether the CommercialDataOptIn setting is allowing any data to upload. The values are: 0 == "Setting is disabled", 1 == "Setting is enabled", and 2 == "Setting is not applicable to this version of Windows".</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -340,7 +340,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>A boolean value representing whether the DiagTrack service is running. This service must be running in order to upload UTC data.</Description>
|
||||
<Description>A boolean value representing whether the DiagTrack service is running. This service must be running in order to upload UTC data.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -362,7 +362,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>A boolean value representing whether the MSA service is enabled. This service must be enabled for UTC data to be indexed with Global Device IDs.</Description>
|
||||
<Description>A boolean value representing whether the MSA service is enabled. This service must be enabled for UTC data to be indexed with Global Device IDs.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -384,7 +384,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>An integer value representing what websites Internet Explorer will collect telemetry data for. The values are: 0 == "Telemetry collection is disabled", 1 == "Telemetry collection is enabled for websites in the local intranet, trusted websites, and machine local zones", 2 == "Telemetry collection is enabled for internet websites and restricted website zones", 3 == "Telemetry collection is enabled for all websites", and 0x7FFFFFFF == "Telemetry collection is not configured".</Description>
|
||||
<Description>An integer value representing what websites Internet Explorer will collect telemetry data for. The values are: 0 == "Telemetry collection is disabled", 1 == "Telemetry collection is enabled for websites in the local intranet, trusted websites, and machine local zones", 2 == "Telemetry collection is enabled for internet websites and restricted website zones", 3 == "Telemetry collection is enabled for all websites", and 0x7FFFFFFF == "Telemetry collection is not configured".</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -472,7 +472,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>An integer value indicating the amount of WER data that will be uploaded. The values are: 0 == "Data will not send due to UTC opt-in", 1 == "Data will not send due to WER opt-in", 2 == "Basic WER data will send but not the complete set of data", and 3 == "The complete set of WER data will send".</Description>
|
||||
<Description>An integer value indicating the amount of WER data that will be uploaded. The values are: 0 == "Data will not send due to UTC opt-in", 1 == "Data will not send due to WER opt-in", 2 == "Basic WER data will send but not the complete set of data", and 3 == "The complete set of WER data will send".</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -494,7 +494,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>An integer value representing which setting category (system telemetry, WER basic policies, WER advanced policies, and WER consent policies) is causing the overall WerTelemetryOptIn value to be restricted. The values are: 0 == "System telemetry settings are restricting uploads", 1 == "WER basic policies are restricting uploads", 2 == "WER advanced policies are restricting uploads", 3 == "WER consent policies are restricting uploads", and 4 == "There are no restrictive settings".</Description>
|
||||
<Description>An integer value representing which setting category (system telemetry, WER basic policies, WER advanced policies, and WER consent policies) is causing the overall WerTelemetryOptIn value to be restricted. The values are: 0 == "System telemetry settings are restricting uploads", 1 == "WER basic policies are restricting uploads", 2 == "WER advanced policies are restricting uploads", 3 == "WER consent policies are restricting uploads", and 4 == "There are no restrictive settings".</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -537,3 +537,7 @@ The XML below is for Windows 10, version 1809.
|
||||
</Node>
|
||||
</MgmtTree>
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[Win32CompatibilityAppraiser configuration service provider](win32compatibilityappraiser-csp.md)
|
@ -14,6 +14,15 @@ ms.date: 11/01/2017
|
||||
|
||||
# WindowsAdvancedThreatProtection CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|No|No|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The Windows Defender Advanced Threat Protection (WDATP) configuration service provider (CSP) allows IT Admins to onboard, determine configuration and health status, and offboard endpoints for WDATP.
|
||||
|
||||
@ -40,102 +49,101 @@ WindowsAdvancedThreatProtection
|
||||
The following list describes the characteristics and parameters.
|
||||
|
||||
<a href="" id="--device-vendor-msft-windowsadvancedthreatprotection"></a>**./Device/Vendor/MSFT/WindowsAdvancedThreatProtection**
|
||||
<p>The root node for the Windows Defender Advanced Threat Protection configuration service provider.
|
||||
The root node for the Windows Defender Advanced Threat Protection configuration service provider.
|
||||
|
||||
<p>Supported operation is Get.
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="onboarding"></a>**Onboarding**
|
||||
<p>Sets Windows Defender Advanced Threat Protection Onboarding blob and initiates onboarding to Windows Defender Advanced Threat Protection.
|
||||
Sets Windows Defender Advanced Threat Protection Onboarding blob and initiates onboarding to Windows Defender Advanced Threat Protection.
|
||||
|
||||
<p>The data type is a string.
|
||||
The data type is a string.
|
||||
|
||||
<p>Supported operations are Get and Replace.
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="healthstate"></a>**HealthState**
|
||||
<p>Node that represents the Windows Defender Advanced Threat Protection health state.
|
||||
Node that represents the Windows Defender Advanced Threat Protection health state.
|
||||
|
||||
<a href="" id="healthstate-lastconnected"></a>**HealthState/LastConnected**
|
||||
<p>Contains the timestamp of the last successful connection.
|
||||
Contains the timestamp of the last successful connection.
|
||||
|
||||
<p>Supported operation is Get.
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="healthstate-senseisrunning"></a>**HealthState/SenseIsRunning**
|
||||
<p>Boolean value that identifies the Windows Defender Advanced Threat Protection Sense running state.
|
||||
Boolean value that identifies the Windows Defender Advanced Threat Protection Sense running state.
|
||||
|
||||
<p>The default value is false.
|
||||
The default value is false.
|
||||
|
||||
<p>Supported operation is Get.
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="healthstate-onboardingstate"></a>**HealthState/OnboardingState**
|
||||
<p>Represents the onboarding state.
|
||||
Represents the onboarding state.
|
||||
|
||||
<p>Supported operation is Get.
|
||||
Supported operation is Get.
|
||||
|
||||
<p>The following list shows the supported values:
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Not onboarded.
|
||||
- 1 – Onboarded
|
||||
- 0 (default) – Not onboarded
|
||||
- 1 – Onboarded
|
||||
|
||||
<a href="" id="healthstate-orgid"></a>**HealthState/OrgId**
|
||||
<p>String that represents the OrgID.
|
||||
String that represents the OrgID.
|
||||
|
||||
<p>Supported operation is Get.
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="configuration"></a>**Configuration**
|
||||
<p>Represents Windows Defender Advanced Threat Protection configuration.
|
||||
Represents Windows Defender Advanced Threat Protection configuration.
|
||||
|
||||
<a href="" id="configuration-samplesharing"></a>**Configuration/SampleSharing**
|
||||
<p>Returns or sets the Windows Defender Advanced Threat Protection Sample Sharing configuration parameter.
|
||||
Returns or sets the Windows Defender Advanced Threat Protection Sample Sharing configuration parameter.
|
||||
|
||||
<p>The following list shows the supported values:
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – None
|
||||
- 1 (default)– All
|
||||
|
||||
<p>Supported operations are Get and Replace.
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="configuration-telemetryreportingfrequency"></a>**Configuration/TelemetryReportingFrequency**
|
||||
<p>Added in Windows 10, version 1703. Returns or sets the Windows Defender Advanced Threat Protection diagnostic data reporting frequency.
|
||||
Added in Windows 10, version 1703. Returns or sets the Windows Defender Advanced Threat Protection diagnostic data reporting frequency.
|
||||
|
||||
<p>The following list shows the supported values:
|
||||
The following list shows the supported values:
|
||||
|
||||
- 1 (default) – Normal
|
||||
- 2 - Expedite
|
||||
- 1 (default) – Normal
|
||||
- 2 - Expedite
|
||||
|
||||
<p>Supported operations are Get and Replace.
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="offboarding"></a>**Offboarding**
|
||||
<p>Sets the Windows Defender Advanced Threat Protection Offboarding blob and initiates offboarding to Windows Defender Advanced Threat Protection.
|
||||
Sets the Windows Defender Advanced Threat Protection Offboarding blob and initiates offboarding to Windows Defender Advanced Threat Protection.
|
||||
|
||||
<p>The data type is a string.
|
||||
The data type is a string.
|
||||
|
||||
<p>Supported operations are Get and Replace.
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="devicetagging"></a>**DeviceTagging**
|
||||
<p>Added in Windows 10, version 1709. Represents Windows Defender Advanced Threat Protection configuration for managing role based access and device tagging.
|
||||
Added in Windows 10, version 1709. Represents Windows Defender Advanced Threat Protection configuration for managing role based access and device tagging.
|
||||
|
||||
<p>Supported operation is Get.
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="group"></a>**DeviceTagging/Group**
|
||||
<p>Added in Windows 10, version 1709. Device group identifiers.
|
||||
Added in Windows 10, version 1709. Device group identifiers.
|
||||
|
||||
<p>The data type is a string.
|
||||
The data type is a string.
|
||||
|
||||
<p>Supported operations are Get and Replace.
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
<a href="" id="criticality"></a>**DeviceTagging/Criticality**
|
||||
<p>Added in Windows 10, version 1709. Asset criticality value. Supported values:
|
||||
Added in Windows 10, version 1709. Asset criticality value. Supported values:
|
||||
|
||||
- 0 - Normal
|
||||
- 1 - Critical
|
||||
|
||||
<p>The data type is an integer.
|
||||
The data type is an integer.
|
||||
|
||||
<p>Supported operations are Get and Replace.
|
||||
Supported operations are Get and Replace.
|
||||
|
||||
## Examples
|
||||
|
||||
|
||||
```xml
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
@ -246,15 +254,4 @@ The following list describes the characteristics and parameters.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: WindowsAdvancedThreatProtection DDF file
|
||||
description: Learn how the OMA DM device description framework (DDF) for the WindowsAdvancedThreatProtection configuration service provider (CSP).
|
||||
description: Learn about the OMA DM device description framework (DDF) for the WindowsAdvancedThreatProtection configuration service provider (CSP).
|
||||
ms.assetid: 0C62A790-4351-48AF-89FD-7D46C42D13E0
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
@ -14,7 +14,6 @@ ms.date: 12/05/2017
|
||||
|
||||
# WindowsAdvancedThreatProtection DDF file
|
||||
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **WindowsAdvancedThreatProtection** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
@ -56,7 +55,7 @@ The XML below is the current version for this CSP.
|
||||
<Replace />
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Set Windows Defender Advanced Threat Protection Onboarding blob and initiate onboarding to Windows Defender Advanced Threat Protection</Description>
|
||||
<Description>Set Windows Defender Advanced Threat Protection Onboarding blob and initiate onboarding to Windows Defender Advanced Threat Protection.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -77,7 +76,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Represents Windows Defender Advanced Threat Protection Health State</Description>
|
||||
<Description>Represents Windows Defender Advanced Threat Protection Health State.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -119,7 +118,7 @@ The XML below is the current version for this CSP.
|
||||
<Get />
|
||||
</AccessType>
|
||||
<DefaultValue>false</DefaultValue>
|
||||
<Description>Return Windows Defender Advanced Threat Protection service running state</Description>
|
||||
<Description>Return Windows Defender Advanced Threat Protection service running state.</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -141,7 +140,7 @@ The XML below is the current version for this CSP.
|
||||
<Get />
|
||||
</AccessType>
|
||||
<DefaultValue>0</DefaultValue>
|
||||
<Description>Return Windows Defender Advanced Threat Protection onboarding state: 0 – not onboarded; 1 - onboarded</Description>
|
||||
<Description>Return Windows Defender Advanced Threat Protection onboarding state: 0 – not onboarded; 1 - onboarded.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -184,7 +183,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Represents Windows Defender Advanced Threat Protection Configuration</Description>
|
||||
<Description>Represents Windows Defender Advanced Threat Protection Configuration.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -206,7 +205,7 @@ The XML below is the current version for this CSP.
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>1</DefaultValue>
|
||||
<Description>Return or set Windows Defender Advanced Threat Protection Sample Sharing configuration parameter: 0 - none, 1 - All</Description>
|
||||
<Description>Return or set Windows Defender Advanced Threat Protection Sample Sharing configuration parameter: 0 - none, 1 - All.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -229,7 +228,7 @@ The XML below is the current version for this CSP.
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<DefaultValue>1</DefaultValue>
|
||||
<Description>Return or set Windows Defender Advanced Threat Protection diagnostic data reporting frequency. Allowed values are: 1 - Normal, 2 - Expedite</Description>
|
||||
<Description>Return or set Windows Defender Advanced Threat Protection diagnostic data reporting frequency. Allowed values are: 1 - Normal, 2 - Expedite.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -253,7 +252,7 @@ The XML below is the current version for this CSP.
|
||||
<Replace />
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Set Windows Defender Advanced Threat Protection Offboarding blob and initiate offboarding</Description>
|
||||
<Description>Set Windows Defender Advanced Threat Protection Offboarding blob and initiate offboarding.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
@ -274,7 +273,7 @@ The XML below is the current version for this CSP.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Represents Windows Defender Advanced Threat Protection configuration for managing role base access and device tagging</Description>
|
||||
<Description>Represents Windows Defender Advanced Threat Protection configuration for managing role base access and device tagging.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -343,15 +342,4 @@ The XML below is the current version for this CSP.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
[WindowsAdvancedThreatProtection configuration service provider](windowsadvancedthreatprotection-csp.md)
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: WindowsAutoPilot CSP
|
||||
title: WindowsAutopilot CSP
|
||||
description: Learn how without the ability to mark a device as remediation required, the device will remain in a broken state, which results in security and privacy concerns in Autopilot.
|
||||
ms.assetid: E6BC6B0D-1F16-48A5-9AC4-76D69A7EDDA6
|
||||
ms.reviewer:
|
||||
@ -12,13 +12,22 @@ author: dansimp
|
||||
ms.date: 02/07/2022
|
||||
---
|
||||
|
||||
# WindowsAutoPilot CSP
|
||||
# WindowsAutopilot CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|No|No|
|
||||
|Pro|No|Yes|
|
||||
|Business|No|Yes|
|
||||
|Enterprise|No|Yes|
|
||||
|Education|No|Yes|
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
The WindowsAutopilot CSP collects hardware information about a device and formats it into a BLOB. This BLOB is used as input for calling Windows Autopilot Service to mark a device as remediation required if the device underwent a hardware change that affects its ability to use Windows Autopilot.” with “The WindowsAutopilot CSP exposes Windows Autopilot related device information.” Because the CSP description should be more general/high level.
|
||||
The WindowsAutopilot CSP exposes Windows Autopilot related device information. The WindowsAutopilot CSP collects hardware information about a device and formats it into a BLOB. This BLOB is used as input for calling Windows Autopilot Service to mark a device as remediation required if the device underwent a hardware change that affects its ability to use Windows Autopilot.
|
||||
|
||||
**./Vendor/MSFT/WindowsAutopilot**
|
||||
|
||||
@ -27,3 +36,7 @@ Root node. Supported operation is Get.
|
||||
**HardwareMismatchRemediationData**
|
||||
|
||||
Interior node. Supported operation is Get. Collects hardware information about a device and returns it as an encoded string. This string is used as input for calling Windows Autopilot Service to remediate a device if the device underwent a hardware change that affects its ability to use Windows Autopilot.
|
||||
|
||||
## Related topics
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: WindowsAutoPilot DDF file
|
||||
description: Learn how without the ability to mark a device as remediation required, the device will remain in a broken state, for the WindowsAutoPilot DDF file configuration service provider (CSP) .
|
||||
title: WindowsAutopilot DDF file
|
||||
description: Learn how without the ability to mark a device as remediation required, the device will remain in a broken state, for the WindowsAutopilot DDF file configuration service provider (CSP) .
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
@ -11,12 +11,12 @@ ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# WindowsAutoPilot DDF file
|
||||
# WindowsAutopilot DDF file
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
This topic shows the device description framework (DDF) for the **WindowsAutoPilot** configuration service provider.
|
||||
This topic shows the device description framework (DDF) for the **WindowsAutopilot** configuration service provider.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
|
||||
@ -27,7 +27,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>These settings enable configuration of Windows Autopilot</Description>
|
||||
<Description>These settings enable configuration of Windows Autopilot.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -74,3 +74,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
||||
</cspDefinition>
|
||||
</identity>
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[WindowsAutopilot configuration service provider](windowsautopilot-csp.md)
|
@ -13,10 +13,21 @@ manager: dansimp
|
||||
|
||||
# WindowsDefenderApplicationGuard CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|No|No|
|
||||
|Pro|No|No|
|
||||
|Business|No|No|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
The WindowsDefenderApplicationGuard configuration service provider (CSP) is used by the enterprise to configure the settings in Microsoft Defender Application Guard. This CSP was added in Windows 10, version 1709.
|
||||
|
||||
The following example shows the WindowsDefenderApplicationGuard configuration service provider in tree format.
|
||||
```
|
||||
|
||||
```console
|
||||
./Device/Vendor/MSFT
|
||||
WindowsDefenderApplicationGuard
|
||||
----Settings
|
||||
@ -36,6 +47,7 @@ WindowsDefenderApplicationGuard
|
||||
----Audit
|
||||
--------AuditApplicationGuard
|
||||
```
|
||||
|
||||
<a href="" id="windowsdefenderapplicationguard"></a>**./Device/Vendor/MSFT/WindowsDefenderApplicationGuard**
|
||||
Root node. Supported operation is Get.
|
||||
|
||||
@ -43,30 +55,37 @@ Root node. Supported operation is Get.
|
||||
Interior node. Supported operation is Get.
|
||||
|
||||
<a href="" id="allowwindowsdefenderapplicationguard"></a>**Settings/AllowWindowsDefenderApplicationGuard**
|
||||
Turn on Microsoft Defender Application Guard in Enterprise Mode.
|
||||
Turn on Microsoft Defender Application Guard in Enterprise Mode.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
The following list shows the supported values:
|
||||
- 0 - Disable Microsoft Defender Application Guard
|
||||
- 1 - Enable Microsoft Defender Application Guard for Microsoft Edge ONLY
|
||||
- 2 - Enable Microsoft Defender Application Guard for isolated Windows environments ONLY (added in Windows 10, version 2004)
|
||||
- 3 - Enable Microsoft Defender Application Guard for Microsoft Edge AND isolated Windows environments (added in Windows 10, version 2004)
|
||||
|
||||
- 0 - Disable Microsoft Defender Application Guard.
|
||||
- 1 - Enable Microsoft Defender Application Guard for Microsoft Edge ONLY.
|
||||
- 2 - Enable Microsoft Defender Application Guard for isolated Windows environments ONLY (added in Windows 10, version 2004).
|
||||
- 3 - Enable Microsoft Defender Application Guard for Microsoft Edge AND isolated Windows environments (added in Windows 10, version 2004).
|
||||
|
||||
<a href="" id="clipboardfiletype"></a>**Settings/ClipboardFileType**
|
||||
Determines the type of content that can be copied from the host to Application Guard environment and vice versa.
|
||||
Determines the type of content that can be copied from the host to Application Guard environment and vice versa.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10/Windows 11 Enterprise or Windows 10/Windows 11 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
- 1 - Allow text copying.
|
||||
- 2 - Allow image copying.
|
||||
- 3 - Allow text and image copying.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Configure Microsoft Defender Application Guard clipboard settings*
|
||||
- GP name: *AppHVSIClipboardFileType*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
@ -76,21 +95,25 @@ ADMX Info:
|
||||
<a href="" id="clipboardsettings"></a>**Settings/ClipboardSettings**
|
||||
This policy setting allows you to decide how the clipboard behaves while in Application Guard.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10/Windows 11 Enterprise or Windows 10/Windows 11 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
The following list shows the supported values:
|
||||
- 0 (default) - Completely turns Off the clipboard functionality for the Application Guard.
|
||||
- 1 - Turns On clipboard operation from an isolated session to the host.
|
||||
- 2 - Turns On clipboard operation from the host to an isolated session.
|
||||
- 3 - Turns On clipboard operation in both the directions.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Allowing copied content to go from Microsoft Edge into Application Guard can cause potential security risks and isn't recommended.
|
||||
> Allowing copied content to go from Microsoft Edge into Application Guard can cause potential security risks and isn't recommended.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Configure Microsoft Defender Application Guard clipboard settings*
|
||||
- GP name: *AppHVSIClipboardSettings*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
@ -98,13 +121,16 @@ ADMX Info:
|
||||
<!--/ADMXMapped-->
|
||||
|
||||
<a href="" id="printingsettings"></a>**Settings/PrintingSettings**
|
||||
This policy setting allows you to decide how the print functionality behaves while in Application Guard.
|
||||
This policy setting allows you to decide how the print functionality behaves while in Application Guard.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
The following list shows the supported values:
|
||||
This policy setting is supported on Microsoft Edge on Windows 10/Windows 11 Enterprise or Windows 10/Windows 11 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - Disables all print functionality.
|
||||
- 1 - Enables only XPS printing.
|
||||
- 2 - Enables only PDF printing.
|
||||
@ -123,7 +149,8 @@ The following list shows the supported values:
|
||||
- 15 - Enables all printing.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Configure Microsoft Defender Application Guard print settings*
|
||||
- GP name: *AppHVSIPrintingSettings*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
@ -133,11 +160,14 @@ ADMX Info:
|
||||
<a href="" id="blocknonenterprisecontent"></a>**Settings/BlockNonEnterpriseContent**
|
||||
This policy setting allows you to decide whether websites can load non-enterprise content in Microsoft Edge and Internet Explorer.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
The following list shows the supported values:
|
||||
This policy setting is supported on Microsoft Edge on Windows 10/Windows 11 Enterprise or Windows 10/Windows 11 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - Non-enterprise content embedded in enterprise sites is allowed to open outside of the Microsoft Defender Application Guard container, directly in Internet Explorer and Microsoft Edge.
|
||||
- 1 - Non-enterprise content embedded on enterprise sites is stopped from opening in Internet Explorer or Microsoft Edge outside of Microsoft Defender Application Guard.
|
||||
|
||||
@ -145,7 +175,8 @@ The following list shows the supported values:
|
||||
> This policy setting is no longer supported in the new Microsoft Edge browser. The policy will be deprecated and removed in a future release. Webpages that contain mixed content, both enterprise and non-enterprise, may load incorrectly or fail completely if this feature is enabled.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Prevent enterprise websites from loading non-enterprise content in Microsoft Edge and Internet Explorer*
|
||||
- GP name: *BlockNonEnterpriseContent*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
@ -155,16 +186,18 @@ ADMX Info:
|
||||
<a href="" id="allowpersistence"></a>**Settings/AllowPersistence**
|
||||
This policy setting allows you to decide whether data should persist across different sessions in Application Guard.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Application Guard discards user-downloaded files and other items (such as, cookies, Favorites, and so on) during machine restart or user sign out.
|
||||
- 1 - Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Allow data persistence for Microsoft Defender Application Guard*
|
||||
- GP name: *AllowPersistence*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
@ -172,15 +205,18 @@ ADMX Info:
|
||||
<!--/ADMXMapped-->
|
||||
|
||||
<a href="" id="allowvirtualgpu"></a>**Settings/AllowVirtualGPU**
|
||||
Added in Windows 10, version 1803. This policy setting allows you to determine whether Application Guard can use the virtual Graphics Processing Unit (GPU) to process graphics.
|
||||
Added in Windows 10, version 1803. This policy setting allows you to determine whether Application Guard can use the virtual Graphics Processing Unit (GPU) to process graphics.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10/Windows 11 Enterprise or Windows 10/Windows 11 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
|
||||
If you enable this setting, Microsoft Defender Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Microsoft Defender Application Guard, particularly for video playback and other graphics-intensive use cases. If you enable this setting without connecting any high-security rendering graphics hardware, Microsoft Defender Application Guard will automatically revert to software-based (CPU) rendering.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - Can't access the vGPU and uses the CPU to support rendering graphics. When the policy isn't configured, it's the same as disabled (0).
|
||||
- 1 - Turns on the functionality to access the vGPU offloading graphics rendering from the CPU. This functionality can create a faster experience when working with graphics intense websites or watching video within the container.
|
||||
|
||||
@ -188,7 +224,8 @@ The following list shows the supported values:
|
||||
> Enabling this setting with potentially compromised graphics devices or drivers might pose a risk to the host device.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Allow hardware-accelerated rendering for Microsoft Defender Application Guard*
|
||||
- GP name: *AllowVirtualGPU*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
@ -196,18 +233,20 @@ ADMX Info:
|
||||
<!--/ADMXMapped-->
|
||||
|
||||
<a href="" id="savefilestohost"></a>**Settings/SaveFilesToHost**
|
||||
Added in Windows 10, version 1803. This policy setting allows you to determine whether users can elect to download files from Edge in the container and persist files them from container to the host operating system. This policy setting also enables users to elect files on the host operating system and upload it through Edge in the container.
|
||||
Added in Windows 10, version 1803. This policy setting allows you to determine whether users can elect to download files from Edge in the container and persist files from container to the host operating system. This policy setting also enables users to elect files on the host operating system and upload it through Edge in the container.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
The following list shows the supported values:
|
||||
- 0 (default) - The user can't download files from Edge in the container to the host file system, or upload files from host file system to Edge in the container. When the policy isn't configured, it's the same as disabled (0).
|
||||
- 1 - Turns on the functionality to allow users to download files from Edge in the container to the host file system.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Allow files to download and save to the host operating system from Microsoft Defender Application Guard*
|
||||
- GP name: *SaveFilesToHost*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
@ -217,9 +256,11 @@ ADMX Info:
|
||||
<a href="" id="certificatethumbprints"></a>**Settings/CertificateThumbprints**
|
||||
Added in Windows 10, version 1809. This policy setting allows certain device level Root Certificates to be shared with the Microsoft Defender Application Guard container.
|
||||
|
||||
Value type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is string.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10/Windows 11 Enterprise or Windows 10/Windows 11 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
|
||||
If you enable this setting, certificates with a thumbprint matching the ones specified will be transferred into the container. Multiple certificates can be specified by using a comma to separate the thumbprints for each certificate you want to transfer.
|
||||
|
||||
@ -229,7 +270,8 @@ b4e72779a8a362c860c36a6461f31e3aa7e58c14,1b1d49f06d2a697a544a1059bd59a7b058cda92
|
||||
If you disable or don’t configure this setting, certificates aren't shared with the Microsoft Defender Application Guard container.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Allow Microsoft Defender Application Guard to use Root Certificate Authorities from the user's device*
|
||||
- GP name: *CertificateThumbprints*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
@ -242,15 +284,18 @@ ADMX Info:
|
||||
<a href="" id="allowcameramicrophoneredirection"></a>**Settings/AllowCameraMicrophoneRedirection**
|
||||
Added in Windows 10, version 1809. This policy setting allows you to determine whether applications inside Microsoft Defender Application Guard can access the device’s camera and microphone when these settings are enabled on the user’s device.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10/Windows 11 Enterprise or Windows 10/Windows 11 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
|
||||
If you enable this policy setting, applications inside Microsoft Defender Application Guard will be able to access the camera and microphone on the user’s device.
|
||||
|
||||
If you disable or don't configure this policy setting, applications inside Microsoft Defender Application Guard will be unable to access the camera and microphone on the user’s device.
|
||||
|
||||
The following list shows the supported values:
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - Microsoft Defender Application Guard can't access the device’s camera and microphone. When the policy isn't configured, it's the same as disabled (0).
|
||||
- 1 - Turns on the functionality to allow Microsoft Defender Application Guard to access the device’s camera and microphone.
|
||||
|
||||
@ -258,7 +303,8 @@ The following list shows the supported values:
|
||||
> If you turn on this policy setting, a compromised container could bypass camera and microphone permissions and access the camera and microphone without the user's knowledge. To prevent unauthorized access, we recommend that camera and microphone privacy settings be turned off on the user's device when they are not needed.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Allow camera and microphone access in Microsoft Defender Application Guard*
|
||||
- GP name: *AllowCameraMicrophoneRedirection*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
@ -268,22 +314,26 @@ ADMX Info:
|
||||
<a href="" id="status"></a>**Status**
|
||||
Returns bitmask that indicates status of Application Guard installation for Microsoft Edge and prerequisites on the device.
|
||||
|
||||
Value type is integer. Supported operation is Get.
|
||||
Value type is integer.
|
||||
|
||||
- Bit 0 - Set to 1 when Application Guard is enabled into enterprise manage mode.
|
||||
- Bit 1 - Set to 1 when the client machine is Hyper-V capable.
|
||||
- Bit 2 - Set to 1 when the client machine has a valid OS license and SKU.
|
||||
- Bit 3 - Set to 1 when Application Guard installed on the client machine.
|
||||
- Bit 4 - Set to 1 when required Network Isolation Policies are configured.
|
||||
> [!IMPORTANT]
|
||||
> If you are deploying Application Guard via Intune, Network Isolation Policy must be configured to enable Application Guard for Microsoft Edge.
|
||||
- Bit 5 - Set to 1 when the client machine meets minimum hardware requirements.
|
||||
- Bit 6 - Set to 1 when system reboot is required.
|
||||
Supported operation is Get.
|
||||
|
||||
- Bit 0 - Set to 1 when Application Guard is enabled into enterprise manage mode.
|
||||
- Bit 1 - Set to 1 when the client machine is Hyper-V capable.
|
||||
- Bit 2 - Set to 1 when the client machine has a valid OS license and SKU.
|
||||
- Bit 3 - Set to 1 when Application Guard installed on the client machine.
|
||||
- Bit 4 - Set to 1 when required Network Isolation Policies are configured.
|
||||
> [!IMPORTANT]
|
||||
> If you are deploying Application Guard via Intune, Network Isolation Policy must be configured to enable Application Guard for Microsoft Edge.
|
||||
- Bit 5 - Set to 1 when the client machine meets minimum hardware requirements.
|
||||
- Bit 6 - Set to 1 when system reboot is required.
|
||||
|
||||
<a href="" id="platformstatus"></a>**PlatformStatus**
|
||||
Added in Windows 10, version 2004. Applies to Microsoft Office/Generic platform. Returns bitmask that indicates status of Application Guard platform installation and prerequisites on the device.
|
||||
|
||||
Value type is integer. Supported operation is Get.
|
||||
Value type is integer.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
- Bit 0 - Set to 1 when Application Guard is enabled into enterprise manage mode.
|
||||
- Bit 1 - Set to 1 when the client machine is Hyper-V capable.
|
||||
@ -297,7 +347,8 @@ Initiates remote installation of Application Guard feature.
|
||||
|
||||
Supported operations are Get and Execute.
|
||||
|
||||
The following list shows the supported values:
|
||||
The following list shows the supported values:
|
||||
|
||||
- Install - Will initiate feature install.
|
||||
- Uninstall - Will initiate feature uninstall.
|
||||
|
||||
@ -305,20 +356,28 @@ The following list shows the supported values:
|
||||
Interior node. Supported operation is Get.
|
||||
|
||||
<a href="" id="auditapplicationguard"></a>**Audit/AuditApplicationGuard**
|
||||
This policy setting allows you to decide whether auditing events can be collected from Application Guard.
|
||||
This policy setting allows you to decide whether auditing events can be collected from Application Guard.
|
||||
|
||||
Value type in integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type in integer.
|
||||
|
||||
This policy setting is supported on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
The following list shows the supported values:
|
||||
This policy setting is supported on Windows 10/Windows 11 Enterprise or Windows 10/Windows 11 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - Audit event logs aren't collected for Application Guard.
|
||||
- 1 - Application Guard inherits its auditing policies from system and starts to audit security events for Application Guard container.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
ADMX Info:
|
||||
|
||||
- GP Friendly name: *Allow auditing events in Microsoft Defender Application Guard*
|
||||
- GP name: *AuditApplicationGuard*
|
||||
- GP path: *Windows Components/Microsoft Defender Application Guard*
|
||||
- GP ADMX file name: *AppHVSI.admx*
|
||||
<!--/ADMXMapped-->
|
||||
|
||||
## Related topics
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: WindowsDefenderApplicationGuard DDF file
|
||||
description: learn about the OMA DM device description framework (DDF) for the WindowsDefenderApplicationGuard DDF file configuration service provider (CSP).
|
||||
description: Learn about the OMA DM device description framework (DDF) for the WindowsDefenderApplicationGuard DDF file configuration service provider (CSP).
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
@ -14,13 +14,13 @@ manager: dansimp
|
||||
# WindowsDefenderApplicationGuard DDF file
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **WindowsDefenderApplicationGuard** configuration service provider.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
|
||||
This XML is for Windows 10, version 1809.
|
||||
This XML is for Windows 10, version 1809 and later.
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
@ -481,3 +481,7 @@ This XML is for Windows 10, version 1809.
|
||||
</Node>
|
||||
</MgmtTree>
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[WindowsDefenderApplicationGuard configuration service provider](windowsdefenderapplicationguard-csp.md)
|
@ -14,6 +14,16 @@ ms.date: 08/15/2018
|
||||
|
||||
# WindowsLicensing CSP
|
||||
|
||||
The table below shows the applicability of Windows:
|
||||
|
||||
|Edition|Windows 10|Windows 11|
|
||||
|--- |--- |--- |
|
||||
|Home|Yes|Yes|
|
||||
|Pro|Yes|Yes|
|
||||
|Business|Yes|Yes|
|
||||
|Enterprise|Yes|Yes|
|
||||
|Education|Yes|Yes|
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
@ -40,6 +50,7 @@ WindowsLicensing
|
||||
--------SwitchFromSMode (Added in Windows 10, version 1809)
|
||||
--------Status (Added in Windows 10, version 1809)
|
||||
```
|
||||
|
||||
<a href="" id="--device-vendor-msft-windowslicensing"></a>**./Device/Vendor/MSFT/WindowsLicensing**
|
||||
This node is the root node for the WindowsLicensing configuration service provider.
|
||||
|
||||
@ -51,21 +62,17 @@ Enters a product key for an edition upgrade of Windows 10 desktop devices.
|
||||
> [!NOTE]
|
||||
> This upgrade process requires a system restart.
|
||||
|
||||
|
||||
|
||||
The date type is a chr.
|
||||
|
||||
The supported operation is Exec.
|
||||
|
||||
When a product key is pushed from an MDM server to a user's device, **changepk.exe** runs using the product key. After it completes, a notification is shown to the user that a new edition of Windows 10 is available. The user can then restart their system manually or, after two hours, the device will restart automatically to complete the upgrade. The user will receive a reminder notification 10 minutes before the automatic restart.
|
||||
When a product key is pushed from an MDM server to a user's device, **changepk.exe** runs using the product key. After it completes, a notification is shown to the user that a new edition of Windows 10 is available. The user can then restart their system manually or after two hours, the device will restart automatically to complete the upgrade. The user will receive a reminder notification 10 minutes before the automatic restart.
|
||||
|
||||
After the device restarts, the edition upgrade process completes. The user will receive a notification of the successful upgrade.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> If another policy requires a system reboot that occurs when **changepk.exe** is running, the edition upgrade will fail.
|
||||
|
||||
|
||||
|
||||
If a product key is entered in a provisioning package and the user begins installation of the package, a notification is shown to the user that their system will restart to complete the package installation. Upon explicit consent from the user to proceed, the package continues installation and **changepk.exe** runs using the product key. The user will receive a reminder notification 30 seconds before the automatic restart.
|
||||
|
||||
After the device restarts, the edition upgrade process completes. The user will receive a notification of the successful upgrade.
|
||||
@ -75,24 +82,22 @@ This node can also be used to activate or change a product key on a particular e
|
||||
> [!IMPORTANT]
|
||||
> The product key entered must be 29 characters (that is, it should include dashes), otherwise the activation, edition upgrade, or product key change on Windows 10 desktop devices will fail. The product key is acquired from Microsoft Volume Licensing Service Center. Your organization must have a Volume Licensing contract with Microsoft to access the portal.
|
||||
|
||||
|
||||
|
||||
The following are valid edition upgrade paths when using this node through an MDM:
|
||||
|
||||
- Windows 10 Enterprise to Windows 10 Education
|
||||
- Windows 10 Home to Windows 10 Education
|
||||
- Windows 10 Pro to Windows 10 Education
|
||||
- Windows 10 Pro to Windows 10 Enterprise
|
||||
- Windows 10/Windows 11 Enterprise to Windows 10/ Windows 11 Education
|
||||
- Windows 10/Windows 11 Home to Windows 10/Windows 11 Education
|
||||
- Windows 10/Windows 11 Pro to Windows 10/Windows 11 Education
|
||||
- Windows 10/Windows 11 Pro to Windows 10/Windows 11 Enterprise
|
||||
|
||||
Activation or changing a product key can be carried out on the following editions:
|
||||
|
||||
- Windows 10 Education
|
||||
- Windows 10 Enterprise
|
||||
- Windows 10 Home
|
||||
- Windows 10 Pro
|
||||
- Windows 10/Windows 11 Education
|
||||
- Windows 10/Windows 11 Enterprise
|
||||
- Windows 10/Windows 11 Home
|
||||
- Windows 10/Windows 11 Pro
|
||||
|
||||
<a href="" id="edition"></a>**Edition**
|
||||
Returns a value that maps to the Windows 10 edition. Take the value, convert it into its hexadecimal equivalent and search the GetProductInfo function page on MSDN for edition information.
|
||||
Returns a value that maps to the Windows 10 or Windows 11 edition. Take the value, convert it into its hexadecimal equivalent and search the GetProductInfo function page on MSDN for edition information.
|
||||
|
||||
The data type is an Int.
|
||||
|
||||
@ -101,11 +106,11 @@ The supported operation is Get.
|
||||
<a href="" id="status"></a>**Status**
|
||||
Returns the status of an edition upgrade on Windows devices. The status corresponds to one of the following values:
|
||||
|
||||
- 0 = Failed
|
||||
- 1 = Pending
|
||||
- 2 = In progress
|
||||
- 3 = Completed
|
||||
- 4 = Unknown
|
||||
- 0 = Failed
|
||||
- 1 = Pending
|
||||
- 2 = In progress
|
||||
- 3 = Completed
|
||||
- 4 = Unknown
|
||||
|
||||
The data type is an Int.
|
||||
|
||||
@ -136,23 +141,23 @@ The following are valid edition upgrade paths when using this node through an MD
|
||||
-->
|
||||
|
||||
<a href="" id="licensekeytype"></a>**LicenseKeyType**
|
||||
Returns the parameter type used by Windows 10 devices for an edition upgrade, activation, or product key change.
|
||||
Returns the parameter type used by Windows 10 or Windows 11 devices for an edition upgrade, activation, or product key change.
|
||||
|
||||
- Windows 10 client devices require a product key.
|
||||
- Windows 10 or Windows 11 client devices require a product key.
|
||||
|
||||
The data type is a chr.
|
||||
|
||||
The supported operation is Get.
|
||||
|
||||
<a href="" id="checkapplicability"></a>**CheckApplicability**
|
||||
Returns TRUE if the entered product key can be used for an edition upgrade, activation or changing a product key of Windows 10 for desktop devices.
|
||||
Returns TRUE if the entered product key can be used for an edition upgrade, activation or changing a product key of Windows 10 or Windows 11 for desktop devices.
|
||||
|
||||
The data type is a chr.
|
||||
|
||||
The supported operation is Exec.
|
||||
|
||||
<a href="" id="changeproductkey"></a>**ChangeProductKey**
|
||||
Added in Windows 10, version 1703. Installs a product key for Windows 10 desktop devices. Doesn't reboot.
|
||||
Added in Windows 10, version 1703. Installs a product key for Windows desktop devices. Doesn't reboot.
|
||||
|
||||
The data type is a chr.
|
||||
|
||||
@ -184,32 +189,37 @@ Interior node for managing S mode.
|
||||
<a href="" id="smode-switchingpolicy"></a>**SMode/SwitchingPolicy**
|
||||
Added in Windows 10, version 1809. Determines whether a consumer can switch the device out of S mode. This setting is only applicable to devices available in S mode. For examples, see [Add S mode SwitchingPolicy](#smode-switchingpolicy-add), [Get S mode SwitchingPolicy](#smode-switchingpolicy-get), [Replace S mode SwitchingPolicy](#smode-switchingpolicy-replace) and [Delete S mode SwitchingPolicy](#smode-switchingpolicy-delete)
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
Value type is integer.
|
||||
|
||||
Supported values:
|
||||
- 0 - No Restriction: The user is allowed to switch the device out of S mode.
|
||||
- 1 - User Blocked: The admin has blocked the user from switching their device out of S mode. Only the admin can switch the device out of S mode through the SMode/SwitchFromSMode node.
|
||||
Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
Supported values:
|
||||
|
||||
- 0 - No Restriction: The user is allowed to switch the device out of S mode.
|
||||
- 1 - User Blocked: The admin has blocked the user from switching their device out of S mode. Only the admin can switch the device out of S mode through the SMode/SwitchFromSMode node.
|
||||
|
||||
<a href="" id="smode-switchfromsmode"></a>**SMode/SwitchFromSMode**
|
||||
Added in Windows 10, version 1809. Switches a device out of S mode if possible. Doesn't reboot. For an example, see [Execute SwitchFromSMode](#smode-switchfromsmode-execute)
|
||||
|
||||
Supported operation is Execute.
|
||||
|
||||
<a href="" id="smode-status"></a>**SMode/Status**
|
||||
<a href="" id="smode-status"></a>**SMode/Status**
|
||||
Added in Windows 10, version 1809. Returns the status of the latest SwitchFromSMode set request. For an example, see [Get S mode status](#smode-status-example)
|
||||
|
||||
Value type is integer. Supported operation is Get.
|
||||
Value type is integer.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
Values:
|
||||
- Request fails with error code 404 - no SwitchFromSMode request has been made.
|
||||
- 0 - The device successfully switched out of S mode
|
||||
- 1 - The device is processing the request to switch out of S mode
|
||||
- 3 - The device was already switched out of S mode
|
||||
- 4 - The device failed to switch out of S mode
|
||||
|
||||
- Request fails with error code 404 - no SwitchFromSMode request has been made.
|
||||
- 0 - The device successfully switched out of S mode.
|
||||
- 1 - The device is processing the request to switch out of S mode.
|
||||
- 3 - The device was already switched out of S mode.
|
||||
- 4 - The device failed to switch out of S mode.
|
||||
|
||||
## SyncML examples
|
||||
|
||||
|
||||
**CheckApplicability**
|
||||
|
||||
```xml
|
||||
@ -235,8 +245,6 @@ Values:
|
||||
> [!NOTE]
|
||||
> `XXXXX-XXXXX-XXXXX-XXXXX-XXXXX` in the **Data** tag should be replaced with your product key.
|
||||
|
||||
|
||||
|
||||
**Edition**
|
||||
|
||||
```xml
|
||||
|
@ -15,13 +15,13 @@ ms.date: 07/16/2017
|
||||
# WindowsLicensing DDF file
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
This topic shows the OMA DM device description framework (DDF) for the **WindowsLicensing** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
|
||||
The XML below is for Windows 10, version 1809.
|
||||
The XML below is for Windows 10, version 1809 and later.
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
@ -104,7 +104,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Returns a value that maps to the Windows 10 edition running on devices. Take the value, convert it into its hexadecimal equivalent and search the GetProductInfo function page on MSDN for edition information.</Description>
|
||||
<Description>Returns a value that maps to the Windows 10 or Windows 11 edition running on devices. Take the value, convert it into its hexadecimal equivalent and search the GetProductInfo function page on MSDN for edition information.</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -128,7 +128,7 @@ The XML below is for Windows 10, version 1809.
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Returns the status of an edition upgrade on Windows 10 client devices. Status: 0 = Failed, 1 = Pending, 2 = In progress, 3 = Completed, 4 = Unknown</Description>
|
||||
<Description>Returns the status of an edition upgrade on Windows 10 or Windows 11 client devices. Status: 0 = Failed, 1 = Pending, 2 = In progress, 3 = Completed, 4 = Unknown</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
</DFFormat>
|
||||
@ -349,3 +349,7 @@ The XML below is for Windows 10, version 1809.
|
||||
</Node>
|
||||
</MgmtTree>
|
||||
```
|
||||
|
||||
## Related topics
|
||||
|
||||
[WindowsLicensing configuration service provider](windowslicensing-csp.md)
|
@ -2,13 +2,9 @@
|
||||
title: Information protection (Windows 10)
|
||||
description: Learn more about how to protect sensitive data across your organization.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/10/2018
|
||||
|
@ -2,13 +2,9 @@
|
||||
title: Kernel DMA Protection (Windows)
|
||||
description: Kernel DMA Protection protects PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderbolt™ 3 ports.
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Secure the Windows boot process
|
||||
description: This article describes how Windows security features help protect your PC from malware, including rootkits and other applications.
|
||||
keywords: trusted boot, windows boot process
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: Explore
|
||||
ms.pagetype: security
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: dansimp
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection:
|
||||
- M365-security-compliance
|
||||
- highpri
|
||||
|
@ -1,18 +1,12 @@
|
||||
---
|
||||
title: Fine-tune Windows Information Policy (WIP) with WIP Learning
|
||||
description: How to access the WIP Learning report to monitor and apply Windows Information Protection in your company.
|
||||
ms.assetid: 53db29d2-d99d-4db6-b494-90e2b4872ca2
|
||||
ms.reviewer:
|
||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection, WIP Learning
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl:
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
manager: dougeby
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 02/26/2019
|
||||
|
Loading…
x
Reference in New Issue
Block a user