mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-17 19:33:37 +00:00
Merge remote-tracking branch 'refs/remotes/origin/rs3' into jd3csp
This commit is contained in:
@ -16,6 +16,11 @@ ms.date: 06/13/2017
|
|||||||
|
|
||||||
This topic lists new and updated topics in the [Client management](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
This topic lists new and updated topics in the [Client management](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
||||||
|
|
||||||
|
## RELEASE: Windows 10, version 1709
|
||||||
|
|
||||||
|
The topics in this library have been updated for Windows 10, version 1709 (also known as the Fall Creators Update).
|
||||||
|
|
||||||
|
|
||||||
## July 2017
|
## July 2017
|
||||||
|
|
||||||
| New or changed topic | Description |
|
| New or changed topic | Description |
|
||||||
|
@ -1044,6 +1044,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
|||||||
<li>Education/PreventAddingNewPrinters</li>
|
<li>Education/PreventAddingNewPrinters</li>
|
||||||
<li>Education/PrinterNames</li>
|
<li>Education/PrinterNames</li>
|
||||||
<li>Security/ClearTPMIfNotReady</li>
|
<li>Security/ClearTPMIfNotReady</li>
|
||||||
|
<li>System/LimitEnhancedDiagnosticDataWindowsAnalytics</li>
|
||||||
<li>Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork</li>
|
<li>Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork</li>
|
||||||
<li>Update/DisableDualScan</li>
|
<li>Update/DisableDualScan</li>
|
||||||
<li>Update/ScheduledInstallEveryWeek</li>
|
<li>Update/ScheduledInstallEveryWeek</li>
|
||||||
@ -1335,6 +1336,31 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
|||||||
|
|
||||||
## Change history in MDM documentation
|
## Change history in MDM documentation
|
||||||
|
|
||||||
|
### September 2017
|
||||||
|
|
||||||
|
<table class="mx-tdBreakAll">
|
||||||
|
<colgroup>
|
||||||
|
<col width="25%" />
|
||||||
|
<col width="75%" />
|
||||||
|
</colgroup>
|
||||||
|
<thead>
|
||||||
|
<tr class="header">
|
||||||
|
<th>New or updated topic</th>
|
||||||
|
<th>Description</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody>
|
||||||
|
<tr class="odd">
|
||||||
|
<td style="vertical-align:top">[Policy CSP](policy-configuration-service-provider.md)</td>
|
||||||
|
<td style="vertical-align:top"><p>Added the following new policies for Windows 10, version 1709:</p>
|
||||||
|
<ul>
|
||||||
|
<li>Search/AllowCloudSearch</li>
|
||||||
|
<li>System/LimitEnhancedDiagnosticDataWindowsAnalytics</li>
|
||||||
|
</ul>
|
||||||
|
</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
### August 2017
|
### August 2017
|
||||||
|
|
||||||
<table class="mx-tdBreakAll">
|
<table class="mx-tdBreakAll">
|
||||||
|
@ -2646,6 +2646,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-system.md#system-disablesystemrestore" id="system-disablesystemrestore">System/DisableSystemRestore</a>
|
<a href="./policy-csp-system.md#system-disablesystemrestore" id="system-disablesystemrestore">System/DisableSystemRestore</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-system.md#system-limitenhanceddiagnosticdatawindowsanalytics" id="limitenhanceddiagnosticdatawindowsanalytics">System/LimitEnhancedDiagnosticDataWindowsAnalytics</a>
|
||||||
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-system.md#system-telemetryproxy" id="system-telemetryproxy">System/TelemetryProxy</a>
|
<a href="./policy-csp-system.md#system-telemetryproxy" id="system-telemetryproxy">System/TelemetryProxy</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
@ -572,7 +572,7 @@ ms.date: 08/30/2017
|
|||||||
|
|
||||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. This policy setting allows you to prevent Attack Surface reduction rules from matching on files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe"..
|
<p style="margin-left: 20px">Added in Windows 10, version 1709. This policy setting allows you to prevent Attack Surface reduction rules from matching on files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe"..
|
||||||
|
|
||||||
Value type is string.
|
<p style="margin-left: 20px">Value type is string.
|
||||||
|
|
||||||
<!--EndDescription-->
|
<!--EndDescription-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
@ -609,7 +609,9 @@ Value type is string.
|
|||||||
|
|
||||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. This policy setting enables setting the state (Block/Audit/Off) for each Attack surface reduction (ASR) rule. Each ASR rule listed can be set to one of the following states (Block/Audit/Off). The ASR rule ID and state should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid ASR rule ID, while the value contains the status ID indicating the status of the rule.
|
<p style="margin-left: 20px">Added in Windows 10, version 1709. This policy setting enables setting the state (Block/Audit/Off) for each Attack surface reduction (ASR) rule. Each ASR rule listed can be set to one of the following states (Block/Audit/Off). The ASR rule ID and state should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid ASR rule ID, while the value contains the status ID indicating the status of the rule.
|
||||||
|
|
||||||
Value type is string.
|
<p style="margin-left: 20px">For more information about ASR rule ID and status ID, see [Enable Attack Surface Reduction](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction).
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">Value type is string.
|
||||||
|
|
||||||
<!--EndDescription-->
|
<!--EndDescription-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
|
@ -554,6 +554,51 @@ ADMX Info:
|
|||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<!--StartPolicy-->
|
<!--StartPolicy-->
|
||||||
|
<a href="" id="system-limitenhanceddiagnosticdatawindowsanalytics"></a>**System/LimitEnhancedDiagnosticDataWindowsAnalytics**
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>Mobile Enterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--StartDescription-->
|
||||||
|
<p style="margin-left: 20px">This policy setting, in combination with the System/AllowTelemetry
|
||||||
|
policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services.
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">To enable this behavior you must complete two steps:
|
||||||
|
<ul>
|
||||||
|
<li>Enable this policy setting</li>
|
||||||
|
<li>Set Allow Telemetry to level 2 (Enhanced)</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">When you configure these policy settings, a basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented here: [Windows 10, version 1703 basic level Windows diagnostic events and fields](https://go.microsoft.com/fwlink/?linkid=847594).
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">Enabling enhanced diagnostic data in the System/AllowTelemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional enhanced level telemetry data. This setting has no effect on computers configured to send full, basic or security level diagnostic data to Microsoft.
|
||||||
|
|
||||||
|
<p style="margin-left: 20px">If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy.
|
||||||
|
|
||||||
|
|
||||||
|
<!--EndDescription-->
|
||||||
|
<!--EndPolicy-->
|
||||||
|
<!--StartPolicy-->
|
||||||
<a href="" id="system-telemetryproxy"></a>**System/TelemetryProxy**
|
<a href="" id="system-telemetryproxy"></a>**System/TelemetryProxy**
|
||||||
|
|
||||||
<!--StartSKU-->
|
<!--StartSKU-->
|
||||||
|
@ -14,6 +14,10 @@ author: jdeckerms
|
|||||||
|
|
||||||
This topic lists new and updated topics in the [Configure Windows 10](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
This topic lists new and updated topics in the [Configure Windows 10](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
||||||
|
|
||||||
|
## RELEASE: Windows 10, version 1709
|
||||||
|
|
||||||
|
The topics in this library have been updated for Windows 10, version 1709 (also known as the Fall Creators Update).
|
||||||
|
|
||||||
## August 2017
|
## August 2017
|
||||||
|
|
||||||
New or changed topic | Description
|
New or changed topic | Description
|
||||||
|
@ -73,5 +73,9 @@ Your data will be kept for a period of at least 90 days, during which it will be
|
|||||||
|
|
||||||
|
|
||||||
## Can Microsoft help us maintain regulatory compliance?
|
## Can Microsoft help us maintain regulatory compliance?
|
||||||
Microsoft provides customers with detailed information about Microsoft's security and compliance programs, including audit reports and compliance packages, to help customers assess Windows Defender ATP services against their own legal and regulatory requirements. Windows Defender ATP has a roadmap for obtaining national, regional and industry-specific certifications, starting with ISO 27001. The service is designed, implemented, and maintained according to the compliance and privacy principles of ISO 27001, as well as Microsoft’s compliance standards.
|
Microsoft provides customers with detailed information about Microsoft's security and compliance programs, including audit reports and compliance packages, to help customers assess Windows Defender ATP services against their own legal and regulatory requirements. Windows Defender ATP is ISO 27001 certified and has a roadmap for obtaining national, regional and industry-specific certifications.
|
||||||
By providing customers with compliant, independently-verified services, Microsoft makes it easier for customers to achieve compliance for the infrastructure and applications they run, including this new Microsoft cloud service.
|
|
||||||
|
|
||||||
|
By providing customers with compliant, independently-verified services, Microsoft makes it easier for customers to achieve compliance for the infrastructure and applications they run.
|
||||||
|
|
||||||
|
For more information on the Windows Defender ATP ISO certification reports, see [Microsoft Trust Center](https://www.microsoft.com/en-us/trustcenter/compliance/iso-iec-27001).
|
||||||
|
@ -38,7 +38,7 @@ Windows Defender Advanced Threat Protection requires one of the following Micros
|
|||||||
|
|
||||||
- Windows 10 Enterprise E5
|
- Windows 10 Enterprise E5
|
||||||
- Windows 10 Education E5
|
- Windows 10 Education E5
|
||||||
- Secure Productive Enterprise E5 (SPE E5) which includes Windows 10 Enterprise E5
|
- Microsoft 365 E5 (M365 E5) which includes Windows 10 Enterprise E5
|
||||||
|
|
||||||
For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us/Licensing/product-licensing/windows10.aspx#tab=2).
|
For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us/Licensing/product-licensing/windows10.aspx#tab=2).
|
||||||
|
|
||||||
|
@ -79,6 +79,9 @@ You can create a custom dashboard in Power BI Desktop to create visualizations t
|
|||||||
|
|
||||||
8. Select **New table and matrix visuals** and **Custom data connectors** and click **OK**.
|
8. Select **New table and matrix visuals** and **Custom data connectors** and click **OK**.
|
||||||
|
|
||||||
|
>[NOTE]
|
||||||
|
>If you are using Power BI Desktop July 2017 version (or later), you won't need to select **New table and matrix visuals**. You'll only need to select **Custom data connectors**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
9. Restart Power BI Desktop.
|
9. Restart Power BI Desktop.
|
||||||
|
Reference in New Issue
Block a user