mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'main' of github.com:MicrosoftDocs/windows-docs-pr into pm-20220914-winse-faq
This commit is contained in:
commit
e2a22fc2d6
@ -138,7 +138,7 @@ Table 3. Settings in the Security node in the Google Admin Console
|
|||||||
|Set up single sign-on (SSO)|This section is used to configure SSO for Google web-based apps (such as Google Apps Gmail or Google Apps Calendar). While you don’t need to migrate any settings in this section, you probably will want to configure Azure Active Directory synchronization to replace Google-based SSO.|
|
|Set up single sign-on (SSO)|This section is used to configure SSO for Google web-based apps (such as Google Apps Gmail or Google Apps Calendar). While you don’t need to migrate any settings in this section, you probably will want to configure Azure Active Directory synchronization to replace Google-based SSO.|
|
||||||
|Advanced settings|This section is used to configure administrative access to user data and to configure the Google Secure Data Connector (which allows Google Apps to access data on your local network). You don’t need to migrate any settings in this section.|
|
|Advanced settings|This section is used to configure administrative access to user data and to configure the Google Secure Data Connector (which allows Google Apps to access data on your local network). You don’t need to migrate any settings in this section.|
|
||||||
|
|
||||||
**Identify locally-configured settings to migrate**
|
**Identify locally configured settings to migrate**
|
||||||
|
|
||||||
In addition to the settings configured in the Google Admin Console, users may have locally configured their devices based on their own personal preferences (as shown in Figure 2). Table 4 lists the Chromebook user and device settings that you can locally configure. Review the settings and determine which settings you'll migrate to Windows. Some of the settings listed in Table 4 can only be seen when you click the **Show advanced settings** link (as shown in Figure 2).
|
In addition to the settings configured in the Google Admin Console, users may have locally configured their devices based on their own personal preferences (as shown in Figure 2). Table 4 lists the Chromebook user and device settings that you can locally configure. Review the settings and determine which settings you'll migrate to Windows. Some of the settings listed in Table 4 can only be seen when you click the **Show advanced settings** link (as shown in Figure 2).
|
||||||
|
|
||||||
@ -146,7 +146,7 @@ In addition to the settings configured in the Google Admin Console, users may ha
|
|||||||
|
|
||||||
Figure 2. Locally configured settings on Chromebook
|
Figure 2. Locally configured settings on Chromebook
|
||||||
|
|
||||||
Table 4. Locally-configured settings
|
Table 4. Locally configured settings
|
||||||
|
|
||||||
| Section | Settings |
|
| Section | Settings |
|
||||||
|------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
|------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
|
@ -116,8 +116,6 @@ You can configure a dedicated testing account through MDM or Configuration Manag
|
|||||||
- **Custom OMA-DM URI** = ./Vendor/MSFT/SecureAssessment/LaunchURI
|
- **Custom OMA-DM URI** = ./Vendor/MSFT/SecureAssessment/LaunchURI
|
||||||
- **String value** = *assessment URL*
|
- **String value** = *assessment URL*
|
||||||
|
|
||||||
See [Assessment URLs](#assessment-urls) for more information.
|
|
||||||
|
|
||||||
4. Create a policy that associates the assessment URL to the account using the following values:
|
4. Create a policy that associates the assessment URL to the account using the following values:
|
||||||
|
|
||||||
- **Custom OMA-DM URI** = ./Vendor/MSFT/SecureAssessment/TesterAccount
|
- **Custom OMA-DM URI** = ./Vendor/MSFT/SecureAssessment/TesterAccount
|
||||||
@ -265,12 +263,6 @@ You can also distribute the test link by creating a shortcut. To create the shor
|
|||||||
|
|
||||||
Once the shortcut is created, you can copy it and distribute it to students.
|
Once the shortcut is created, you can copy it and distribute it to students.
|
||||||
|
|
||||||
|
|
||||||
## Assessment URLs
|
|
||||||
This assessment URL uses our lockdown API:
|
|
||||||
- SBAC/AIR: [https://mobile.tds.airast.org/launchpad/](https://mobile.tds.airast.org/launchpad/).
|
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
[Take tests in Windows](take-tests-in-windows-10.md)
|
[Take tests in Windows](take-tests-in-windows-10.md)
|
||||||
|
@ -102,7 +102,7 @@ The following applications can also run on Windows 11 SE, and can be deployed us
|
|||||||
| eTests | 4.0.25 | Win32 | CASAS |
|
| eTests | 4.0.25 | Win32 | CASAS |
|
||||||
| FortiClient | 7.0.1.0083 | Win32 | Fortinet |
|
| FortiClient | 7.0.1.0083 | Win32 | Fortinet |
|
||||||
| Free NaturalReader | 16.1.2 | Win32 | Natural Soft |
|
| Free NaturalReader | 16.1.2 | Win32 | Natural Soft |
|
||||||
| Ghotit | 10.14.2.3 | Win32 | Ghotit Ltd |
|
| Ghotit Real Writer & Reader | 10.14.2.3 | Win32 | Ghotit Ltd |
|
||||||
| GoGuardian | 1.4.4 | Win32 | GoGuardian |
|
| GoGuardian | 1.4.4 | Win32 | GoGuardian |
|
||||||
| Google Chrome | 102.0.5005.115 | Win32 | Google |
|
| Google Chrome | 102.0.5005.115 | Win32 | Google |
|
||||||
| Illuminate Lockdown Browser | 2.0.5 | Win32 | Illuminate Education |
|
| Illuminate Lockdown Browser | 2.0.5 | Win32 | Illuminate Education |
|
||||||
|
@ -32,6 +32,8 @@
|
|||||||
href: deploy/windows-autopatch-device-registration-overview.md
|
href: deploy/windows-autopatch-device-registration-overview.md
|
||||||
- name: Register your devices
|
- name: Register your devices
|
||||||
href: deploy/windows-autopatch-register-devices.md
|
href: deploy/windows-autopatch-register-devices.md
|
||||||
|
- name: Post-device registration readiness checks
|
||||||
|
href: deploy/windows-autopatch-post-reg-readiness-checks.md
|
||||||
- name: Operate
|
- name: Operate
|
||||||
href: operate/index.md
|
href: operate/index.md
|
||||||
items:
|
items:
|
||||||
|
@ -0,0 +1,99 @@
|
|||||||
|
---
|
||||||
|
title: Post-device registration readiness checks
|
||||||
|
description: This article details how post-device registration readiness checks are performed in Windows Autopatch
|
||||||
|
ms.date: 09/15/2022
|
||||||
|
ms.prod: w11
|
||||||
|
ms.technology: windows
|
||||||
|
ms.topic: conceptual
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
author: tiaraquan
|
||||||
|
ms.author: tiaraquan
|
||||||
|
manager: dougeby
|
||||||
|
msreviewer: andredm7
|
||||||
|
---
|
||||||
|
|
||||||
|
# Post-device registration readiness checks
|
||||||
|
|
||||||
|
One of the most expensive aspects of the software update management process is to make sure devices are always healthy to receive and report software updates for each software update release cycle.
|
||||||
|
|
||||||
|
Having a way of measuring, quickly detecting and remediating when something goes wrong with on-going change management processes is important; it helps mitigate high Helpdesk ticket volumes, reduces cost, and improves overall update management results.
|
||||||
|
|
||||||
|
Windows Autopatch provides proactive device readiness information about devices that are and aren't ready to be fully managed by the service. IT admins can easily detect and fix device-related issues that are preventing them from achieving their update management compliance report goals.
|
||||||
|
|
||||||
|
## Device readiness scenarios
|
||||||
|
|
||||||
|
Device readiness in Windows Autopatch is divided into two different scenarios:
|
||||||
|
|
||||||
|
| Scenario | Description |
|
||||||
|
| ----- | ----- |
|
||||||
|
| Prerequisite checks | Ensures devices follow software-based requirements before being registered with the service. |
|
||||||
|
| Post-device registration readiness checks | Provides continuous monitoring of device health for registered devices.<p>IT admins can easily detect and remediate configuration mismatches in their environments or issues that prevent devices from having one or more software update workloads (Windows quality, feature updates, Microsoft Office, Microsoft Teams, or Microsoft Edge) fully managed by the Windows Autopatch service. Configuration mismatches can leave devices in a vulnerable state, out of compliance and exposed to security threats.</p>|
|
||||||
|
|
||||||
|
### Device readiness checks available for each scenario
|
||||||
|
|
||||||
|
| Required device readiness (prerequisite checks) prior to device registration (powered by Intune Graph API) | Required post-device registration readiness checks (powered by Microsoft Cloud Managed Desktop Extension) |
|
||||||
|
| ----- | ----- |
|
||||||
|
| <ul><li>Windows OS (build, architecture and edition)</li></li><li>Managed by either Intune or ConfigMgr co-management</li><li>ConfigMgr co-management workloads</li><li>Last communication with Intune</li><li>Personal or non-Windows devices</li></ul> | <ul><li>Windows OS (build, architecture and edition)</li><li>Windows updates & Office Group Policy Object (GPO) versus Intune mobile device management (MDM) policy conflict</li><li>Bind network endpoints (Microsoft Defender, Microsoft Teams, Microsoft Edge, Microsoft Office)</li><li>Internet connectivity</li></ul> |
|
||||||
|
|
||||||
|
The status of each post-device registration readiness check is shown in the Windows Autopatch’s Devices blade under the **Not ready** tab. You can take appropriate action(s) on devices that aren't ready to be fully managed by the Windows Autopatch service.
|
||||||
|
|
||||||
|
## About the three tabs in the Devices blade
|
||||||
|
|
||||||
|
You deploy software updates to secure your environment, but these deployments only reach healthy and active devices. Unhealthy or not ready devices affect the overall software update compliance. Figuring out device health can be challenging and disruptive to the end user when IT can’t obtain proactive data sent by the device to the service for IT admins to proactively detect, troubleshoot, and fix issues.
|
||||||
|
|
||||||
|
Windows Autopatch has three tabs within its Devices blade. Each tab is designed to provide a different set of device readiness statuses so IT admins know where to go to monitor, and troubleshoot potential device health issues:
|
||||||
|
|
||||||
|
| Tab | Description |
|
||||||
|
| ----- | ----- |
|
||||||
|
| Ready | This tab only lists devices with the **Active** status. Devices with the **Active** status successfully:<ul><li>Passed the prerequisite checks.</li><li>Registered with Windows Autopatch.</li></ul>This tab also lists devices that have passed all postdevice registration readiness checks. |
|
||||||
|
| Not ready | This tab only lists devices with the **Readiness failed** and **Inactive** status.<ul><li>**Readiness failed status**: Devices that didn’t pass one or more post-device registration readiness checks.</li><li>**Inactive**: Devices that haven’t communicated with the Microsoft Endpoint Manager-Intune service in the last 28 days.</li></ul> |
|
||||||
|
| Not registered | Only lists devices with the **Prerequisite failed** status in it. Devices with the **Prerequisite failed** status didn’t pass one or more prerequisite checks during the device registration process. |
|
||||||
|
|
||||||
|
## Details about the post-device registration readiness checks
|
||||||
|
|
||||||
|
A healthy or active device in Windows Autopatch is:
|
||||||
|
|
||||||
|
- Online
|
||||||
|
- Actively sending data
|
||||||
|
- Passes all post-device registration readiness checks
|
||||||
|
|
||||||
|
The post-device registration readiness checks are powered by the **Microsoft Cloud Managed Desktop Extension**. It's installed right after devices are successfully registered with Windows Autopatch. The **Microsoft Cloud Managed Desktop Extension** has the Device Readiness Check Plugin responsible for performing the readiness checks in devices and report back to the service. The **Microsoft Cloud Managed Desktop Extension** is a subcomponent of the overall Windows Autopatch service.
|
||||||
|
|
||||||
|
The following list of post-device registration readiness checks is performed in Windows Autopatch:
|
||||||
|
|
||||||
|
| Check | Description |
|
||||||
|
| ----- | ----- |
|
||||||
|
| **Windows OS build, architecture, and edition** | Checks to see if devices support Windows 1809+ build (10.0.17763), 64-bit architecture and either Pro or Enterprise SKUs. |
|
||||||
|
| **Windows update policies managed via Microsoft Endpoint Manager-Intune** | Checks to see if devices have Windows Updates policies managed via Microsoft Endpoint Manager-Intune (MDM). |
|
||||||
|
| **Windows update policies managed via Group Policy Object (GPO)** | Checks to see if devices have Windows update policies managed via GPO. Windows Autopatch doesn’t support Windows update policies managed via GPOs. Windows update must be managed via Microsoft Endpoint Manager-Intune. |
|
||||||
|
| **Microsoft Office update policy managed via Group Policy Object (GPO)** | Checks to see if devices have Microsoft Office updates policies managed via GPO. Windows Autopatch doesn’t support Microsoft Office update policies managed via GPOs. Office updates must be managed via Microsoft Endpoint Manager-Intune or another Microsoft Office policy management method where Office update bits are downloaded directly from the Office Content Delivery Network (CDN). |
|
||||||
|
| **Windows Autopatch network endpoints** | There's a set of [network endpoints](../prepare/windows-autopatch-configure-network.md) that Windows Autopatch services must be able to reach for the various aspects of the Windows Autopatch service. |
|
||||||
|
| **Microsoft Teams network endpoints** | There's a set of [network endpoints](../prepare/windows-autopatch-configure-network.md) that devices with Microsoft Teams must be able to reach for software updates management. |
|
||||||
|
| **Microsoft Edge network endpoints** | There's a set of [network endpoints](../prepare/windows-autopatch-configure-network.md) that devices with Microsoft Edge must be able to reach for software updates management. |
|
||||||
|
| **Internet connectivity** | Checks to see if a device has internet connectivity to communicate with Microsoft cloud services. Windows Autopatch uses the PingReply class. Windows Autopatch tries to ping at least three different Microsoft’s public URLs two times each, to confirm that ping results aren't coming from the device’s cache. |
|
||||||
|
|
||||||
|
## Daily operations in Windows Autopatch
|
||||||
|
|
||||||
|
See the following end-to-end IT admin operation workflow:
|
||||||
|
|
||||||
|
:::image type="content" source="../media/windows-autopatch-post-device-registration-readiness-checks.png" alt-text="Post-device registration readiness checks" lightbox="../media/windows-autopatch-post-device-registration-readiness-checks.png":::
|
||||||
|
|
||||||
|
| Step | Description |
|
||||||
|
| ----- | ----- |
|
||||||
|
| **Steps 1-7** | For more information, see the [Device registration overview diagram](windows-autopatch-device-registration-overview.md).|
|
||||||
|
| **Step 8: Perform readiness checks** |<ol><li>Once devices are successfully registered with Windows Autopatch, the devices are added to the **Ready** tab.</li><li>The Microsoft Cloud Managed Desktop Extension agent performs readiness checks against devices in the **Ready** tab every 24 hours.</li></ol> |
|
||||||
|
| **Step 9: Check readiness status** |<ol><li>The Microsoft Cloud Managed Desktop Extension service evaluates the readiness results gathered by its agent.</li><li>The readiness results are sent from the Microsoft Cloud Managed Desktop Extension service component to the Device Readiness component within the Windows Autopatch’s service.</li></ol>|
|
||||||
|
| **Step 10: Add devices to the Not ready** | When devices don’t pass one or more readiness checks, even if they’re registered with Windows Autopatch, they’re added to the **Not ready** tab so IT admins can remediate devices based on Windows Autopatch recommendations. |
|
||||||
|
| **Step 11: IT admin understands what the issue is and remediates** | The IT admin checks and remediates issues in the Devices blade (**Not ready** tab). It can take up to 24 hours for devices to show back up into the **Ready** tab. |
|
||||||
|
|
||||||
|
## FAQ
|
||||||
|
|
||||||
|
| Question | Answer |
|
||||||
|
| ----- | ----- |
|
||||||
|
| **How frequent are the post-device registration readiness checks performed?** |<ul><li>The **Microsoft Cloud Managed Desktop Extension** agent collects device readiness statuses when it runs (once a day).</li><li>Once the agent collects results for the post-device registration readiness checks, it generates readiness results in the device in the `%programdata%\Microsoft\CMDExtension\Plugins\DeviceReadinessPlugin\Logs\DRCResults.json.log`.</li><li>The readiness results are sent over to the **Microsoft Cloud Managed Desktop Extension service**.</li><li>The **Microsoft Cloud Managed Desktop Extension** service component sends the readiness results to the Device Readiness component. The results appear in the Windows Autopatch Devices blade (**Not ready** tab).</li></ul>|
|
||||||
|
| **What to expect when one or more checks fail?** | Devices are automatically sent to the **Ready** tab once they're successfully registered with Windows Autopatch. When devices don’t meet one or more post-device registration readiness checks, the devices are moved to the **Not ready** tab. IT admins can learn about these devices and take appropriate actions to remediate them. Windows Autopatch will provide information about the failure and how to potentially remediate devices.<p>Once devices are remediated, it can take up to **24 hours** to show up in the **Ready** tab.</p>|
|
||||||
|
|
||||||
|
## Additional resources
|
||||||
|
|
||||||
|
- [Device registration overview](windows-autopatch-device-registration-overview.md)
|
||||||
|
- [Register your devices](windows-autopatch-register-devices.md)
|
Binary file not shown.
After Width: | Height: | Size: 443 KiB |
@ -27,3 +27,7 @@ After you've completed enrollment in Windows Autopatch, some management settings
|
|||||||
| Setting | Description |
|
| Setting | Description |
|
||||||
| ----- | ----- |
|
| ----- | ----- |
|
||||||
| Update rings for Windows 10 or later | For any update rings for Windows 10 or later policies you've created, exclude the **Modern Workplace Devices - All** Azure AD group from each policy. For more information, see [Create and assign update rings](/mem/intune/protect/windows-10-update-rings#create-and-assign-update-rings).<p>Windows Autopatch will also have created some update ring policies. all of which The policies will have "**Modern Workplace**" in the name. For example:</p><ul><li>Modern Workplace Update Policy [Broad]-[Windows Autopatch]</li><li>Modern Workplace Update Policy [Fast]-[Windows Autopatch]</li><li>Modern Workplace Update Policy [First]-[Windows Autopatch]</li><li>Modern Workplace Update Policy [Test]-[Windows Autopatch]</li></ul><p>When you update your own policies, ensure that you don't exclude the **Modern Workplace Devices - All** Azure AD group from the policies that Windows Autopatch created.</p><p>**To resolve the Not ready result:**</p><p>After enrolling into Autopatch, make sure that any update ring policies you have **exclude** the **Modern Workplace Devices - All** Azure Active Directory (AD) group.For more information, see [Manage Windows 10 software updates in Intune](/mem/intune/protect/windows-update-for-business-configure).</p><p>**To resolve the Advisory result:**</p><ol><li>Make sure that any update ring policies you have **exclude** the **Modern Workplace Devices - All** Azure Active Directory (AD) group.</li> <li>If you have assigned Azure AD user groups to these policies, make sure that any update ring policies you have also **exclude** the **Modern Workplace - All** Azure AD group that you add your Windows Autopatch users to (or an equivalent group).</li></ol><p>For more information, see [Manage Windows 10 software updates in Intune](/mem/intune/protect/windows-update-for-business-configure).</p> |
|
| Update rings for Windows 10 or later | For any update rings for Windows 10 or later policies you've created, exclude the **Modern Workplace Devices - All** Azure AD group from each policy. For more information, see [Create and assign update rings](/mem/intune/protect/windows-10-update-rings#create-and-assign-update-rings).<p>Windows Autopatch will also have created some update ring policies. all of which The policies will have "**Modern Workplace**" in the name. For example:</p><ul><li>Modern Workplace Update Policy [Broad]-[Windows Autopatch]</li><li>Modern Workplace Update Policy [Fast]-[Windows Autopatch]</li><li>Modern Workplace Update Policy [First]-[Windows Autopatch]</li><li>Modern Workplace Update Policy [Test]-[Windows Autopatch]</li></ul><p>When you update your own policies, ensure that you don't exclude the **Modern Workplace Devices - All** Azure AD group from the policies that Windows Autopatch created.</p><p>**To resolve the Not ready result:**</p><p>After enrolling into Autopatch, make sure that any update ring policies you have **exclude** the **Modern Workplace Devices - All** Azure Active Directory (AD) group.For more information, see [Manage Windows 10 software updates in Intune](/mem/intune/protect/windows-update-for-business-configure).</p><p>**To resolve the Advisory result:**</p><ol><li>Make sure that any update ring policies you have **exclude** the **Modern Workplace Devices - All** Azure Active Directory (AD) group.</li> <li>If you have assigned Azure AD user groups to these policies, make sure that any update ring policies you have also **exclude** the **Modern Workplace - All** Azure AD group that you add your Windows Autopatch users to (or an equivalent group).</li></ol><p>For more information, see [Manage Windows 10 software updates in Intune](/mem/intune/protect/windows-update-for-business-configure).</p> |
|
||||||
|
|
||||||
|
## Windows Autopatch configurations
|
||||||
|
|
||||||
|
Windows Autopatch deploys, manages and maintains all configurations related to the operation of the service, as described in [Changes made at tenant enrollment](../references/windows-autopatch-changes-to-tenant.md). Don't make any changes to any of the Windows Autopatch configurations.
|
||||||
|
@ -99,7 +99,7 @@ sections:
|
|||||||
No, you can't customize update scheduling. However, you can specify [active hours](../operate/windows-autopatch-wqu-end-user-exp.md#servicing-window) to prevent users from updating during business hours.
|
No, you can't customize update scheduling. However, you can specify [active hours](../operate/windows-autopatch-wqu-end-user-exp.md#servicing-window) to prevent users from updating during business hours.
|
||||||
- question: Does Autopatch support include and exclude groups, or dynamic groups to define deployment ring membership?
|
- question: Does Autopatch support include and exclude groups, or dynamic groups to define deployment ring membership?
|
||||||
answer: |
|
answer: |
|
||||||
Windows autopatch doesn't support managing update deployment ring membership using your Azure AD groups. For more information, see [Moving devices in between deployment rings](../operate/windows-autopatch-update-management.md#moving-devices-in-between-deployment-rings).
|
Windows Autopatch doesn't support managing update deployment ring membership using your Azure AD groups. For more information, see [Moving devices in between deployment rings](../operate/windows-autopatch-update-management.md#moving-devices-in-between-deployment-rings).
|
||||||
- question: Does Autopatch have two release cadences per update or are there two release cadences per-ring?
|
- question: Does Autopatch have two release cadences per update or are there two release cadences per-ring?
|
||||||
answer: |
|
answer: |
|
||||||
The release cadences are defined based on the update type. For example, a [regular cadence](../operate/windows-autopatch-wqu-overview.md#windows-quality-update-releases) (for a Windows quality update would be a gradual rollout from the Test ring to the Broad ring over 14 days whereas an [expedited release](../operate/windows-autopatch-wqu-overview.md#expedited-releases) would roll out more rapidly.
|
The release cadences are defined based on the update type. For example, a [regular cadence](../operate/windows-autopatch-wqu-overview.md#windows-quality-update-releases) (for a Windows quality update would be a gradual rollout from the Test ring to the Broad ring over 14 days whereas an [expedited release](../operate/windows-autopatch-wqu-overview.md#expedited-releases) would roll out more rapidly.
|
||||||
|
@ -14,6 +14,11 @@ msreviewer: hathind
|
|||||||
|
|
||||||
# Changes made at tenant enrollment
|
# Changes made at tenant enrollment
|
||||||
|
|
||||||
|
The following configuration details are provided as information to help you understand the changes made to your tenant when enrolling into the Windows Autopatch service.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> The service manages and maintains the following configuration items. Don't change, edit, add to, or remove any of the configurations. Doing so might cause unintended configuration conflicts and impact the Windows Autopatch service.
|
||||||
|
|
||||||
## Service principal
|
## Service principal
|
||||||
|
|
||||||
Windows Autopatch will create a service principal in your tenant allowing the service to establish an identity and restrict access to what resources the service has access to within the tenant. For more information, see [Application and service principal objects in Azure Active Directory](/azure/active-directory/develop/app-objects-and-service-principals#service-principal-object). The service principal created by Windows Autopatch is:
|
Windows Autopatch will create a service principal in your tenant allowing the service to establish an identity and restrict access to what resources the service has access to within the tenant. For more information, see [Application and service principal objects in Azure Active Directory](/azure/active-directory/develop/app-objects-and-service-principals#service-principal-object). The service principal created by Windows Autopatch is:
|
||||||
|
@ -1,21 +1,15 @@
|
|||||||
---
|
---
|
||||||
title: Understanding Windows Defender Application Control (WDAC) secure settings
|
title: Understanding Windows Defender Application Control (WDAC) secure settings
|
||||||
description: Learn about secure settings in Windows Defender Application Control.
|
description: Learn about secure settings in Windows Defender Application Control.
|
||||||
keywords: security, malware
|
ms.prod: windows-client
|
||||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
ms.technology: itpro-security
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
author: jgeurten
|
author: jgeurten
|
||||||
ms.reviewer: jgeurten
|
ms.reviewer: vinpa
|
||||||
ms.author: dansimp
|
ms.author: jogeurte
|
||||||
manager: dansimp
|
manager: aaroncz
|
||||||
ms.date: 10/11/2021
|
ms.date: 10/11/2021
|
||||||
ms.technology: mde
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Understanding WDAC Policy Settings
|
# Understanding WDAC Policy Settings
|
||||||
|
Loading…
x
Reference in New Issue
Block a user