From 87019adff190139268d466f9129f8e063b7c80c7 Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 14:54:33 -0800 Subject: [PATCH 01/13] Fixed XML. --- ...bleshoot-exploit-protection-mitigations.md | 217 ++++++++++++++++++ 1 file changed, 217 insertions(+) create mode 100644 windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md new file mode 100644 index 0000000000..0435dc738a --- /dev/null +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -0,0 +1,217 @@ +--- +title: Deploy Exploit protection mitigations across your organization +keywords: Exploit protection, mitigations, troubleshoot, import, export, configure, emet, convert, conversion, deploy, install +description: Remove unwanted Exploit protection mitigations. +search.product: eADQiWindows 10XVcnh +ms.pagetype: security +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +localizationpriority: medium +author: andreabichsel +ms.author: v-anbic +ms.date: 01/31/18 +--- + + + +# Troubleshoot Exploit protection mitigations + + +**Applies to:** + +- Windows 10, version 1709 + + + +**Audience** + +- Enterprise security administrators + + +**Manageability available with** + +- Windows Defender Security Center app +- PowerShell + + +When you create a set of Exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations. + +You can manually remove unwanted mitigations in Windows Defender Security Center, or you can use the following process to remove all mitigations and then import a baseline configuration file instead. + +1. Remove all process mitigations with this PowerShell script: + + ```PowerShell + # Check if Admin-Privileges are available + function Test-IsAdmin { + ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator") + } + + # Delete ExploitGuard ProcessMitigations for a given key in the registry. If no other settings exist under the specified key, + # the key is deleted as well + function Remove-ProcessMitigations([Object] $Key, [string] $Name) { + Try { + if ($Key.GetValue("MitigationOptions")) { + Write-Host "Removing MitigationOptions for: " $Name + Remove-ItemProperty -Path $Key.PSPath -Name "MitigationOptions" -ErrorAction Stop; + } + if ($Key.GetValue("MitigationAuditOptions")) { + Write-Host "Removing MitigationAuditOptions for: " $Name + Remove-ItemProperty -Path $Key.PSPath -Name "MitigationAuditOptions" -ErrorAction Stop; + } + + # Remove the FilterFullPath value if there is nothing else + if (($Key.SubKeyCount -eq 0) -and ($Key.ValueCount -eq 1) -and ($Key.GetValue("FilterFullPath"))) { + Remove-ItemProperty -Path $Key.PSPath -Name "FilterFullPath" -ErrorAction Stop; + } + + # If the key is empty now, delete it + if (($Key.SubKeyCount -eq 0) -and ($Key.ValueCount -eq 0)) { + Write-Host "Removing empty Entry: " $Name + Remove-Item -Path $Key.PSPath -ErrorAction Stop + } + } + Catch { + Write-Host "ERROR:" $_.Exception.Message "- at ($MitigationItemName)" + } + } + + # Delete all ExploitGuard ProcessMitigations + function Remove-All-ProcessMitigations { + if (!(Test-IsAdmin)) { + throw "ERROR: No Administrator-Privileges detected!"; return + } + + Get-ChildItem -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" | ForEach-Object { + $MitigationItem = $_; + $MitigationItemName = $MitigationItem.PSChildName + + Try { + Remove-ProcessMitigations $MitigationItem $MitigationItemName + + # "UseFilter" indicate full path filters may be present + if ($MitigationItem.GetValue("UseFilter")) { + Get-ChildItem -Path $MitigationItem.PSPath | ForEach-Object { + $FullPathItem = $_ + if ($FullPathItem.GetValue("FilterFullPath")) { + $Name = $MitigationItemName + "-" + $FullPathItem.GetValue("FilterFullPath") + Write-Host "Removing FullPathEntry: " $Name + Remove-ProcessMitigations $FullPathItem $Name + } + + # If there are no subkeys now, we can delete the "UseFilter" value + if ($MitigationItem.SubKeyCount -eq 0) { + Remove-ItemProperty -Path $MitigationItem.PSPath -Name "UseFilter" -ErrorAction Stop + } + } + } + if (($MitigationItem.SubKeyCount -eq 0) -and ($MitigationItem.ValueCount -eq 0)) { + Write-Host "Removing empty Entry: " $MitigationItemName + Remove-Item -Path $MitigationItem.PSPath -ErrorAction Stop + } + } + Catch { + Write-Host "ERROR:" $_.Exception.Message "- at ($MitigationItemName)" + } + } + } + + # Delete all ExploitGuard System-wide Mitigations + function Remove-All-SystemMitigations { + + if (!(Test-IsAdmin)) { + throw "ERROR: No Administrator-Privileges detected!"; return + } + + $Kernel = Get-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\kernel" + + Try { + if ($Kernel.GetValue("MitigationOptions")) + { Write-Host "Removing System MitigationOptions" + Remove-ItemProperty -Path $Kernel.PSPath -Name "MitigationOptions" -ErrorAction Stop; + } + if ($Kernel.GetValue("MitigationAuditOptions")) + { Write-Host "Removing System MitigationAuditOptions" + Remove-ItemProperty -Path $Kernel.PSPath -Name "MitigationAuditOptions" -ErrorAction Stop; + } + } Catch { + Write-Host "ERROR:" $_.Exception.Message "- System" + } + } + + Remove-All-ProcessMitigations + Remove-All-SystemMitigations + ``` + +2. Create and import an XML configuration file with the following default mitigations, as described in Import, export, and deploy Exploit Protection configurations: + + ```XML + + - + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + + + + - + + + + - + + + + + + - + + + + ``` + +If you haven’t already, it is a good idea to download and use the [Windows Security Baselines](windows-security-baselines.md) to complete your Exploit protection customization. + +## Related topics + +- [Protect devices from exploits with Windows Defender Exploit Guard](exploit-protection-exploit-guard.md) +- [Comparison with Enhanced Mitigation Experience Toolkit](emet-exploit-protection-exploit-guard.md) +- [Evaluate Exploit protection](evaluate-exploit-protection.md) +- [Enable Exploit protection](enable-exploit-protection.md) +- [Configure and audit Exploit protection mitigations](customize-exploit-protection.md) +- [Import, export, and deploy Exploit protection configurations](import-export-exploit-protection-emet-xml.md) From 81b365fea65764568c4b0b473fcb994f49fca36e Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 14:55:46 -0800 Subject: [PATCH 02/13] Fixed bad link. --- .../troubleshoot-exploit-protection-mitigations.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index 0435dc738a..549d76f11a 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -205,7 +205,7 @@ You can manually remove unwanted mitigations in Windows Defender Security Center ``` -If you haven’t already, it is a good idea to download and use the [Windows Security Baselines](windows-security-baselines.md) to complete your Exploit protection customization. +If you haven’t already, it is a good idea to download and use the [Windows Security Baselines](https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines) to complete your Exploit protection customization. ## Related topics From 242bc46edd996e0f43366ee6d78b32a6967f47ea Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 15:37:35 -0800 Subject: [PATCH 03/13] Tried reformatting xml. --- .../troubleshoot-exploit-protection-mitigations.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index 549d76f11a..e95d263b12 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -146,8 +146,7 @@ You can manually remove unwanted mitigations in Windows Defender Security Center 2. Create and import an XML configuration file with the following default mitigations, as described in Import, export, and deploy Exploit Protection configurations: - ```XML - + - - @@ -203,9 +202,8 @@ You can manually remove unwanted mitigations in Windows Defender Security Center - ``` - -If you haven’t already, it is a good idea to download and use the [Windows Security Baselines](https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines) to complete your Exploit protection customization. + +If you haven’t already, it's a good idea to download and use the [Windows Security Baselines](https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines) to complete your Exploit protection customization. ## Related topics From 203ec9597bddf5558d77a3e826e3b4b0861632c0 Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 15:49:47 -0800 Subject: [PATCH 04/13] Tried reformatting xml again. --- .../troubleshoot-exploit-protection-mitigations.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index e95d263b12..ee23324d0b 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -146,6 +146,7 @@ You can manually remove unwanted mitigations in Windows Defender Security Center 2. Create and import an XML configuration file with the following default mitigations, as described in Import, export, and deploy Exploit Protection configurations: + ```xml - @@ -202,7 +203,8 @@ You can manually remove unwanted mitigations in Windows Defender Security Center - + ``` + If you haven’t already, it's a good idea to download and use the [Windows Security Baselines](https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines) to complete your Exploit protection customization. ## Related topics From f21342fbee7cd23363d02e058c1abee05147082b Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 15:58:38 -0800 Subject: [PATCH 05/13] Removed dashes from xml. --- ...bleshoot-exploit-protection-mitigations.md | 32 +++++++++---------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index ee23324d0b..eb71a22518 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -148,58 +148,58 @@ You can manually remove unwanted mitigations in Windows Defender Security Center ```xml - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + From 8b2d3858d8031c7d311d4de28d29ab5ae73a7f65 Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 16:12:43 -0800 Subject: [PATCH 06/13] Added new topic to TOC (Troubleshoot Exploit protection mitigations) --- windows/threat-protection/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/threat-protection/TOC.md b/windows/threat-protection/TOC.md index 42ede7cb70..58317c1029 100644 --- a/windows/threat-protection/TOC.md +++ b/windows/threat-protection/TOC.md @@ -254,6 +254,7 @@ #### [Enable Exploit protection](windows-defender-exploit-guard\enable-exploit-protection.md) #### [Customize Exploit protection](windows-defender-exploit-guard\customize-exploit-protection.md) ##### [Import, export, and deploy Exploit protection configurations](windows-defender-exploit-guard\import-export-exploit-protection-emet-xml.md) +#### [Troubleshoot Exploit protection mitigations](windows-defender-exploit-guard\troubleshoot-exploit-protection-mitigations.md) ### [Attack surface reduction](windows-defender-exploit-guard\attack-surface-reduction-exploit-guard.md) #### [Evaluate Attack surface reduction](windows-defender-exploit-guard\evaluate-attack-surface-reduction.md) #### [Enable Attack surface reduction](windows-defender-exploit-guard\enable-attack-surface-reduction.md) From af7480eaa7fa6791b1689519d831464855cf939e Mon Sep 17 00:00:00 2001 From: Maira Wenzel Date: Wed, 31 Jan 2018 16:53:36 -0800 Subject: [PATCH 07/13] fix typo --- .../whats-new-microsoft-store-business-education.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/store-for-business/whats-new-microsoft-store-business-education.md b/store-for-business/whats-new-microsoft-store-business-education.md index 38af4a8e01..80d4cc6d6c 100644 --- a/store-for-business/whats-new-microsoft-store-business-education.md +++ b/store-for-business/whats-new-microsoft-store-business-education.md @@ -11,7 +11,7 @@ ms.date: 1/8/2018 # What's new in Microsoft Store for Business and Education -Microsoft Store for Business and Education regularly releases new and improved feaures. +Microsoft Store for Business and Education regularly releases new and improved features. ## Latest updates for Store for Business and Education From 651904ea5f776b9cf522882e81694ea9c857c921 Mon Sep 17 00:00:00 2001 From: chintanpatel Date: Wed, 31 Jan 2018 18:34:45 -0800 Subject: [PATCH 08/13] Update windowsdefenderapplicationguard-csp.md --- .../mdm/windowsdefenderapplicationguard-csp.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md index 47b499d041..6b6afaec07 100644 --- a/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md +++ b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md @@ -83,6 +83,9 @@ The following diagram shows the WindowsDefenderApplicationGuard configuration se **InstallWindowsDefenderApplicationGuard**

Initiates remote installation of Application Guard feature. Supported operations are Get and Execute.

+- Install - Will initiate feature install +- Uninstall - Will initiate feature uninstall + **Audit**

Interior node. Supported operation is Get

From 7ea9974dc1c210b1b5686f782c5af1e663430aa9 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Thu, 1 Feb 2018 14:30:33 +0000 Subject: [PATCH 09/13] Merged PR 5640: Add instructions to disable auto sign-in for kiosk --- .../change-history-for-configure-windows-10.md | 4 +++- windows/configuration/images/auto-signin.png | Bin 0 -> 13645 bytes .../lock-down-windows-10-to-specific-apps.md | 3 ++- ...kiosk-for-windows-10-for-desktop-editions.md | 10 ++++++++-- 4 files changed, 13 insertions(+), 4 deletions(-) create mode 100644 windows/configuration/images/auto-signin.png diff --git a/windows/configuration/change-history-for-configure-windows-10.md b/windows/configuration/change-history-for-configure-windows-10.md index ce324c8cf1..a12a531608 100644 --- a/windows/configuration/change-history-for-configure-windows-10.md +++ b/windows/configuration/change-history-for-configure-windows-10.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: high author: jdeckerms -ms.date: 01/26/2018 +ms.date: 01/31/2018 --- # Change history for Configure Windows 10 @@ -26,6 +26,8 @@ New or changed topic | Description [Configure Windows 10 taskbar](configure-windows-10-taskbar.md) | Added section for removing default apps from the taskbar. [Manage Windows 10 connection endpoints](manage-windows-endpoints-version-1709.md) | New topic for Windows 10, version 1709 that explains the purpose for connections to Microsoft services and how to manage them. [Configure Windows Spotlight on the lock screen](windows-spotlight.md) | Added section for resolution of custom lock screen images. +[Set up a kiosk on Windows 10 Pro, Enterprise, or Education](set-up-a-kiosk-for-windows-10-for-desktop-editions.md) | Added section for automatic sign-in after restart on unmanaged devices. + ## November 2017 diff --git a/windows/configuration/images/auto-signin.png b/windows/configuration/images/auto-signin.png new file mode 100644 index 0000000000000000000000000000000000000000..260376199ecadc7ad234a071a4648483969e4a36 GIT binary patch literal 13645 zcmbuGWmJ?=`|gK^A%&3~V#panQo2KGXe6W?5hWE6RJuC{K~e`$K#&lW?ik9Xq*Fjr zKtj&;eZTzII$zFN{|_Rtobh>{z4v|J*YCO}&QM>I63PsPKp>RbTI$9S2%Z!8zJwGX zd}VQxqXU28`59}fLaImMo8SjRHx)e<2&6WJ{KA0<{7mMpW$6cjP<8+NgV*m>?hJuQ zENQE&m97c4C^(8v@pz8hHJF1?}81|-;niam|*)iza5(5R((@)HcFW-?s3{o-9#Y}}vI<&-+-!2@u)mUp96 z_l2Wo&=bXKBm&py{Pq?)%L<>$B9TZz!Akdu5&^SH_s>|$Fya_qz2{#V@6T*(Y@kfA z5_dnX3}p%ULK$WK-OKb}&{W&CD?0X&3Jbr*<%*{;iLV{+%osz|)zy!7W~6LB_=`+5 z`7E1N-MRfzE3G?*+A7A$@zKuo@9nxVViFQ7a208p-g&4G{+o_Gj*cNAAv)QDah)-d zk;*i$bh4)F?`FUcj*oAcVA0ObD`{Ms(nrI>?OKXFe(R&H?h~9VXTP_=V*CY<<@8`! z7)5YXEBA$509G$A`+jnJ`_;vtLq0UdduRG4G?7i=4iwUaH7dPjWMuU333KzzI>pNe z9hg>H`0OwB`mNzMKbINA!%#JT2L}1lVLafAQG6IeEqdW_wK|>u_Uogq?*<3$m&aE8 zWR#Q|lJ)qL108}4!nW$wcN$(lN#Wwy2z69%d;I&S_?W!f?Q~NlOq=oqQ=%M(Z=m>x z+j)Q1Z>+&1wp}p|_rBlZ`2`UR$4GikhPL=`egf-|uk_583I&UQ86AvXTwVS8;o&{PbD?r& zOxJ_CN7%`a0bby#Ha_?fk85-sd44mQQxt5Go&|^eFanYTn_^X>A-iT@o}hyjk=V@I zQm`nQ>PYkI{1*>kPz~emoh_KJ=qIu+STug<3zTx6n56Sq~zoo zD{h5P%-%U`56w6EM7(w#D-ingDCFw$B$Dm?c&D^uFoUnk8Z7V;Sm5pUCyY(b&_Kk! zZ_%{2|N&R1kTUTHPzK4BO|w`8xn-b z{&*@+o_?vadan{eoGc52_7a2#qtn2WfZb_9#zMueNMT}sVJ6FqH7Hahg2F^{XdleA z#3V9_zuPPl`4|V5JYOL=TP-AD>zj~WTS#yGb%8te8(VMNAN*vJ z^kmGM6pls0;z=MU7{`-eKlcBQ#WyXypMP3s*J2+~^X%&H#)i89D_wWB!&rfWSyxyB zgD|b0=X8CXf|j$hv%UQSxXcwARYOCXm`1Pp8%mj^;Gzm-{9J<@z?sDBP{5uB`&^#= zetrARba161l8xdo6WV8Iy1}VGd89x=F8Fx+tQ{S-)VW;P2?M8hFcqQpYqnYG>cUSz zx7bi#`9d7S$@PU7=|NI(g~#>Q&Aw7zbM>E|34m2R`lKt25VZMl^dev`4R_vI zVNy2tc&my_GudKOZezav>er8tRqEk1^z?lf;Dx<9d~9HI-)Z(;Rg0mryeri?bi6UK z{3Bq#;nUTvrV&^c|Lx~D@6k_(Y<;WxZX2AGPe#Yva`y9$?@=LXw77i-MBo~`q}QBv zqo-xivV(QY=~BXc$YD}eEJ5kF!E~O4#6;Mi2U;1tdM(1XXI3=Vuk(D7eE8F}IPtuv z)~TOa>OsrB?>7XVkgN{p*tI`x&C)`)o&S^#l>3%=^j{frAVs{f44I`r#t@+`MSNmYGLhy0E;uGeuKR-a-b7sD{ zI2;?!7OHDE7Lk|Fhrbr{LM#jVx*OrBz3Lo$p->EOGP}})g4HL-+m=SwA9}{6bLgny z(#rbo?(U!i*aa>U`R0cxx*07RC|w?b?QK?JtdVTn`uH~qNqHf+ZMk|JZJ;hwFSx8% zENid0pZ)z))^aB)h|cDv&Gf*m}5SCA5$qL@LqE3l0b2zn#Ah5y4OQD=$L7{fX3;_|8h9O86B zxqx5Xai5H@4|BgAJ-`f)qbH!YS3=gBo8N9de&ou5#)vf!DDfDw2 zuZ>8}Z-dh4nItN@oj#z+DDBM=t!Iw1u6H*w4Xeq}fim2ft+J9jJT{@Zc1`7KKgq(Y z^j6YFy5M!nn_hGIBU+%#jlGbINf^e6IyHEF?Mq~eVEc?*zW??0?H?Z=y1XL4&d)8` zF=?b(U!{>i|3da*$s`yGm}fq*jt8OQ@RJxt@tvFoZr=N*e)nZ)Xcc=_``@!ISnTjL zu~*Cft=~Vt=5n5qp^7dEBhVb5Z5upp%P#EfP-S$nT(ZIN0d8hRcOVVcc`3+$U=ggI?{I+55(rDVjNF-~6Qz`V#F7-ppb|G%9cD zZTny5n_FMsFo>JIHbtFpHQ?R;T5c54`|1s&0*FV%^?m;C&|) z#3rr+)doOUtUV(|((;eg+f$M12lE_7R+PF%Ctj(!G4ewDJ`_owBF-Wj#p!uz0#pq! z@!3LFU|G{Y8$I+j^b~vpUcS;H9CWzmvbe$W{9-YNU3OYK1Qe%jC8MUYg2zy34jdD1 zNuRq4V^ewWyx5tEGFhSARR4}ZAXHRTD&5bHHV2uMp0<2uvxsF{P#c#g#45WJiDXTR zZ1H(%#HdVw@hygmSwaiC@X7LS<>RHExHZB0DsaY0(eDk3?MsY!BW3*7dVV}PJv%FL z<}7_~A&4(2?(qdV_|k}x1dlaJn8rP`Y0yXHkwKe%CqAL73miXu1HPYA@$GIpqNp|a zg!AV|>HQkD^4L_iQC7Ck9Y8GPhzw-|7~~%jnZGsXF+Rx>p$@ zBu!pwU5jk?TQ4~x-4}}@i{&?~9H3n|Dbn?E?}3eHG<~CB64OFcc`05VeWvXizhA60 z)cukaKU2rkcIjHa&^#HUff|g0xhBSWKJyK)C)u+)|KP%c)rzUM2x)PAH-YN{ea+fJ9rHTM}ANlaV{>Rg6-;qfWz3F*j6 zt%2)$p?q$OqI}Nvg|E^>kd)oLxChhq6}3T2)E|_i@Ldr=$zZm^^DOl@s30B z;!x=fZVDY|WDJCvgIUl%x7bgWK>L&58iU*KzvsJowoKTLMm=Q-=K-3<&AXqmO!}hA zEa;ZfEEw*EgiTMtnn5m-_0*3LRY**el?b4_J=t9n$ zo2dJt#~z_R*b}yRd~MGgPDBf1!75)RIrTdf#c-0Vzekv9uMOuIG}hvO2&aVgAyQtwXTVuU(TCkC>rR8m;J64KC)MI-bxr(SRb{(BuC^2oTuy~YELaiq z_NjZduI`dEx(A5BXc8%>dO|1K119Iebd9r~=>$J6`Udgd5{-l!3xP$5wqHdehRC&e z6igVZ2I<;ONc7_JviRd8_dyA?%3u>Z>^|m&corRki-w(9N6g-dQ)0|^bC9nvvsL1! z*poAVLOB!6Jy*v;ObIuUMUDtjE#~x3Q|Kmc41EgEy=vl+mKx%>cZxEhRdc!St}Cet zbK(kBo<+DuY-M}wcESkFkhKF~Y;kPPRa-Ohopfm3>msjIxB7h-O#~Py}5rEm+%6m?%L--ILLiOb3$e5Jn}qibl zE`2W0GtZwrF{BeTa+ncv*3=@hUl|zugmm5XMC9$)rmBRGupH4Z58rup)lc#u7>h1F zr>}wez#J%}ZOYuP675Pl1Y@v(gMl)on0cU=q#^AH)LX~%S0u(Aw%a2pBN`)g49S^YmJAVl-o+}J4;SGTPw-3oS=FXdCpwIB*c&5?%Zn;qzcqp(Ihqn764Q+q9Wrvz_Ux}Df_HA%$Hb(eAi7r7 z)-t9{KWI7mZiuw~N$n+T6shXaxne+s3*Ua7iNPDn0g^-v2x%dnTBQGTs_psq!n?)% z`Y&0QE-K8n3p)>zwCMu8>%AAdJ{b`FRH;>Wy@Qc8&4#YNyHS?lQxba=AItD9PlJm_{IBsRaxAHkX2_-YPP45B%776($jN{{+b%icTxYA>&RKB`WTHN8P z(+a$9zwVn19U=IldLuw4Z0Igg7=C)hlh7RI&)c@sXl~<|T2Pi)84NRJorDw|3==|!;-aaM+j`wJcPdnRUWXzXicV@xjG7yqW=C;zMitk;0PT9LSfN{}V5 zeWBV}M>7q{k;*5M=9uVl7#kFON|2rgHQeGKyJ z*w~ot-hf)}QXyfN`6Gkv(8;C2`CG6!@-EKfYun7H+2m+w*#Ea=)kI&retmU!SLyzA zJs6VCPERQw(d92~ZOPsHCP>Zxw%ibz&P?VO52ji9lUcvs1ctFfrDvo0GOe_cV8~_w z!#z0VHXk3|9IFF_j+%wG3kJqAFylwEf^M|BzP|2n@baUy|He4r83Lx|sls-O&7Jx{ zje7#%0q8^Am9PmG_oc$5srdd#P*j;HF~yI7cnN&Rv$LBAdK%miTrs2x z2#te$B0yQ}oBCm828E+9n;GXG52uI&Qokd<-p?$ZtT0=6e>m-|x!e$6r&%bi~p=DamT z&PD~JMS~8U%T)^O8r{YUJg46M({kYilOAFCM7NURo1X@DlYrdJe7&St{V5r!G&S^r zAPNtb0sa}NH5%&bG%6IVvPT_Z1OQsTwyawNOyI$@pNXo)T98>MXiIBQd`pWQK{CfF zgEHq$k1uaGPXT^1 zLx9J@0UpOlp43~Dvg83))?K`JT3vXKc-F0-30Qw&!@!~~Z7`3$x#SS#XWq*y~=8RcXzB>#g{g5Z*LDs7od(dpFaH(nGTezVXdRa zv0TXed*4TongNYGup3KFO$FN`FNc^P7EjoH9}8(~YqPbrT_e(q!`~pz8_Psx1ifk1 z17S{obD}V z@EH_%)16)@{XKP>YY76!3K`%F#QR?Xu>Z;MeWb9`40L|7yt1ZBXA@&w7c#7V=jr2JHW*F`US3X1oW|vb zrc%oBy2riZsE^{ktIoB~KB&>$vx$_aY*EyWV|?#o#=8`9!+pQ^_o%ZcH#cbh=Y5Xi z6tB~zjj&>4&y2;cLwif3Vyz#DYHZ&-2fK9qb2KN@oK3J+;cWvaaY`AOHf^wmV9J% zH1G(HCu^O|&e+2b*T=+-%(|`vT0Pzp?H6Qp0qLi0yQ$D09T-J9>rjriVKE}gjp450m3}HV`GTB z0HtyH#UHQ-^a>S!fdBPv%K=m`Au%_Ouj%RKW3W+_eu?fIS^)!~GEzWf25`eV+LMme zd^S-HfQX-+ZSn~$2I|s0uyjUKSvPsBq)QV9RcQMA*RL?<%LOFwmTIO%M@1ok_u;+t zO1HLsw&VqkvnPV&hHcBhk|h}lBVW{N52%QCA0O!*ylNJA8|4_#nQsZo@Y|$b-FY~z z;s;YJVr-bO;*Xng_^ER5+5*0_JasR3OxMG$Z|+#di52ciLyh5UFgkEPzTb4 zWU&EGF)|6hONZ*0+})XL8}h6Rsix#i*NntuuYT6H9jj*ruMIGa-AE!eNwf|j6ma%d9agdd~W67k({1Aq*LAvvlR!ixQf#Xwy( zd(st229VGz>JYh|d&HE?M_)_~RtM4uo@vqAmPwxVc>~*q)59b5ZtXGXP1qLnDX_e7 zF9#i)M<`(*8$W&|UZ5w%!u6eCJ%wiXX;((@>l^y0G6m_x=Y>yl2mz zK__#=7s9LXVzi*C5#iyL>S&73y{6;t0H}W|GXSjniCB)HC9uQz>sOoC3rbroh_>WF zJtsVhJn(M==!qN9fp2fjg^!Z5c>3=ik7ocfY(%Z2L3{h|e47HR>uX?e#I4q>Y6EJt zZY>mR9F>b8p{_P8#$SKeKM&^hvRF!SLV6eA zuJ~q$))uj4y4Cuw;ZV64ZUvZC2Sx5HP!)!YciXSpJifj*6~H4klkr{AlD*|1+hM^W znC`yoH0bxYfzJ~6mD?WL$14*S78U|*&OX8zy*$Z>AF@05#vlGeUA`qvO_KMgL-smJ zNNYMk5lgJ`UDYun$IIxICOb$I<<3s>cm=VJh?mppwWlrtPU71#UnBoMrhqi%6gCAB zHo|hKrI?KF1qLrN9FJpM3T-L|DnyIh7#m@|Ch@=;(~pPn#2*au$CFN+EWljNL9*h} z_TX^ncl!UXegMBa1$eeJYfG~}%YE9s&ri;_-f{tY%A%2m{-S|nvF8UxObr9hLbY`> z&A7ek)mL*nja!QtZNgdDb|Pe>8@R;bp;gZVzKLH)-~5?8I7mdUpT=l7cXNz5wL;B1 z9z|m>ASq002+87NEJ}+sr)3qiYNR;O*gHHdmDw-Zc<)Y{>;^gqQj}b%AQf>qvPlES z7olY8P;~4LKKZqJ4o=tgulRdi=5|k_AbNQMtRmaMpw-A$ERrNWIJ?Jdaxo94}%uUZ%wHi2T1P7HgmCG!&vOIl^r7^Ey@{0jBGC2n)GQJH;Y4Hr_nd4g*U;HeQah)9Ewxk9vXND zXVLM;T|^bkN*JPA_`r1yZiyl_8pLu;Gi$Fx1N2L>H!{svKyFQ!XpqYcr5BwfN7Qz>I5?Sg;Z5qybyF3JWu%jBh#%htl~23$4S<4C z2inuQ`0HF~l|oCK!Iv|t389mWH@jebdd~@ybg;EZI2I!nN@{@*XGRblYEzjIwhtJ& zvhb9SdA0q)t}tHgbyNRyo{d;sw5D@aZPmssaV+?6AoB=DxU_d@s!1m8kLy?t&ot6& zz$>{Q${0iD3qF4~VaDs?u^s*is*u;=MAvG9X60@q za9C2wgrQQ)Y2A3xo&LL%wcS1<#3?GYVL{xGj3=l$+Tm+cRCFejx%g9?l$+5gLn=RQ zTFa0q2k7&<&qx-$-~meec(4ix5t&EWRCb^3JX_D`1=27S=b3U*Xs!pL1N00fk8kg> ze+a?ayN;WxUhh_kM#WN1HgYIq%cBU%BUwtMNTa86Jvd{5+DmxIMAN!#bj>|njMOI= zzeBM{a2vMG;zT2CqWn(G7*aQI(E+=a$0X=br*4t&_|&18f2w#=Wg{%lB_Ja4a`L1G z|ICa24HyQnlF?jf2f=)e$fIlH2FrX)Vt_C;yIxDng*RDY??A{|s;|`ysp28|j)baR zfN_URSq}76P#4HYPSoRx+t+^)A*!c6(UgT#R5 zNs%b}&Aq!>dM_b7fLBxzL;Yr9_Q*R3(qS0TSJrxcsxC6Ge+Kb@-{l z>(O<(uiEw8e^7n*lw`18oQN0C1f%e>^9QDDAUx0s>ij3ELxhMp@!S`l*l;V*#F?Ov zC!*`+qIGE-p^8Q6fU>{7^EZnNrE3*U?j5}D3msvkdrlK28a#CXFV<8Ipp$!;^KalW zceo5TZRAO7GiQzb0siaYwWaQAUV{Qq#E5-R@m8g`C~F`6K@qMeIwI`*K79?$4KHV; zjJwwt-~?Uk@sXEoqu~ulIoH`&lWO^y-YW@hLOYN?@50;|{oLQL=}VgCJZ#wd_@VWC zXVnlNCurTF6uPtEPCkvY&D6Y%4Ju{;sLX&!Fh)l_HZ=Fdpc_k!A;+DD8uVZ*^@^j7 z$_)|y`;!*5Z)r|64KtI9teo@lp5iY8@05O(}*6-U5K6PU z{kWU^GWgYBFJ61);JyADsMqj>==bY_SG z!U^J;#YFz2Px{3`X0lIa*g|S=GpoYm%tdSd*6K<52D?MPrx%?r^weLe$8z`5h8BtV32-id27QN~Ef$Rt(vW3>&9+L59B4 zme%gTMRJ6KOA)Rac(s=W@J}TBxH7(i>Ro7Nq?_wW4y@Imd&t*^;7!YZU8q zvW8L-1Pu-De;!ZT8T451hoT^dq)Y_CvB`AZF?FJ%6Aas0O!zHLGc=N^jvXSg*3%F^ z{rnC_byr&vvNXz)(o!;1MQU`9(4G*3A)bfk0u3CVh(B0f!|7-0{8@@X7B%VtqB#c< z2^oS#zCOj1m_=bOt^uP^H~ZX8?kufj)+U#wXJ;tw#N2eu8xz0Kboib2rwYejUHXr8 zd4~r(M%r62w(>P!IxLVK{ETHon%CVuy5)87m7;nDshE;rM;i&fya*^(8Th=(;=1Ls zVFU@Wm%}vM$}+k1iH6uHo`}B|L_gh%dAb@Rw8e)aMzx}jMmDJHVjPB3mh_9nO$EM( z;vUL+*jrP4Yg=^u;QX-T>l<^PJv`Io!=jd2Sazac&f8fZA;CILbBPRQM)8DrUH|FP zA1swT_qwGT%}dndn)K28p<%TSJA_%sHeZ!kQ+W{z+0pmuaI!YHk{C`Irx>^)3 zHpW$|kCfa417C1fgo)z-mogFAqy@^?&1&>kw6xjNDdUUQjxoButE8)WJ?O$KCRlZ> zSB?}OX)G_P!V+=a34yBkqq76Q&3Op*)d)!Qv61~xn(*Ji4i^gJ`01tgkBz|O5R{v<8XJfR~_jye+PM-w_7Bz?}thEWp;~mc2 zZhv}tcCwqoA#;?9UA}xv&LO{8-g>=nczj@GX2|#Ac=QB>8_){+Pf9~8_~hkV092#N z&DV(X9XK*Ps0iByLTa$RV8kejbAJ(GQiKJpjNkaBR)Ktw*3vxqX8-830T5-YAP<2C zzl^3}T1j?&_Uy{BH-2@jupMCAft3Za!Nra7Vl}6&4-w!VOu&5O?@PTgQL2d|IEM+_ z%7Y-<+TUwjh$JAYYU;8|uB#fj9IS+8Wgh#A9eGmnPMp_1{G*5tuo! zsvx;x&A0~=Lou6Reb#n%^w#gT0v`v!Ft{-?osdl|s@Y`cRgP_X-bL)p>J6^YAT=J+ z7%EoP;nlHGfJW2%=_ptvakFNgG0nmMX!z+B=oqRueC7H;8VfvYJ--C*)R|L_zLWSC zFsC1FeijA^Kc=&e> zqnu~6`Vt1F2o=tyxxxNzgBP+<&7VjP-7F%2gExF%qhpqlm~pfZSVUBC|^AD|E+x>K;jaJL4Y?f@X+8Cq*AXvp@9xAKPnRW)9nf3M>el!AaZ5ChlL@^(t8t{ z?3QHxKc)a?mI*l(;c9s2>HeiWZFV4Jxi1N1U`_4=8l{_wRC$q#I_DttyW-q717R}1 zeuOq@ly>yrm2bC8$i&GG*G9PPuUQsr@dF07@qU&_9;7csgXK(UG{{ZtRi%xsC8+3H zb69_Slfa3tNI0oV0-CF6W;!sU`i?ZB6oGhCPv2*~K!py75Mf=8cYx}=T+OiqQH2D> z0JbH36B@$7UlArNK4WiNkDtr$<2_GJ2Ang#7GNl?_dDNNl>t9<*~VYO$6*$t+SDUuwcWueU&;Tf7rBmLS4baPy6`FTZIK^JBR?X%QF#)pMi zF`@07k~+Hp)%d{t%Hytt3D6 z$i_GhWukn8Zin{Q(^>xF*6h)`u2fNzb+5*Pn!=W0UG!`{cNG+b6h_55Gi!L07E1)5uFSq&F zXl>HrpZ0=HfwZ|Mz+QM9)Bp#lJ5lM+>4rDJ;-Ru;8|PNcJ;h(A&RHGF3jk4AZ?og= zski|5Khoylu}w+p!VV!pPq zt-enea55?~C`l!JHb1>8FGq%x9&!_L&Fq699Nixipa-UrSX zC=2x5H0u(5#J^%4mxU2^jfNj`ke!ArOn@w0nuCN6?O%9+yj>yuU?)R4;Rvs<_zklO zD0KyP6CtEwQ!{Vf`C(9l{kP6gYYDk)bUGkL|DT_L?KAM-IQ{=q+LfEr1g^mT+sVGC zK53n=n*7S<{I4lkJQ zFB2`s0X=@`mwaD=?dtOeK=JdCvD_v9o{lvHR*PrG-E=jln4g?rRx)IS)k zzV1EYx^TAu79rtYD(Z$^%8lQPX_FQZa(1@VkU=bm*bI zY7pvN$5Vsi!8z~o$c)vGzxU&Q`1sq>9Gp>?$&FBJ%g9RdNwU9VY}`G`IBB3Hqo!t8 zdU^q}r6kmBm0m(-NLr=>5sk?#tJ*Ngv8PmUfRbWZ6ff(Uc+cZ{rPJTzSs`>0PJ{UP z%y0{@(b~L;8#lZQq^iu%o0vbuhhvNq-bYJHcqmWCM7xtW09gHA;5uG&=tx&p;Xh z-zN3sagBCuJEhitZ)<7e4@>RU%e}q#)Vr-&W$Xb<8 zHhLZ|s+mV)&kYO(^-_0Fcb3;9_FLv>$$;z#Jf3m`Q-H#Q*(N*!Vld=r79>9d_7eD1 z!~NN&Ycky2gfbi)9X`<@LQcXa_HSne@e*1E(@3|!@;pGDdXTaHCWRrJ>)`+j%DIgbzDfvhZm6<%O~ zF9j)l@L`?%Gm>_8c8etTqP?J@0eVabZWBrrDu_=&5XBza3!?n0KIT0=7wpa!4Xj&2 Tjw|3JP!Memef4Tp`|$q*;6tR= literal 0 HcmV?d00001 diff --git a/windows/configuration/lock-down-windows-10-to-specific-apps.md b/windows/configuration/lock-down-windows-10-to-specific-apps.md index 7e5d71562c..ea121c6820 100644 --- a/windows/configuration/lock-down-windows-10-to-specific-apps.md +++ b/windows/configuration/lock-down-windows-10-to-specific-apps.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: edu, security author: jdeckerms ms.localizationpriority: high -ms.date: 11/26/2018 +ms.date: 01/31/2018 ms.author: jdecker --- @@ -52,6 +52,7 @@ If you don't want to use a provisioning package, you can deploy the configuratio - The kiosk device must be running Windows 10 (S, Pro, Enterprise, or Education), version 1709 + ## Create XML file Let's start by looking at the basic structure of the XML file. diff --git a/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md b/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md index fcbf41202b..0fe1c5b458 100644 --- a/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md +++ b/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md @@ -8,7 +8,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: jdeckerms ms.localizationpriority: high -ms.date: 10/16/2017 +ms.date: 01/31/2018 --- # Set up a kiosk on Windows 10 Pro, Enterprise, or Education @@ -37,9 +37,15 @@ To return the device to the regular shell, see [Sign out of assigned access](#si >[!NOTE] >A Universal Windows app is built on the Universal Windows Platform (UWP), which was first introduced in Windows 8 as the Windows Runtime. A Classic Windows application uses the Classic Windows Platform (CWP) (e.g., COM, Win32, WPF, WinForms, etc.) and is typically launched using an .EXE or .DLL file. -  +## Using a local device as a kiosk +When your kiosk is a local device that is not managed by Active Directory or Azure Active Directory, there is a default setting that enables automatic sign-in after a restart. That means that when the device restarts, the last signed-in user will be signed in automatically. If the last signed-in user is the kiosk account, the kiosk app will be launched automatically after the device restarts. +If you want the kiosk account signed in automatically and the kiosk app launched when the device restarts, there is nothing you need to do. + +If you do not want the kiosk account signed in automatically when the device restarts, you must change the default setting before you configure the device as a kiosk. Sign in with the account that you will assign as the kiosk account, go to **Settings** > **Accounts** > **Sign-in options**, and toggle the **Use my sign-in info to automatically finish setting up my device after an update or restart** setting to **Off**. After you change the setting, you can apply the kiosk configuration to the device. + +![Screenshot of automatic sign-in setting](images/auto-signin.png) ## Set up a kiosk using Windows Configuration Designer From 7b9645c83a347b7690e46c82389c34e208ec7541 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Thu, 1 Feb 2018 16:44:48 +0000 Subject: [PATCH 10/13] Merged PR 5641: fix link --- windows/deployment/update/waas-configure-wufb.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-configure-wufb.md b/windows/deployment/update/waas-configure-wufb.md index f705f7b85f..b6260dbd6d 100644 --- a/windows/deployment/update/waas-configure-wufb.md +++ b/windows/deployment/update/waas-configure-wufb.md @@ -28,7 +28,7 @@ ms.date: 10/13/2017 You can use Group Policy or your mobile device management (MDM) service to configure Windows Update for Business settings for your devices. The sections in this topic provide the Group Policy and MDM policies for Windows 10, version 1511 and above. The MDM policies use the OMA-URI setting from the [Policy CSP](https://msdn.microsoft.com/en-us/library/windows/hardware/dn904962.aspx). >[!IMPORTANT] ->For Windows Update for Business policies to be honored, the Diagnostic Data level of the device must be set to **1 (Basic)** or higher. If it is set to **0 (Security)**, Windows Update for Business policies will have no effect. For instructions, see [Configure the operating system diagnostic data level](https://technet.microsoft.com/en-us/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization#configure-the-operating-system-diagnostic-data-level). +>For Windows Update for Business policies to be honored, the Diagnostic Data level of the device must be set to **1 (Basic)** or higher. If it is set to **0 (Security)**, Windows Update for Business policies will have no effect. For instructions, see [Configure the operating system diagnostic data level](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization#diagnostic-data-levels). Some Windows Update for Business policies are not applicable or behave differently for devices running Windows 10 Mobile Enterprise. Specifically, policies pertaining to Feature Updates will not be applied to Windows 10 Mobile Enterprise. All Windows 10 Mobile updates are recognized as Quality Updates, and can only be deferred or paused using the Quality Update policy settings. Additional information is provided in this topic and in [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md). From 01c6963b9d395499d46df56fea54c4f60560c711 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Thu, 1 Feb 2018 17:09:59 +0000 Subject: [PATCH 11/13] Merged PR 5642: fix links --- windows/deployment/update/device-health-get-started.md | 2 +- windows/deployment/update/update-compliance-get-started.md | 2 +- .../deployment/upgrade/upgrade-readiness-deployment-script.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/update/device-health-get-started.md b/windows/deployment/update/device-health-get-started.md index 9350288947..175f553534 100644 --- a/windows/deployment/update/device-health-get-started.md +++ b/windows/deployment/update/device-health-get-started.md @@ -24,7 +24,7 @@ Steps are provided in sections that follow the recommended setup process: Device Health has the following requirements: 1. Device Health is currently only compatible with Windows 10 and Windows Server 2016 devices. The solution is intended to be used with desktop devices (Windows 10 workstations and laptops). 2. The solution requires that at least the [enhanced level of diagnostic data](https://technet.microsoft.com/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization#basic-level) is enabled on all devices that are intended to be displayed in the solution. To learn more about Windows diagnostic data, see [Configure Windows diagnostic data in your organization](/windows/configuration/configure-windows-diagnostic-data-in-your-organization). -3. The diagnostic data of your organization’s Windows devices must be successfully transmitted to Microsoft. Microsoft has specified [endpoints for each of the diagnostic data services](https://technet.microsoft.com/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization#endpoints), which must be whitelisted by your organization so the data can be transmitted. The following table is taken from the article on diagnostic data endpoints and summarizes the use of each endpoint: +3. The diagnostic data of your organization’s Windows devices must be successfully transmitted to Microsoft. Microsoft has specified [endpoints for each of the diagnostic data services](/windows/configuration//configure-windows-diagnostic-data-in-your-organization#endpoints), which must be whitelisted by your organization so the data can be transmitted. The following table is taken from the article on diagnostic data endpoints and summarizes the use of each endpoint: Service | Endpoint --- | --- diff --git a/windows/deployment/update/update-compliance-get-started.md b/windows/deployment/update/update-compliance-get-started.md index ead61e2d95..354ad86c3d 100644 --- a/windows/deployment/update/update-compliance-get-started.md +++ b/windows/deployment/update/update-compliance-get-started.md @@ -36,7 +36,7 @@ Update Compliance has the following requirements: 4. To use Windows Defender Antivirus Assessment, devices must be protected by Windows Defender AV (and not a 3rd party AV program), and must have enabled [cloud-delivered protection](/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). See the [Troublehsoot Windows Defender Antivirus reporting](/windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md) topic for help on ensuring the configuration is correct. - For endpoints running Windows 10, version 1607 or earlier, [Windows diagnostic data must also be set to **Enhanced**](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-diagnostic-data-in-your-organization#enhanced-level), to be compatible with Windows Defender Antivirus. + For endpoints running Windows 10, version 1607 or earlier, [Windows diagnostic data must also be set to **Enhanced**](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization#enhanced-level), to be compatible with Windows Defender Antivirus. See the [Windows Defender Antivirus in Windows 10](/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) content library for more information on enabling, configuring, and validating Windows Defender AV. diff --git a/windows/deployment/upgrade/upgrade-readiness-deployment-script.md b/windows/deployment/upgrade/upgrade-readiness-deployment-script.md index 3e838c9578..fb04dd5bf6 100644 --- a/windows/deployment/upgrade/upgrade-readiness-deployment-script.md +++ b/windows/deployment/upgrade/upgrade-readiness-deployment-script.md @@ -263,7 +263,7 @@ The deployment script displays the following exit codes to let you know if it wa \Windows\DataCollection** or **HKLM:\SOFTWARE\Microsoft\Windows \CurrentVersion\Policies\DataCollection** - For Windows 10 machines, the **AllowTelemetry** property should be set to 1 or greater to enable data collection. The script will throw an error if this is not true. For more information, see [Configure Windows diagnostic data in your organization](https://technet.microsoft.com/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization). + For Windows 10 machines, the **AllowTelemetry** property should be set to 1 or greater to enable data collection. The script will throw an error if this is not true. For more information, see [Configure Windows diagnostic data in your organization](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization). 40 - Function **CheckTelemetryOptIn** failed with an unexpected exception. From 79a6f58699d372eb5a515347ab5b6d7e6b4dd0d3 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Thu, 1 Feb 2018 18:02:35 +0000 Subject: [PATCH 12/13] Merged PR 5644: Added Browser/AllowConfigurationUpdateForBooksLibrary to Policy CSP --- ...ew-in-windows-mdm-enrollment-management.md | 1 + .../policy-configuration-service-provider.md | 7 +- .../mdm/policy-csp-browser.md | 119 +++++++++++++++++- 3 files changed, 124 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 2065aba9d1..54c9115a56 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1405,6 +1405,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware