diff --git a/windows/deployment/upgrade/upgrade-error-codes.md b/windows/deployment/upgrade/upgrade-error-codes.md index 2286a7ec90..8af8acdd00 100644 --- a/windows/deployment/upgrade/upgrade-error-codes.md +++ b/windows/deployment/upgrade/upgrade-error-codes.md @@ -88,67 +88,57 @@ Extend codes can be matched to the phase and operation when an error occurred. T The following tables provide the corresponding phase and operation for values of an extend code: -
+### Extend code: phase - - -
Extend code: phase
HexPhase -
0SP_EXECUTION_UNKNOWN -
1SP_EXECUTION_DOWNLEVEL -
2SP_EXECUTION_SAFE_OS -
3SP_EXECUTION_FIRST_BOOT -
4SP_EXECUTION_OOBE_BOOT -
5SP_EXECUTION_UNINSTALL -
+|Hex|Phase| +|--- |--- | +|0|SP_EXECUTION_UNKNOWN| +|1|SP_EXECUTION_DOWNLEVEL| +|2|SP_EXECUTION_SAFE_OS| +|3|SP_EXECUTION_FIRST_BOOT| +|4|SP_EXECUTION_OOBE_BOOT| +|5|SP_EXECUTION_UNINSTALL| +### Extend code: Operation - - - - - -
Extend code: operation
- -
HexOperation -
0SP_EXECUTION_OP_UNKNOWN -
1SP_EXECUTION_OP_COPY_PAYLOAD -
2SP_EXECUTION_OP_DOWNLOAD_UPDATES -
3SP_EXECUTION_OP_INSTALL_UPDATES -
4SP_EXECUTION_OP_INSTALL_RECOVERY_ENVIRONMENT -
5SP_EXECUTION_OP_INSTALL_RECOVERY_IMAGE -
6SP_EXECUTION_OP_REPLICATE_OC -
7SP_EXECUTION_OP_INSTALL_DRVIERS -
8SP_EXECUTION_OP_PREPARE_SAFE_OS -
9SP_EXECUTION_OP_PREPARE_ROLLBACK -
ASP_EXECUTION_OP_PREPARE_FIRST_BOOT -
BSP_EXECUTION_OP_PREPARE_OOBE_BOOT -
CSP_EXECUTION_OP_APPLY_IMAGE -
DSP_EXECUTION_OP_MIGRATE_DATA -
ESP_EXECUTION_OP_SET_PRODUCT_KEY -
FSP_EXECUTION_OP_ADD_UNATTEND -
-
- -
HexOperation -
10SP_EXECUTION_OP_ADD_DRIVER -
11SP_EXECUTION_OP_ENABLE_FEATURE -
12SP_EXECUTION_OP_DISABLE_FEATURE -
13SP_EXECUTION_OP_REGISTER_ASYNC_PROCESS -
14SP_EXECUTION_OP_REGISTER_SYNC_PROCESS -
15SP_EXECUTION_OP_CREATE_FILE -
16SP_EXECUTION_OP_CREATE_REGISTRY -
17SP_EXECUTION_OP_BOOT -
18SP_EXECUTION_OP_SYSPREP -
19SP_EXECUTION_OP_OOBE -
1ASP_EXECUTION_OP_BEGIN_FIRST_BOOT -
1BSP_EXECUTION_OP_END_FIRST_BOOT -
1CSP_EXECUTION_OP_BEGIN_OOBE_BOOT -
1DSP_EXECUTION_OP_END_OOBE_BOOT -
1ESP_EXECUTION_OP_PRE_OOBE -
1FSP_EXECUTION_OP_POST_OOBE -
20SP_EXECUTION_OP_ADD_PROVISIONING_PACKAGE -
-
+|Hex|Operation| +|--- |--- | +|0|SP_EXECUTION_OP_UNKNOWN| +|1|SP_EXECUTION_OP_COPY_PAYLOAD| +|2|SP_EXECUTION_OP_DOWNLOAD_UPDATES| +|3|SP_EXECUTION_OP_INSTALL_UPDATES| +|4|SP_EXECUTION_OP_INSTALL_RECOVERY_ENVIRONMENT| +|5|SP_EXECUTION_OP_INSTALL_RECOVERY_IMAGE| +|6|SP_EXECUTION_OP_REPLICATE_OC| +|7|SP_EXECUTION_OP_INSTALL_DRIVERS| +|8|SP_EXECUTION_OP_PREPARE_SAFE_OS| +|9|SP_EXECUTION_OP_PREPARE_ROLLBACK| +|A|SP_EXECUTION_OP_PREPARE_FIRST_BOOT| +|B|SP_EXECUTION_OP_PREPARE_OOBE_BOOT| +|C|SP_EXECUTION_OP_APPLY_IMAGE| +|D|SP_EXECUTION_OP_MIGRATE_DATA| +|E|SP_EXECUTION_OP_SET_PRODUCT_KEY| +|F|SP_EXECUTION_OP_ADD_UNATTEND| + +|Hex|Operation| +|--- |--- | +|10|SP_EXECUTION_OP_ADD_DRIVER| +|11|SP_EXECUTION_OP_ENABLE_FEATURE| +|12|SP_EXECUTION_OP_DISABLE_FEATURE| +|13|SP_EXECUTION_OP_REGISTER_ASYNC_PROCESS| +|14|SP_EXECUTION_OP_REGISTER_SYNC_PROCESS| +|15|SP_EXECUTION_OP_CREATE_FILE| +|16|SP_EXECUTION_OP_CREATE_REGISTRY| +|17|SP_EXECUTION_OP_BOOT| +|18|SP_EXECUTION_OP_SYSPREP| +|19|SP_EXECUTION_OP_OOBE| +|1A|SP_EXECUTION_OP_BEGIN_FIRST_BOOT| +|1B|SP_EXECUTION_OP_END_FIRST_BOOT| +|1C|SP_EXECUTION_OP_BEGIN_OOBE_BOOT| +|1D|SP_EXECUTION_OP_END_OOBE_BOOT| +|1E|SP_EXECUTION_OP_PRE_OOBE| +|1F|SP_EXECUTION_OP_POST_OOBE| +|20|SP_EXECUTION_OP_ADD_PROVISIONING_PACKAGE| For example: An extend code of **0x4000D**, represents a problem during phase 4 (**0x4**) with data migration (**000D**). diff --git a/windows/security/identity-protection/access-control/local-accounts.md b/windows/security/identity-protection/access-control/local-accounts.md index 2126be498a..b2a5460671 100644 --- a/windows/security/identity-protection/access-control/local-accounts.md +++ b/windows/security/identity-protection/access-control/local-accounts.md @@ -139,53 +139,16 @@ For details about the HelpAssistant account attributes, see the following table. **HelpAssistant account attributes** - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
AttributeValue

Well-Known SID/RID

S-1-5-<domain>-13 (Terminal Server User), S-1-5-<domain>-14 (Remote Interactive Logon)

Type

User

Default container

CN=Users, DC=<domain>, DC=

Default members

None

Default member of

Domain Guests

-

Guests

Protected by ADMINSDHOLDER?

No

Safe to move out of default container?

Can be moved out, but we do not recommend it.

Safe to delegate management of this group to non-Service admins?

No

+|Attribute|Value| +|--- |--- | +|Well-Known SID/RID|S-1-5--13 (Terminal Server User), S-1-5--14 (Remote Interactive Logon)| +|Type|User| +|Default container|CN=Users, DC=, DC=| +|Default members|None| +|Default member of|Domain Guests

Guests| +|Protected by ADMINSDHOLDER?|No| +|Safe to move out of default container?|Can be moved out, but we do not recommend it.| +|Safe to delegate management of this group to non-Service admins?|No| ### DefaultAccount @@ -290,71 +253,18 @@ For more information about UAC, see [User Account Control](/windows/access-prote The following table shows the Group Policy and registry settings that are used to enforce local account restrictions for remote access. - ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

No.

Setting

Detailed Description

Policy location

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options

1

Policy name

User Account Control: Run all administrators in Admin Approval Mode

Policy setting

Enabled

2

Policy location

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options

Policy name

User Account Control: Run all administrators in Admin Approval Mode

Policy setting

Enabled

3

Registry key

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System

Registry value name

LocalAccountTokenFilterPolicy

Registry value type

DWORD

Registry value data

0

- +|No.|Setting|Detailed Description| +|--- |--- |--- | +||Policy location|Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options| +|1|Policy name|[User Account Control: Run all administrators in Admin Approval Mode](/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode)| +||Policy setting|Enabled| +|2|Policy location|Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options| +||Policy name|[User Account Control: Run all administrators in Admin Approval Mode](/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode)| +||Policy setting|Enabled| +|3|Registry key|HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System| +||Registry value name|LocalAccountTokenFilterPolicy| +||Registry value type|DWORD| +||Registry value data|0| >[!NOTE] >You can also enforce the default for LocalAccountTokenFilterPolicy by using the custom ADMX in Security Templates. @@ -437,54 +347,14 @@ In order to perform this procedure, you must first identify the name of the loca The following table shows the Group Policy settings that are used to deny network logon for all local Administrator accounts. - ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

No.

Setting

Detailed Description

Policy location

Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment

1

Policy name

Deny access to this computer from the network

Policy setting

Local account and member of Administrators group

-

2

Policy location

Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment

Policy name

Deny log on through Remote Desktop Services

Policy setting

Local account and member of Administrators group

-
- - +|No.|Setting|Detailed Description| +|--- |--- |--- | +||Policy location|Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment| +|1|Policy name|[Deny access to this computer from the network](/windows/device-security/security-policy-settings/deny-access-to-this-computer-from-the-network)| +||Policy setting|Local account and member of Administrators group| +|2|Policy location|Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment| +||Policy name|[Deny log on through Remote Desktop Services](/windows/device-security/security-policy-settings/deny-log-on-through-remote-desktop-services)| +||Policy setting|Local account and member of Administrators group| **To deny network logon to all local administrator accounts** diff --git a/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md b/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md index de574128e5..a585e796ba 100644 --- a/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md +++ b/windows/security/identity-protection/hello-for-business/hello-manage-in-organization.md @@ -41,151 +41,32 @@ The following table lists the Group Policy settings that you can configure for W > [!NOTE] > Starting with Windows 10, version 1709, the location of the PIN complexity section of the Group Policy is: **Computer Configuration** > **Administrative Templates** > **System** > **PIN Complexity**. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PolicyScopeOptions
Use Windows Hello for BusinessComputer or user -

Not configured: Device does not provision Windows Hello for Business for any user.

-

Enabled: Device provisions Windows Hello for Business using keys or certificates for all users.

-

Disabled: Device does not provision Windows Hello for Business for any user.

-
Use a hardware security deviceComputer -

Not configured: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.

-

Enabled: Windows Hello for Business will only be provisioned using TPM. This feature will provision Windows Hello for Business using TPM 1.2 unless the option to exclude them is explicitly set.

-

Disabled: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.

-
Use certificate for on-premises authenticationComputer or user -

Not configured: Windows Hello for Business enrolls a key that is used for on-premises authentication.

-

Enabled: Windows Hello for Business enrolls a sign-in certificate using ADFS that is used for on-premises authentication.

-

Disabled: Windows Hello for Business enrolls a key that is used for on-premises authentication.

-
Use PIN recoveryComputer -

Added in Windows 10, version 1703

-

Not configured: Windows Hello for Business does not create or store a PIN recovery secret. PIN reset does not use the Azure-based PIN recovery service.

-

Enabled: Windows Hello for Business uses the Azure-based PIN recovery service for PIN reset.

-

Disabled: Windows Hello for Business does not create or store a PIN recovery secret. PIN reset does not use the Azure-based PIN recovery service.

-

+|Policy|Scope|Options| +|--- |--- |--- | +|Use Windows Hello for Business|Computer or user|

Not configured: Device does not provision Windows Hello for Business for any user.

Enabled: Device provisions Windows Hello for Business using keys or certificates for all users.

Disabled: Device does not provision Windows Hello for Business for any user.| +|Use a hardware security device|Computer|

Not configured: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.

Enabled: Windows Hello for Business will only be provisioned using TPM. This feature will provision Windows Hello for Business using TPM 1.2 unless the option to exclude them is explicitly set.

Disabled: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.| +|Use certificate for on-premises authentication|Computer or user|

Not configured: Windows Hello for Business enrolls a key that is used for on-premises authentication.

Enabled: Windows Hello for Business enrolls a sign-in certificate using ADFS that is used for on-premises authentication.

Disabled: Windows Hello for Business enrolls a key that is used for on-premises authentication.| +|Use PIN recovery|Computer|

Added in Windows 10, version 1703

Not configured: Windows Hello for Business does not create or store a PIN recovery secret. PIN reset does not use the Azure-based PIN recovery service

Enabled: Windows Hello for Business uses the Azure-based PIN recovery service for PIN reset

Disabled: Windows Hello for Business does not create or store a PIN recovery secret. PIN reset does not use the Azure-based PIN recovery service.

For more information about using the PIN recovery service for PIN reset see [Windows Hello for Business PIN Reset](hello-feature-pin-reset.md).| +|Use biometrics|Computer|

Not configured: Biometrics can be used as a gesture in place of a PIN

Enabled: Biometrics can be used as a gesture in place of a PIN.

Disabled: Only a PIN can be used as a gesture.| -For more information about using the PIN recovery service for PIN reset see [Windows Hello for Business PIN Reset](hello-feature-pin-reset.md). -

-
Use biometricsComputer -

Not configured: Biometrics can be used as a gesture in place of a PIN.

-

Enabled: Biometrics can be used as a gesture in place of a PIN.

-

Disabled: Only a PIN can be used as a gesture.

-
PIN ComplexityRequire digitsComputer -

Not configured: Users must include a digit in their PIN.

-

Enabled: Users must include a digit in their PIN.

-

Disabled: Users cannot use digits in their PIN.

-
Require lowercase lettersComputer -

Not configured: Users cannot use lowercase letters in their PIN.

-

Enabled: Users must include at least one lowercase letter in their PIN.

-

Disabled: Users cannot use lowercase letters in their PIN.

-
Maximum PIN lengthComputer -

Not configured: PIN length must be less than or equal to 127.

-

Enabled: PIN length must be less than or equal to the number you specify.

-

Disabled: PIN length must be less than or equal to 127.

-
Minimum PIN lengthComputer -

Not configured: PIN length must be greater than or equal to 4.

-

Enabled: PIN length must be greater than or equal to the number you specify.

-

Disabled: PIN length must be greater than or equal to 4.

-
ExpirationComputer -

Not configured: PIN does not expire.

-

Enabled: PIN can be set to expire after any number of days between 1 and 730, or PIN can be set to never expire by setting policy to 0.

-

Disabled: PIN does not expire.

-
HistoryComputer -

Not configured: Previous PINs are not stored.

-

Enabled: Specify the number of previous PINs that can be associated to a user account that can't be reused.

-

Disabled: Previous PINs are not stored.

-
Note  Current PIN is included in PIN history.
-
 
-
Require special charactersComputer -

Not configured: Users cannot include a special character in their PIN.

-

Enabled: Users must include at least one special character in their PIN.

-

Disabled: Users cannot include a special character in their PIN.

-
Require uppercase lettersComputer -

Not configured: Users cannot include an uppercase letter in their PIN.

-

Enabled: Users must include at least one uppercase letter in their PIN.

-

Disabled: Users cannot include an uppercase letter in their PIN.

-
Phone Sign-inUse Phone Sign-inComputer -

Not currently supported.

-
+### PIN Complexity + +|Policy|Scope|Options| +|--- |--- |--- | +|Require digits|Computer|

Not configured: Users must include a digit in their PIN.

Enabled: Users must include a digit in their PIN.

Disabled: Users cannot use digits in their PIN.| +|Require lowercase letters|Computer|

Not configured: Users cannot use lowercase letters in their PIN

Enabled: Users must include at least one lowercase letter in their PIN.

Disabled: Users cannot use lowercase letters in their PIN.| +|Maximum PIN length|Computer|

Not configured: PIN length must be less than or equal to 127.

Enabled: PIN length must be less than or equal to the number you specify.

Disabled: PIN length must be less than or equal to 127.| +|Minimum PIN length|Computer|

Not configured: PIN length must be greater than or equal to 4.

Enabled: PIN length must be greater than or equal to the number you specify.

Disabled: PIN length must be greater than or equal to 4.| +|Expiration|Computer|

Not configured: PIN does not expire.

Enabled: PIN can be set to expire after any number of days between 1 and 730, or PIN can be set to never expire by setting policy to 0.

Disabled: PIN does not expire.| +|History|Computer|

Not configured: Previous PINs are not stored.

Enabled: Specify the number of previous PINs that can be associated to a user account that can't be reused.

Disabled: Previous PINs are not stored.

Note  Current PIN is included in PIN history.
| +|Require special characters|Computer|

Not configured: Users cannot include a special character in their PIN

Enabled: Users must include at least one special character in their PIN.

Disabled: Users cannot include a special character in their PIN.| +|Require uppercase letters|Computer|

Not configured: Users cannot include an uppercase letter in their PIN.

Enabled: Users must include at least one uppercase letter in their PIN.

Disabled: Users cannot include an uppercase letter in their PIN.| + +### Phone Sign-in + +|Policy|Scope|Options| +|--- |--- |--- | +|Use Phone Sign-in|Computer|Not currently supported.| ## MDM policy settings for Windows Hello for Business @@ -194,175 +75,38 @@ The following table lists the MDM policy settings that you can configure for Win >[!IMPORTANT] >Starting in Windows 10, version 1607, all devices only have one PIN associated with Windows Hello for Business. This means that any PIN on a device will be subject to the policies specified in the PassportForWork CSP. The values specified take precedence over any complexity rules set via Exchange ActiveSync (EAS) or the DeviceLock CSP. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PolicyScopeDefaultOptions
UsePassportForWorkDevice or userTrue -

True: Windows Hello for Business will be provisioned for all users on the device.

-

False: Users will not be able to provision Windows Hello for Business.

-
Note  If Windows Hello for Business is enabled, and then the policy is changed to False, users who previously set up Windows Hello for Business can continue to use it, but will not be able to set up Windows Hello for Business on other devices.
-
 
-
RequireSecurityDeviceDevice or userFalse -

True: Windows Hello for Business will only be provisioned using TPM.

-

False: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.

-
ExcludeSecurityDeviceTPM12DeviceFalse -

Added in Windows 10, version 1703

-

True: TPM revision 1.2 modules will be disallowed from being used with Windows Hello for Business.

-

False: TPM revision 1.2 modules will be allowed to be used with Windows Hello for Business.

-
EnablePinRecoveryDevice or userFalse -

Added in Windows 10, version 1703

-

True: Windows Hello for Business uses the Azure-based PIN recovery service for PIN reset.

-

False: Windows Hello for Business does not create or store a PIN recovery secret. PIN reset does not use the Azure-based PIN recovery service.

-

+|Policy|Scope|Default|Options| +|--- |--- |--- |--- | +|UsePassportForWork|Device or user|True|

True: Windows Hello for Business will be provisioned for all users on the device.

False: Users will not be able to provision Windows Hello for Business.

**Note:** If Windows Hello for Business is enabled, and then the policy is changed to False, users who previously set up Windows Hello for Business can continue to use it, but will not be able to set up Windows Hello for Business on other devices
| +|RequireSecurityDevice|Device or user|False|

True: Windows Hello for Business will only be provisioned using TPM.

False: Windows Hello for Business will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.| +|ExcludeSecurityDevice

TPM12|Device|False|Added in Windows 10, version 1703

True: TPM revision 1.2 modules will be disallowed from being used with Windows Hello for Business.

False: TPM revision 1.2 modules will be allowed to be used with Windows Hello for Business.| +|EnablePinRecovery|Device or use|False|

Added in Windows 10, version 1703

True: Windows Hello for Business uses the Azure-based PIN recovery service for PIN reset.

False: Windows Hello for Business does not create or store a PIN recovery secret. PIN reset does not use the Azure-based PIN recovery service.For more information about using the PIN recovery service for PIN reset see [Windows Hello for Business PIN Reset](hello-feature-pin-reset.md).| -For more information about using the PIN recovery service for PIN reset see [Windows Hello for Business PIN Reset](hello-feature-pin-reset.md). -

-
Biometrics -

UseBiometrics

-
Device False -

True: Biometrics can be used as a gesture in place of a PIN for domain sign-in.

-

False: Only a PIN can be used as a gesture for domain sign-in.

-
-

FacialFeaturesUser

-

EnhancedAntiSpoofing

-
DeviceNot configured -

Not configured: users can choose whether to turn on enhanced anti-spoofing.

-

True: Enhanced anti-spoofing is required on devices which support it.

-

False: Users cannot turn on enhanced anti-spoofing.

-
PINComplexity
Digits Device or user1 -

0: Digits are allowed.

-

1: At least one digit is required.

-

2: Digits are not allowed.

-
Lowercase letters Device or user2 -

0: Lowercase letters are allowed.

-

1: At least one lowercase letter is required.

-

2: Lowercase letters are not allowed.

-
Special charactersDevice or user2 -

0: Special characters are allowed.

-

1: At least one special character is required.

-

2: Special characters are not allowed.

-
Uppercase lettersDevice or user2 -

0: Uppercase letters are allowed.

-

1: At least one uppercase letter is required.

-

2: Uppercase letters are not allowed.

-
Maximum PIN length Device or user127 -

Maximum length that can be set is 127. Maximum length cannot be less than minimum setting.

-
Minimum PIN lengthDevice or user4 -

Minimum length that can be set is 4. Minimum length cannot be greater than maximum setting.

-
Expiration Device or user0 -

Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user's PIN will never expire. -

-
HistoryDevice or user0 -

Integer value that specifies the number of past PINs that can be associated to a user account that can't be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required. -

-
Remote -

UseRemotePassport

-
Device or userFalse -

Not currently supported.

-
+### Biometrics + +|Policy|Scope|Default|Options| +|--- |--- |--- |--- | +|UseBiometrics|Device |False|

True: Biometrics can be used as a gesture in place of a PIN for domain sign-in.

False: Only a PIN can be used as a gesture for domain sign-in.| +|

FacialFeaturesUser

EnhancedAntiSpoofing|Device|Not configured|

Not configured: users can choose whether to turn on enhanced anti-spoofing.

True: Enhanced anti-spoofing is required on devices which support it.

False: Users cannot turn on enhanced anti-spoofing.| + +### PINComplexity + +|Policy|Scope|Default|Options| +|--- |--- |--- |--- | +|Digits |Device or user|1 |

0: Digits are allowed.

1: At least one digit is required.

2: Digits are not allowed.| +|Lowercase letters |Device or user|2|

0: Lowercase letters are allowed.

1: At least one lowercase letter is required.

2: Lowercase letters are not allowed.| +|Special characters|Device or user|2|

0: Special characters are allowed.

1: At least one special character is required.

2: Special characters are not allowed.| +|Uppercase letters|Device or user|2|

0: Uppercase letters are allowed.

1: At least one uppercase letter is required.

2: Uppercase letters are not allowed.| +|Maximum PIN length |Device or user|127 |

Maximum length that can be set is 127. Maximum length cannot be less than minimum setting.| +|Minimum PIN length|Device or user|4|

Minimum length that can be set is 4. Minimum length cannot be greater than maximum setting.| +|Expiration |Device or user|0|

Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user's PIN will never expire.| +|History|Device or user|0|

Integer value that specifies the number of past PINs that can be associated to a user account that can't be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required.| + +### Remote + +|Policy|Scope|Default|Options| +|--- |--- |--- |--- | +|UseRemotePassport|Device or user|False|Not currently supported.| >[!NOTE] > In Windows 10, version 1709 and later, if policy is not configured to explicitly require letters or special characters, users can optionally set an alphanumeric PIN. Prior to version 1709 the user is required to set a numeric PIN. diff --git a/windows/security/identity-protection/user-account-control/how-user-account-control-works.md b/windows/security/identity-protection/user-account-control/how-user-account-control-works.md index e9f7b85291..edf3452542 100644 --- a/windows/security/identity-protection/user-account-control/how-user-account-control-works.md +++ b/windows/security/identity-protection/user-account-control/how-user-account-control-works.md @@ -106,169 +106,35 @@ The following diagram details the UAC architecture. To better understand each component, review the table below: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ComponentDescription
User
-

User performs operation requiring privilege

-
-

If the operation changes the file system or registry, Virtualization is called. All other operations call ShellExecute.

-
-

ShellExecute

-
-

ShellExecute calls CreateProcess. ShellExecute looks for the ERROR_ELEVATION_REQUIRED error from CreateProcess. If it receives the error, ShellExecute calls the Application Information service to attempt to perform the requested task with the elevated prompt.

-
-

CreateProcess

-
-

If the application requires elevation, CreateProcess rejects the call with ERROR_ELEVATION_REQUIRED.

-
System
-

Application Information service

-
-

A system service that helps start apps that require one or more elevated privileges or user rights to run, such as local administrative tasks, and apps that require higher integrity levels. The Application Information service helps start such apps by creating a new process for the application with an administrative user's full access token when elevation is required and (depending on Group Policy) consent is given by the user to do so.

-
-

Elevating an ActiveX install

-
-

If ActiveX is not installed, the system checks the UAC slider level. If ActiveX is installed, the User Account Control: Switch to the secure desktop when prompting for elevation Group Policy setting is checked.

-
-

Check UAC slider level

-
-

UAC has a slider to select from four levels of notification.

-
    -
  • Always notify will:

    -
      -
    • Notify you when programs try to install software or make changes to your computer.
    • -
    • Notify you when you make changes to Windows settings.
    • -
    • Freeze other tasks until you respond.
    • -
    -

    Recommended if you often install new software or visit unfamiliar websites.


    -
  • -
  • Notify me only when programs try to make changes to my computer will:

    -
      -
    • Notify you when programs try to install software or make changes to your computer.
    • -
    • Not notify you when you make changes to Windows settings.
    • -
    • Freeze other tasks until you respond.
    • -
    -

    Recommended if you do not often install apps or visit unfamiliar websites.


    -
  • -
  • Notify me only when programs try to make changes to my computer (do not dim my desktop) will:

    -
      -
    • Notify you when programs try to install software or make changes to your computer.
    • -
    • Not notify you when you make changes to Windows settings.
    • -
    • Not freeze other tasks until you respond.
    • -
    -

    Not recommended. Choose this only if it takes a long time to dim the desktop on your computer.


    -
  • -
  • Never notify (Disable UAC prompts) will:

    -
      -
    • Not notify you when programs try to install software or make changes to your computer.
    • -
    • Not notify you when you make changes to Windows settings.
    • -
    • Not freeze other tasks until you respond.
    • -
    -

    Not recommended due to security concerns.

    -
-
-

Secure desktop enabled

-
-

The User Account Control: Switch to the secure desktop when prompting for elevation policy setting is checked:

-
    -
  • -

    If the secure desktop is enabled, all elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.

    -
  • -
  • -

    If the secure desktop is not enabled, all elevation requests go to the interactive user's desktop, and the per-user settings for administrators and standard users are used.

    -
  • -
-
-

CreateProcess

-
-

CreateProcess calls AppCompat, Fusion, and Installer detection to assess if the app requires elevation. The file is then inspected to determine its requested execution level, which is stored in the application manifest for the file. CreateProcess fails if the requested execution level specified in the manifest does not match the access token and returns an error (ERROR_ELEVATION_REQUIRED) to ShellExecute.

-
-

AppCompat

-
-

The AppCompat database stores information in the application compatibility fix entries for an application.

-
-

Fusion

-
-

The Fusion database stores information from application manifests that describe the applications. The manifest schema is updated to add a new requested execution level field.

-
-

Installer detection

-
-

Installer detection detects setup files, which helps prevent installations from being run without the user's knowledge and consent.

-
Kernel
-

Virtualization

-
-

Virtualization technology ensures that non-compliant apps do not silently fail to run or fail in a way that the cause cannot be determined. UAC also provides file and registry virtualization and logging for applications that write to protected areas.

-
-

File system and registry

-
-

The per-user file and registry virtualization redirects per-computer registry and file write requests to equivalent per-user locations. Read requests are redirected to the virtualized per-user location first and to the per-computer location second.

-
+### User + +|Component|Description| +|--- |--- | +|

User performs operation requiring privilege|

If the operation changes the file system or registry, Virtualization is called. All other operations call ShellExecute.| +|

ShellExecute|

ShellExecute calls CreateProcess. ShellExecute looks for the ERROR_ELEVATION_REQUIRED error from CreateProcess. If it receives the error, ShellExecute calls the Application Information service to attempt to perform the requested task with the elevated prompt.| +|

CreateProcess|

If the application requires elevation, CreateProcess rejects the call with ERROR_ELEVATION_REQUIRED.| + +### System + +|Component|Description| +|--- |--- | +|

Application Information service|

A system service that helps start apps that require one or more elevated privileges or user rights to run, such as local administrative tasks, and apps that require higher integrity levels. The Application Information service helps start such apps by creating a new process for the application with an administrative user's full access token when elevation is required and (depending on Group Policy) consent is given by the user to do so.| +|

Elevating an ActiveX install|

If ActiveX is not installed, the system checks the UAC slider level. If ActiveX is installed, the **User Account Control: Switch to the secure desktop when prompting for elevation** Group Policy setting is checked.| +|

Check UAC slider level|

UAC has a slider to select from four levels of notification.

  • **Always notify** will:

    • Notify you when programs try to install software or make changes to your computer.
    • Notify you when you make changes to Windows settings.
    • Freeze other tasks until you respond.

    Recommended if you often install new software or visit unfamiliar websites.

  • **Notify me only when programs try to make changes to my computer** will:

    • Notify you when programs try to install software or make changes to your computer.
    • Not notify you when you make changes to Windows settings.
    • Freeze other tasks until you respond.

    Recommended if you do not often install apps or visit unfamiliar websites.

  • **Notify me only when programs try to make changes to my computer (do not dim my desktop)** will:

    • Notify you when programs try to install software or make changes to your computer.
    • Not notify you when you make changes to Windows settings.
    • Not freeze other tasks until you respond.

    Not recommended. Choose this only if it takes a long time to dim the desktop on your computer.

  • **Never notify (Disable UAC prompts)** will:

    • Not notify you when programs try to install software or make changes to your computer.
    • Not notify you when you make changes to Windows settings.
    • Not freeze other tasks until you respond.

    Not recommended due to security concerns.| +|

    Secure desktop enabled|

    The **User Account Control: Switch to the secure desktop when prompting for elevation** policy setting is checked:

    • If the secure desktop is enabled, all elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.

    • If the secure desktop is not enabled, all elevation requests go to the interactive user's desktop, and the per-user settings for administrators and standard users are used.| +|

      CreateProcess|

      CreateProcess calls AppCompat, Fusion, and Installer detection to assess if the app requires elevation. The file is then inspected to determine its requested execution level, which is stored in the application manifest for the file. CreateProcess fails if the requested execution level specified in the manifest does not match the access token and returns an error (ERROR_ELEVATION_REQUIRED) to ShellExecute.| +|

      AppCompat|

      The AppCompat database stores information in the application compatibility fix entries for an application.| +|

      Fusion|

      The Fusion database stores information from application manifests that describe the applications. The manifest schema is updated to add a new requested execution level field.| +|

      Installer detection|

      Installer detection detects setup files, which helps prevent installations from being run without the user's knowledge and consent.| + +### Kernel + +|Component|Description| +|--- |--- | +|

      Virtualization|

      Virtualization technology ensures that non-compliant apps do not silently fail to run or fail in a way that the cause cannot be determined. UAC also provides file and registry virtualization and logging for applications that write to protected areas.| +|

      File system and registry|

      The per-user file and registry virtualization redirects per-computer registry and file write requests to equivalent per-user locations. Read requests are redirected to the virtualized per-user location first and to the per-computer location second.| -The slider will never turn UAC completely off. If you set it to Never notify, it will: +The slider will never turn UAC completely off. If you set it to **Never notify**, it will: - Keep the UAC service running. - Cause all elevation request initiated by administrators to be auto-approved without showing a UAC prompt. diff --git a/windows/security/identity-protection/vpn/vpn-authentication.md b/windows/security/identity-protection/vpn/vpn-authentication.md index 77824138a9..b646e90f3e 100644 --- a/windows/security/identity-protection/vpn/vpn-authentication.md +++ b/windows/security/identity-protection/vpn/vpn-authentication.md @@ -23,15 +23,12 @@ In addition to older and less-secure password-based authentication methods (whic Windows supports a number of EAP authentication methods. - - - - - - - -
      MethodDetails
      EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (EAP-MSCHAPv2)
      • User name and password authentication
      • Winlogon credentials - can specify authentication with computer sign-in credentials
      EAP-Transport Layer Security (EAP-TLS)
      • Supports the following types of certificate authentication
        • Certificate with keys in the software Key Storage Provider (KSP)
        • Certificate with keys in Trusted Platform Module (TPM) KSP
        • Smart card certificates
        • Windows Hello for Business certificate
      • Certificate filtering
        • Certificate filtering can be enabled to search for a particular certificate to use to authenticate with
        • Filtering can be Issuer-based or Enhanced Key Usage (EKU)-based
      • Server validation - with TLS, server validation can be toggled on or off
        • Server name - specify the server to validate
        • Server certificate - trusted root certificate to validate the server
        • Notification - specify if the user should get a notification asking whether to trust the server or not
      Protected Extensible Authentication Protocol (PEAP)
      • Server validation - with PEAP, server validation can be toggled on or off
        • Server name - specify the server to validate
        • Server certificate - trusted root certificate to validate the server
        • Notification - specify if the user should get a notification asking whether to trust the server or not
      • Inner method - the outer method creates a secure tunnel inside while the inner method is used to complete the authentication
        • EAP-MSCHAPv2
        • EAP-TLS
      • Fast Reconnect: reduces the delay between an authentication request by a client and the response by the Network Policy Server (NPS) or other Remote Authentication Dial-in User Service (RADIUS) server. This reduces resource requirements for both client and server, and minimizes the number of times that users are prompted for credentials.
      • Cryptobinding: By deriving and exchanging values from the PEAP phase 1 key material (Tunnel Key) and from the PEAP phase 2 inner EAP method key material (Inner Session Key), it is possible to prove that the two authentications terminate at the same two entities (PEAP peer and PEAP server). This process, termed "cryptobinding", is used to protect the PEAP negotiation against "Man in the Middle" attacks.
      Tunneled Transport Layer Security (TTLS)
      • Inner method
        • Non-EAP
          • Password Authentication Protocol (PAP)
          • CHAP
          • MSCHAP
          • MSCHAPv2
        • EAP
          • MSCHAPv2
          • TLS
      • Server validation: in TTLS, the server must be validated. The following can be configured:
        • Server name
        • Trusted root certificate for server certificate
        • Whether there should be a server validation notification
      -
      +|Method|Details| +|--- |--- | +|EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (EAP-MSCHAPv2)|

    • User name and password authentication
    • Winlogon credentials- can specify authentication with computer sign-in credentials| +|EAP-Transport Layer Security (EAP-TLS)|

      Supports the following types of certificate authentication

    • Certificate with keys in the software Key Storage Provider (KSP)
    • Certificate with keys in Trusted Platform Module (TPM) KSP
    • Smart card certificates
    • Windows Hello for Business certificate

      Certificate filtering

    • Certificate filtering can be enabled to search for a particular certificate to use to authenticate with
    • Filtering can be Issuer-based or Enhanced Key Usage (EKU)-based

      Server validation- with TLS, server validation can be toggled on or off

    • Server name-specify the server to validate
    • Server certificate- trusted root certificate to validate the server
    • Notification-specify if the user should get a notification asking whether to trust the server or not| +|[Protected Extensible Authentication Protocol (PEAP)](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754179(v=ws.11))|

      Server validation with PEAP,- server validation can be toggled on or off

    • Server name- specify the server to validate
    • Server certificate- trusted root certificate to validate the server
    • Notification- specify if the user should get a notification asking whether to trust the server or not

      Inner method- the outer method creates a secure tunnel inside while the inner method is used to complete the authentication

    • EAP-MSCHAPv2
    • EAP-TLS

      Fast Reconnect: reduces the delay between an authentication request by a client and the response by the Network Policy Server (NPS) or other Remote Authentication Dial-in User Service (RADIUS) server. This reduces resource requirements for both client and server, and minimizes the number of times that users are prompted for credentials.

      [Cryptobinding](/openspecs/windows_protocols/ms-peap/757a16c7-0826-4ba9-bb71-8c3f1339e937): By deriving and exchanging values from the PEAP phase 1 key material (**Tunnel Key**) and from the PEAP phase 2 inner EAP method key material (**Inner Session Key**), it is possible to prove that the two authentications terminate at the same two entities (PEAP peer and PEAP server). This process, termed "cryptobinding", is used to protect the PEAP negotiation against "Man in the Middle" attacks.| +|Tunneled Transport Layer Security (TTLS)|**Inner method**

      Non-EAP

    • Password Authentication Protocol (PAP)
    • CHAP
    • MSCHAP
    • MSCHAPv2

      EAP

    • MSCHAPv2
    • TLS

      Server validation: in TTLS, the server must be validated. The following can be configured:

    • Server name
    • Trusted root certificate for server certificate
    • Whether there should be a server validation notification| For a UWP VPN plug-in, the app vendor controls the authentication method to be used. The following credential types can be used: diff --git a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md index d43cdb899b..887293791c 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md +++ b/windows/security/information-protection/bitlocker/bitlocker-basic-deployment.md @@ -184,132 +184,20 @@ manage-bde -on C: Windows PowerShell cmdlets provide an alternative way to work with BitLocker. Using Windows PowerShell's scripting capabilities, administrators can integrate BitLocker options into existing scripts with ease. The list below displays the available BitLocker cmdlets. - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

      Name

      Parameters

      Add-BitLockerKeyProtector

      -ADAccountOrGroup

      -

      -ADAccountOrGroupProtector

      -

      -Confirm

      -

      -MountPoint

      -

      -Password

      -

      -PasswordProtector

      -

      -Pin

      -

      -RecoveryKeyPath

      -

      -RecoveryKeyProtector

      -

      -RecoveryPassword

      -

      -RecoveryPasswordProtector

      -

      -Service

      -

      -StartupKeyPath

      -

      -StartupKeyProtector

      -

      -TpmAndPinAndStartupKeyProtector

      -

      -TpmAndPinProtector

      -

      -TpmAndStartupKeyProtector

      -

      -TpmProtector

      -

      -WhatIf

      Backup-BitLockerKeyProtector

      -Confirm

      -

      -KeyProtectorId

      -

      -MountPoint

      -

      -WhatIf

      Disable-BitLocker

      -Confirm

      -

      -MountPoint

      -

      -WhatIf

      Disable-BitLockerAutoUnlock

      -Confirm

      -

      -MountPoint

      -

      -WhatIf

      Enable-BitLocker

      -AdAccountOrGroup

      -

      -AdAccountOrGroupProtector

      -

      -Confirm

      -

      -EncryptionMethod

      -

      -HardwareEncryption

      -

      -Password

      -

      -PasswordProtector

      -

      -Pin

      -

      -RecoveryKeyPath

      -

      -RecoveryKeyProtector

      -

      -RecoveryPassword

      -

      -RecoveryPasswordProtector

      -

      -Service

      -

      -SkipHardwareTest

      -

      -StartupKeyPath

      -

      -StartupKeyProtector

      -

      -TpmAndPinAndStartupKeyProtector

      -

      -TpmAndPinProtector

      -

      -TpmAndStartupKeyProtector

      -

      -TpmProtector

      -

      -UsedSpaceOnly

      -

      -WhatIf

      Enable-BitLockerAutoUnlock

      -Confirm

      -

      -MountPoint

      -

      -WhatIf

      Get-BitLockerVolume

      -MountPoint

      Lock-BitLocker

      -Confirm

      -

      -ForceDismount

      -

      -MountPoint

      -

      -WhatIf

      Remove-BitLockerKeyProtector

      -Confirm

      -

      -KeyProtectorId

      -

      -MountPoint

      -

      -WhatIf

      Resume-BitLocker

      -Confirm

      -

      -MountPoint

      -

      -WhatIf

      Suspend-BitLocker

      -Confirm

      -

      -MountPoint

      -

      -RebootCount

      -

      -WhatIf

      Unlock-BitLocker

      -AdAccountOrGroup

      -

      -Confirm

      -

      -MountPoint

      -

      -Password

      -

      -RecoveryKeyPath

      -

      -RecoveryPassword

      -

      -RecoveryPassword

      -

      -WhatIf

      +|Name|Parameters| +|--- |--- | +|**Add-BitLockerKeyProtector**|
    • ADAccountOrGroup
    • ADAccountOrGroupProtector
    • Confirm
    • MountPoint
    • Password
    • PasswordProtector
    • Pin
    • RecoveryKeyPath
    • RecoveryKeyProtector
    • RecoveryPassword
    • RecoveryPasswordProtector
    • Service
    • StartupKeyPath
    • StartupKeyProtector
    • TpmAndPinAndStartupKeyProtector
    • TpmAndPinProtector
    • TpmAndStartupKeyProtector
    • TpmProtector
    • WhatIf| +|**Backup-BitLockerKeyProtector**|
    • Confirm
    • KeyProtectorId
    • MountPoint
    • WhatIf| +|**Disable-BitLocker**|
    • Confirm
    • MountPoint
    • WhatIf| +|**Disable-BitLockerAutoUnlock**|
    • Confirm
    • MountPoint
    • WhatIf| +|**Enable-BitLocker**|
    • AdAccountOrGroup
    • AdAccountOrGroupProtector
    • Confirm
    • EncryptionMethod
    • HardwareEncryption
    • Password
    • PasswordProtector
    • Pin
    • RecoveryKeyPath
    • RecoveryKeyProtector
    • RecoveryPassword
    • RecoveryPasswordProtector
    • Service
    • SkipHardwareTest
    • StartupKeyPath
    • StartupKeyProtector
    • TpmAndPinAndStartupKeyProtector
    • TpmAndPinProtector
    • TpmAndStartupKeyProtector
    • TpmProtector
    • UsedSpaceOnly
    • WhatIf| +|**Enable-BitLockerAutoUnlock**|
    • Confirm
    • MountPoint
    • WhatIf| +|**Get-BitLockerVolume**|
    • MountPoint| +|**Lock-BitLocker**|
    • Confirm
    • ForceDismount
    • MountPoint
    • WhatIf| +|**Remove-BitLockerKeyProtector**|
    • Confirm
    • KeyProtectorId
    • MountPoint
    • WhatIf| +|**Resume-BitLocker**|
    • Confirm
    • MountPoint
    • WhatIf| +|**Suspend-BitLocker**|
    • Confirm
    • MountPoint
    • RebootCount
    • WhatIf| +|**Unlock-BitLocker**|
    • AdAccountOrGroup
    • Confirm
    • MountPoint
    • Password
    • RecoveryKeyPath
    • RecoveryPassword
    • RecoveryPassword
    • WhatIf| Similar to manage-bde, the Windows PowerShell cmdlets allow configuration beyond the options offered in the control panel. As with manage-bde, users need to consider the specific needs of the volume they are encrypting prior to running Windows PowerShell cmdlets. diff --git a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md index c70a1373ec..300f1f911d 100644 --- a/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md +++ b/windows/security/information-protection/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md @@ -128,134 +128,20 @@ For more information about using repair-bde, see [Repair-bde](/previous-versions Windows PowerShell cmdlets provide a new way for administrators to use when working with BitLocker. Using Windows PowerShell's scripting capabilities, administrators can integrate BitLocker options into existing scripts with ease. The list below displays the available BitLocker cmdlets. - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

      Name

      Parameters

      Add-BitLockerKeyProtector

      -ADAccountOrGroup

      -

      -ADAccountOrGroupProtector

      -

      -Confirm

      -

      -MountPoint

      -

      -Password

      -

      -PasswordProtector

      -

      -Pin

      -

      -RecoveryKeyPath

      -

      -RecoveryKeyProtector

      -

      -RecoveryPassword

      -

      -RecoveryPasswordProtector

      -

      -Service

      -

      -StartupKeyPath

      -

      -StartupKeyProtector

      -

      -TpmAndPinAndStartupKeyProtector

      -

      -TpmAndPinProtector

      -

      -TpmAndStartupKeyProtector

      -

      -TpmProtector

      -

      -WhatIf

      Backup-BitLockerKeyProtector

      -Confirm

      -

      -KeyProtectorId

      -

      -MountPoint

      -

      -WhatIf

      Disable-BitLocker

      -Confirm

      -

      -MountPoint

      -

      -WhatIf

      Disable-BitLockerAutoUnlock

      -Confirm

      -

      -MountPoint

      -

      -WhatIf

      Enable-BitLocker

      -AdAccountOrGroup

      -

      -AdAccountOrGroupProtector

      -

      -Confirm

      -

      -EncryptionMethod

      -

      -HardwareEncryption

      -

      -Password

      -

      -PasswordProtector

      -

      -Pin

      -

      -RecoveryKeyPath

      -

      -RecoveryKeyProtector

      -

      -RecoveryPassword

      -

      -RecoveryPasswordProtector

      -

      -Service

      -

      -SkipHardwareTest

      -

      -StartupKeyPath

      -

      -StartupKeyProtector

      -

      -TpmAndPinAndStartupKeyProtector

      -

      -TpmAndPinProtector

      -

      -TpmAndStartupKeyProtector

      -

      -TpmProtector

      -

      -UsedSpaceOnly

      -

      -WhatIf

      Enable-BitLockerAutoUnlock

      -Confirm

      -

      -MountPoint

      -

      -WhatIf

      Get-BitLockerVolume

      -MountPoint

      Lock-BitLocker

      -Confirm

      -

      -ForceDismount

      -

      -MountPoint

      -

      -WhatIf

      Remove-BitLockerKeyProtector

      -Confirm

      -

      -KeyProtectorId

      -

      -MountPoint

      -

      -WhatIf

      Resume-BitLocker

      -Confirm

      -

      -MountPoint

      -

      -WhatIf

      Suspend-BitLocker

      -Confirm

      -

      -MountPoint

      -

      -RebootCount

      -

      -WhatIf

      Unlock-BitLocker

      -AdAccountOrGroup

      -

      -Confirm

      -

      -MountPoint

      -

      -Password

      -

      -RecoveryKeyPath

      -

      -RecoveryPassword

      -

      -RecoveryPassword

      -

      -WhatIf

      +|Name|Parameters| +|--- |--- | +|**Add-BitLockerKeyProtector**|
    • ADAccountOrGroup
    • ADAccountOrGroupProtector
    • Confirm
    • MountPoint
    • Password
    • PasswordProtector
    • Pin
    • RecoveryKeyPath
    • RecoveryKeyProtector
    • RecoveryPassword
    • RecoveryPasswordProtector
    • Service
    • StartupKeyPath
    • StartupKeyProtector
    • TpmAndPinAndStartupKeyProtector
    • TpmAndPinProtector
    • TpmAndStartupKeyProtector
    • TpmProtector
    • WhatIf| +|**Backup-BitLockerKeyProtector**|
    • Confirm
    • KeyProtectorId
    • MountPoint
    • WhatIf| +|**Disable-BitLocker**|
    • Confirm
    • MountPoint
    • WhatIf| +|**Disable-BitLockerAutoUnlock**|
    • Confirm
    • MountPoint
    • WhatIf| +|**Enable-BitLocker**|
    • AdAccountOrGroup
    • AdAccountOrGroupProtector
    • Confirm
    • EncryptionMethod
    • HardwareEncryption
    • Password
    • PasswordProtector
    • Pin
    • RecoveryKeyPath
    • RecoveryKeyProtector
    • RecoveryPassword
    • RecoveryPasswordProtector
    • Service
    • SkipHardwareTest
    • StartupKeyPath
    • StartupKeyProtector
    • TpmAndPinAndStartupKeyProtector
    • TpmAndPinProtector
    • TpmAndStartupKeyProtector
    • TpmProtector
    • UsedSpaceOnly
    • WhatIf| +|**Enable-BitLockerAutoUnlock**|
    • Confirm
    • MountPoint
    • WhatIf| +|**Get-BitLockerVolume**|
    • MountPoint| +|**Lock-BitLocker**|
    • Confirm
    • ForceDismount
    • MountPoint
    • WhatIf| +|**Remove-BitLockerKeyProtector**|
    • Confirm
    • KeyProtectorId
    • MountPoint
    • WhatIf| +|**Resume-BitLocker**|
    • Confirm
    • MountPoint
    • WhatIf| +|**Suspend-BitLocker**|
    • Confirm
    • MountPoint
    • RebootCount
    • WhatIf| +|**Unlock-BitLocker**|
    • AdAccountOrGroup
    • Confirm
    • MountPoint
    • Password
    • RecoveryKeyPath
    • RecoveryPassword
    • RecoveryPassword
    • WhatIf| Similar to manage-bde, the Windows PowerShell cmdlets allow configuration beyond the options offered in the control panel. As with manage-bde, users need to consider the specific needs of the volume they are encrypting prior to running Windows PowerShell cmdlets. diff --git a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md index ac8caab616..8eb564b9c2 100644 --- a/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md +++ b/windows/security/information-protection/bitlocker/protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md @@ -160,110 +160,23 @@ Unlike CSV2.0 volumes, physical disk resources can only be accessed by one clust The following table contains information about both Physical Disk Resources (that is, traditional failover cluster volumes) and Cluster Shared Volumes (CSV) and the actions that are allowed by BitLocker in each situation. - ------- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

      Action

      On owner node of failover volume

      On Metadata Server (MDS) of CSV

      On (Data Server) DS of CSV

      Maintenance Mode

      Manage-bde –on

      Blocked

      Blocked

      Blocked

      Allowed

      Manage-bde –off

      Blocked

      Blocked

      Blocked

      Allowed

      Manage-bde Pause/Resume

      Blocked

      Blocked

      Blocked

      Allowed

      Manage-bde –lock

      Blocked

      Blocked

      Blocked

      Allowed

      manage-bde –wipe

      Blocked

      Blocked

      Blocked

      Allowed

      Unlock

      Automatic via cluster service

      Automatic via cluster service

      Automatic via cluster service

      Allowed

      manage-bde –protector –add

      Allowed

      Allowed

      Blocked

      Allowed

      manage-bde -protector -delete

      Allowed

      Allowed

      Blocked

      Allowed

      manage-bde –autounlock

      Allowed (not recommended)

      Allowed (not recommended)

      Blocked

      Allowed (not recommended)

      Manage-bde -upgrade

      Allowed

      Allowed

      Blocked

      Allowed

      Shrink

      Allowed

      Allowed

      Blocked

      Allowed

      Extend

      Allowed

      Allowed

      Blocked

      Allowed

      - ->Note:** Although the manage-bde -pause command is Blocked in clusters, the cluster service will automatically resume a paused encryption or decryption from the MDS node +|**Action**|**On owner node of failover volume**|**On Metadata Server (MDS) of CSV**|**On (Data Server) DS of CSV**|**Maintenance Mode**| +|--- |--- |--- |--- |--- | +|**Manage-bde –on**|Blocked|Blocked|Blocked|Allowed| +|**Manage-bde –off**|Blocked|Blocked|Blocked|Allowed| +|**Manage-bde Pause/Resume**|Blocked|Blocked**|Blocked|Allowed| +|**Manage-bde –lock**|Blocked|Blocked|Blocked|Allowed| +|**manage-bde –wipe**|Blocked|Blocked|Blocked|Allowed| +|**Unlock**|Automatic via cluster service|Automatic via cluster service|Automatic via cluster service|Allowed| +|**manage-bde –protector –add**|Allowed|Allowed|Blocked|Allowed| +|**manage-bde -protector -delete**|Allowed|Allowed|Blocked|Allowed| +|**manage-bde –autounlock**|Allowed (not recommended)|Allowed (not recommended)|Blocked|Allowed (not recommended)| +|**Manage-bde -upgrade**|Allowed|Allowed|Blocked|Allowed| +|**Shrink**|Allowed|Allowed|Blocked|Allowed| +|**Extend**|Allowed|Allowed|Blocked|Allowed| + +>[!NOTE] +> Although the manage-bde -pause command is Blocked in clusters, the cluster service will automatically resume a paused encryption or decryption from the MDS node In the case where a physical disk resource experiences a failover event during conversion, the new owning node will detect the conversion is not complete and will complete the conversion process. diff --git a/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md b/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md index f1bededfaf..a2dde84f60 100644 --- a/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/app-behavior-with-wip.md @@ -42,104 +42,21 @@ We strongly suggest that the only unenlightened apps you add to your allowed app ## Unenlightened app behavior This table includes info about how unenlightened apps might behave, based on your Windows Information Protection (WIP) networking policies, your app configuration, and potentially whether the app connects to network resources directly by using IP addresses or by using hostnames. - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      App rule settingNetworking policy configuration
       Name-based policies, without the /*AppCompat*/ stringName-based policies, using the /*AppCompat*/ string or proxy-based policies
      Not required. App connects to enterprise cloud resources directly, using an IP address. -
        -
      • App is entirely blocked from both personal and enterprise cloud resources.
      • -
      • No encryption is applied.
      • -
      • App can’t access local Work files.
      • -
      -
      -
        -
      • App can access both personal and enterprise cloud resources. However, you might encounter apps using policies that restrict access to enterprise cloud resources.
      • -
      • No encryption is applied.
      • -
      • App can’t access local Work files.
      • -
      -
      Not required. App connects to enterprise cloud resources, using a hostname. -
        -
      • App is blocked from accessing enterprise cloud resources, but can access other network resources.
      • -
      • No encryption is applied.
      • -
      • App can’t access local Work files.
      • -
      -
      Allow. App connects to enterprise cloud resources, using an IP address or a hostname. -
        -
      • App can access both personal and enterprise cloud resources.
      • -
      • Auto-encryption is applied.
      • -
      • App can access local Work files.
      • -
      -
      Exempt. App connects to enterprise cloud resources, using an IP address or a hostname. -
        -
      • App can access both personal and enterprise cloud resources.
      • -
      • No encryption is applied.
      • -
      • App can access local Work files.
      • -
      -
      +|App rule setting|Networking policy configuration| +|--- |--- | +|**Not required.** App connects to enterprise cloud resources directly, using an IP address.|

      **Name-based policies, without the /*AppCompat*/ string:**

    • App is entirely blocked from both personal and enterprise cloud resources.
    • No encryption is applied.
    • App can’t access local Work files.

      **Name-based policies, using the /*AppCompat*/ string or proxy-based policies:**

    • App can access both personal and enterprise cloud resources. However, you might encounter apps using policies that restrict access to enterprise cloud resources.
    • No encryption is applied.
    • App can’t access local Work files.| +|**Not required.** App connects to enterprise cloud resources, using a hostname.|
    • App is blocked from accessing enterprise cloud resources, but can access other network resources.
    • No encryption is applied.
    • App can’t access local Work files.| +|**Allow.** App connects to enterprise cloud resources, using an IP address or a hostname.|
    • App can access both personal and enterprise cloud resources.
    • Auto-encryption is applied.
    • App can access local Work files.| +|**Exempt.** App connects to enterprise cloud resources, using an IP address or a hostname.|
    • App can access both personal and enterprise cloud resources.
    • No encryption is applied.
    • App can access local Work files.| ## Enlightened app behavior This table includes info about how enlightened apps might behave, based on your Windows Information Protection (WIP) networking policies, your app configuration, and potentially whether the app connects to network resources directly by using IP addresses or by using hostnames. - - - - - - - - - - - - - - - - - -
      App rule settingNetworking policy configuration for name-based policies, possibly using the /*AppCompat*/ string, or proxy-based policies
      Not required. App connects to enterprise cloud resources, using an IP address or a hostname. -
        -
      • App is blocked from accessing enterprise cloud resources, but can access other network resources.
      • -
      • No encryption is applied.
      • -
      • App can't access local Work files.
      • -
      -
      Allow. App connects to enterprise cloud resources, using an IP address or a hostname. -
        -
      • App can access both personal and enterprise cloud resources.
      • -
      • App protects work data and leaves personal data unprotected.
      • -
      • App can access local Work files.
      • -
      -
      Exempt. App connects to enterprise cloud resources, using an IP address or a hostname. -
        -
      • App can access both personal and enterprise cloud resources.
      • -
      • App protects work data and leaves personal data unprotected.
      • -
      • App can access local Work files.
      • -
      -
      +|App rule setting|Networking policy configuration for name-based policies, possibly using the /*AppCompat*/ string, or proxy-based policies| +|--- |--- | +|**Not required.** App connects to enterprise cloud resources, using an IP address or a hostname.|
    • App is blocked from accessing enterprise cloud resources, but can access other network resources.
    • No encryption is applied.
    • App can't access local Work files.| +|**Allow.** App connects to enterprise cloud resources, using an IP address or a hostname.|
    • App can access both personal and enterprise cloud resources.
    • App protects work data and leaves personal data unprotected.
    • App can access local Work files.| +|**Exempt.** App connects to enterprise cloud resources, using an IP address or a hostname.|
    • App can access both personal and enterprise cloud resources.
    • App protects work data and leaves personal data unprotected.
    • App can access local Work files.| >[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-configmgr.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-configmgr.md index 32511b9cd5..43da21cd72 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-configmgr.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-configmgr.md @@ -155,40 +155,15 @@ For this example, we're going to add Internet Explorer, a desktop app, to the ** 5. Pick the options you want to include for the app rule (see table), and then click **OK**. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      OptionManages
      All fields left as "*"All files signed by any publisher. (Not recommended.)
      Publisher selectedAll files signed by the named publisher.

      This might be useful if your company is the publisher and signer of internal line-of-business apps.

      Publisher and Product Name selectedAll files for the specified product, signed by the named publisher.
      Publisher, Product Name, and Binary name selectedAny version of the named file or package for the specified product, signed by the named publisher.
      Publisher, Product Name, Binary name, and File Version, and above, selectedSpecified version or newer releases of the named file or package for the specified product, signed by the named publisher.

      This option is recommended for enlightened apps that weren't previously enlightened.

      Publisher, Product Name, Binary name, and File Version, And below selectedSpecified version or older releases of the named file or package for the specified product, signed by the named publisher.
      Publisher, Product Name, Binary name, and File Version, Exactly selectedSpecified version of the named file or package for the specified product, signed by the named publisher.
      + |Option|Manages| + |--- |--- | + |All fields left as "*"|All files signed by any publisher. (Not recommended.)| + |**Publisher** selected|All files signed by the named publisher.This might be useful if your company is the publisher and signer of internal line-of-business apps.| + |**Publisher** and **Product Name** selected|All files for the specified product, signed by the named publisher.| + |**Publisher**, **Product Name**, and **Binary name** selected|Any version of the named file or package for the specified product, signed by the named publisher.| + |**Publisher**, **Product Name**, **Binary name**, and **File Version, and above**, selected|Specified version or newer releases of the named file or package for the specified product, signed by the named publisher.This option is recommended for enlightened apps that weren't previously enlightened.| + |**Publisher**, **Product Name**, **Binary name**, and **File Version, And below** selected|Specified version or older releases of the named file or package for the specified product, signed by the named publisher.| + |**Publisher**, **Product Name**, **Binary name**, and **File Version, Exactly** selected|Specified version of the named file or package for the specified product, signed by the named publisher.| If you're unsure about what to include for the publisher, you can run this PowerShell command: @@ -374,47 +349,16 @@ There are no default locations included with WIP, you must add each of your netw ![Add or edit corporate network definition box, Add your enterprise network locations.](images/wip-configmgr-add-network-domain.png) - - - - - - - - - - - - - - - - - - - - - - - - -
      - - - - - - - - - - - - - - -
      Network location typeFormatDescription
      Enterprise Cloud ResourcesWith proxy: contoso.sharepoint.com,contoso.internalproxy1.com|
      contoso.visualstudio.com,contoso.internalproxy2.com

      Without proxy: contoso.sharepoint.com|contoso.visualstudio.com

      Specify the cloud resources to be treated as corporate and protected by WIP.

      For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.

      If you have multiple resources, you must separate them using the "|" delimiter. If you don't use proxy servers, you must also include the "," delimiter just before the "|". For example: URL <,proxy>|URL <,proxy>.

      Important
      In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can't tell whether it's attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the /*AppCompat*/ string to the setting. For example: URL <,proxy>|URL <,proxy>|/*AppCompat*/.

      Enterprise Network Domain Names (Required)corp.contoso.com,region.contoso.comSpecify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.

      This setting works with the IP ranges settings to detect whether a network endpoint is enterprise or personal on private networks.

      If you have multiple resources, you must separate them using the "," delimiter.

      Proxy serversproxy.contoso.com:80;proxy2.contoso.com:443Specify the proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you're connecting to are enterprise resources.

      This list shouldn't include any servers listed in your Internal proxy servers list. Internal proxy servers must be used only for WIP-protected (enterprise) traffic.

      If you have multiple resources, you must separate them using the ";" delimiter.
      Internal proxy serverscontoso.internalproxy1.com;contoso.internalproxy2.comSpecify the internal proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you're connecting to are enterprise resources.

      This list shouldn't include any servers listed in your Proxy servers list. Proxy servers must be used only for non-WIP-protected (non-enterprise) traffic.

      If you have multiple resources, you must separate them using the ";" delimiter.
      Enterprise IPv4 Range (Required)Starting IPv4 Address: 3.4.0.1
      Ending IPv4 Address: 3.4.255.254
      Custom URI: 3.4.0.1-3.4.255.254,
      10.0.0.1-10.255.255.254
      Specify the addresses for a valid IPv4 value range within your intranet. These addresses, used with your Enterprise Network Domain Names, define your corporate network boundaries.

      If you have multiple ranges, you must separate them using the "," delimiter.

      Enterprise IPv6 RangeStarting IPv6 Address: 2a01:110::
      Ending IPv6 Address: 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff
      Custom URI: 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,
      fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
      Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Enterprise Network Domain Names, define your corporate network boundaries.

      If you have multiple ranges, you must separate them using the "," delimiter.

      Neutral Resourcessts.contoso.com,sts.contoso2.comSpecify your authentication redirection endpoints for your company.

      These locations are considered enterprise or personal, based on the context of the connection before the redirection.

      If you have multiple resources, you must separate them using the "," delimiter.

      - + |Network location type|Format|Description| + |--- |--- |--- | + |Enterprise Cloud Resources|With proxy: contoso.sharepoint.com,contoso.internalproxy1.com,
      contoso.visualstudio.com,contoso.internalproxy2.com

      Without proxy: contoso.sharepoint.com,contoso.visualstudio.com|Specify the cloud resources to be treated as corporate and protected by WIP.

      For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.

      If you have multiple resources, you must separate them using the "I" delimiter. If you don't use proxy servers, you must also include the "," delimiter just before the "I". For example: URL <,proxy>|URL <,proxy>

      Important
      In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can't tell whether it's attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the /*AppCompat*/ string to the setting. For example: URL <,proxy>|URL <,proxy>|/*AppCompat*/.| + |Enterprise Network Domain Names (Required)|corp.contoso.com,region.contoso.com|Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.

      This setting works with the IP ranges settings to detect whether a network endpoint is enterprise or personal on private networks.

      If you have multiple resources, you must separate them using the "," delimiter.| + |Proxy servers|proxy.contoso.com:80;proxy2.contoso.com:443|Specify the proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you're connecting to are enterprise resources.

      This list shouldn't include any servers listed in your Internal proxy servers list. Internal proxy servers must be used only for WIP-protected (enterprise) traffic.

      If you have multiple resources, you must separate them using the ";" delimiter.| + |Internal proxy servers|contoso.internalproxy1.com;contoso.internalproxy2.com|Specify the internal proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you're connecting to are enterprise resources.

      This list shouldn't include any servers listed in your Proxy servers list. Proxy servers must be used only for non-WIP-protected (non-enterprise) traffic.

      If you have multiple resources, you must separate them using the ";" delimiter.| + |Enterprise IPv4 Range (Required)|Starting IPv4 Address: 3.4.0.1
      Ending IPv4 Address: 3.4.255.254
      Custom URI: 3.4.0.1-3.4.255.254,
      10.0.0.1-10.255.255.254|Specify the addresses for a valid IPv4 value range within your intranet. These addresses, used with your Enterprise Network Domain Names, define your corporate network boundaries.

      If you have multiple ranges, you must separate them using the "," delimiter.| + |Enterprise IPv6 Range|Starting IPv6 Address: 2a01:110::
      Ending IPv6 Address: 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff
      Custom URI: 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,
      fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff|Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Enterprise Network Domain Names, define your corporate network boundaries.

      If you have multiple ranges, you must separate them using the "," delimiter.| + |Neutral Resources|sts.contoso.com,sts.contoso2.com|Specify your authentication redirection endpoints for your company.

      These locations are considered enterprise or personal, based on the context of the connection before the redirection.

      If you have multiple resources, you must separate them using the "," delimiter.| + 3. Add as many locations as you need, and then click **OK**. The **Add or edit corporate network definition** box closes. diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md index 0442c3778a..370455c093 100644 --- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md +++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md @@ -164,40 +164,15 @@ If you don't know the Store app publisher or product name, you can find them by To add **Desktop apps**, complete the following fields, based on what results you want returned. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      FieldManages
      All fields marked as “*”All files signed by any publisher. (Not recommended and may not work)
      Publisher onlyIf you only fill out this field, you’ll get all files signed by the named publisher.

      This might be useful if your company is the publisher and signer of internal line-of-business apps.
      Publisher and Name onlyIf you only fill out these fields, you’ll get all files for the specified product, signed by the named publisher.
      Publisher, Name, and File onlyIf you only fill out these fields, you’ll get any version of the named file or package for the specified product, signed by the named publisher.
      Publisher, Name, File, and Min version onlyIf you only fill out these fields, you’ll get the specified version or newer releases of the named file or package for the specified product, signed by the named publisher.

      This option is recommended for enlightened apps that weren't previously enlightened.
      Publisher, Name, File, and Max version onlyIf you only fill out these fields, you’ll get the specified version or older releases of the named file or package for the specified product, signed by the named publisher.
      All fields completedIf you fill out all fields, you’ll get the specified version of the named file or package for the specified product, signed by the named publisher.
      +|Field|Manages| +|--- |--- | +|All fields marked as “*”|All files signed by any publisher. (Not recommended and may not work)| +|Publisher only|If you only fill out this field, you’ll get all files signed by the named publisher.This might be useful if your company is the publisher and signer of internal line-of-business apps.| +|Publisher and Name only|If you only fill out these fields, you’ll get all files for the specified product, signed by the named publisher.| +|Publisher, Name, and File only|If you only fill out these fields, you’ll get any version of the named file or package for the specified product, signed by the named publisher.| +|Publisher, Name, File, and Min version only|If you only fill out these fields, you’ll get the specified version or newer releases of the named file or package for the specified product, signed by the named publisher.This option is recommended for enlightened apps that weren't previously enlightened.| +|Publisher, Name, File, and Max version only|If you only fill out these fields, you’ll get the specified version or older releases of the named file or package for the specified product, signed by the named publisher.| +|All fields completed|If you fill out all fields, you’ll get the specified version of the named file or package for the specified product, signed by the named publisher.| To add another Desktop app, click the ellipsis **…**. After you’ve entered the info into the fields, click **OK**. diff --git a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md index 929975aa97..15b0f9f1f8 100644 --- a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md @@ -24,138 +24,28 @@ ms.localizationpriority: medium This table provides info about the most common problems you might encounter while running WIP in your organization. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      LimitationHow it appearsWorkaround
      Your enterprise data on USB drives might be tied to the device it was protected on, based on your Azure RMS configuration.If you’re using Azure RMS: Authenticated users can open enterprise data on USB drives, on computers running Windows 10, version 1703.

      If you’re not using Azure RMS: Data in the new location remains encrypted, but becomes inaccessible on other devices and for other users. For example, the file won't open or the file opens, but doesn't contain readable text.
      Share files with fellow employees through enterprise file servers or enterprise cloud locations. If data must be shared via USB, employees can decrypt protected files, but it will be audited.

      We strongly recommend educating employees about how to limit or eliminate the need for this decryption.
      Direct Access is incompatible with WIP.Direct Access might experience problems with how WIP enforces app behavior and data movement because of how WIP determines what is and isn’t a corporate network resource.We recommend that you use VPN for client access to your intranet resources.

      Note
      VPN is optional and isn’t required by WIP.
      NetworkIsolation Group Policy setting takes precedence over MDM Policy settings.The NetworkIsolation Group Policy setting can configure network settings that can also be configured by using MDM. WIP relies on these policies being correctly configured.If you use both Group Policy and MDM to configure your NetworkIsolation settings, you must make sure that those same settings are deployed to your organization using both Group Policy and MDM.
      Cortana can potentially allow data leakage if it’s on the allowed apps list.If Cortana is on the allowed list, some files might become unexpectedly encrypted after an employee performs a search using Cortana. Your employees will still be able to use Cortana to search and provide results on enterprise documents and locations, but results might be sent to Microsoft.We don’t recommend adding Cortana to your allowed apps list. However, if you wish to use Cortana and don't mind whether the results potentially go to Microsoft, you can make Cortana an Exempt app.
      WIP is designed for use by a single user per device.A secondary user on a device might experience app compatibility issues when unenlightened apps start to automatically encrypt for all users. Additionally, only the initial, enrolled user’s content can be revoked during the unenrollment process.We recommend only having one user per managed device.
      Installers copied from an enterprise network file share might not work properly.An app might fail to properly install because it can’t read a necessary configuration or data file, such as a .cab or .xml file needed for installation, which was protected by the copy action.To fix this, you can: -
        -
      • Start the installer directly from the file share.

        -OR-

      • -
      • Decrypt the locally copied files needed by the installer.

        -OR-

      • -
      • Mark the file share with the installation media as “personal”. To do this, you’ll need to set the Enterprise IP ranges as Authoritative and then exclude the IP address of the file server, or you’ll need to put the file server on the Enterprise Proxy Server list.
      • -
      Changing your primary Corporate Identity isn’t supported.You might experience various instabilities, including but not limited to network and file access failures, and potentially granting incorrect access.Turn off WIP for all devices before changing the primary Corporate Identity (first entry in the list), restarting, and finally redeploying.
      Redirected folders with Client-Side Caching are not compatible with WIP.Apps might encounter access errors while attempting to read a cached, offline file.Migrate to use another file synchronization method, such as Work Folders or OneDrive for Business.

      Note
      For more info about Work Folders and Offline Files, see the blog, Work Folders and Offline Files support for Windows Information Protection. If you're having trouble opening files offline while using Offline Files and WIP, see the support article, Can't open files offline when you use Offline Files and Windows Information Protection.
      An unmanaged device can use Remote Desktop Protocol (RDP) to connect to a WIP-managed device.

      Data copied from the WIP-managed device is marked as Work.

      Data copied to the WIP-managed device is not marked as Work.

      Local Work data copied to the WIP-managed device remains Work data.

      Work data that is copied between two apps in the same session remains data.

      Disable RDP to prevent access because there is no way to restrict access to only devices managed by WIP. RDP is disabled by default.
      You can't upload an enterprise file to a personal location using Microsoft Edge or Internet Explorer.A message appears stating that the content is marked as Work and the user isn't given an option to override to Personal.Open File Explorer and change the file ownership to Personal before you upload.
      ActiveX controls should be used with caution.Webpages that use ActiveX controls can potentially communicate with other outside processes that aren’t protected by using WIP.We recommend that you switch to using Microsoft Edge, the more secure and safer browser that prevents the use of ActiveX controls. We also recommend that you limit the usage of Internet Explorer 11 to only those line-of-business apps that require legacy technology.

      For more info, see Out-of-date ActiveX control blocking.
      Resilient File System (ReFS) isn't currently supported with WIP.Trying to save or transfer WIP files to ReFS will fail.Format drive for NTFS, or use a different drive.
      WIP isn’t turned on if any of the following folders have the MakeFolderAvailableOfflineDisabled option set to False: -
        -
      • AppDataRoaming
      • -
      • Desktop
      • -
      • StartMenu
      • -
      • Documents
      • -
      • Pictures
      • -
      • Music
      • -
      • Videos
      • -
      • Favorites
      • -
      • Contacts
      • -
      • Downloads
      • -
      • Links
      • -
      • Searches
      • -
      • SavedGames
      • -
      -
      WIP isn’t turned on for employees in your organization. Error code 0x807c0008 will result if WIP is deployed by using Microsoft Endpoint Configuration Manager.Don’t set the MakeFolderAvailableOfflineDisabled option to False for any of the specified folders. You can configure this parameter, as described here.

      If you currently use redirected folders, we recommend that you migrate to a file synchronization solution that supports WIP, such as Work Folders or OneDrive for Business. Additionally, if you apply redirected folders after WIP is already in place, you might be unable to open your files offline. For more info about these potential access errors, see Can't open files offline when you use Offline Files and Windows Information Protection. -
      Only enlightened apps can be managed without device enrollment - If a user enrolls a device for Mobile Application Management (MAM) without device enrollment, only enlightened apps will be managed. This is by design to prevent personal files from being unintentionally encrypted by unenlighted apps. Unenlighted apps that need to access work using MAM need to be re-compiled as LOB apps or managed by using MDM with device enrollment.If all apps need to be managed, enroll the device for MDM. -
      By design, files in the Windows directory (%windir% or C:/Windows) cannot be encrypted because they need to be accessed by any user. If a file in the Windows directory gets encrypted by one user, other users can't access it.
      Any attempt to encrypt a file in the Windows directory will return a file access denied error. But if you copy or drag and drop an encrypted file to the Windows directory, it will retain encryption to honor the intent of the owner. - If you need to save an encrypted file in the Windows directory, create and encrypt the file in a different directory and copy it. -
      OneNote notebooks on OneDrive for Business must be properly configured to work with WIP.OneNote might encounter errors syncing a OneDrive for Business notebook and suggest changing the file ownership to Personal. Attempting to view the notebook in OneNote Online in the browser will show an error and unable to view it."OneNote notebooks that are newly copied into the OneDrive for Business folder from File Explorer should get fixed automatically. To do this, follow these steps: -1. Close the notebook in OneNote. -2. Move the notebook folder via File Explorer out of the OneDrive for Business folder to another location, such as the Desktop. -3. Copy the notebook folder and Paste it back into the OneDrive for Business folder. - -Wait a few minutes to allow OneDrive to finish syncing & upgrading the notebook, and the folder should automatically convert to an Internet Shortcut. Opening the shortcut will open the notebook in the browser, which can then be opened in the OneNote client by using the “Open in app” button.
      Microsoft Office Outlook offline data files (PST and OST files) are not marked as Work files, and are therefore not protected. - If Microsoft Office Outlook is set to work in cached mode (default setting), or if some emails are stored in a local PST file, the data is unprotected. - It is recommended to use Microsoft Office Outlook in Online mode, or to use encryption to protect OST and PST files manually. -
      +|Limitation|How it appears|Workaround| +|--- |--- |--- | +|Your enterprise data on USB drives might be tied to the device it was protected on, based on your Azure RMS configuration.|**If you’re using Azure RMS:** Authenticated users can open enterprise data on USB drives, on computers running Windows 10, version 1703.**If you’re not using Azure RMS:** Data in the new location remains encrypted, but becomes inaccessible on other devices and for other users. For example, the file won't open or the file opens, but doesn't contain readable text.|Share files with fellow employees through enterprise file servers or enterprise cloud locations. If data must be shared via USB, employees can decrypt protected files, but it will be audited.We strongly recommend educating employees about how to limit or eliminate the need for this decryption.| +|Direct Access is incompatible with WIP.|Direct Access might experience problems with how WIP enforces app behavior and data movement because of how WIP determines what is and isn’t a corporate network resource.|We recommend that you use VPN for client access to your intranet resources.

      **Note** VPN is optional and isn’t required by WIP.| +|**NetworkIsolation** Group Policy setting takes precedence over MDM Policy settings.|The **NetworkIsolation** Group Policy setting can configure network settings that can also be configured by using MDM. WIP relies on these policies being correctly configured.|If you use both Group Policy and MDM to configure your **NetworkIsolation** settings, you must make sure that those same settings are deployed to your organization using both Group Policy and MDM.| +|Cortana can potentially allow data leakage if it’s on the allowed apps list.|If Cortana is on the allowed list, some files might become unexpectedly encrypted after an employee performs a search using Cortana. Your employees will still be able to use Cortana to search and provide results on enterprise documents and locations, but results might be sent to Microsoft.|We don’t recommend adding Cortana to your allowed apps list. However, if you wish to use Cortana and don't mind whether the results potentially go to Microsoft, you can make Cortana an Exempt app.| +|WIP is designed for use by a single user per device.|A secondary user on a device might experience app compatibility issues when unenlightened apps start to automatically encrypt for all users. Additionally, only the initial, enrolled user’s content can be revoked during the unenrollment process.|We recommend only having one user per managed device.| +|Installers copied from an enterprise network file share might not work properly.|An app might fail to properly install because it can’t read a necessary configuration or data file, such as a .cab or .xml file needed for installation, which was protected by the copy action.|To fix this, you can:

    • Start the installer directly from the file share.

      -OR-

    • Decrypt the locally copied files needed by the installer.

      -OR-

    • Mark the file share with the installation media as “personal”. To do this, you’ll need to set the Enterprise IP ranges as **Authoritative** and then exclude the IP address of the file server, or you’ll need to put the file server on the Enterprise Proxy Server list.| +|Changing your primary Corporate Identity isn’t supported.|You might experience various instabilities, including but not limited to network and file access failures, and potentially granting incorrect access.|Turn off WIP for all devices before changing the primary Corporate Identity (first entry in the list), restarting, and finally redeploying.| +|Redirected folders with Client-Side Caching are not compatible with WIP.|Apps might encounter access errors while attempting to read a cached, offline file.|Migrate to use another file synchronization method, such as Work Folders or OneDrive for Business.

      **Note** For more info about Work Folders and Offline Files, see the blog, [Work Folders and Offline Files support for Windows Information Protection](https://blogs.technet.microsoft.com/filecab/2016/08/29/work-folders-and-offline-files-support-for-windows-information-protection/)". If you're having trouble opening files offline while using Offline Files and WIP, see the support article, [Can't open files offline when you use Offline Files and Windows Information Protection](https://support.microsoft.com/kb/3187045).| +|An unmanaged device can use Remote Desktop Protocol (RDP) to connect to a WIP-managed device.|Data copied from the WIP-managed device is marked as **Work**.Data copied to the WIP-managed device is not marked as **Work**.Local **Work** data copied to the WIP-managed device remains **Work** data.**Work** data that is copied between two apps in the same session remains ** data.|Disable RDP to prevent access because there is no way to restrict access to only devices managed by WIP. RDP is disabled by default.| +|You can't upload an enterprise file to a personal location using Microsoft Edge or Internet Explorer.|A message appears stating that the content is marked as **Work** and the user isn't given an option to override to **Personal**.|Open File Explorer and change the file ownership to **Personal** before you upload.| +|ActiveX controls should be used with caution.|Webpages that use ActiveX controls can potentially communicate with other outside processes that aren’t protected by using WIP.|We recommend that you switch to using Microsoft Edge, the more secure and safer browser that prevents the use of ActiveX controls. We also recommend that you limit the usage of Internet Explorer 11 to only those line-of-business apps that require legacy technology.For more info, see [Out-of-date ActiveX control blocking](/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking).| +|Resilient File System (ReFS) isn't currently supported with WIP.|Trying to save or transfer WIP files to ReFS will fail.|Format drive for NTFS, or use a different drive.| +|WIP isn’t turned on if any of the following folders have the **MakeFolderAvailableOfflineDisabled** option set to **False**:

    • AppDataRoaming
    • Desktop
    • StartMenu
    • Documents
    • Pictures
    • Music
    • Videos
    • Favorites
    • Contacts
    • Downloads
    • Links
    • Searches
    • SavedGames|WIP isn’t turned on for employees in your organization. Error code 0x807c0008 will result if WIP is deployed by using Microsoft Endpoint Configuration Manager.|Don’t set the **MakeFolderAvailableOfflineDisabled** option to **False** for any of the specified folders. You can configure this parameter, as described [here](/windows-server/storage/folder-redirection/disable-offline-files-on-folders)".If you currently use redirected folders, we recommend that you migrate to a file synchronization solution that supports WIP, such as Work Folders or OneDrive for Business. Additionally, if you apply redirected folders after WIP is already in place, you might be unable to open your files offline. For more info about these potential access errors, see [Can't open files offline when you use Offline Files and Windows Information Protection](https://support.microsoft.com/help/3187045/can-t-open-files-offline-when-you-use-offline-files-and-windows-information-protection)".| +|Only enlightened apps can be managed without device enrollment|If a user enrolls a device for Mobile Application Management (MAM) without device enrollment, only enlightened apps will be managed. This is by design to prevent personal files from being unintentionally encrypted by unenlighted apps. Unenlighted apps that need to access work using MAM need to be re-compiled as LOB apps or managed by using MDM with device enrollment.|If all apps need to be managed, enroll the device for MDM.| +|By design, files in the Windows directory (%windir% or C:/Windows) cannot be encrypted because they need to be accessed by any user. If a file in the Windows directory gets encrypted by one user, other users can't access it.|Any attempt to encrypt a file in the Windows directory will return a file access denied error. But if you copy or drag and drop an encrypted file to the Windows directory, it will retain encryption to honor the intent of the owner.|If you need to save an encrypted file in the Windows directory, create and encrypt the file in a different directory and copy it.| +|OneNote notebooks on OneDrive for Business must be properly configured to work with WIP.|OneNote might encounter errors syncing a OneDrive for Business notebook and suggest changing the file ownership to Personal. Attempting to view the notebook in OneNote Online in the browser will show an error and unable to view it.|"OneNote notebooks that are newly copied into the OneDrive for Business folder from File Explorer should get fixed automatically. To do this, follow these steps:
      1. Close the notebook in OneNote.
      2. Move the notebook folder via File Explorer out of the OneDrive for Business folder to another location, such as the Desktop.
      3. Copy the notebook folder and Paste it back into the OneDrive for Business folder.

      Wait a few minutes to allow OneDrive to finish syncing & upgrading the notebook, and the folder should automatically convert to an Internet Shortcut. Opening the shortcut will open the notebook in the browser, which can then be opened in the OneNote client by using the “Open in app” button.| +|Microsoft Office Outlook offline data files (PST and OST files) are not marked as **Work** files, and are therefore not protected.|If Microsoft Office Outlook is set to work in cached mode (default setting), or if some emails are stored in a local PST file, the data is unprotected.|It is recommended to use Microsoft Office Outlook in Online mode, or to use encryption to protect OST and PST files manually.| > [!NOTE] > When corporate data is written to disk, WIP uses the Windows-provided Encrypting File System (EFS) to protect it and associate it with your enterprise identity. One caveat to keep in mind is that the Preview Pane in File Explorer will not work for encrypted files. - - - > [!NOTE] > Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to our content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). \ No newline at end of file diff --git a/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md b/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md index c2b7cb2188..0bc4cc6341 100644 --- a/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/testing-scenarios-for-wip.md @@ -31,141 +31,20 @@ You can try any of the processes included in these scenarios, but you should foc >[!IMPORTANT] >If any of these scenarios does not work, first take note of whether WIP has been revoked. If it has, unenlightened apps will have to be uninstalled and re-installed since their settings files will remain encrypted. - - - - - - - - - - - -
      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      ScenarioProcesses
      Encrypt and decrypt files using File Explorer.For desktop:

      -
        -
      1. Open File Explorer, right-click a work document, and then click Work from the File Ownership menu.
        Make sure the file is encrypted by right-clicking the file again, clicking Advanced from the General tab, and then clicking Details from the Compress or Encrypt attributes area. The file should show up under the heading, This enterprise domain can remove or revoke access: <your_enterprise_identity>. For example, contoso.com.
      2. -
      3. In File Explorer, right-click the same document, and then click Personal from the File Ownership menu.
        Make sure the file is decrypted by right-clicking the file again, clicking Advanced from the General tab, and then verifying that the Details button is unavailable.
      4. -
      - For mobile:

      -
        -
      1. Open the File Explorer app, browse to a file location, click the elipsis (...), and then click Select to mark at least one file as work-related.
      2. -
      3. Click the elipsis (...) again, click File ownership from the drop down menu, and then click Work.
        Make sure the file is encrypted, by locating the Briefcase icon next to the file name.
      4. -
      5. Select the same file, click File ownership from the drop down menu, and then click Personal.
        Make sure the file is decrypted and that you're no longer seeing the Briefcase icon next to file name.
      6. -
      -
      Create work documents in enterprise-allowed apps.For desktop:

      - - For mobile:

      -
        -
      1. Start an allowed mobile app, such as Word Mobile, create a new document, and then save your changes as Work to a local, work-related location.
        Make sure the document is encrypted, by locating the Briefcase icon next to the file name.
      2. -
      3. Open the same document and attempt to save it to a non-work-related location.
        WIP should stop you from saving the file to this location.
      4. -
      5. Open the same document one last time, make a change to the contents, and then save it again using the Personal option.
        Make sure the file is decrypted and that you're no longer seeing the Briefcase icon next to file name.
      6. -
      -
      Block enterprise data from non-enterprise apps. -
        -
      1. Start an app that doesn't appear on your allowed apps list, and then try to open a work-encrypted file.
        The app shouldn't be able to access the file.
      2. -
      3. Try double-clicking or tapping on the work-encrypted file.
        If your default app association is an app not on your allowed apps list, you should get an Access Denied error message.
      4. -
      -
      Copy and paste from enterprise apps to non-enterprise apps. -
        -
      1. Copy (CTRL+C) content from an app on your allowed apps list, and then try to paste (CTRL+V) the content into an app that doesn't appear on your allowed apps list.
        You should see a WIP-related warning box, asking you to click either Change to personal or Keep at work.
      2. -
      3. Click Keep at work.
        The content isn't pasted into the non-enterprise app.
      4. -
      5. Repeat Step 1, but this time click Change to personal, and try to paste the content again.
        The content is pasted into the non-enterprise app.
      6. -
      7. Try copying and pasting content between apps on your allowed apps list.
        The content should copy and paste between apps without any warning messages.
      8. -
      -
      Drag and drop from enterprise apps to non-enterprise apps. -
        -
      1. Drag content from an app on your allowed apps list, and then try to drop the content into an app that doesn't appear on your allowed apps list.
        You should see a WIP-related warning box, asking you to click either Keep at work or Change to personal.
      2. -
      3. Click Keep at work.
        The content isn't dropped into the non-enterprise app.
      4. -
      5. Repeat Step 1, but this time click Change to personal, and try to drop the content again.
        The content is dropped into the non-enterprise app.
      6. -
      7. Try dragging and dropping content between apps on your allowed apps list.
        The content should move between the apps without any warning messages.
      8. -
      -
      Share between enterprise apps and non-enterprise apps. -
        -
      1. Open an app on your allowed apps list, like Microsoft Photos, and try to share content with an app that doesn't appear on your allowed apps list, like Facebook.
        You should see a WIP-related warning box, asking you to click either Keep at work or Change to personal.
      2. -
      3. Click Keep at work.
        The content isn't shared into Facebook.
      4. -
      5. Repeat Step 1, but this time click Change to personal, and try to share the content again.
        The content is shared into Facebook.
      6. -
      7. Try sharing content between apps on your allowed apps list.
        The content should share between the apps without any warning messages.
      8. -
      -
      Verify that Windows system components can use WIP. -
        -
      1. Start Windows Journal and Internet Explorer 11, creating, editing, and saving files in both apps.
        Make sure that all of the files you worked with are encrypted to your configured Enterprise Identity. In some cases, you might need to close the file and wait a few moments for it to be automatically encrypted.
      2. -
      3. Open File Explorer and make sure your modified files are appearing with a Lock icon.
      4. -
      5. Try copying and pasting, dragging and dropping, and sharing using these apps with other apps that appear both on and off the allowed apps list.

        Note
        Most Windows-signed components like File Explorer (when running in the user's context), should have access to enterprise data.

        A few notable exceptions include some of the user-facing in-box apps, like Wordpad, Notepad, and Microsoft Paint. These apps don't have access by default, but can be added to your allowed apps list.
      6. -
      -
      Use WIP on NTFS, FAT, and exFAT systems. -
        -
      1. Start an app that uses the FAT or exFAT file system (for example a SD card or USB flash drive), and appears on your allowed apps list.
      2. -
      3. Create, edit, write, save, copy, and move files.
        Basic file and folder operations like copy, move, rename, delete, and so on, should work properly on encrypted files.
      4. -
      -
      Verify your shared files can use WIP. -
        -
      1. Download a file from a protected file share, making sure the file is encrypted by locating the Briefcase icon next to the file name.
      2. -
      3. Open the same file, make a change, save it and then try to upload it back to the file share. Again, this should work without any warnings.
      4. -
      5. Open an app that doesn't appear on your allowed apps list and attempt to access a file on the WIP-enabled file share.
        The app shouldn't be able to access the file share.
      6. -
      -
      Verify your cloud resources can use WIP. -
        -
      1. Add both Internet Explorer 11 and Microsoft Edge to your allowed apps list.
      2. -
      3. Open SharePoint (or another cloud resource that's part of your policy) and access a WIP-enabled resource by using both IE11 and Microsoft Edge.
        Both browsers should respect the enterprise and personal boundary.
      4. -
      5. Remove Internet Explorer 11 from your allowed app list and then try to access an intranet site or enterprise-related cloud resource.
        IE11 shouldn't be able to access the sites.

        Note
        Any file downloaded from your work SharePoint site, or any other WIP-enabled cloud resource, is automatically marked as Work.
      6. -
      -
      Verify your Virtual Private Network (VPN) can be auto-triggered. -
        -
      1. Set up your VPN network to start based on the WIPModeID setting.
        For specific info about how to do this, see the Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune topic.
      2. -
      3. Start an app from your allowed apps list.
        The VPN network should automatically start.
      4. -
      5. Disconnect from your network and then start an app that isn't on your allowed apps list.
        The VPN shouldn't start and the app shouldn't be able to access your enterprise network.
      6. -
      -
      Unenroll client devices from WIP. -
        -
      • Unenroll a device from WIP by going to Settings, click Accounts, click Work, click the name of the device you want to unenroll, and then click Remove.
        The device should be removed and all of the enterprise content for that managed account should be gone.

        Important
        On desktop devices, the data isn't removed and can be recovered, so you must make sure the content is marked as Revoked and that access is denied for the employee. On mobile devices, the data is removed.
      • -
      -
      +|Scenario|Processes| +|--- |--- | +|Encrypt and decrypt files using File Explorer.|**For desktop:**

      1. Open File Explorer, right-click a work document, and then click **Work** from the **File Ownership** menu.
        Make sure the file is encrypted by right-clicking the file again, clicking **Advanced** from the **General** tab, and then clicking **Details** from the **Compress or Encrypt attributes** area. The file should show up under the heading, **This enterprise domain can remove or revoke access:** <your_enterprise_identity>. For example, contoso.com.
      2. In File Explorer, right-click the same document, and then click **Personal** from the **File Ownership** menu.
        Make sure the file is decrypted by right-clicking the file again, clicking **Advanced** from the **General** tab, and then verifying that the **Details** button is unavailable.
      **For mobile:**

      1. Open the File Explorer app, browse to a file location, click the elipsis (...), and then click **Select** to mark at least one file as work-related.
      2. Click the elipsis (...) again, click **File ownership** from the drop down menu, and then click **Work**.
        Make sure the file is encrypted, by locating the **Briefcase** icon next to the file name.
      3. Select the same file, click **File ownership** from the drop down menu, and then click **Personal**.
        Make sure the file is decrypted and that you're no longer seeing the **Briefcase** icon next to file name.
      | +|Create work documents in enterprise-allowed apps.|**For desktop:**

      • Start an unenlightened but allowed app, such as a line-of-business app, and then create a new document, saving your changes.
        Make sure the document is encrypted to your Enterprise Identity. This might take a few minutes and require you to close and re-open the file.

        **Important**
        Certain file types like .exe and .dll, along with certain file paths, such as %windir% and %programfiles% are excluded from automatic encryption.

        For more info about your Enterprise Identity and adding apps to your allowed apps list, see either [Create a Windows Information Protection (WIP) policy using Microsoft Intune](create-wip-policy-using-intune-azure.md) or [Create a Windows Information Protection (WIP) policy using Microsoft Endpoint Configuration Manager](create-wip-policy-using-configmgr.md), based on your deployment system.
      **For mobile:**

      1. Start an allowed mobile app, such as Word Mobile, create a new document, and then save your changes as **Work** to a local, work-related location.
        Make sure the document is encrypted, by locating the **Briefcase** icon next to the file name.
      2. Open the same document and attempt to save it to a non-work-related location.
        WIP should stop you from saving the file to this location.
      3. Open the same document one last time, make a change to the contents, and then save it again using the **Personal** option.
        Make sure the file is decrypted and that you're no longer seeing the **Briefcase** icon next to file name.
      | +|Block enterprise data from non-enterprise apps.|
      1. Start an app that doesn't appear on your allowed apps list, and then try to open a work-encrypted file.
        The app shouldn't be able to access the file.
      2. Try double-clicking or tapping on the work-encrypted file.
        If your default app association is an app not on your allowed apps list, you should get an **Access Denied** error message.
      | +|Copy and paste from enterprise apps to non-enterprise apps.|
      1. Copy (CTRL+C) content from an app on your allowed apps list, and then try to paste (CTRL+V) the content into an app that doesn't appear on your allowed apps list.
        You should see a WIP-related warning box, asking you to click either **Change to personal** or **Keep at work**.
      2. Click **Keep at work**.
        The content isn't pasted into the non-enterprise app.
      3. Repeat Step 1, but this time click **Change to personal**, and try to paste the content again.
        The content is pasted into the non-enterprise app.
      4. Try copying and pasting content between apps on your allowed apps list.
        The content should copy and paste between apps without any warning messages.
      | +|Drag and drop from enterprise apps to non-enterprise apps.|
      1. Drag content from an app on your allowed apps list, and then try to drop the content into an app that doesn't appear on your allowed apps list.
        You should see a WIP-related warning box, asking you to click either **Keep at work** or **Change to personal**.
      2. Click **Keep at work**.
        The content isn't dropped into the non-enterprise app.
      3. Repeat Step 1, but this time click **Change to personal**, and try to drop the content again.
        The content is dropped into the non-enterprise app.
      4. Try dragging and dropping content between apps on your allowed apps list.
        The content should move between the apps without any warning messages.
      | +|Share between enterprise apps and non-enterprise apps.|
      1. Open an app on your allowed apps list, like Microsoft Photos, and try to share content with an app that doesn't appear on your allowed apps list, like Facebook.
        You should see a WIP-related warning box, asking you to click either **Keep at work** or **Change to personal**.
      2. Click **Keep at work**.
        The content isn't shared into Facebook.
      3. Repeat Step 1, but this time click **Change to personal**, and try to share the content again.
        The content is shared into Facebook.
      4. Try sharing content between apps on your allowed apps list.
        The content should share between the apps without any warning messages.
      | +|Verify that Windows system components can use WIP.|
      1. Start Windows Journal and Internet Explorer 11, creating, editing, and saving files in both apps.
        Make sure that all of the files you worked with are encrypted to your configured Enterprise Identity. In some cases, you might need to close the file and wait a few moments for it to be automatically encrypted.
      2. Open File Explorer and make sure your modified files are appearing with a **Lock** icon.
      3. Try copying and pasting, dragging and dropping, and sharing using these apps with other apps that appear both on and off the allowed apps list.

        **Note**
        Most Windows-signed components like File Explorer (when running in the user's context), should have access to enterprise data.

        A few notable exceptions include some of the user-facing in-box apps, like Wordpad, Notepad, and Microsoft Paint. These apps don't have access by default, but can be added to your allowed apps list.
      | +|Use WIP on NTFS, FAT, and exFAT systems.|
      1. Start an app that uses the FAT or exFAT file system (for example a SD card or USB flash drive), and appears on your allowed apps list.
      2. Create, edit, write, save, copy, and move files.
        Basic file and folder operations like copy, move, rename, delete, and so on, should work properly on encrypted files.
      | +|Verify your shared files can use WIP.|
      1. Download a file from a protected file share, making sure the file is encrypted by locating the **Briefcase** icon next to the file name.
      2. Open the same file, make a change, save it and then try to upload it back to the file share. Again, this should work without any warnings.
      3. Open an app that doesn't appear on your allowed apps list and attempt to access a file on the WIP-enabled file share.
        The app shouldn't be able to access the file share.
      | +|Verify your cloud resources can use WIP.|
      1. Add both Internet Explorer 11 and Microsoft Edge to your allowed apps list.
      2. Open SharePoint (or another cloud resource that's part of your policy) and access a WIP-enabled resource by using both IE11 and Microsoft Edge.
        Both browsers should respect the enterprise and personal boundary.
      3. Remove Internet Explorer 11 from your allowed app list and then try to access an intranet site or enterprise-related cloud resource.
        IE11 shouldn't be able to access the sites.

        **Note**
        Any file downloaded from your work SharePoint site, or any other WIP-enabled cloud resource, is automatically marked as **Work**.
      | +|Verify your Virtual Private Network (VPN) can be auto-triggered.|
      1. Set up your VPN network to start based on the **WIPModeID** setting.
        For specific info about how to do this, see the [Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Intune](create-vpn-and-wip-policy-using-intune-azure.md) topic.
      2. Start an app from your allowed apps list.
        The VPN network should automatically start.
      3. Disconnect from your network and then start an app that isn't on your allowed apps list.
        The VPN shouldn't start and the app shouldn't be able to access your enterprise network.
      | +|Unenroll client devices from WIP.|
      • Unenroll a device from WIP by going to **Settings**, click **Accounts**, click **Work**, click the name of the device you want to unenroll, and then click **Remove**.
        The device should be removed and all of the enterprise content for that managed account should be gone.

        **Important**
        On desktop devices, the data isn't removed and can be recovered, so you must make sure the content is marked as **Revoked** and that access is denied for the employee. On mobile devices, the data is removed.| >[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md index fdd4c1c7d4..d75785dec2 100644 --- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md @@ -308,58 +308,13 @@ The following table lists EMET features in relation to Windows 10 features. ### Table 5   EMET features in relation to Windows 10 features - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
        Specific EMET featuresHow these EMET features map
        -to Windows 10 features
          -
        • DEP

        • -
        • SEHOP

        • -
        • ASLR (Force ASLR, Bottom-up ASLR)

        • -

        DEP, SEHOP, and ASLR are included in Windows 10 as configurable features. See Table 2, earlier in this topic.

        -

        You can install the ProcessMitigations PowerShell module to convert your EMET settings for these features into policies that you can apply to Windows 10.

          -
        • Load Library Check (LoadLib)

        • -
        • Memory Protection Check (MemProt)

        • -
        LoadLib and MemProt are supported in Windows 10, for all applications that are written to use these functions. See Table 4, earlier in this topic.
          -
        • Null Page

        • -
        Mitigations for this threat are built into Windows 10, as described in the "Memory reservations" item in Kernel pool protections, earlier in this topic.
          -
        • Heap Spray

        • -
        • EAF

        • -
        • EAF+

        • -
        Windows 10 does not include mitigations that map specifically to these EMET features because they have low impact in the current threat landscape, and do not significantly increase the difficulty of exploiting vulnerabilities. Microsoft remains committed to monitoring the security environment as new exploits appear and taking steps to harden the operating system against them.
          -
        • Caller Check

        • -
        • Simulate Execution Flow

        • -
        • Stack Pivot

        • -
        • Deep Hooks (an ROP "Advanced Mitigation")

        • -
        • Anti Detours (an ROP "Advanced Mitigation")

        • -
        • Banned Functions (an ROP "Advanced Mitigation")

        • -
        Mitigated in Windows 10 with applications compiled with Control Flow Guard, as described in Control Flow Guard, earlier in this topic.
        +|Specific EMET features|How these EMET features map to Windows 10 features| +|--- |--- | +|
      • DEP
      • SEHOP
      • ASLR (Force ASLR, Bottom-up ASLR)|DEP, SEHOP, and ASLR are included in Windows 10 as configurable features. See [Table 2](#table-2), earlier in this topic.You can install the ProcessMitigations PowerShell module to convert your EMET settings for these features into policies that you can apply to Windows 10.| +|
      • Load Library Check (LoadLib)
      • Memory Protection Check (MemProt)|LoadLib and MemProt are supported in Windows 10, for all applications that are written to use these functions. See [Table 4](#functions-that-software-vendors-can-use-to-build-mitigations-into-apps), earlier in this topic.| +|Null Page|Mitigations for this threat are built into Windows 10, as described in the "Memory reservations" item in [Kernel pool protections](#kernel-pool-protections), earlier in this topic.| +|
      • Heap Spray
      • EAF
      • EAF+|Windows 10 does not include mitigations that map specifically to these EMET features because they have low impact in the current threat landscape, and do not significantly increase the difficulty of exploiting vulnerabilities. Microsoft remains committed to monitoring the security environment as new exploits appear and taking steps to harden the operating system against them.| +|
      • Caller Check
      • Simulate Execution Flow
      • Stack Pivot
      • Deep Hooks (an ROP "Advanced Mitigation")
      • Anti Detours (an ROP "Advanced Mitigation")
      • Banned Functions (an ROP "Advanced Mitigation")|Mitigated in Windows 10 with applications compiled with Control Flow Guard, as described in [Control Flow Guard](#control-flow-guard), earlier in this topic.| ### Converting an EMET XML settings file into Windows 10 mitigation policies diff --git a/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md b/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md index 7794832d3e..da336ab0f6 100644 --- a/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md +++ b/windows/security/threat-protection/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md @@ -336,49 +336,13 @@ For more information on device health attestation, see the [Detect an unhealthy The following table details the hardware requirements for both virtualization-based security services and the health attestation feature. For more information, see [Minimum hardware requirements](/windows-hardware/design/minimum/minimum-hardware-requirements-overview). - ---- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
        HardwareMotivation

        UEFI 2.3.1 or later firmware with Secure Boot enabled

        Required to support UEFI Secure Boot.

        -

        UEFI Secure Boot ensures that the device boots only authorized code.

        -

        Additionally, Boot Integrity (Platform Secure Boot) must be supported following the requirements in Hardware Compatibility Specification for Systems for Windows 10 under the subsection: “System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby”

        Virtualization extensions, such as Intel VT-x, AMD-V, and SLAT must be enabled

        Required to support virtualization-based security.

        -
        -Note

        Device Guard can be enabled without using virtualization-based security.

        -
        -
        - -

        X64 processor

        Required to support virtualization-based security that uses Windows Hypervisor. Hyper-V is supported only on x64 processor (and not on x86).

        -

        Direct Memory Access (DMA) protection can be enabled to provide additional memory protection but requires processors to include DMA protection technologies.

        IOMMU, such as Intel VT-d, AMD-Vi

        Support for the IOMMU in Windows 10 enhances system resiliency against DMA attacks.

        Trusted Platform Module (TPM)

        Required to support health attestation and necessary for additional key protections for virtualization-based security. TPM 2.0 is supported. Support for TPM 1.2 was added beginning in Windows 10, version 1607 (RS1)

        +|Hardware|Motivation| +|--- |--- | +|UEFI 2.3.1 or later firmware with Secure Boot enabled|Required to support UEFI Secure Boot.

        UEFI Secure Boot ensures that the device boots only authorized code.

        Additionally, Boot Integrity (Platform Secure Boot) must be supported following the requirements in Hardware Compatibility Specification for Systems for Windows 10 under the subsection: “System.Fundamentals.Firmware.CS.UEFISecureBoot.ConnectedStandby”| +|Virtualization extensions, such as Intel VT-x, AMD-V, and SLAT must be enabled|Required to support virtualization-based security.

        **Note:** Device Guard can be enabled without using virtualization-based security.
        | +|X64 processor|Required to support virtualization-based security that uses Windows Hypervisor. Hyper-V is supported only on x64 processor (and not on x86).

        Direct Memory Access (DMA) protection can be enabled to provide additional memory protection but requires processors to include DMA protection technologies.| +|IOMMU, such as Intel VT-d, AMD-Vi|Support for the IOMMU in Windows 10 enhances system resiliency against DMA attacks.| +|Trusted Platform Module (TPM)|Required to support health attestation and necessary for additional key protections for virtualization-based security. TPM 2.0 is supported. Support for TPM 1.2 was added beginning in Windows 10, version 1607 (RS1)| This section presented information about several closely related controls in Windows 10. The multi-layer defenses and in-depth approach helps to eradicate low-level malware during boot sequence. Virtualization-based security is a fundamental operating system architecture change that adds a new security boundary. Device Guard and Credential Guard respectively help to block untrusted code and protect corporate domain credentials from theft and reuse. This section also briefly discussed the importance of managing devices and patching vulnerabilities. All these technologies can be used to harden and lock down devices while limiting the risk of attackers compromising them. @@ -591,36 +555,9 @@ For completeness of the measurements, see [Health Attestation CSP](/windows/clie The following table presents some key items that can be reported back to MDM depending on the type of Windows 10-based device. - ---- - - - - - - - - - - - - - -
        OS typeKey items that can be reported

        Windows 10 for desktop editions

          -
        • PCR0 measurement

        • -
        • Secure Boot Enabled

        • -
        • Secure Boot db matches Expected

        • -
        • Secure Boot dbx is up to date

        • -
        • Secure Boot policy GUID matches Expected

        • -
        • BitLocker enabled

        • -
        • Virtualization-based security enabled

        • -
        • ELAM was loaded

        • -
        • Code Integrity version is up to date

        • -
        • Code Integrity policy hash matches Expected

        • -
        +|OS type|Key items that can be reported| +|--- |--- | +|Windows 10 for desktop editions|

      • PCR0 measurement
      • Secure Boot Enabled
      • Secure Boot db matches Expected
      • Secure Boot dbx is up to date
      • Secure Boot policy GUID matches Expected
      • BitLocker enabled
      • Virtualization-based security enabled
      • ELAM was loaded
      • Code Integrity version is up to date
      • Code Integrity policy hash matches Expected| ### Leverage MDM and the Health Attestation Service