Merge branch 'master' into App-v-revision

This commit is contained in:
Heidi Lohr 2018-06-26 09:24:34 -07:00
commit e6734b7605
18 changed files with 75 additions and 55 deletions

View File

@ -646,9 +646,9 @@ This policy setting specifies whether you see an additional page in Microsoft Ed
**Microsoft Intune to manage your MDM settings** **Microsoft Intune to manage your MDM settings**
| | | | | |
|---|---| |---|---|
|MDM name |[ShowMessageWhenOpeningInteretExplorerSites](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-showmessagewhenopeningsitesininternetexplorer) | |MDM name |[ShowMessageWhenOpeningSitesInInternetExplorer](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-showmessagewhenopeningsitesininternetexplorer) |
|Supported devices |Desktop | |Supported devices |Desktop |
|URI full path |./Vendor/MSFT/Policy/Config/Browser/ShowMessageWhenOpeningSitesInInteretExplorer | |URI full path |./Vendor/MSFT/Policy/Config/Browser/ShowMessageWhenOpeningSitesInInternetExplorer |
|Data type | Integer | |Data type | Integer |
|Allowed values |<ul><li>**0 (default)** - Doesnt show an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.</li><li>**1** - Shows an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.</li></ul> | |Allowed values |<ul><li>**0 (default)** - Doesnt show an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.</li><li>**1** - Shows an additional page in Microsoft Edge, stating that a site has been opened using Internet Explorer 11.</li></ul> |

View File

@ -12,7 +12,7 @@ ms.date: 04/17/2018
# Accounts CSP # Accounts CSP
The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and joint it to a local user group. This CSP was added in Windows 10, version 1803. The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and join it to a local user group. This CSP was added in Windows 10, version 1803.
The following diagram shows the Accounts configuration service provider in tree format. The following diagram shows the Accounts configuration service provider in tree format.

View File

@ -96,9 +96,9 @@ Example: Export the Debug logs
</SyncML> </SyncML>
``` ```
## Collect logs from Windows 10 Mobile devices ## Collect logs from Windows 10 Mobile devices
Since there is no Event Viewer in Windows 10 Mobile, you can use the [Field Medic]( http://go.microsoft.com/fwlink/p/?LinkId=718232) app to collect logs. Since there is no Event Viewer in Windows 10 Mobile, you can use the [Field Medic](https://www.microsoft.com/en-us/p/field-medic/9wzdncrfjb82?activetab=pivot%3aoverviewtab) app to collect logs.
**To collect logs manually** **To collect logs manually**
@ -168,9 +168,9 @@ The following table contains a list of common providers and their corresponding
   
## Collect logs remotely from Windows 10 Mobile devices ## Collect logs remotely from Windows 10 Holographic or Windows 10 Mobile devices
For mobile devices already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](diagnosticlog-csp.md). For holographic or mobile devices already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](diagnosticlog-csp.md).
You can use the DiagnosticLog CSP to enable the ETW provider. The provider ID is 3DA494E4-0FE2-415C-B895-FB5265C5C83B. The following examples show how to enable the ETW provider: You can use the DiagnosticLog CSP to enable the ETW provider. The provider ID is 3DA494E4-0FE2-415C-B895-FB5265C5C83B. The following examples show how to enable the ETW provider:

View File

@ -1627,6 +1627,28 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
## Change history in MDM documentation ## Change history in MDM documentation
### June 2018
<table class="mx-tdBreakAll">
<colgroup>
<col width="25%" />
<col width="75%" />
</colgroup>
<thead>
<tr class="header">
<th>New or updated topic</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align:top">[Diagnose MDM failures in Windows 10](diagnose-mdm-failures-in-windows-10.md)</td>
<td style="vertical-align:top"><p>Added procedure for collecting logs remotely from Windows 10 Holographic.</p>
</td></tr>
</tbody>
</table>
### May 2018 ### May 2018
<table class="mx-tdBreakAll"> <table class="mx-tdBreakAll">

View File

@ -4790,7 +4790,6 @@ The following diagram shows the Policy configuration service provider in tree fo
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) - [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
- [Settings/AllowDateTime](#settings-allowdatetime) - [Settings/AllowDateTime](#settings-allowdatetime)
- [Settings/AllowVPN](#settings-allowvpn) - [Settings/AllowVPN](#settings-allowvpn)
- [System/AllowFontProviders](#system-allowfontproviders)
- [System/AllowLocation](#system-allowlocation) - [System/AllowLocation](#system-allowlocation)
- [System/AllowTelemetry](#system-allowtelemetry) - [System/AllowTelemetry](#system-allowtelemetry)
- [Update/AllowAutoUpdate](#update-allowautoupdate) - [Update/AllowAutoUpdate](#update-allowautoupdate)

View File

@ -1,12 +1,12 @@
--- ---
title: Policy CSP - Browser title: Policy CSP - Browser
description: Policy CSP - Browser description: Policy CSP - Browser
ms.author: maricia
ms.topic: article ms.topic: article
ms.prod: w10 ms.prod: w10
ms.technology: windows ms.technology: windows
author: MariciaAlforque author: shortpatti
ms.date: 05/14/2018 ms.author: pashort
ms.date: 06/21/2018
--- ---
# Policy CSP - Browser # Policy CSP - Browser
@ -181,10 +181,9 @@ ms.date: 05/14/2018
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
Added in Windows 10, version 1703. Specifies whether to allow the address bar drop-down functionality in Microsoft Edge. If you want to minimize network connections from Microsoft Edge to Microsoft services, we recommend disabling this functionality.  Added in Windows 10, version 1703.
> [!NOTE] By default, Microsoft Edge shows the Address bar drop-down list and makes it available. When enabled (default setting), this policy takes precedence over the [Browser/AllowSearchSuggestionsinAddressBar](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowsearchsuggestionsinaddressbar) policy. If you want to minimize network connections from Microsoft Edge to Microsoft service, we recommend disabling this policy, which hides the Address bar drop-down list functionality. When disabled, Microsoft Edge also disables the _Show search and site suggestions as I type_ toggle in Settings.  
> Disabling this setting turns off the address bar drop-down functionality. Because search suggestions are shown in the drop-down list, this setting takes precedence over the Browser/AllowSearchSuggestionsinAddressBar setting.
Most restricted value is 0. Most restricted value is 0.
@ -245,7 +244,7 @@ The following list shows the supported values:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
Specifies whether autofill on websites is allowed. By default, users can choose to use Autofill for filling in form fields automatically. With this policy, you can configure Microsoft Edge, when enabled to use Autofill or, when disabled to prevent using Autofill.
Most restricted value is 0. Most restricted value is 0.
@ -318,13 +317,10 @@ To verify AllowAutofill is set to 0 (not allowed):
> [!NOTE] > [!NOTE]
> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead.
By default, the device allows Microsoft Edge on Windows 10 Mobile. Disabling this policy disables the Microsoft Edge tile, and when clicking the tile, a message opens indicating that the administrator disabled Internet browsing.
Specifies whether the browser is allowed on the device.
Most restricted value is 0. Most restricted value is 0.
When this policy is set to 0 (not allowed), the Microsoft Edge for Windows 10 Mobile tile will appear greyed out, and clicking on the tile will display a message indicating theat Internet browsing has been disabled by your administrator.
<!--/Description--> <!--/Description-->
<!--SupportedValues--> <!--SupportedValues-->
The following list shows the supported values: The following list shows the supported values:
@ -374,7 +370,7 @@ The following list shows the supported values:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
This policy setting lets you decide whether Microsoft Edge can automatically update the configuration data for the Books Library. By default, Microsoft Edge automatically updates the configuration data for the Books Library. Enabling this policy prevents Microsoft Edge from updating the configuration data.
<!--/Description--> <!--/Description-->
<!--SupportedValues--> <!--SupportedValues-->
@ -425,7 +421,7 @@ The following list shows the supported values:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
Specifies whether cookies are allowed. By default, Microsoft Edge allows all cookies from all websites. With this policy, however, you can configure Microsoft to block only 3rd-party cookies or block all cookies.
Most restricted value is 0. Most restricted value is 0.
@ -443,9 +439,9 @@ ADMX Info:
<!--SupportedValues--> <!--SupportedValues-->
The following list shows the supported values: The following list shows the supported values:
- 0 Block all cookies - 0 Block all cookies from all sites.
- 1 Block only third party cookies - 1 Block only cookies from third party websites.
- 2 - Allow cookies - 2 - Allow all cookies from all sites.
<!--/SupportedValues--> <!--/SupportedValues-->
<!--Validation--> <!--Validation-->
@ -501,8 +497,7 @@ To verify AllowCookies is set to 0 (not allowed):
> [!NOTE] > [!NOTE]
> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile.
By default, Microsoft Edge allows users to use the F12 developer tools to build and debug web pages. Disabling this policy prevents users from using the F12 developer tools.
Specifies whether employees can use F12 Developer Tools on Microsoft Edge. Turning this setting on, or not configuring it, lets employees use F12 Developer Tools. Turning this setting off stops employees from using F12 Developer Tools.
Most restricted value is 0. Most restricted value is 0.
@ -563,7 +558,7 @@ The following list shows the supported values:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
Specifies whether Do Not Track headers are allowed. By default, Microsoft Edge does not send Do Not Track requests to websites asking for tracking information, but users can choose to send tracking information to sites they visit. With this policy, you can configure Microsoft Edge to send or never send tracking information.
Most restricted value is 1. Most restricted value is 1.
@ -579,8 +574,10 @@ ADMX Info:
<!--SupportedValues--> <!--SupportedValues-->
The following list shows the supported values: The following list shows the supported values:
- 0 (default) Not allowed. - Blank/Null (default) Not configured - Does not send tracking information, but allow users to choose whether to send tracking information to sites they visit.
- 1 Allowed. - 0 (Disabled) - Never sends tracking information.
- 1 (Enabled) - Sends tracking information, including to the third parties whose content may be hosted on the sites visited.
<!--/SupportedValues--> <!--/SupportedValues-->
<!--Validation--> <!--Validation-->
@ -2381,7 +2378,7 @@ ADMX Info:
> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile.
Specifies whether to send intranet traffic over to Internet Explorer. By default, all websites, including intranet sites, open in Microsoft Edge automatically. Only enable this policy if there are known compatibility problems with Microsoft Edge. Enabling this policy loads only intranet sites in Internet Explorer 11 automatically.
Most restricted value is 0. Most restricted value is 0.
@ -2397,8 +2394,9 @@ ADMX Info:
<!--SupportedValues--> <!--SupportedValues-->
The following list shows the supported values: The following list shows the supported values:
- 0 (default) Intranet traffic is sent to Internet Explorer. - 0 (default) - All websites, including intranet sites, open in Microsoft Edge automatically.
- 1 Intranet traffic is sent to Microsoft Edge. - 1 - Only intranet sites open in Internet Explorer 11 automatically.
<!--/SupportedValues--> <!--/SupportedValues-->
<!--/Policy--> <!--/Policy-->

View File

@ -1204,7 +1204,6 @@ Footnote:
<!--StartHoloLens--> <!--StartHoloLens-->
## <a href="" id="hololenspolicies"></a>System policies supported by Windows Holographic for Business ## <a href="" id="hololenspolicies"></a>System policies supported by Windows Holographic for Business
- [System/AllowFontProviders](#system-allowfontproviders)
- [System/AllowLocation](#system-allowlocation) - [System/AllowLocation](#system-allowlocation)
- [System/AllowTelemetry](#system-allowtelemetry) - [System/AllowTelemetry](#system-allowtelemetry)
<!--EndHoloLens--> <!--EndHoloLens-->

View File

@ -634,7 +634,7 @@ Follow these steps to create a bootable USB stick from the offline media content
## <a href="" id="sec11"></a>Unified Extensible Firmware Interface (UEFI)-based deployments ## <a href="" id="sec11"></a>Unified Extensible Firmware Interface (UEFI)-based deployments
As referenced in [Windows 10 deployment tools](https://go.microsoft.com/fwlink/p/?LinkId=619546), Unified Extensible Firmware Interface (UEFI)-based deployments are becoming more common. In fact, when you create a generation 2 virtual machine in Hyper-V, you get a UEFI-based computer. During deployment, MDT automatically detects that you have an UEFI-based machine and creates the partitions UEFI requires. You do not need to update or change your task sequences in any way to accommodate UFEI. As referenced in [Windows 10 deployment tools](https://go.microsoft.com/fwlink/p/?LinkId=619546), Unified Extensible Firmware Interface (UEFI)-based deployments are becoming more common. In fact, when you create a generation 2 virtual machine in Hyper-V, you get a UEFI-based computer. During deployment, MDT automatically detects that you have an UEFI-based machine and creates the partitions UEFI requires. You do not need to update or change your task sequences in any way to accommodate UEFI.
![figure 14](../images/mdt-07-fig16.png) ![figure 14](../images/mdt-07-fig16.png)

View File

@ -8,7 +8,7 @@ ms.sitesec: library
ms.pagetype: security ms.pagetype: security
ms.localizationpriority: high ms.localizationpriority: high
author: brianlic-msft author: brianlic-msft
ms.date: 07/27/2017 ms.date: 06/18/2018
--- ---
# Trusted Platform Module Technology Overview # Trusted Platform Module Technology Overview

View File

@ -73,7 +73,7 @@ A deployment's trust type defines how each Windows Hello for Business client aut
The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during an in-box provisioning experience, which requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more. The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during an in-box provisioning experience, which requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more.
The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the in-box provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers. Users can authentication using their certificate to any Windows Server 2008 R2 or later domain controller. The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the in-box provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers. Users can authentice using their certificate to any Windows Server 2008 R2 or later domain controller.
#### Device registration #### Device registration

View File

@ -8,7 +8,7 @@ ms.sitesec: library
ms.pagetype: security ms.pagetype: security
localizationpriority: high localizationpriority: high
author: brianlic-msft author: brianlic-msft
ms.date: 05/03/2018 ms.date: 06/25/2018
--- ---
# BitLocker Deployment and Administration FAQ # BitLocker Deployment and Administration FAQ
@ -44,12 +44,12 @@ No, BitLocker does not encrypt and decrypt the entire drive when reading and wri
## How can I prevent users on a network from storing data on an unencrypted drive? ## How can I prevent users on a network from storing data on an unencrypted drive?
You can can Group Policy settings to require that data drives be BitLocker-protected before a BitLocker-protected computer can write data to them. For more info, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md). You can configure Group Policy settings to require that data drives be BitLocker-protected before a BitLocker-protected computer can write data to them. For more info, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md).
When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only.
## What is Used Disk Space Only encryption? ## What is Used Disk Space Only encryption?
BitLocker in Windows 10 lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to beencrypted. For more information, see [Used Disk Space Only encryption](bitlocker-device-encryption-overview-windows-10.md#used-disk-space-only-encryption). BitLocker in Windows 10 lets users choose to encrypt just their data. Although it's not the most secure way to encrypt a drive, this option can reduce encryption time by more than 99 percent, depending on how much data that needs to be encrypted. For more information, see [Used Disk Space Only encryption](bitlocker-device-encryption-overview-windows-10.md#used-disk-space-only-encryption).
## What system changes would cause the integrity check on my operating system drive to fail? ## What system changes would cause the integrity check on my operating system drive to fail?

View File

@ -7,7 +7,7 @@ ms.mktglfcycl: deploy
ms.localizationpriority: high ms.localizationpriority: high
ms.author: sagaudre ms.author: sagaudre
author: brianlic-msft author: brianlic-msft
ms.date: 05/01/2018 ms.date: 06/25/2018
--- ---
# Get Support # Get Support
@ -25,7 +25,7 @@ Any version of Windows baseline before Windows 10 1703 can still be downloaded u
- [SCM 4.0 Download](https://technet.microsoft.com/solutionaccelerators/cc835245.aspx) - [SCM 4.0 Download](https://technet.microsoft.com/solutionaccelerators/cc835245.aspx)
- [SCM Frequently Asked Questions (FAQ)](https://social.technet.microsoft.com/wiki/contents/articles/1836.microsoft-security-compliance-manager-scm-frequently-asked-questions-faq.aspx) - [SCM Frequently Asked Questions (FAQ)](https://social.technet.microsoft.com/wiki/contents/articles/1836.microsoft-security-compliance-manager-scm-frequently-asked-questions-faq.aspx)
- [SCM Release Notes](https://social.technet.microsoft.com/wiki/contents/articles/1864.microsoft-security-compliance-manager-scm-release-notes.aspx) - [SCM Release Notes](https://social.technet.microsoft.com/wiki/contents/articles/1864.microsoft-security-compliance-manager-scm-release-notes.aspx)
- [SCM Baseline Download Help](https://social.technet.microsoft.com/wiki/contents/articles/1865.microsoft-security-compliance-manager-scm-baseline-download-help.aspx) - [SCM baseline download help](https://social.technet.microsoft.com/wiki/contents/articles/1865.microsoft-security-compliance-manager-scm-baseline-download-help.aspx)
**What file formats are supported by the new SCT?** **What file formats are supported by the new SCT?**
@ -94,4 +94,4 @@ Internet Explorer 11 | [SecGuide](https://blogs.technet.microsoft.com/secguide/2
## See also ## See also
[Windows Security Baselines](windows-security-baselines.md) [Windows security baselines](windows-security-baselines.md)

View File

@ -7,7 +7,7 @@ ms.mktglfcycl: deploy
ms.localizationpriority: high ms.localizationpriority: high
ms.author: sagaudre ms.author: sagaudre
author: brianlic-msft author: brianlic-msft
ms.date: 05/01/2018 ms.date: 06/25/2018
--- ---
# Microsoft Security Compliance Toolkit 1.0 # Microsoft Security Compliance Toolkit 1.0
@ -21,7 +21,7 @@ The SCT enables administrators to effectively manage their enterprises Group
The Security Compliance Toolkit consists of: The Security Compliance Toolkit consists of:
- Windows 10 Security Baselines - Windows 10 security baselines
- Windows 10 Version 1803 (April 2018 Update) - Windows 10 Version 1803 (April 2018 Update)
- Windows 10 Version 1709 (Fall Creators Update) - Windows 10 Version 1709 (Fall Creators Update)
- Windows 10 Version 1703 (Creators Update) - Windows 10 Version 1703 (Creators Update)
@ -29,11 +29,11 @@ The Security Compliance Toolkit consists of:
- Windows 10 Version 1511 (November Update) - Windows 10 Version 1511 (November Update)
- Windows 10 Version 1507 - Windows 10 Version 1507
- Windows Server Security Baselines - Windows Server security baselines
- Windows Server 2016 - Windows Server 2016
- Windows Server 2012 R2 - Windows Server 2012 R2
- Microsoft Office Security Baselines - Microsoft Office security baseline
- Office 2016 - Office 2016
- Tools - Tools

Binary file not shown.

Before

Width:  |  Height:  |  Size: 42 KiB

After

Width:  |  Height:  |  Size: 45 KiB

View File

@ -103,7 +103,7 @@ Use optional query parameters to specify and control the amount of data returned
Name | Value| Description Name | Value| Description
:---|:---|:--- :---|:---|:---
DateTime?sinceTimeUtc | string | Defines the lower time bound alerts are retrieved from, based on field: <br> `LastProccesedTimeUtc` <br> The time range will be: from sinceTimeUtc time to current time. <br><br> **NOTE**: When not specified, all alerts generated in the last two hours are retrieved. DateTime?sinceTimeUtc | string | Defines the lower time bound alerts are retrieved from, based on field: <br> `LastProcessedTimeUtc` <br> The time range will be: from sinceTimeUtc time to current time. <br><br> **NOTE**: When not specified, all alerts generated in the last two hours are retrieved.
DateTime?untilTimeUtc | string | Defines the upper time bound alerts are retrieved. <br> The time range will be: from `sinceTimeUtc` time to `untilTimeUtc` time. <br><br> **NOTE**: When not specified, the default value will be the current time. DateTime?untilTimeUtc | string | Defines the upper time bound alerts are retrieved. <br> The time range will be: from `sinceTimeUtc` time to `untilTimeUtc` time. <br><br> **NOTE**: When not specified, the default value will be the current time.
string ago | string | Pulls alerts in the following time range: from `(current_time - ago)` time to `current_time` time. <br><br> Value should be set according to **ISO 8601** duration format <br> E.g. `ago=PT10M` will pull alerts received in the last 10 minutes. string ago | string | Pulls alerts in the following time range: from `(current_time - ago)` time to `current_time` time. <br><br> Value should be set according to **ISO 8601** duration format <br> E.g. `ago=PT10M` will pull alerts received in the last 10 minutes.
int?limit | int | Defines the number of alerts to be retrieved. Most recent alerts will be retrieved based on the number defined.<br><br> **NOTE**: When not specified, all alerts available in the time range will be retrieved. int?limit | int | Defines the number of alerts to be retrieved. Most recent alerts will be retrieved based on the number defined.<br><br> **NOTE**: When not specified, all alerts available in the time range will be retrieved.

View File

@ -10,7 +10,7 @@ ms.pagetype: security
ms.author: macapara ms.author: macapara
author: mjcaparas author: mjcaparas
ms.localizationpriority: high ms.localizationpriority: high
ms.date: 02/26/2018 ms.date: 06/25/2018
--- ---
# Troubleshoot custom threat intelligence issues # Troubleshoot custom threat intelligence issues
@ -39,8 +39,10 @@ If your client secret expires or if you've misplaced the copy provided when you
3. Select your tenant. 3. Select your tenant.
4. Click **App registrations** > **All apps**. Then select the application name **WindowsDefenderATPThreatIntelAPI** (formerly known as **WindowsDefenderATPCustomerTiConnector**). 4. Click **App registrations** > **All apps**. Then select the relevant application name:
- **WindowsDefenderATPThreatIntelAPI** (formerly known as **WindowsDefenderATPCustomerTiConnector**)
- **WindowsDefenderATPSiemConnector**
5. Under **Settings**, select **Keys**, then provide a key description and specify the key validity duration. 5. Under **Settings**, select **Keys**, then provide a key description and specify the key validity duration.
6. Click **Save**. The key value is displayed. 6. Click **Save**. The key value is displayed.

View File

@ -69,7 +69,7 @@ If the portal dashboard, and other sections show an error message such as "Data
![Image of data currently isn't available](images/atp-data-not-available.png) ![Image of data currently isn't available](images/atp-data-not-available.png)
You'll need to whitelist the `security.windows.com` and all sub-domains under it. For example `*security.windows.com`. You'll need to whitelist the `securitycenter.windows.com` and all sub-domains under it. For example `*.securitycenter.windows.com`.
## Related topics ## Related topics

View File

@ -1,16 +1,16 @@
--- ---
title: Windows Security Baselines title: Windows security baselines
description: This article, and the articles it links to, describe how to use Windows Security Baselines in your organization description: This article, and the articles it links to, describe how to use Windows security baselines in your organization
keywords: virtualization, security, malware keywords: virtualization, security, malware
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.localizationpriority: high ms.localizationpriority: high
ms.author: sagaudre ms.author: sagaudre
author: brianlic-msft author: brianlic-msft
ms.date: 05/01/2018 ms.date: 06/25/2018
--- ---
# Windows Security Baselines # Windows security baselines
**Applies to** **Applies to**