From 784a8bae51d4dc42bded73bbd540ad1123b56a61 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Sat, 12 Jun 2021 16:01:10 +0530 Subject: [PATCH 01/17] Updated --- .../mdm/policies-in-policy-csp-admx-backed.md | 2 + .../policy-configuration-service-provider.md | 10 ++ .../mdm/policy-csp-admx-networklistmanager.md | 162 ++++++++++++++++++ windows/client-management/mdm/toc.yml | 2 + 4 files changed, 176 insertions(+) create mode 100644 windows/client-management/mdm/policy-csp-admx-networklistmanager.md diff --git a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md index 6c81fd4df2..7d4bd55974 100644 --- a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md +++ b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md @@ -733,6 +733,8 @@ ms.date: 10/08/2020 - [ADMX_NetworkConnections/NC_ShowSharedAccessUI](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-showsharedaccessui) - [ADMX_NetworkConnections/NC_Statistics](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-statistics) - [ADMX_NetworkConnections/NC_StdDomainUserSetLocation](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-stddomainusersetlocation) +- [ADMX_NetworkListManager-AllowedTlsAuthenticatedEndpoints](./policy-csp-admz-networklistmanager.md#admx-networklistmanager-allowedtlsauthenticatedendpoints) +- [ADMX_NetworkListManager-ConfiguredTLSAuthenticationNetworkName](./policy-csp-admz-networklistmanager.md#admx-networklistmanager-configuredtlsauthenticationnetworkname) - [ADMX_OfflineFiles/Pol_AlwaysPinSubFolders](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-alwayspinsubfolders) - [ADMX_OfflineFiles/Pol_AssignedOfflineFiles_1](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-assignedofflinefiles-1) - [ADMX_OfflineFiles/Pol_AssignedOfflineFiles_2](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-assignedofflinefiles-2) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index fbe229c166..f04ef812f9 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -2573,6 +2573,16 @@ The following diagram shows the Policy configuration service provider in tree fo +### ADMX_NetworkListManager policies + +
+
+ ADMX_NetworkListManager/AllowedTlsAuthenticationEndpoints +
+
+ ADMX_NetworkListManager_ConfiguredTLSAuthenticationNetworkName +
+ ### ADMX_OfflineFiles policies
diff --git a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md new file mode 100644 index 0000000000..3bcfab9825 --- /dev/null +++ b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md @@ -0,0 +1,162 @@ +--- +title: Policy CSP - ADMX_NetworkListManager +description: Policy CSP - ADMX_NetworkListManager +ms.author: dansimp +ms.localizationpriority: medium +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: NimishaSatapathy +ms.date: 06/11/2021 +ms.reviewer: +manager: dansimp +--- + +# Policy CSP - ADMX_NetworkListManager + +> [!WARNING] +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. + +
+ + +## ADMX_NetworkListManager policies + +
+
+ ADMX_NetworkListManager/AllowedTLsAuthenticatedEndpoints +
+
+ ADMX_NetworkListManager/ConfiguredTLsAuthenticatedNetworkName +
+ + +
+ + +**ADMX_NetworkListManager/AllowedTLsAuthenticatedEndpoints** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Machine + +
+ + + +List of URLs (separated by Unicode character 0xF000) to endpoints accessible only within an enterprise's network. If any of the URLs can be resolved over HTTPS, the network would be considered authenticated. + + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Creates a new MDM policy that allows admins to configure a list of URIs of HTTPS endpoints that are considered secure* +- GP name: *NetworkListManager/AllowedTlsAuthenticationEndpoints* +- GP path: *OS\Core\STACK\MobCon-Mobile Connectivity\Connection Awareness\NLM* +- GP ADMX file name: *NetworkListManager.admx* + + + +
+ + +**ADMX_NetworkListManager/ConfiguredTLSAuthenticationNetworkName** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procross mark
Businesscross mark
Enterprisecheck mark
Educationcross mark
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Machine + +
+ + + +The string to be used to name the network authenticated against one of the endpoints listed in *NetworkListManager/AllowedTlsAuthenticationEndpoints* policy. + +> [!TIP] +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> +> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). +> +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). + + +ADMX Info: +- GP English name: *Creates a new MDM policy that allows admins to configure a name for TLS authenticated networks* +- GP name: *NetworkListManager/ConfiguredTLSAuthenticationNetworkName* +- GP path: *OS\Core\STACK\MobCon-Mobile Connectivity\Connection Awareness\NLM* +- GP ADMX file name: *NetworkListManager.admx* + + + diff --git a/windows/client-management/mdm/toc.yml b/windows/client-management/mdm/toc.yml index 8680bff0db..d6032a06af 100644 --- a/windows/client-management/mdm/toc.yml +++ b/windows/client-management/mdm/toc.yml @@ -519,6 +519,8 @@ items: href: policy-csp-admx-netlogon.md - name: ADMX_NetworkConnections href: policy-csp-admx-networkconnections.md + - name: ADMX_NetworkListManager + href: policy-csp-admx-networklistmanager.md - name: ADMX_OfflineFiles href: policy-csp-admx-offlinefiles.md - name: ADMX_PeerToPeerCaching From 19b71ff2ef545a4831b2f79fa8f93db6dd696f93 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Mon, 14 Jun 2021 15:00:58 +0530 Subject: [PATCH 02/17] Update policies-in-policy-csp-admx-backed.md --- .../mdm/policies-in-policy-csp-admx-backed.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md index 7d4bd55974..557e212d5d 100644 --- a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md +++ b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md @@ -733,8 +733,8 @@ ms.date: 10/08/2020 - [ADMX_NetworkConnections/NC_ShowSharedAccessUI](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-showsharedaccessui) - [ADMX_NetworkConnections/NC_Statistics](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-statistics) - [ADMX_NetworkConnections/NC_StdDomainUserSetLocation](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-stddomainusersetlocation) -- [ADMX_NetworkListManager-AllowedTlsAuthenticatedEndpoints](./policy-csp-admz-networklistmanager.md#admx-networklistmanager-allowedtlsauthenticatedendpoints) -- [ADMX_NetworkListManager-ConfiguredTLSAuthenticationNetworkName](./policy-csp-admz-networklistmanager.md#admx-networklistmanager-configuredtlsauthenticationnetworkname) +- [ADMX_NetworkListManager-AllowedTlsAuthenticatedEndpoints](./policy-csp-admx-networklistmanager.md#admx-networklistmanager-allowedtlsauthenticatedendpoints) +- [ADMX_NetworkListManager-ConfiguredTLSAuthenticationNetworkName](./policy-csp-admx-networklistmanager.md#admx-networklistmanager-configuredtlsauthenticationnetworkname) - [ADMX_OfflineFiles/Pol_AlwaysPinSubFolders](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-alwayspinsubfolders) - [ADMX_OfflineFiles/Pol_AssignedOfflineFiles_1](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-assignedofflinefiles-1) - [ADMX_OfflineFiles/Pol_AssignedOfflineFiles_2](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-assignedofflinefiles-2) From 6b05bcc9a7d8dde988e85d7aec658654870d3472 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Mon, 21 Jun 2021 15:23:20 +0530 Subject: [PATCH 03/17] Update policy-csp-admx-networklistmanager.md --- .../mdm/policy-csp-admx-networklistmanager.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md index 3bcfab9825..2f0f6cead2 100644 --- a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md @@ -24,17 +24,17 @@ manager: dansimp
- ADMX_NetworkListManager/AllowedTLsAuthenticatedEndpoints + ADMX_NetworkListManager/AllowedTlsAuthenticatedEndpoints
- ADMX_NetworkListManager/ConfiguredTLsAuthenticatedNetworkName + ADMX_NetworkListManager/ConfiguredTLSAuthenticationNetworkName

-**ADMX_NetworkListManager/AllowedTLsAuthenticatedEndpoints** +**ADMX_NetworkListManager/AllowedTlsAuthenticatedEndpoints** From aef01d2991f0620c8ae8e598e84f883119d275f8 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Mon, 21 Jun 2021 15:31:38 +0530 Subject: [PATCH 04/17] up --- .../client-management/mdm/policies-in-policy-csp-admx-backed.md | 2 +- .../client-management/mdm/policy-csp-admx-networklistmanager.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md index 557e212d5d..3cb809553f 100644 --- a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md +++ b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md @@ -733,7 +733,7 @@ ms.date: 10/08/2020 - [ADMX_NetworkConnections/NC_ShowSharedAccessUI](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-showsharedaccessui) - [ADMX_NetworkConnections/NC_Statistics](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-statistics) - [ADMX_NetworkConnections/NC_StdDomainUserSetLocation](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-stddomainusersetlocation) -- [ADMX_NetworkListManager-AllowedTlsAuthenticatedEndpoints](./policy-csp-admx-networklistmanager.md#admx-networklistmanager-allowedtlsauthenticatedendpoints) +- [ADMX_NetworkListManager-AllowedTlsAuthenticationEndpoints](./policy-csp-admx-networklistmanager.md#admx-networklistmanager-allowedtlsauthenticationendpoints) - [ADMX_NetworkListManager-ConfiguredTLSAuthenticationNetworkName](./policy-csp-admx-networklistmanager.md#admx-networklistmanager-configuredtlsauthenticationnetworkname) - [ADMX_OfflineFiles/Pol_AlwaysPinSubFolders](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-alwayspinsubfolders) - [ADMX_OfflineFiles/Pol_AssignedOfflineFiles_1](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-assignedofflinefiles-1) diff --git a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md index 2f0f6cead2..40de373e96 100644 --- a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md @@ -24,7 +24,7 @@ manager: dansimp
- ADMX_NetworkListManager/AllowedTlsAuthenticatedEndpoints + ADMX_NetworkListManager/AllowedTlsAuthenticationEndpoints
ADMX_NetworkListManager/ConfiguredTLSAuthenticationNetworkName From d6af85097ef258da0393fe6fdf13a7a95b56fd55 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Mon, 21 Jun 2021 19:15:48 +0530 Subject: [PATCH 05/17] Update policy-csp-admx-networklistmanager.md --- .../client-management/mdm/policy-csp-admx-networklistmanager.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md index 40de373e96..7d7619c1d7 100644 --- a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md @@ -34,7 +34,7 @@ manager: dansimp
-**ADMX_NetworkListManager/AllowedTlsAuthenticatedEndpoints** +**ADMX_NetworkListManager/AllowedTlsAuthenticationEndpoints**
From ccf432d723a0d0ac2ed36cd30de854d04075580a Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Mon, 21 Jun 2021 19:27:41 +0530 Subject: [PATCH 06/17] Update policy-csp-admx-networklistmanager.md --- .../mdm/policy-csp-admx-networklistmanager.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md index 7d7619c1d7..5901b7e3e1 100644 --- a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-admx-networklistmanager.md @@ -25,11 +25,9 @@ manager: dansimp
ADMX_NetworkListManager/AllowedTlsAuthenticationEndpoints -
ADMX_NetworkListManager/ConfiguredTLSAuthenticationNetworkName
-
@@ -99,7 +97,8 @@ ADMX Info:
-**ADMX_NetworkListManager/ConfiguredTLSAuthenticationNetworkName** +**ADMX_NetworkListManager/ConfiguredTLSAuthenticationNetworkName** +
From 025f819512f0a9fc772ffae451615af987a20de0 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Wed, 30 Jun 2021 20:18:05 +0530 Subject: [PATCH 07/17] Updated --- .../mdm/policies-in-policy-csp-admx-backed.md | 2 - .../policy-configuration-service-provider.md | 22 +++--- ...er.md => policy-csp-networklistmanager.md} | 76 ++++++++++++------- windows/client-management/mdm/toc.yml | 2 + 4 files changed, 62 insertions(+), 40 deletions(-) rename windows/client-management/mdm/{policy-csp-admx-networklistmanager.md => policy-csp-networklistmanager.md} (53%) diff --git a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md index 3cb809553f..6c81fd4df2 100644 --- a/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md +++ b/windows/client-management/mdm/policies-in-policy-csp-admx-backed.md @@ -733,8 +733,6 @@ ms.date: 10/08/2020 - [ADMX_NetworkConnections/NC_ShowSharedAccessUI](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-showsharedaccessui) - [ADMX_NetworkConnections/NC_Statistics](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-statistics) - [ADMX_NetworkConnections/NC_StdDomainUserSetLocation](./policy-csp-admx-networkconnections.md#admx-networkconnections-nc-stddomainusersetlocation) -- [ADMX_NetworkListManager-AllowedTlsAuthenticationEndpoints](./policy-csp-admx-networklistmanager.md#admx-networklistmanager-allowedtlsauthenticationendpoints) -- [ADMX_NetworkListManager-ConfiguredTLSAuthenticationNetworkName](./policy-csp-admx-networklistmanager.md#admx-networklistmanager-configuredtlsauthenticationnetworkname) - [ADMX_OfflineFiles/Pol_AlwaysPinSubFolders](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-alwayspinsubfolders) - [ADMX_OfflineFiles/Pol_AssignedOfflineFiles_1](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-assignedofflinefiles-1) - [ADMX_OfflineFiles/Pol_AssignedOfflineFiles_2](./policy-csp-admx-offlinefiles.md#admx-offlinefiles-pol-assignedofflinefiles-2) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index f04ef812f9..57262a6ce7 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -2573,16 +2573,6 @@ The following diagram shows the Policy configuration service provider in tree fo -### ADMX_NetworkListManager policies - -
-
- ADMX_NetworkListManager/AllowedTlsAuthenticationEndpoints -
-
- ADMX_NetworkListManager_ConfiguredTLSAuthenticationNetworkName -
- ### ADMX_OfflineFiles policies
@@ -7077,6 +7067,18 @@ The following diagram shows the Policy configuration service provider in tree fo
+### NetworkListManager policies + +
+
+ NetworkListManager/AllowedTlsAuthenticationEndpoints +
+
+ NetworkListManager/ConfiguredTLSAuthenticationNetworkName +
+
+
+ ### Notifications policies
diff --git a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md b/windows/client-management/mdm/policy-csp-networklistmanager.md similarity index 53% rename from windows/client-management/mdm/policy-csp-admx-networklistmanager.md rename to windows/client-management/mdm/policy-csp-networklistmanager.md index 5901b7e3e1..d8d7be2137 100644 --- a/windows/client-management/mdm/policy-csp-admx-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-networklistmanager.md @@ -1,38 +1,40 @@ --- -title: Policy CSP - ADMX_NetworkListManager -description: Policy CSP - ADMX_NetworkListManager +title: Policy CSP - NetworkListManager +description: The Policy CSP - NetworkListManager setting creates a new MDM policy that allows admins to configure a list of URIs of HTTPS endpoints that are considered secure. ms.author: dansimp -ms.localizationpriority: medium ms.topic: article ms.prod: w10 ms.technology: windows -author: NimishaSatapathy -ms.date: 06/11/2021 +author: nimishasatapathy +ms.localizationpriority: medium +ms.date: 09/27/2019 ms.reviewer: manager: dansimp --- -# Policy CSP - ADMX_NetworkListManager +# Policy CSP - NetworkListManager + -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-## ADMX_NetworkListManager policies +## NetworkListManager policies
- ADMX_NetworkListManager/AllowedTlsAuthenticationEndpoints -
- ADMX_NetworkListManager/ConfiguredTLSAuthenticationNetworkName + NetworkListManager/AllowedTlsAuthenticationEndpoints
+
+ NetworkListManager/ConfiguredTLSAuthenticationNetworkName +
+
+
-**ADMX_NetworkListManager/AllowedTlsAuthenticationEndpoints** +**NetworkListManager/AllowedTlsAuthenticationEndpoints**
@@ -46,11 +48,11 @@ manager: dansimp - + - + @@ -58,7 +60,7 @@ manager: dansimp - +
Procross markcheck mark
Businesscross markcheck mark
Enterprise
Educationcross markcheck mark
@@ -75,15 +77,15 @@ manager: dansimp -List of URLs (separated by Unicode character 0xF000) to endpoints accessible only within an enterprise's network. If any of the URLs can be resolved over HTTPS, the network would be considered authenticated. +This policy setting provides the list of URLs (separated by Unicode character 0xF000) to endpoints accessible only within an enterprise's network. If any of the URLs can be resolved over HTTPS, the network would be considered authenticated. > [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). > > You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). > -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). ADMX Info: @@ -96,9 +98,11 @@ ADMX Info:
- -**ADMX_NetworkListManager/ConfiguredTLSAuthenticationNetworkName** +
+ + +**NetworkListManager/ConfiguredTLSAuthenticationNetworkName** @@ -112,11 +116,11 @@ ADMX Info: - + - + @@ -124,7 +128,7 @@ ADMX Info: - +
Procross markcheck mark
Businesscross markcheck mark
Enterprise
Educationcross markcheck mark
@@ -141,21 +145,37 @@ ADMX Info: -The string to be used to name the network authenticated against one of the endpoints listed in *NetworkListManager/AllowedTlsAuthenticationEndpoints* policy. +This policy setting provides The string to be used to name the network authenticated against one of the endpoints listed in NetworkListManager/AllowedTlsAuthenticationEndpoints policy. + > [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). +> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). > > You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). > -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). +> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). ADMX Info: -- GP English name: *Creates a new MDM policy that allows admins to configure a name for TLS authenticated networks* +- GP English name: *Creates a new MDM policy that allows admins to configure a name for TLS authenticated networks* - GP name: *NetworkListManager/ConfiguredTLSAuthenticationNetworkName* - GP path: *OS\Core\STACK\MobCon-Mobile Connectivity\Connection Awareness\NLM* - GP ADMX file name: *NetworkListManager.admx* +
+ +Footnotes: + +- 1 - Available in Windows 10, version 1607. +- 2 - Available in Windows 10, version 1703. +- 3 - Available in Windows 10, version 1709. +- 4 - Available in Windows 10, version 1803. +- 5 - Available in Windows 10, version 1809. +- 6 - Available in Windows 10, version 1903. +- 7 - Available in Windows 10, version 1909. +- 8 - Available in Windows 10, version 2004. + + + diff --git a/windows/client-management/mdm/toc.yml b/windows/client-management/mdm/toc.yml index d6032a06af..f9a7d7ef62 100644 --- a/windows/client-management/mdm/toc.yml +++ b/windows/client-management/mdm/toc.yml @@ -727,6 +727,8 @@ items: href: policy-csp-multitasking.md - name: NetworkIsolation href: policy-csp-networkisolation.md + - name: NetworkLinkManager + href: policy-csp-networklinkmanager.md - name: Notifications href: policy-csp-notifications.md - name: Power From 1e90e9f4c81e499d996cfaa5e30825b0c964b236 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Tue, 13 Jul 2021 22:03:30 +0530 Subject: [PATCH 08/17] Updated --- .../mdm/policy-csp-networklistmanager.md | 17 ++++++++--------- windows/client-management/mdm/toc.yml | 4 ++-- 2 files changed, 10 insertions(+), 11 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-networklistmanager.md b/windows/client-management/mdm/policy-csp-networklistmanager.md index d8d7be2137..13da8d30a4 100644 --- a/windows/client-management/mdm/policy-csp-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-networklistmanager.md @@ -1,13 +1,13 @@ --- title: Policy CSP - NetworkListManager description: The Policy CSP - NetworkListManager setting creates a new MDM policy that allows admins to configure a list of URIs of HTTPS endpoints that are considered secure. -ms.author: dansimp +ms.author: v-nsatapathy ms.topic: article ms.prod: w10 ms.technology: windows author: nimishasatapathy ms.localizationpriority: medium -ms.date: 09/27/2019 +ms.date: 7/10/2021 ms.reviewer: manager: dansimp --- @@ -15,7 +15,6 @@ manager: dansimp # Policy CSP - NetworkListManager -
@@ -48,11 +47,11 @@ manager: dansimp Pro - check mark + check mark Business - check mark + check mark Enterprise @@ -60,7 +59,7 @@ manager: dansimp Education - check mark + check mark @@ -116,11 +115,11 @@ ADMX Info: Pro - check mark + check mark Business - check mark + check mark Enterprise @@ -128,7 +127,7 @@ ADMX Info: Education - check mark + check mark diff --git a/windows/client-management/mdm/toc.yml b/windows/client-management/mdm/toc.yml index f9a7d7ef62..0b96b10953 100644 --- a/windows/client-management/mdm/toc.yml +++ b/windows/client-management/mdm/toc.yml @@ -727,8 +727,8 @@ items: href: policy-csp-multitasking.md - name: NetworkIsolation href: policy-csp-networkisolation.md - - name: NetworkLinkManager - href: policy-csp-networklinkmanager.md + - name: NetworkListManager + href: policy-csp-networklistmanager.md - name: Notifications href: policy-csp-notifications.md - name: Power From 6d86539e91a7d9ff4a09cc75250d80242928fde3 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Tue, 13 Jul 2021 22:14:57 +0530 Subject: [PATCH 09/17] Update toc.yml --- windows/client-management/mdm/toc.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/toc.yml b/windows/client-management/mdm/toc.yml index 0b96b10953..51a0630b08 100644 --- a/windows/client-management/mdm/toc.yml +++ b/windows/client-management/mdm/toc.yml @@ -728,7 +728,7 @@ items: - name: NetworkIsolation href: policy-csp-networkisolation.md - name: NetworkListManager - href: policy-csp-networklistmanager.md + href: policy-csp-networklistmanager.md - name: Notifications href: policy-csp-notifications.md - name: Power From 94b4379cd2804c471a49451ffe7d129e50934136 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Tue, 13 Jul 2021 23:18:17 +0530 Subject: [PATCH 10/17] Update policy-csp-networklistmanager.md --- .../mdm/policy-csp-networklistmanager.md | 47 +------------------ 1 file changed, 1 insertion(+), 46 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-networklistmanager.md b/windows/client-management/mdm/policy-csp-networklistmanager.md index 13da8d30a4..4328d1b831 100644 --- a/windows/client-management/mdm/policy-csp-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-networklistmanager.md @@ -78,23 +78,6 @@ manager: dansimp This policy setting provides the list of URLs (separated by Unicode character 0xF000) to endpoints accessible only within an enterprise's network. If any of the URLs can be resolved over HTTPS, the network would be considered authenticated. - -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - -ADMX Info: -- GP English name: *Creates a new MDM policy that allows admins to configure a list of URIs of HTTPS endpoints that are considered secure* -- GP name: *NetworkListManager/AllowedTlsAuthenticationEndpoints* -- GP path: *OS\Core\STACK\MobCon-Mobile Connectivity\Connection Awareness\NLM* -- GP ADMX file name: *NetworkListManager.admx* - - -
@@ -144,37 +127,9 @@ ADMX Info: -This policy setting provides The string to be used to name the network authenticated against one of the endpoints listed in NetworkListManager/AllowedTlsAuthenticationEndpoints policy. +This policy setting provides the string to be used to name the network authenticated against one of the endpoints listed in NetworkListManager/AllowedTlsAuthenticationEndpoints policy. - -> [!TIP] -> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). -> -> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy). -> -> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - - -ADMX Info: -- GP English name: *Creates a new MDM policy that allows admins to configure a name for TLS authenticated networks* -- GP name: *NetworkListManager/ConfiguredTLSAuthenticationNetworkName* -- GP path: *OS\Core\STACK\MobCon-Mobile Connectivity\Connection Awareness\NLM* -- GP ADMX file name: *NetworkListManager.admx* - - -
-Footnotes: - -- 1 - Available in Windows 10, version 1607. -- 2 - Available in Windows 10, version 1703. -- 3 - Available in Windows 10, version 1709. -- 4 - Available in Windows 10, version 1803. -- 5 - Available in Windows 10, version 1809. -- 6 - Available in Windows 10, version 1903. -- 7 - Available in Windows 10, version 1909. -- 8 - Available in Windows 10, version 2004. - From 32cbdb5c1447644f8f8fd730b0eea74da2864ced Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Wed, 14 Jul 2021 18:09:46 +0530 Subject: [PATCH 11/17] Updated --- windows/client-management/mdm/toc.yml | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/client-management/mdm/toc.yml b/windows/client-management/mdm/toc.yml index 51a0630b08..1d385366fb 100644 --- a/windows/client-management/mdm/toc.yml +++ b/windows/client-management/mdm/toc.yml @@ -519,8 +519,6 @@ items: href: policy-csp-admx-netlogon.md - name: ADMX_NetworkConnections href: policy-csp-admx-networkconnections.md - - name: ADMX_NetworkListManager - href: policy-csp-admx-networklistmanager.md - name: ADMX_OfflineFiles href: policy-csp-admx-offlinefiles.md - name: ADMX_PeerToPeerCaching From 94d981697b8472c6d43a9109658929ac7ed622f3 Mon Sep 17 00:00:00 2001 From: nimishasatapathy <75668234+nimishasatapathy@users.noreply.github.com> Date: Thu, 15 Jul 2021 11:37:02 +0530 Subject: [PATCH 12/17] Update policy-csp-networklistmanager.md --- .../client-management/mdm/policy-csp-networklistmanager.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-networklistmanager.md b/windows/client-management/mdm/policy-csp-networklistmanager.md index 4328d1b831..9bbe04d477 100644 --- a/windows/client-management/mdm/policy-csp-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-networklistmanager.md @@ -59,7 +59,7 @@ manager: dansimp Education - check mark + check mark @@ -110,7 +110,7 @@ This policy setting provides the list of URLs (separated by Unicode character 0x Education - check mark + check mark From 6c9b8aa9f60f5d20fdf10e384b44aad2a4911ce6 Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Mon, 19 Jul 2021 16:25:16 -0700 Subject: [PATCH 13/17] quality updates article --- windows/deployment/TOC.yml | 2 + windows/deployment/update/quality-updates.md | 75 ++++++++++++++++++++ 2 files changed, 77 insertions(+) create mode 100644 windows/deployment/update/quality-updates.md diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml index ae0fdee1a2..048a630323 100644 --- a/windows/deployment/TOC.yml +++ b/windows/deployment/TOC.yml @@ -11,6 +11,8 @@ href: update/waas-quick-start.md - name: Windows update fundamentals href: update/waas-overview.md + - name: Monthly quality updates + href: update/quality-updates.md - name: Basics of Windows updates, channels, and tools href: update/get-started-updates-channels-tools.md - name: Servicing the Windows 10 operating system diff --git a/windows/deployment/update/quality-updates.md b/windows/deployment/update/quality-updates.md new file mode 100644 index 0000000000..8dd8e09a05 --- /dev/null +++ b/windows/deployment/update/quality-updates.md @@ -0,0 +1,75 @@ +--- +title: Overview of Windows as a service (Windows 10) +description: Windows as a service introduces a new way to build, deploy, and service Windows. Learn how Windows as a service works. +keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools +ms.prod: w10 +ms.mktglfcycl: manage +author: greg-lindsay +ms.localizationpriority: medium +ms.author: greglin +ms.reviewer: +manager: laurawi +ms.topic: article +--- + +# Monthly quality updates + +**Applies to** + +- Windows 10 +- Windows 11 + +Windows1 monthly quality updates help customers stay productive and protected. They provide consumers and IT administrators alike with the security fixes they need to protect their devices before unpatched vulnerabilities can potentially be exploited. They are cumulative and include all previously released fixes to guard against fragmentation of the operating system (OS) that can lead to reliability and vulnerability issues when only a subset of fixes is installed.   + +This document provides details on the types of monthly quality updates that Microsoft provides to consumers and organizations, and how they help make the overall user experience simpler and consistent. + +## Quality updates + +Quality updates are provided on a monthly schedule in non-security and combined security and non-security releases. Non-security releases provide IT admins an opportunity for early validation of that content prior to the combined release. Releases are provided outside of the monthly schedule when there is an exceptional need. + +### B releases + +Most users are familiar with what is commonly referred to as Patch Tuesday or Update Tuesday. These updates, published on the second Tuesday of each month, are known as the “B” release, where “B” refers to the second week in the month. They are published at 10:00 AM Pacific Time (PST/PDT). + +Because they are cumulative, they include both new and previously released security fixes, along with non-security content introduced in the prior month’s Preview “C” release (see below for details). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. “B” releases are mandatory. + +Channels for availability of “B” releases include Windows Update, Windows Server Update Services (WSUS), and the Microsoft Update Catalog. + +### C releases + +IT admins have the option to test and/or validate production-quality releases ahead of the planned “B” release for the following month. These are optional, cumulative, non-security preview releases. Known as “C” releases, they are only offered to the most recent, supported versions of Windows. New features like News and Interests may initially be deployed in the prior month’s “C” preview release, then ship in the following month’s “B” release. + +For customers to access the “C” releases, they must navigate to Settings > Update & Security > Windows Update and select the Check for updates box. + +IT admins may also validate fixes and features in a preview update by leveraging the Windows Insider Program for Business or via the Microsoft Update Catalog. + +### OOB releases + +Out-of-band (OOB) releases may be provided to fix a recently identified issue or vulnerability. They are used in atypical cases when an issue is detected and cannot wait for the next monthly release because devices must be updated immediately to address security vulnerabilities or to resolve a quality issue impacting many devices. + +Some key considerations about OOB releases include: + +- OOB releases are always cumulative, and they supersede any prior “B” or “C” release. +- The OOB releases will generally require IT admins to deploy off-cycle. +- Some OOB releases are classified as critical and will automatically be pushed to Windows Server Update Services and Windows Update for Business, just like the “B” releases. +- Some OOB releases are non-critical and only go to the Microsoft Update Catalog for users or organizations to voluntarily seek out the update. + +> [!NOTE] +> Windows monthly updates are applicable for Windows 10 and Windows 11 when released. + +## Also see + +For additional details about the different types of Windows updates like critical, security, drivers, service packs, and more, please see the Description of the standard terminology used to describe Microsoft software updates and Introducing a new deployment service for driver and firmware updates. + +## Related topics + +- [Overview of Windows as a service](waas-overview.md) +- [Update Windows 10 in the enterprise](index.md) +- [Quick guide to Windows as a service](waas-quick-start.md) +- [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md) +- [Configure BranchCache for Windows 10 updates](waas-branchcache.md) +- [Configure Windows Update for Business](waas-configure-wufb.md) +- [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md) +- [Walkthrough: use Group Policy to configure Windows Update for Business](waas-wufb-group-policy.md) +- [Walkthrough: use Intune to configure Windows Update for Business](/intune/windows-update-for-business-configure) +- [Manage device restarts after updates](waas-restart.md) From 944b8b35cf763a10b0245d9d6246aebbc21425ba Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Mon, 19 Jul 2021 16:44:59 -0700 Subject: [PATCH 14/17] edits --- windows/deployment/update/quality-updates.md | 21 +++++++++----------- 1 file changed, 9 insertions(+), 12 deletions(-) diff --git a/windows/deployment/update/quality-updates.md b/windows/deployment/update/quality-updates.md index 8dd8e09a05..eeea349c40 100644 --- a/windows/deployment/update/quality-updates.md +++ b/windows/deployment/update/quality-updates.md @@ -1,6 +1,6 @@ --- -title: Overview of Windows as a service (Windows 10) -description: Windows as a service introduces a new way to build, deploy, and service Windows. Learn how Windows as a service works. +title: Monthly quality updates (Windows 10/11) +description: Learn about Windows monthly quality updates to stay productive and protected. keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools ms.prod: w10 ms.mktglfcycl: manage @@ -19,7 +19,7 @@ ms.topic: article - Windows 10 - Windows 11 -Windows1 monthly quality updates help customers stay productive and protected. They provide consumers and IT administrators alike with the security fixes they need to protect their devices before unpatched vulnerabilities can potentially be exploited. They are cumulative and include all previously released fixes to guard against fragmentation of the operating system (OS) that can lead to reliability and vulnerability issues when only a subset of fixes is installed.   +Windows monthly quality updates help you stay productive and protected. They provide your users and IT administrators alike with the security fixes they need to protect their devices before unpatched vulnerabilities can potentially be exploited. They are cumulative and include all previously released fixes to guard against fragmentation of the operating system (OS) that can lead to reliability and vulnerability issues when only a subset of fixes is installed.   This document provides details on the types of monthly quality updates that Microsoft provides to consumers and organizations, and how they help make the overall user experience simpler and consistent. @@ -29,17 +29,17 @@ Quality updates are provided on a monthly schedule in non-security and combined ### B releases -Most users are familiar with what is commonly referred to as Patch Tuesday or Update Tuesday. These updates, published on the second Tuesday of each month, are known as the “B” release, where “B” refers to the second week in the month. They are published at 10:00 AM Pacific Time (PST/PDT). +Most users are familiar with what is commonly referred to as Patch Tuesday or Update Tuesday. These updates, published on the second Tuesday of each month, are known as the **B release**, where “B” refers to the second week in the month. They are typcially published at 10:00 AM Pacific Time (PST/PDT). -Because they are cumulative, they include both new and previously released security fixes, along with non-security content introduced in the prior month’s Preview “C” release (see below for details). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. “B” releases are mandatory. +Because they are cumulative, B releases include both new and previously released security fixes, along with non-security content introduced in the prior month’s Preview “C” release (see below for details). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. “B” releases are mandatory. Channels for availability of “B” releases include Windows Update, Windows Server Update Services (WSUS), and the Microsoft Update Catalog. ### C releases -IT admins have the option to test and/or validate production-quality releases ahead of the planned “B” release for the following month. These are optional, cumulative, non-security preview releases. Known as “C” releases, they are only offered to the most recent, supported versions of Windows. New features like News and Interests may initially be deployed in the prior month’s “C” preview release, then ship in the following month’s “B” release. +IT admins have the option to test and/or validate production-quality releases ahead of the planned B release for the following month. These are optional, cumulative, non-security preview releases. Known as **C releases**, they are only offered to the most recent, supported versions of Windows. New features like News and Interests may initially be deployed in the prior month’s C preview release, then ship in the following month’s B release. -For customers to access the “C” releases, they must navigate to Settings > Update & Security > Windows Update and select the Check for updates box. +For customers to access the C releases, they must navigate to **Settings** > **Update & Security** > **Windows Update** and select **Check for updates**. IT admins may also validate fixes and features in a preview update by leveraging the Windows Insider Program for Business or via the Microsoft Update Catalog. @@ -49,14 +49,11 @@ Out-of-band (OOB) releases may be provided to fix a recently identified issue or Some key considerations about OOB releases include: -- OOB releases are always cumulative, and they supersede any prior “B” or “C” release. +- OOB releases are always cumulative, and they supersede any prior B or C release. - The OOB releases will generally require IT admins to deploy off-cycle. -- Some OOB releases are classified as critical and will automatically be pushed to Windows Server Update Services and Windows Update for Business, just like the “B” releases. +- Some OOB releases are classified as critical and will automatically be pushed to Windows Server Update Services and Windows Update for Business, just like the B releases. - Some OOB releases are non-critical and only go to the Microsoft Update Catalog for users or organizations to voluntarily seek out the update. -> [!NOTE] -> Windows monthly updates are applicable for Windows 10 and Windows 11 when released. - ## Also see For additional details about the different types of Windows updates like critical, security, drivers, service packs, and more, please see the Description of the standard terminology used to describe Microsoft software updates and Introducing a new deployment service for driver and firmware updates. From b7c44aaed38f02f142b3c5ca7091047c6ecc8897 Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Tue, 20 Jul 2021 12:49:57 -0700 Subject: [PATCH 15/17] edits --- windows/deployment/update/quality-updates.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/deployment/update/quality-updates.md b/windows/deployment/update/quality-updates.md index eeea349c40..d2c2e6f9d6 100644 --- a/windows/deployment/update/quality-updates.md +++ b/windows/deployment/update/quality-updates.md @@ -19,33 +19,33 @@ ms.topic: article - Windows 10 - Windows 11 -Windows monthly quality updates help you stay productive and protected. They provide your users and IT administrators alike with the security fixes they need to protect their devices before unpatched vulnerabilities can potentially be exploited. They are cumulative and include all previously released fixes to guard against fragmentation of the operating system (OS) that can lead to reliability and vulnerability issues when only a subset of fixes is installed.   +Windows monthly quality updates help you to stay productive and protected. They provide your users and IT administrators with the security fixes they need, and protect devices before unpatched vulnerabilities can be exploited. Quality updates are cumulative; they include all previously released fixes to guard against fragmentation of the operating system (OS). Reliability and vulnerability issues can occur when only a subset of fixes is installed.   -This document provides details on the types of monthly quality updates that Microsoft provides to consumers and organizations, and how they help make the overall user experience simpler and consistent. +This document provides details on the types of monthly quality updates that Microsoft provides to consumers and organizations, and how they help make the overall user experience simple and consistent. ## Quality updates -Quality updates are provided on a monthly schedule in non-security and combined security and non-security releases. Non-security releases provide IT admins an opportunity for early validation of that content prior to the combined release. Releases are provided outside of the monthly schedule when there is an exceptional need. +Quality updates are provided on a monthly schedule, as two types of releases: non-security releases, and combined security + non-security releases. Non-security releases provide IT admins an opportunity for early validation of that content prior to the combined release. Releases can also be provided outside of the monthly schedule when there is an exceptional need. ### B releases -Most users are familiar with what is commonly referred to as Patch Tuesday or Update Tuesday. These updates, published on the second Tuesday of each month, are known as the **B release**, where “B” refers to the second week in the month. They are typcially published at 10:00 AM Pacific Time (PST/PDT). +Most users are familiar with what is commonly referred to as **Patch Tuesday** or **Update Tuesday**. These updates are published on the second Tuesday of each month, and are known as the **B release**, where “**B**” refers to the second week in the month. These updates are typically published at 10:00 AM Pacific Time (PST/PDT). -Because they are cumulative, B releases include both new and previously released security fixes, along with non-security content introduced in the prior month’s Preview “C” release (see below for details). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. “B” releases are mandatory. +Because they are cumulative, B releases include both new and previously released security fixes, along with non-security content introduced in the prior month’s Preview “C” release (see below). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. B releases are mandatory. -Channels for availability of “B” releases include Windows Update, Windows Server Update Services (WSUS), and the Microsoft Update Catalog. +Channels for availability of B releases include Windows Update, Windows Server Update Services (WSUS), and the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx). ### C releases -IT admins have the option to test and/or validate production-quality releases ahead of the planned B release for the following month. These are optional, cumulative, non-security preview releases. Known as **C releases**, they are only offered to the most recent, supported versions of Windows. New features like News and Interests may initially be deployed in the prior month’s C preview release, then ship in the following month’s B release. +IT admins have the option to test and validate production-quality releases ahead of the planned B release for the following month. These updates are optional, cumulative, non-security preview releases. Known as **C releases**, they are only offered to the most recent, supported versions of Windows. New features like [News and Interests](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/group-configuration-news-and-interests-on-the-windows-taskbar/ba-p/2281005) may initially be deployed in the prior month’s C preview release, then ship in the following month’s B release. For customers to access the C releases, they must navigate to **Settings** > **Update & Security** > **Windows Update** and select **Check for updates**. -IT admins may also validate fixes and features in a preview update by leveraging the Windows Insider Program for Business or via the Microsoft Update Catalog. +IT admins can also validate fixes and features in a preview update by leveraging the [Windows Insider Program for Business](https://insider.windows.com/for-business) or via the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx). ### OOB releases -Out-of-band (OOB) releases may be provided to fix a recently identified issue or vulnerability. They are used in atypical cases when an issue is detected and cannot wait for the next monthly release because devices must be updated immediately to address security vulnerabilities or to resolve a quality issue impacting many devices. +Out-of-band (OOB) releases might be provided to fix a recently identified issue or vulnerability. They are used in atypical cases when an issue is detected and cannot wait for the next monthly release, because devices must be updated immediately to address security vulnerabilities or to resolve a quality issue impacting many devices. Some key considerations about OOB releases include: From 91a245858f5dc9a0123067f7000d385a3df21853 Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Tue, 20 Jul 2021 13:19:26 -0700 Subject: [PATCH 16/17] edits --- windows/deployment/update/quality-updates.md | 23 ++++++++++++-------- 1 file changed, 14 insertions(+), 9 deletions(-) diff --git a/windows/deployment/update/quality-updates.md b/windows/deployment/update/quality-updates.md index d2c2e6f9d6..0c58b7d747 100644 --- a/windows/deployment/update/quality-updates.md +++ b/windows/deployment/update/quality-updates.md @@ -19,25 +19,30 @@ ms.topic: article - Windows 10 - Windows 11 -Windows monthly quality updates help you to stay productive and protected. They provide your users and IT administrators with the security fixes they need, and protect devices before unpatched vulnerabilities can be exploited. Quality updates are cumulative; they include all previously released fixes to guard against fragmentation of the operating system (OS). Reliability and vulnerability issues can occur when only a subset of fixes is installed.   +Windows monthly quality updates help you to stay productive and protected. They provide your users and IT administrators with the security fixes they need, and protect devices so that unpatched vulnerabilities can't be exploited. Quality updates are cumulative; they include all previously released fixes to guard against fragmentation of the operating system (OS). Reliability and vulnerability issues can occur when only a subset of fixes is installed.   -This document provides details on the types of monthly quality updates that Microsoft provides to consumers and organizations, and how they help make the overall user experience simple and consistent. +This article provides details on the types of monthly quality updates that Microsoft provides, and how they help make the overall user experience simple and consistent. ## Quality updates -Quality updates are provided on a monthly schedule, as two types of releases: non-security releases, and combined security + non-security releases. Non-security releases provide IT admins an opportunity for early validation of that content prior to the combined release. Releases can also be provided outside of the monthly schedule when there is an exceptional need. +Quality updates are provided on a monthly schedule, as two types of releases: + +1. Non-security releases +2. Combined security + non-security releases + +Non-security releases provide IT admins an opportunity for early validation of that content prior to the combined release. Releases can also be provided outside of the monthly schedule when there is an exceptional need. ### B releases -Most users are familiar with what is commonly referred to as **Patch Tuesday** or **Update Tuesday**. These updates are published on the second Tuesday of each month, and are known as the **B release**, where “**B**” refers to the second week in the month. These updates are typically published at 10:00 AM Pacific Time (PST/PDT). +Most people are familiar with what is commonly referred to as **Patch Tuesday** or **Update Tuesday**. These updates are released on the second Tuesday of each month, and are known as the **B release** (where “**B**” refers to the second week in the month). B releases are typically published at 10:00 AM Pacific Time (PST/PDT). -Because they are cumulative, B releases include both new and previously released security fixes, along with non-security content introduced in the prior month’s Preview “C” release (see below). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. B releases are mandatory. +Because they are cumulative, B releases include both new and previously released security fixes, along with non-security content introduced in the prior month’s Preview **C release** (see the next section). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. B releases are mandatory. -Channels for availability of B releases include Windows Update, Windows Server Update Services (WSUS), and the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx). +Channels for availability of B releases include: Windows Update, Windows Server Update Services (WSUS), and the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx). ### C releases -IT admins have the option to test and validate production-quality releases ahead of the planned B release for the following month. These updates are optional, cumulative, non-security preview releases. Known as **C releases**, they are only offered to the most recent, supported versions of Windows. New features like [News and Interests](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/group-configuration-news-and-interests-on-the-windows-taskbar/ba-p/2281005) may initially be deployed in the prior month’s C preview release, then ship in the following month’s B release. +IT admins have the option to test and validate production-quality releases ahead of the planned B release for the following month. These updates are optional, cumulative, non-security preview releases known as **C releases**. These releases are only offered to the most recent, supported versions of Windows. For example, new features like [News and Interests](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/group-configuration-news-and-interests-on-the-windows-taskbar/ba-p/2281005) might initially be deployed in the prior month’s C preview release, then ship in the following month’s B release. For customers to access the C releases, they must navigate to **Settings** > **Update & Security** > **Windows Update** and select **Check for updates**. @@ -54,9 +59,9 @@ Some key considerations about OOB releases include: - Some OOB releases are classified as critical and will automatically be pushed to Windows Server Update Services and Windows Update for Business, just like the B releases. - Some OOB releases are non-critical and only go to the Microsoft Update Catalog for users or organizations to voluntarily seek out the update. -## Also see +## More information -For additional details about the different types of Windows updates like critical, security, drivers, service packs, and more, please see the Description of the standard terminology used to describe Microsoft software updates and Introducing a new deployment service for driver and firmware updates. +For additional details about the different types of Windows updates like critical, security, drivers, service packs, and more, please see the [Description of the standard terminology used to describe Microsoft software updates](https://support.microsoft.com/help/824684) and [Introducing a new deployment service for driver and firmware updates](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/introducing-a-new-deployment-service-for-driver-and-firmware/ba-p/2176942). ## Related topics From 2e545e81bf9867b4e0e3d10102049dada8aac4dd Mon Sep 17 00:00:00 2001 From: greg-lindsay Date: Tue, 20 Jul 2021 13:31:40 -0700 Subject: [PATCH 17/17] edits --- windows/deployment/update/quality-updates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/quality-updates.md b/windows/deployment/update/quality-updates.md index 0c58b7d747..2f90ee99e0 100644 --- a/windows/deployment/update/quality-updates.md +++ b/windows/deployment/update/quality-updates.md @@ -36,7 +36,7 @@ Non-security releases provide IT admins an opportunity for early validation of t Most people are familiar with what is commonly referred to as **Patch Tuesday** or **Update Tuesday**. These updates are released on the second Tuesday of each month, and are known as the **B release** (where “**B**” refers to the second week in the month). B releases are typically published at 10:00 AM Pacific Time (PST/PDT). -Because they are cumulative, B releases include both new and previously released security fixes, along with non-security content introduced in the prior month’s Preview **C release** (see the next section). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. B releases are mandatory. +Because they are cumulative, B releases include both new and previously released security fixes, along with non-security content introduced in the prior month’s **Preview C release** (see the next section). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. B releases are mandatory. Channels for availability of B releases include: Windows Update, Windows Server Update Services (WSUS), and the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx).