diff --git a/mdop/appv-v4/application-virtualization-client-hardware-and-software-requirements.md b/mdop/appv-v4/application-virtualization-client-hardware-and-software-requirements.md index 5dec2b8fb8..4f285ff5cf 100644 --- a/mdop/appv-v4/application-virtualization-client-hardware-and-software-requirements.md +++ b/mdop/appv-v4/application-virtualization-client-hardware-and-software-requirements.md @@ -50,7 +50,7 @@ The hardware requirements are applicable to all versions. Operating System Edition Service Pack -System Architecture +Achitectural SKU @@ -74,31 +74,21 @@ The hardware requirements are applicable to all versions.

Windows 8

-

Professional or Enterprise Edition

+

Pro or Enterprise Edition

x86 and x64

-  - -**Note**   The following software prerequisites are installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, the following products must be installed first. - - **Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2005 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=119961) (https://go.microsoft.com/fwlink/?LinkId=119961). For version 4.5 SP2 of the App-V client, download Vcredist\_x86.exe from [Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package ATL Security Update](https://go.microsoft.com/fwlink/?LinkId=169360) (https://go.microsoft.com/fwlink/?LinkId=169360). + - **Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)**—For more information about installing Microsoft Core XML Services (MSXML) 6.0 SP1 (x86), see [Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)](https://go.microsoft.com/fwlink/?LinkId=63266) (https://go.microsoft.com/fwlink/?LinkId=63266). -- **Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)**—For more information about installing Microsoft Core XML Services (MSXML) 6.0 SP1 (x86), see [Microsoft Core XML Services (MSXML) 6.0 SP1 (x86)](https://go.microsoft.com/fwlink/?LinkId=63266) (https://go.microsoft.com/fwlink/?LinkId=63266). - -  - -**Note**   For the Application Virtualization (App-V) 4.6 Desktop Client, the following additional software prerequisite is installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, you must also install with the other prerequisites listed. - **Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2008 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=150700) (https://go.microsoft.com/fwlink/?LinkId=150700). -  - ### Software Requirements for Versions that Precede App-V 4.6 SP2 @@ -113,7 +103,7 @@ For the Application Virtualization (App-V) 4.6 Desktop Client, the following add - + @@ -121,33 +111,26 @@ For the Application Virtualization (App-V) 4.6 Desktop Client, the following add - + - + - +
Operating System Edition Service PackSystem ArchitectureAchitectural SKU

Windows XP

Professional Edition

SP2 or SP3

x86

x86 and x64

Windows Vista

Business, Enterprise, or Ultimate Edition

No service pack, SP1, or SP2

x86

x86 and x64

Windows 7¹

Professional, Enterprise, or Ultimate Edition

No service pack or SP1

x86

x86 and x64

- -  - ¹Supported for App-V 4.5 SP1 and SP2, App-V 4.6 and 4.6 SP1 only -**Note**   -The Application Virtualization (App-V) 4.6 Desktop Client supports 32-bit and 64-bit versions of these operating systems. +The Application Virtualization (App-V) 4.6 Desktop Client supports x86 and x64 SKUs of these operating systems. -  - -**Note**   The following software prerequisites are installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, the following products must be installed first. - **Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2005 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=119961) (https://go.microsoft.com/fwlink/?LinkId=119961). For version 4.5 SP2 of the App-V client, download Vcredist\_x86.exe from [Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package ATL Security Update](https://go.microsoft.com/fwlink/?LinkId=169360) (https://go.microsoft.com/fwlink/?LinkId=169360). @@ -156,25 +139,16 @@ The following software prerequisites are installed automatically if you are usin - **Microsoft Application Error Reporting**—The installation program for this software is included in the **Support\\Watson** folder in the self-extracting archive file. -  - -**Note**   For the Application Virtualization (App-V) 4.6 Desktop Client, the following additional software prerequisite is installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, you must also install with the other prerequisites listed. - **Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2008 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=150700) (https://go.microsoft.com/fwlink/?LinkId=150700). -  - ## Application Virtualization Client for Remote Desktop Services - Following are the recommended hardware and software requirements for the Application Virtualization Client for Remote Desktop Services. The requirements are listed first for appv461\_3, followed by the requirements for versions that preceded App-V 4.6 SP2. -**Note**   The Application Virtualization (App-V) Client for Remote Desktop Services requires no additional processor or RAM resources beyond the requirements of the host operating system. -  - ### Hardware Requirements The hardware requirements are applicable to all versions. @@ -199,7 +173,7 @@ The hardware requirements are applicable to all versions. Operating System Edition Service Pack -System Architecture +Achitectural SKU @@ -207,13 +181,13 @@ The hardware requirements are applicable to all versions.

Windows Server 2003 R2

Standard Edition, Enterprise Edition, or Datacenter Edition

SP2

-

x86

+

x86 and x64

Windows Server 2008

Standard, Enterprise, or Datacenter Edition

SP2

-

x86

+

x86 and x64

Windows Server 2008 R2

@@ -225,14 +199,11 @@ The hardware requirements are applicable to all versions.

Windows Server 2012

Standard, Enterprise, or Datacenter Edition

-

x86 or x64

+

x64

-  - -**Note**   The following software prerequisites are installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, the following products must be installed first. - **Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2005 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2005 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=119961) (https://go.microsoft.com/fwlink/?LinkId=119961). For version 4.5 SP2 of the App-V client, download Vcredist\_x86.exe from [Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package ATL Security Update](https://go.microsoft.com/fwlink/?LinkId=169360) (https://go.microsoft.com/fwlink/?LinkId=169360). @@ -241,15 +212,10 @@ The following software prerequisites are installed automatically if you are usin - **Microsoft Application Error Reporting**—The installation program for this software is included in the **Support\\Watson** folder in the self-extracting archive file. -  - -**Note**   For the Application Virtualization (App-V) 4.6 Desktop Client, the following additional software prerequisite is installed automatically if you are using the Setup.exe method. If you are using the Setup.msi installation program, you must also install with the other prerequisites listed. - **Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)**—For more information about installing Microsoft Visual C++ 2008 SP1 Redistributable Package (x86), see [Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)](https://go.microsoft.com/fwlink/?LinkId=150700) (https://go.microsoft.com/fwlink/?LinkId=150700). -  - ### Software Requirements for Versions that Precede App-V 4.6 SP2 @@ -264,7 +230,7 @@ For the Application Virtualization (App-V) 4.6 Desktop Client, the following add - + @@ -272,19 +238,19 @@ For the Application Virtualization (App-V) 4.6 Desktop Client, the following add - + - + - + @@ -295,31 +261,11 @@ For the Application Virtualization (App-V) 4.6 Desktop Client, the following add
Operating System Edition Service PackSystem ArchitectureAchitectural SKU

Windows Server 2003

Standard Edition, Enterprise Edition, or Datacenter Edition

SP1 or SP2

x86

x86 and x64

Windows Server 2003 R2

Standard Edition, Enterprise Edition, or Datacenter Edition

No service pack or SP2

x86

x86 and x64

Windows Server 2008

Standard, Enterprise, or Datacenter Edition

SP1 or SP2

x86

x86 and x64

Windows Server 2008 R2

-  - -**Note**   -The Application Virtualization (App-V) 4.6 Client for Remote Desktop Services supports 32-bit and 64-bit versions of these operating systems. - -  +The Application Virtualization (App-V) 4.6 Client for Remote Desktop Services supports x86 and x64 SKUs of these operating systems. ## Related topics - - -[Application Virtualization Sequencer Hardware and Software Requirements](application-virtualization-sequencer-hardware-and-software-requirements.md) - -[Application Virtualization System Requirements](application-virtualization-system-requirements.md) - -[How to Install the Client by Using the Command Line](how-to-install-the-client-by-using-the-command-line-new.md) - -[How to Manually Install the Application Virtualization Client](how-to-manually-install-the-application-virtualization-client.md) - -[How to Upgrade the Application Virtualization Client](how-to-upgrade-the-application-virtualization-client.md) - -  - -  - - - - - +- [Application Virtualization Sequencer Hardware and Software Requirements](application-virtualization-sequencer-hardware-and-software-requirements.md) +- [Application Virtualization System Requirements](application-virtualization-system-requirements.md) +- [How to Install the Client by Using the Command Line](how-to-install-the-client-by-using-the-command-line-new.md) +- [How to Manually Install the Application Virtualization Client](how-to-manually-install-the-application-virtualization-client.md) +- [How to Upgrade the Application Virtualization Client](how-to-upgrade-the-application-virtualization-client.md) diff --git a/mdop/appv-v4/application-virtualization-sequencer-hardware-and-software-requirements.md b/mdop/appv-v4/application-virtualization-sequencer-hardware-and-software-requirements.md index 01ed9e88ed..9186e17f03 100644 --- a/mdop/appv-v4/application-virtualization-sequencer-hardware-and-software-requirements.md +++ b/mdop/appv-v4/application-virtualization-sequencer-hardware-and-software-requirements.md @@ -86,7 +86,7 @@ The following list outlines the supported operating systems for running the App-

Windows 8

-

Professional or Enterprise Edition

+

Pro or Enterprise Edition

x86 and x64

diff --git a/windows/client-management/mdm/policy-csp-restrictedgroups.md b/windows/client-management/mdm/policy-csp-restrictedgroups.md index 1d41637f5b..e2bc67b21b 100644 --- a/windows/client-management/mdm/policy-csp-restrictedgroups.md +++ b/windows/client-management/mdm/policy-csp-restrictedgroups.md @@ -114,8 +114,8 @@ Here is an example: ``` - - + + ``` diff --git a/windows/deployment/upgrade/windows-10-upgrade-paths.md b/windows/deployment/upgrade/windows-10-upgrade-paths.md index 4ca5f1bd95..166c96a39c 100644 --- a/windows/deployment/upgrade/windows-10-upgrade-paths.md +++ b/windows/deployment/upgrade/windows-10-upgrade-paths.md @@ -142,7 +142,7 @@ D = Edition downgrade; personal data is maintained, applications and settings ar - Professional + Pro D ✔ ✔ @@ -153,7 +153,7 @@ D = Edition downgrade; personal data is maintained, applications and settings ar - Professional Student + Pro Student D ✔ ✔ @@ -164,7 +164,7 @@ D = Edition downgrade; personal data is maintained, applications and settings ar - Professional WMC + Pro WMC D ✔ ✔ @@ -233,7 +233,7 @@ D = Edition downgrade; personal data is maintained, applications and settings ar - Professional + Pro D ✔ ✔ diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md index cb4b220902..8cd71d80c3 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md @@ -18,22 +18,19 @@ ms.date: 06/01/2018 Windows Autopilot depends on specific capabilities available in Windows 10 and Azure Active Directory; it also requires an MDM service such as Microsoft Intune. These capabilities can be obtained through various editions and subscription programs: -- Windows 10 version 1703 or higher must be used. The Professional, Professional for Education, Business, Enterprise, and Education editions are supported. - +- Windows 10 version 1703 or higher must be used. Supported editions are the following: + - Pro + - Pro Education + - Pro for Workstations + - Enterprise + - Education - One of the following, to provide needed Azure Active Directory (automatic MDM enrollment and company branding features) and MDM functionality: - - Microsoft 365 Business subscriptions - - Microsoft 365 F1 subscriptions - - Microsoft 365 Enterprise E3 or E5 subscriptions, which include all Windows 10, Office 365, and EM+S features (Azure AD and Intune) - - Enterprise Mobility + Security E3 or E5 subscriptions, which include all needed Azure AD and Intune features - - Azure Active Directory Premium P1 or P2 and Intune subscriptions (or an alternative MDM service) Additionally, the following are also recommended but not required: - - Office 365 ProPlus, which can be deployed easily via Intune (or other MDM services) - - [Windows Subscription Activation](https://docs.microsoft.com/en-us/windows/deployment/windows-10-enterprise-subscription-activation), to automatically step up devices from Windows 10 Pro to Windows 10 Enterprise diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index a2276b46e7..ba15937384 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -44,7 +44,7 @@ The attack surface reduction set of capabilities provide the first line of defen - [Network protection](windows-defender-exploit-guard/network-protection-exploit-guard.md) - [Controlled folder access](windows-defender-exploit-guard/controlled-folders-exploit-guard.md) - [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md) -- [Attack surface reducation controls](windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md) +- [Attack surface reduction controls](windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md index 621f8ea7bf..1b73389dbb 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level.md @@ -56,10 +56,14 @@ authentication level that servers accept. The following table identifies the pol - Best practices are dependent on your specific security and authentication requirements. -### Location +### Policy Location Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options +### Registry Location + +HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel + ### Default values The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page. diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index ec2dd9aa22..acaeab8a05 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -28,11 +28,11 @@ Turn on the following advanced features to get better protected from potentially When you enable this feature, you'll be able to take advantage of the automated investigation and remediation features of the service. For more information, see [Automated investigations](automated-investigations-windows-defender-advanced-threat-protection.md). ## Auto-resolve remediated alerts -The Automated investigations capability is configured by default to resolve alerts where the automated analysis result status is “No threats found” or “Remediated”. +The Automated investigations capability is configured by default to resolve alerts where the automated analysis result status is "No threats found" or "Remediated". >[!NOTE] > - The result of the auto-resolve action may influence the Machine risk level calculation which is based on the active alerts found on a machine. ->- If a security operations analyst manually sets the status of an alert to “In progress” or “Resolved” the auto-resolve capability will not overrite it. +>- If a security operations analyst manually sets the status of an alert to "In progress" or "Resolved" the auto-resolve capability will not overrite it. If you don’t want to have alerts auto-resolved, you’ll need to manually turn off the feature. diff --git a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md index a1d7c465e8..ea9af9e5bd 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection.md @@ -1,7 +1,7 @@ --- title: Onboard servers to the Windows Defender ATP service description: Onboard servers so that they can send sensor data to the Windows Defender ATP sensor. -keywords: onboard server, server, server onboarding, machine management, configure Windows ATP servers, onboard Windows Defender Advanced Threat Protection servers +keywords: onboard server, server, 2012r2, 2016, 2019, server onboarding, machine management, configure Windows ATP servers, onboard Windows Defender Advanced Threat Protection servers search.product: eADQiWindows 10XVcnh ms.prod: w10 ms.mktglfcycl: deploy @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: security author: mjcaparas ms.localizationpriority: high -ms.date: 09/03/2018 +ms.date: 09/04/2018 --- # Onboard servers to the Windows Defender ATP service diff --git a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md index e7bed4c016..cb47452b3c 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-analytics.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-analytics.md @@ -19,22 +19,21 @@ ms.date: 09/03/2018 [!include[Prerelease information](prerelease.md)] -Cyber threats are emerging more frequently and prevalently. It is critical for organizations to be able to quickly assess their security posture, including impact, and organizational resilience in the context of specific emerging threats. +Cyberthreats are emerging more frequently and prevalently. It is critical for organizations to be able to quickly assess their security posture, including impact, and organizational resilience in the context of specific emerging threats. Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help you the assess impact of threats in your environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. >[!NOTE] ->Threat analytics requires all Windows Defender ATP components to be running, including Next generation protection and Attack surface reduction. - +>The number of resolved alerts indicates how quickly your organization responds to alerts associated with a threat. Ideally, the chart should be showing alerts being resolved within a few days. Each threat report provides a summary to describe details such as where the threat is coming from, where it's been seen, or techniques and tools that were used by the threat. The dashboard shows the impact in your organization through the following tiles: - Machines with alerts - shows the current distinct number of impacted machines in your organization - Machines with alerts over time - shows the distinct number of impacted over time -- Mitigation recommendations - provides specific actionable recommendations to take for the threat can be contained -- Mitigation status - shows the current distinct number of machines that have been mitigated, unmitigated, and unavailable +- Mitigation recommendations - lists the measurable mitigations and the number of machines that do not have each of the mitigations in place +- Mitigation status - shows the number of mitigated and unmitigated machines. Machines are considered mitigated if they have all the measurable mitigations in place. - Mitigation status over time - shows the distinct number of machines that have been mitigated, unmitigated, and unavailable over time ![Image of a threat analytics report](images/ta.png) @@ -45,15 +44,13 @@ You can assess the organizational impact of a threat using the **Machines with a A machine is categorized as **Active** if there is at least 1 alert associated with that threat and **Resolved** if *all* alerts associated with the threat on the machine are resolved. -The **Machine with alerts over time**, shows the number of distinct machines with **Active** and **Resolved alerts over time**. An indication of threat containment is reflected by the number of **Resolved alerts**. Total number of Resolved alerts increasing over time is a good indication of threat containment. - - +The **Machine with alerts over time**, shows the number of distinct machines with **Active** and **Resolved alerts over time**. The number of resolved alerts indicates how quickly your organization responds to alerts associated with a threat. Ideally, the chart should be showing alerts being resolved within a few days. ## Organizational resilience The **Mitigation recommendations** section provides specific actionable recommendations to improve your visibility into this threat and increase your organizational resilience. The **Mitigation status** and **Mitigation status over time** shows the endpoint configuration status assessed based on the recommended mitigations. ->![IMPORTANT] +>[!IMPORTANT] >- The chart only reflects mitigations that are measurable and where an evaluation can be made on the machine state as being compliant or non-compliant. There can be additional mitigations or compliance actions that currently cannot be computed or measured that are not reflected in the charts and are covered in the threat description under **Mitigation recommendations** section. >- Even if all mitigations were measurable, there is no absolute guarantee of complete resilience but reflects the best possible actions that need to be taken to improve resiliency.