mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #5118 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
commit
ed3652d192
@ -78,6 +78,9 @@ To do this, follow these steps:
|
|||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, [back up the registry for restoration](https://support.microsoft.com/help/322756) in case problems occur.
|
> Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, [back up the registry for restoration](https://support.microsoft.com/help/322756) in case problems occur.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This registry key is not required for clients running Windows 8 and later, or servers running Windows Server 2012 and later. Setting this registry key on later versions of Windows has no effect.
|
||||||
|
|
||||||
1. In Registry Editor, locate the following registry subkey:
|
1. In Registry Editor, locate the following registry subkey:
|
||||||
|
|
||||||
@ -110,4 +113,4 @@ If you want to run NMI in Microsoft Azure using Serial Console, see [Use Serial
|
|||||||
|
|
||||||
### Use Debugger
|
### Use Debugger
|
||||||
|
|
||||||
[Forcing a System Crash from the Debugger](/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-debugger)
|
[Forcing a System Crash from the Debugger](/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-debugger)
|
||||||
|
@ -251,7 +251,7 @@ Use the following figures to help you troubleshoot when users experience these c
|
|||||||
|
|
||||||
### Review requirements on devices
|
### Review requirements on devices
|
||||||
|
|
||||||
Devices must be running Windows 10 Pro, version 1703, and be Azure Active Directory joined, or hybrid domain joined with Azure AD Connect. Customers who are federated with Azure Active Directory are also eligible. You can use the following procedures to review whether a particular device meets requirements.
|
Devices must be running Windows 10 Pro, version 1703 (or later), and be Azure Active Directory joined, or hybrid domain joined with Azure AD Connect. Customers who are federated with Azure Active Directory are also eligible. You can use the following procedures to review whether a particular device meets requirements.
|
||||||
|
|
||||||
**To determine if a device is Azure Active Directory joined:**
|
**To determine if a device is Azure Active Directory joined:**
|
||||||
|
|
||||||
@ -264,4 +264,4 @@ At a command prompt, type: **winver**
|
|||||||
|
|
||||||
A popup window will display the Windows 10 version number and detailed OS build information.
|
A popup window will display the Windows 10 version number and detailed OS build information.
|
||||||
|
|
||||||
If a device is running a previous version of Windows 10 Pro (for example, version 1511), it will not be upgraded to Windows 10 Enterprise when a user signs in, even if the user has been assigned a subscription in the CSP portal.
|
If a device is running a version of Windows 10 Pro prior to version 1703 (for example, version 1511), it will not be upgraded to Windows 10 Enterprise when a user signs in, even if the user has been assigned a subscription in the CSP portal.
|
||||||
|
@ -196,4 +196,5 @@ For secure administrative workstations, Microsoft recommends TPM with PIN protec
|
|||||||
|
|
||||||
- [Blocking the SBP-2 driver and Thunderbolt controllers to reduce 1394 DMA and Thunderbolt DMA threats to BitLocker](https://support.microsoft.com/help/2516445/blocking-the-sbp-2-driver-and-thunderbolt-controllers-to-reduce-1394-d)
|
- [Blocking the SBP-2 driver and Thunderbolt controllers to reduce 1394 DMA and Thunderbolt DMA threats to BitLocker](https://support.microsoft.com/help/2516445/blocking-the-sbp-2-driver-and-thunderbolt-controllers-to-reduce-1394-d)
|
||||||
- [BitLocker Group Policy settings](./bitlocker-group-policy-settings.md)
|
- [BitLocker Group Policy settings](./bitlocker-group-policy-settings.md)
|
||||||
- [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp)
|
- [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp)
|
||||||
|
- [Winlogon automatic restart sign-on (ARSO)](https://docs.microsoft.com/windows-server/identity/ad-ds/manage/component-updates/winlogon-automatic-restart-sign-on--arso-)
|
||||||
|
@ -8,7 +8,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.date: 04/26/2021
|
ms.date: 04/28/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
@ -77,11 +77,15 @@ This feature is currently experimental only and is not functional without an add
|
|||||||
|
|
||||||
### What is the WDAGUtilityAccount local account?
|
### What is the WDAGUtilityAccount local account?
|
||||||
|
|
||||||
This account is part of Application Guard beginning with Windows 10, version 1709 (Fall Creators Update). This account remains disabled until Application Guard is enabled on your device. This item is integrated to the OS and is not considered as a threat/virus/malware.
|
WDAGUtilityAccount is part of Application Guard, beginning with Windows 10, version 1709 (Fall Creators Update). It remains disabled by default, unless Application Guard is enabled on your device. WDAGUtilityAccount is used to sign in to the Application Guard container as a standard user with a random password. It is NOT a malicious account. If *Run as a service* permissions are revoked for this account, you might see the following error:
|
||||||
|
|
||||||
|
**Error: 0x80070569, Ext error: 0x00000001; RDP: Error: 0x00000000, Ext error: 0x00000000 Location: 0x00000000**
|
||||||
|
|
||||||
|
We recommend that you do not modify this account.
|
||||||
|
|
||||||
### How do I trust a subdomain in my site list?
|
### How do I trust a subdomain in my site list?
|
||||||
|
|
||||||
To trust a subdomain, you must precede your domain with two dots, for example: `..contoso.com` ensures that `mail.contoso.com` or `news.contoso.com` are trusted. The first dot represents the strings for the subdomain name (mail or news), the second dot recognizes the start of the domain name (`contoso.com`). This prevents sites such as `fakesitecontoso.com` from being trusted.
|
To trust a subdomain, you must precede your domain with two dots (..). For example: `..contoso.com` ensures that `mail.contoso.com` or `news.contoso.com` are trusted. The first dot represents the strings for the subdomain name (mail or news), and the second dot recognizes the start of the domain name (`contoso.com`). This prevents sites such as `fakesitecontoso.com` from being trusted.
|
||||||
|
|
||||||
### Are there differences between using Application Guard on Windows Pro vs Windows Enterprise?
|
### Are there differences between using Application Guard on Windows Pro vs Windows Enterprise?
|
||||||
|
|
||||||
@ -89,21 +93,23 @@ When using Windows Pro or Windows Enterprise, you have access to using Applicati
|
|||||||
|
|
||||||
### Is there a size limit to the domain lists that I need to configure?
|
### Is there a size limit to the domain lists that I need to configure?
|
||||||
|
|
||||||
Yes, both the Enterprise Resource domains hosted in the cloud and the Domains categorized as both work and personal have a 16383-B limit.
|
Yes, both the Enterprise Resource domains that are hosted in the cloud and the domains that are categorized as both work and personal have a 16383-B limit.
|
||||||
|
|
||||||
### Why does my encryption driver break Microsoft Defender Application Guard?
|
### Why does my encryption driver break Microsoft Defender Application Guard?
|
||||||
|
|
||||||
Microsoft Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, Application Guard does not work and results in an error message (`0x80070013 ERROR_WRITE_PROTECT`).
|
Microsoft Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, Application Guard does not work and results in an error message (**0x80070013 ERROR_WRITE_PROTECT**).
|
||||||
|
|
||||||
### Why do the Network Isolation policies in Group Policy and CSP look different?
|
### Why do the Network Isolation policies in Group Policy and CSP look different?
|
||||||
|
|
||||||
There is not a one-to-one mapping among all the Network Isolation policies between CSP and GP. Mandatory network isolation policies to deploy Application Guard are different between CSP and GP.
|
There is not a one-to-one mapping among all the Network Isolation policies between CSP and GP. Mandatory network isolation policies to deploy Application Guard are different between CSP and GP.
|
||||||
|
|
||||||
Mandatory network isolation GP policy to deploy Application Guard: "DomainSubnets or CloudResources"
|
- Mandatory network isolation GP policy to deploy Application Guard: **DomainSubnets or CloudResources**
|
||||||
Mandatory network isolation CSP policy to deploy Application Guard: "EnterpriseCloudResources or (EnterpriseIpRange and EnterpriseNetworkDomainNames)"
|
|
||||||
For EnterpriseNetworkDomainNames, there is no mapped CSP policy.
|
|
||||||
|
|
||||||
Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, Application Guard does not work and results in an error message (`0x80070013 ERROR_WRITE_PROTECT`).
|
- Mandatory network isolation CSP policy to deploy Application Guard: **EnterpriseCloudResources or (EnterpriseIpRange and EnterpriseNetworkDomainNames)**
|
||||||
|
|
||||||
|
- For EnterpriseNetworkDomainNames, there is no mapped CSP policy.
|
||||||
|
|
||||||
|
Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, Application Guard does not work and results in an error message (**0x80070013 ERROR_WRITE_PROTECT**).
|
||||||
|
|
||||||
### Why did Application Guard stop working after I turned off hyperthreading?
|
### Why did Application Guard stop working after I turned off hyperthreading?
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user