From 186b730ec9741e07ad66d48b611857577dd241c9 Mon Sep 17 00:00:00 2001 From: chcart <120026950+chcart@users.noreply.github.com> Date: Thu, 22 Jun 2023 11:01:11 -0500 Subject: [PATCH 1/5] Update whats-new-windows-10-version-1909.md Clearly stating that experimental TLS 1.3 is not supported. --- windows/whats-new/whats-new-windows-10-version-1909.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/whats-new/whats-new-windows-10-version-1909.md b/windows/whats-new/whats-new-windows-10-version-1909.md index 602a7fcac7..0050d31f82 100644 --- a/windows/whats-new/whats-new-windows-10-version-1909.md +++ b/windows/whats-new/whats-new-windows-10-version-1909.md @@ -57,6 +57,9 @@ Windows 10, version 1909 also includes two new features called **Key-rolling** a An experimental implementation of TLS 1.3 is included in Windows 10, version 1909. TLS 1.3 disabled by default system wide. If you enable TLS 1.3 on a device for testing, then it can also be enabled in Internet Explorer 11.0 and Microsoft Edge by using Internet Options. For beta versions of Microsoft Edge on Chromium, TLS 1.3 isn't built on the Windows TLS stack, and is instead configured independently, using the **Edge://flags** dialog. Also see [Microsoft Edge platform status](https://developer.microsoft.com/microsoft-edge/status/tls13/) +>[!NOTE] +>The experiental implementation of TLS 1.3 is not supported. See [Protocols in TLS/SSL (Schannel SSP)](https://learn.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-). + ## Virtualization ### Windows Sandbox From 75062db092b902912b73b8083c824a7164be0a97 Mon Sep 17 00:00:00 2001 From: chcart <120026950+chcart@users.noreply.github.com> Date: Thu, 22 Jun 2023 11:38:07 -0500 Subject: [PATCH 2/5] Additional clarification --- windows/whats-new/whats-new-windows-10-version-1909.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/whats-new/whats-new-windows-10-version-1909.md b/windows/whats-new/whats-new-windows-10-version-1909.md index 0050d31f82..feab6f49c1 100644 --- a/windows/whats-new/whats-new-windows-10-version-1909.md +++ b/windows/whats-new/whats-new-windows-10-version-1909.md @@ -58,7 +58,7 @@ Windows 10, version 1909 also includes two new features called **Key-rolling** a An experimental implementation of TLS 1.3 is included in Windows 10, version 1909. TLS 1.3 disabled by default system wide. If you enable TLS 1.3 on a device for testing, then it can also be enabled in Internet Explorer 11.0 and Microsoft Edge by using Internet Options. For beta versions of Microsoft Edge on Chromium, TLS 1.3 isn't built on the Windows TLS stack, and is instead configured independently, using the **Edge://flags** dialog. Also see [Microsoft Edge platform status](https://developer.microsoft.com/microsoft-edge/status/tls13/) >[!NOTE] ->The experiental implementation of TLS 1.3 is not supported. See [Protocols in TLS/SSL (Schannel SSP)](https://learn.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-). +>The experiental implementation of TLS 1.3 is not supported. TLS 1.3 is only supported on Windows 11 and Server 2022. See [Protocols in TLS/SSL (Schannel SSP)](https://learn.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-). ## Virtualization From cfc752030e659a1175bd579a7332917dcd5d7842 Mon Sep 17 00:00:00 2001 From: Aaron Czechowski Date: Thu, 22 Jun 2023 13:22:36 -0700 Subject: [PATCH 3/5] editorial revision --- windows/whats-new/whats-new-windows-10-version-1909.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/whats-new/whats-new-windows-10-version-1909.md b/windows/whats-new/whats-new-windows-10-version-1909.md index feab6f49c1..69a6ccfa4c 100644 --- a/windows/whats-new/whats-new-windows-10-version-1909.md +++ b/windows/whats-new/whats-new-windows-10-version-1909.md @@ -58,7 +58,7 @@ Windows 10, version 1909 also includes two new features called **Key-rolling** a An experimental implementation of TLS 1.3 is included in Windows 10, version 1909. TLS 1.3 disabled by default system wide. If you enable TLS 1.3 on a device for testing, then it can also be enabled in Internet Explorer 11.0 and Microsoft Edge by using Internet Options. For beta versions of Microsoft Edge on Chromium, TLS 1.3 isn't built on the Windows TLS stack, and is instead configured independently, using the **Edge://flags** dialog. Also see [Microsoft Edge platform status](https://developer.microsoft.com/microsoft-edge/status/tls13/) >[!NOTE] ->The experiental implementation of TLS 1.3 is not supported. TLS 1.3 is only supported on Windows 11 and Server 2022. See [Protocols in TLS/SSL (Schannel SSP)](https://learn.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-). +>The experiental implementation of TLS 1.3 isn't supported. TLS 1.3 is only supported on Windows 11 and Server 2022. For more information, see [Protocols in TLS/SSL (Schannel SSP)](/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-). ## Virtualization From 5b687f2404af46f1a2740a4ec6341606d683497d Mon Sep 17 00:00:00 2001 From: Sriraman M S <45987684+msbemba@users.noreply.github.com> Date: Fri, 23 Jun 2023 13:28:28 +0530 Subject: [PATCH 4/5] Update select-types-of-rules-to-create.md Added filepath description Fixes https://github.com/MicrosoftDocs/windows-itpro-docs/issues/11574 --- .../select-types-of-rules-to-create.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md index 1c867e7010..4ce947f736 100644 --- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md @@ -137,6 +137,7 @@ Table 3 describes the available resource header attribute options you can set wi | **OriginalFileName** | Specifies the original file name, or the name with which the file was first created, of the binary. | | **PackageFamilyName** | Specifies the package family name of the binary. The package family name consists of two parts: the name of the file and the publisher ID. | | **ProductName** | Specifies the name of the product with which the binary ships. | +| **Filepath** | Specifies the File path of the binary. | ## More information about filepath rules From 548b8964a08bc99eec268c7976eb9ebef4522cb5 Mon Sep 17 00:00:00 2001 From: Sriraman M S <45987684+msbemba@users.noreply.github.com> Date: Fri, 23 Jun 2023 17:46:50 +0530 Subject: [PATCH 5/5] Update windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../select-types-of-rules-to-create.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md index 4ce947f736..a3454bee50 100644 --- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md @@ -137,7 +137,7 @@ Table 3 describes the available resource header attribute options you can set wi | **OriginalFileName** | Specifies the original file name, or the name with which the file was first created, of the binary. | | **PackageFamilyName** | Specifies the package family name of the binary. The package family name consists of two parts: the name of the file and the publisher ID. | | **ProductName** | Specifies the name of the product with which the binary ships. | -| **Filepath** | Specifies the File path of the binary. | +| **Filepath** | Specifies the file path of the binary. | ## More information about filepath rules