mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
CAT Auto Pulish for Windows Release Messages - 20190924190106 (#1194)
* Updated supported values for ScheduleScanDay * multiple fixes * More fixes * Fixed typos * Fixed typos * CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20190924173922 (#1193)
This commit is contained in:
parent
52b60562cc
commit
ee4c9764b9
@ -56,6 +56,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
|||||||
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
|
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
|
||||||
|
|
||||||
- **Change history in MDM documentation**
|
- **Change history in MDM documentation**
|
||||||
|
- [September 2019](#september-2019)
|
||||||
- [August 2019](#august-2019)
|
- [August 2019](#august-2019)
|
||||||
- [July 2019](#july-2019)
|
- [July 2019](#july-2019)
|
||||||
- [June 2019](#june-2019)
|
- [June 2019](#june-2019)
|
||||||
@ -470,7 +471,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
|
|||||||
<li>ShellLauncher</li>
|
<li>ShellLauncher</li>
|
||||||
<li>StatusConfiguration</li>
|
<li>StatusConfiguration</li>
|
||||||
</ul>
|
</ul>
|
||||||
<p>Updated the AssigneAccessConfiguration schema. Starting in Windows 10, version 1803 AssignedAccess CSP is supported in Windows Holographic for Business edition. Added example for Windows Holographic for Business edition.</p>
|
<p>Updated the AssigneAccessConfiguration schema. Starting in Windows 10, version 1803 AssignedAccess CSP is supported in HoloLens (1st gen) Commercial Suite. Added example for HoloLens (1st gen) Commercial Suite.</p>
|
||||||
</td></tr>
|
</td></tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td style="vertical-align:top"><a href="multisim-csp.md" data-raw-source="[MultiSIM CSP](multisim-csp.md)">MultiSIM CSP</a></td>
|
<td style="vertical-align:top"><a href="multisim-csp.md" data-raw-source="[MultiSIM CSP](multisim-csp.md)">MultiSIM CSP</a></td>
|
||||||
@ -830,7 +831,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
|
|||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td style="vertical-align:top"><a href="messaging-csp.md" data-raw-source="[Messaging CSP](messaging-csp.md)">Messaging CSP</a></td>
|
<td style="vertical-align:top"><a href="messaging-csp.md" data-raw-source="[Messaging CSP](messaging-csp.md)">Messaging CSP</a></td>
|
||||||
<td style="vertical-align:top"><p>Added new CSP. This CSP is only supported in Windows 10 Mobile and Mobile Enteprise editions.</p>
|
<td style="vertical-align:top"><p>Added new CSP. This CSP is only supported in Windows 10 Mobile and Mobile Enterprise editions.</p>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
@ -940,7 +941,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
|
|||||||
<li>WirelessDisplay/AllowProjectionToPCOverInfrastructure</li>
|
<li>WirelessDisplay/AllowProjectionToPCOverInfrastructure</li>
|
||||||
<li>WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver</li>
|
<li>WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver</li>
|
||||||
</ul><p>Removed TextInput/AllowLinguisticDataCollection</p>
|
</ul><p>Removed TextInput/AllowLinguisticDataCollection</p>
|
||||||
<p>Starting in Windows 10, version 1703, Update/UpdateServiceUrl is not supported in Windows 10 Mobile Enteprise and IoT Enterprise</p>
|
<p>Starting in Windows 10, version 1703, Update/UpdateServiceUrl is not supported in Windows 10 Mobile Enterprise and IoT Enterprise</p>
|
||||||
<p>Starting in Windows 10, version 1703, the maximum value of Update/DeferFeatureUpdatesPeriodInDays has been increased from 180 days, to 365 days.</p>
|
<p>Starting in Windows 10, version 1703, the maximum value of Update/DeferFeatureUpdatesPeriodInDays has been increased from 180 days, to 365 days.</p>
|
||||||
<p>Starting in Windows 10, version 1703, in Browser/HomePages you can use the "<about:blank>" value if you don’t want to send traffic to Microsoft.</p>
|
<p>Starting in Windows 10, version 1703, in Browser/HomePages you can use the "<about:blank>" value if you don’t want to send traffic to Microsoft.</p>
|
||||||
<p>Starting in Windows 10, version 1703, Start/StartLayout can now be set on a per-device basis in addition to the pre-existing per-user basis.</p>
|
<p>Starting in Windows 10, version 1703, Start/StartLayout can now be set on a per-device basis in addition to the pre-existing per-user basis.</p>
|
||||||
@ -1529,7 +1530,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
|
|||||||
</ul></td>
|
</ul></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td style="vertical-align:top"><p>Management tool for the Micosoft Store for Business</p></td>
|
<td style="vertical-align:top"><p>Management tool for the Microsoft Store for Business</p></td>
|
||||||
<td style="vertical-align:top"><p>New topics. The Store for Business has a new web service designed for the enterprise to acquire, manage, and distribute applications in bulk. It enables several capabilities that are required for the enterprise to manage the lifecycle of applications from acquisition to updates.</p></td>
|
<td style="vertical-align:top"><p>New topics. The Store for Business has a new web service designed for the enterprise to acquire, manage, and distribute applications in bulk. It enables several capabilities that are required for the enterprise to manage the lifecycle of applications from acquisition to updates.</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
@ -1899,6 +1900,12 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
|
|
||||||
## Change history in MDM documentation
|
## Change history in MDM documentation
|
||||||
|
|
||||||
|
### September 2019
|
||||||
|
|
||||||
|
|New or updated topic | Description|
|
||||||
|
|--- | ---|
|
||||||
|
|[Policy CSP - Defender](policy-csp-defender.md)|Updated the supported value list for Defender/ScheduleScanDay policy.|
|
||||||
|
|
||||||
### August 2019
|
### August 2019
|
||||||
|
|
||||||
|New or updated topic | Description|
|
|New or updated topic | Description|
|
||||||
@ -2189,8 +2196,8 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
<li>AccountPoliciesAccountLockoutPolicy/AccountLockoutThreshold - removed from docs. Not supported.</li>
|
<li>AccountPoliciesAccountLockoutPolicy/AccountLockoutThreshold - removed from docs. Not supported.</li>
|
||||||
<li>AccountPoliciesAccountLockoutPolicy/ResetAccountLockoutCounterAfter - removed from docs. Not supported.</li>
|
<li>AccountPoliciesAccountLockoutPolicy/ResetAccountLockoutCounterAfter - removed from docs. Not supported.</li>
|
||||||
<li>LocalPoliciesSecurityOptions/NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers - removed from docs. Not supported.</li>
|
<li>LocalPoliciesSecurityOptions/NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers - removed from docs. Not supported.</li>
|
||||||
<li>System/AllowFontProviders is not supported in Windows Holographic for Business.</li>
|
<li>System/AllowFontProviders is not supported in HoloLens (1st gen) Commercial Suite.</li>
|
||||||
<li>Security/RequireDeviceEncryption is suported in the Home SKU.</li>
|
<li>Security/RequireDeviceEncryption is supported in the Home SKU.</li>
|
||||||
<li>Start/StartLayout - added a table of SKU support information.</li>
|
<li>Start/StartLayout - added a table of SKU support information.</li>
|
||||||
<li>Start/ImportEdgeAssets - added a table of SKU support information.</li>
|
<li>Start/ImportEdgeAssets - added a table of SKU support information.</li>
|
||||||
</ul>
|
</ul>
|
||||||
@ -2424,7 +2431,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
<li>ShellLauncher</li>
|
<li>ShellLauncher</li>
|
||||||
<li>StatusConfiguration</li>
|
<li>StatusConfiguration</li>
|
||||||
</ul>
|
</ul>
|
||||||
<p>Updated the AssigneAccessConfiguration schema. Starting in Windows 10, version 1803 AssignedAccess CSP is supported in Windows Holographic for Business edition. Added example for Windows Holographic for Business edition.</p>
|
<p>Updated the AssigneAccessConfiguration schema. Starting in Windows 10, version 1803 AssignedAccess CSP is supported in HoloLens (1st gen) Commercial Suite. Added example for HoloLens (1st gen) Commercial Suite.</p>
|
||||||
</td></tr>
|
</td></tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td style="vertical-align:top"><a href="multisim-csp.md" data-raw-source="[MultiSIM CSP](multisim-csp.md)">MultiSIM CSP</a></td>
|
<td style="vertical-align:top"><a href="multisim-csp.md" data-raw-source="[MultiSIM CSP](multisim-csp.md)">MultiSIM CSP</a></td>
|
||||||
@ -2739,7 +2746,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
<p>For examples, see section 4.3.1 RequestSecurityToken of the MS-MDE2 protocol documentation.</p>
|
<p>For examples, see section 4.3.1 RequestSecurityToken of the MS-MDE2 protocol documentation.</p>
|
||||||
</td></tr>
|
</td></tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td style="vertical-align:top"><a href="enterpriseapn-csp.md" data-raw-source="[EntepriseAPN CSP](enterpriseapn-csp.md)">EntepriseAPN CSP</a></td>
|
<td style="vertical-align:top"><a href="enterpriseapn-csp.md" data-raw-source="[EnterpriseAPN CSP](enterpriseapn-csp.md)">EnterpriseAPN CSP</a></td>
|
||||||
<td style="vertical-align:top"><p>Added a SyncML example.</p>
|
<td style="vertical-align:top"><p>Added a SyncML example.</p>
|
||||||
</td></tr>
|
</td></tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
|
@ -6,17 +6,13 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: manikadhiman
|
author: manikadhiman
|
||||||
ms.date: 08/26/2019
|
ms.date: 09/24/2019
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Policy CSP - Defender
|
# Policy CSP - Defender
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
|
||||||
|
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--Policies-->
|
<!--Policies-->
|
||||||
@ -2337,15 +2333,15 @@ ADMX Info:
|
|||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
The following list shows the supported values:
|
The following list shows the supported values:
|
||||||
|
|
||||||
- 0 (default) – Every day
|
- 0 (default) – Every day
|
||||||
- 1 – Monday
|
- 1 – Sunday
|
||||||
- 2 – Tuesday
|
- 2 – Monday
|
||||||
- 3 – Wednesday
|
- 3 – Tuesday
|
||||||
- 4 – Thursday
|
- 4 – Wednesday
|
||||||
- 5 – Friday
|
- 5 – Thursday
|
||||||
- 6 – Saturday
|
- 6 – Friday
|
||||||
- 7 – Sunday
|
- 7 – Saturday
|
||||||
- 8 – No scheduled scan
|
- 8 – No scheduled scan
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
<!--/SupportedValues-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
@ -15,7 +15,7 @@ manager: dansimp
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
These policies currently only apply to Kiosk Browser app. Kiosk Browser is a Microsoft Store app, added in Windows 10 version 1803, that provides IT a way to customize the end user’s browsing experience to fulfill kiosk, signage, and shared device scenarios. Application developers can also create their own kiosk browser and read these policies using [NamedPolicy.GetPolicyFromPath(String, String) Method](https://docs.microsoft.com/uwp/api/windows.management.policies.namedpolicy.getpolicyfrompath#Windows_Management_Policies_NamedPolicy_GetPolicyFromPath_System_String_System_String_).
|
These policies currently only apply to Kiosk Browser app. Kiosk Browser is a Microsoft Store app, added in Windows 10 version 1803, that provides IT a way to customize the end user's browsing experience to fulfill kiosk, signage, and shared device scenarios. Application developers can also create their own kiosk browser and read these policies using [NamedPolicy.GetPolicyFromPath(String, String) Method](https://docs.microsoft.com/uwp/api/windows.management.policies.namedpolicy.getpolicyfrompath#Windows_Management_Policies_NamedPolicy_GetPolicyFromPath_System_String_System_String_).
|
||||||
|
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
@ -224,7 +224,7 @@ Added in Windows 10, version 1803. Configures the default URL kiosk browsers to
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Shows the Kiosk Browser's end session button. When the policy is enabled, the Kiosk Browser app shows a button to reset the browser. When the user clicks on the button, the app will prompt the user for confirmation to end the session. When the user confirms, the Kiosk broswser will clear all browsing data (cache, cookies, etc.) and navigate back to the default URL.
|
Shows the Kiosk Browser's end session button. When the policy is enabled, the Kiosk Browser app shows a button to reset the browser. When the user clicks on the button, the app will prompt the user for confirmation to end the session. When the user confirms, the Kiosk browser will clear all browsing data (cache, cookies, etc.) and navigate back to the default URL.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
@ -65,7 +65,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch.
|
Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch.
|
||||||
|
|
||||||
The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled.
|
The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled.
|
||||||
|
|
||||||
|
@ -922,11 +922,11 @@ Value type is integer.
|
|||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
- GP English name: Let Windows apps access background spatial perception
|
- GP English name: *Let Windows apps access background spatial perception*
|
||||||
- GP name: LetAppsAccessBackgroundSpatialPerception
|
- GP name: *LetAppsAccessBackgroundSpatialPerception*
|
||||||
- GP element: LetAppsAccessBackgroundSpatialPerception_Enum
|
- GP element: *LetAppsAccessBackgroundSpatialPerception_Enum*
|
||||||
- GP path: Windows Components/App Privacy
|
- GP path: *Windows Components/App Privacy*
|
||||||
- GP ADMX file name: AppPrivacy.admx
|
- GP ADMX file name: *AppPrivacy.admx*
|
||||||
|
|
||||||
|
|
||||||
<!--/ADMXMapped-->
|
<!--/ADMXMapped-->
|
||||||
@ -989,11 +989,11 @@ Value type is chr.
|
|||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
- GP English name: Let Windows apps access background spatial perception
|
- GP English name: *Let Windows apps access background spatial perception*
|
||||||
- GP name: LetAppsAccessBackgroundSpatialPerception
|
- GP name: *LetAppsAccessBackgroundSpatialPerception*
|
||||||
- GP element: LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps_List
|
- GP element: *LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps_List*
|
||||||
- GP path: Windows Components/App Privacy
|
- GP path: *Windows Components/App Privacy*
|
||||||
- GP ADMX file name: AppPrivacy.admx
|
- GP ADMX file name: *AppPrivacy.admx*
|
||||||
|
|
||||||
|
|
||||||
<!--/ADMXMapped-->
|
<!--/ADMXMapped-->
|
||||||
@ -1051,11 +1051,11 @@ Value type is chr.
|
|||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
- GP English name: Let Windows apps access background spatial perception
|
- GP English name: *Let Windows apps access background spatial perception*
|
||||||
- GP name: LetAppsAccessBackgroundSpatialPerception
|
- GP name: *LetAppsAccessBackgroundSpatialPerception*
|
||||||
- GP element: LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps_List
|
- GP element: *LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps_List*
|
||||||
- GP path: Windows Components/App Privacy
|
- GP path: Windows *Components/App Privacy*
|
||||||
- GP ADMX file name: AppPrivacy.admx
|
- GP ADMX file name: *AppPrivacy.admx*
|
||||||
<!--/ADMXMapped-->
|
<!--/ADMXMapped-->
|
||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
|
|
||||||
@ -1116,11 +1116,11 @@ Value type is chr.
|
|||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
- GP English name: Let Windows apps access background spatial perception
|
- GP English name: *Let Windows apps access background spatial perception*
|
||||||
- GP name: LetAppsAccessBackgroundSpatialPerception
|
- GP name: *LetAppsAccessBackgroundSpatialPerception*
|
||||||
- GP element: LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps_List
|
- GP element: *LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps_List*
|
||||||
- GP path: Windows Components/App Privacy
|
- GP path: *Windows Components/App Privacy*
|
||||||
- GP ADMX file name: AppPrivacy.admx
|
- GP ADMX file name: *AppPrivacy.admx*
|
||||||
<!--/ADMXMapped-->
|
<!--/ADMXMapped-->
|
||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
|
|
||||||
|
@ -97,9 +97,6 @@ Supported values:
|
|||||||
|
|
||||||
<!--/Validation-->
|
<!--/Validation-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
<!--/Policies-->
|
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
Footnotes:
|
Footnotes:
|
||||||
@ -110,3 +107,5 @@ Footnotes:
|
|||||||
- 4 - Added in Windows 10, version 1803.
|
- 4 - Added in Windows 10, version 1803.
|
||||||
- 5 - Added in Windows 10, version 1809.
|
- 5 - Added in Windows 10, version 1809.
|
||||||
- 6 - Added in Windows 10, version 1903.
|
- 6 - Added in Windows 10, version 1903.
|
||||||
|
<!--/Policies-->
|
||||||
|
|
||||||
|
@ -668,13 +668,7 @@ The following list shows the supported values:
|
|||||||
Enabling this policy prevents context menus from being invoked in the Start Menu.
|
Enabling this policy prevents context menus from being invoked in the Start Menu.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--SupportedValues-->
|
|
||||||
The following list shows the supported values:
|
|
||||||
|
|
||||||
- 0 (default) – False (Do not disable).
|
|
||||||
- 1 - True (disable).
|
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
- GP English name: *Disable context menus in the Start Menu*
|
- GP English name: *Disable context menus in the Start Menu*
|
||||||
@ -684,6 +678,10 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/ADMXMapped-->
|
<!--/ADMXMapped-->
|
||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
|
The following list shows the supported values:
|
||||||
|
|
||||||
|
- 0 (default) – False (Do not disable).
|
||||||
|
- 1 - True (disable).
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
<!--/SupportedValues-->
|
||||||
<!--Example-->
|
<!--Example-->
|
||||||
@ -1100,13 +1098,7 @@ Added in Windows 10, version 1709. Enabling this policy removes the people icon
|
|||||||
Value type is integer.
|
Value type is integer.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--SupportedValues-->
|
|
||||||
The following list shows the supported values:
|
|
||||||
|
|
||||||
- 0 (default) – False (do not hide).
|
|
||||||
- 1 - True (hide).
|
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
- GP English name: *Remove the People Bar from the taskbar*
|
- GP English name: *Remove the People Bar from the taskbar*
|
||||||
@ -1115,6 +1107,13 @@ ADMX Info:
|
|||||||
- GP ADMX file name: *StartMenu.admx*
|
- GP ADMX file name: *StartMenu.admx*
|
||||||
|
|
||||||
<!--/ADMXMapped-->
|
<!--/ADMXMapped-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
The following list shows the supported values:
|
||||||
|
|
||||||
|
- 0 (default) – False (do not hide).
|
||||||
|
- 1 - True (hide).
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
@ -395,7 +395,7 @@ The following list shows the supported values:
|
|||||||
|
|
||||||
- 0 – Disabled.
|
- 0 – Disabled.
|
||||||
- 1 (default) – Permits Microsoft to configure device settings only.
|
- 1 (default) – Permits Microsoft to configure device settings only.
|
||||||
- 2 – Allows Microsoft to conduct full experimentations.
|
- 2 – Allows Microsoft to conduct full experimentation.
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
<!--/SupportedValues-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
@ -532,9 +532,9 @@ ADMX Info:
|
|||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
The following list shows the supported values:
|
The following list shows the supported values:
|
||||||
|
|
||||||
- 0 – Force Location Off. All Location Privacy settings are toggled off and greyed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search.
|
- 0 – Force Location Off. All Location Privacy settings are toggled off and grayed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search.
|
||||||
- 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off.
|
- 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off.
|
||||||
- 2 – Force Location On. All Location Privacy settings are toggled on and greyed out. Users cannot change the settings and all consent permissions will be automatically suppressed.
|
- 2 – Force Location On. All Location Privacy settings are toggled on and grayed out. Users cannot change the settings and all consent permissions will be automatically suppressed.
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
<!--/SupportedValues-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
@ -763,16 +763,14 @@ Specifies whether to allow the user to factory reset the device by using control
|
|||||||
|
|
||||||
Most restricted value is 0.
|
Most restricted value is 0.
|
||||||
|
|
||||||
<!--/Description-->
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> This policy is also applicable to Windows 10 and not exclusive to phone.
|
> This policy is also applicable to Windows 10 and not exclusive to phone.
|
||||||
> <!--SupportedValues-->
|
<!--/Description-->
|
||||||
> The following list shows the supported values:
|
|
||||||
> orted values:
|
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
The following list shows the supported values:
|
||||||
- 0 – Not allowed.
|
- 0 – Not allowed.
|
||||||
- 1 (default) – Allowed to reset to factory default settings.
|
- 1 (default) – Allowed to reset to factory default settings.
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
<!--/SupportedValues-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
@ -1006,10 +1004,10 @@ This policy setting determines whether people can change their own telemetry lev
|
|||||||
|
|
||||||
If you set this policy setting to "Disable Telemetry opt-in Settings", telemetry levels are disabled in Settings, preventing people from changing them.
|
If you set this policy setting to "Disable Telemetry opt-in Settings", telemetry levels are disabled in Settings, preventing people from changing them.
|
||||||
|
|
||||||
If you set this policy setting to "Enable Telemetry opt-in Setings" or don't configure this policy setting, people can change their own telemetry levels in Settings.
|
If you set this policy setting to "Enable Telemetry opt-in Settings" or don't configure this policy setting, people can change their own telemetry levels in Settings.
|
||||||
|
|
||||||
Note:
|
> [!Note]
|
||||||
Set the Allow Telemetry policy setting to prevent people from sending diagnostic data to Microsoft beyond your organization's limit.
|
> Set the Allow Telemetry policy setting to prevent people from sending diagnostic data to Microsoft beyond your organization's limit.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
|
@ -113,10 +113,11 @@ By default, this policy is not configured and the SKU based defaults are used fo
|
|||||||
|
|
||||||
<!--/SupportedValues-->
|
<!--/SupportedValues-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:<br/>- GP English name: <em>Troubleshooting: Allow users to access recommended troubleshooting for known problems</em>
|
ADMX Info:
|
||||||
- GP name: <em>TroubleshootingAllowRecommendations</em>
|
- GP English name: *Troubleshooting: Allow users to access recommended troubleshooting for known problems*
|
||||||
- GP path: <em>Troubleshooting and Diagnostics/Microsoft Support Diagnostic Tool</em>
|
- GP name: *TroubleshootingAllowRecommendations*
|
||||||
- GP ADMX file name: <em>MSDT.admx</em>
|
- GP path: *Troubleshooting and Diagnostics/Microsoft Support Diagnostic Tool*
|
||||||
|
- GP ADMX file name: *MSDT.admx*
|
||||||
|
|
||||||
<!--/ADMXMapped-->
|
<!--/ADMXMapped-->
|
||||||
|
|
||||||
@ -127,8 +128,6 @@ ADMX Info:<br/>- GP English name: <em>Troubleshooting: Allow users to access r
|
|||||||
|
|
||||||
<!--/Validation-->
|
<!--/Validation-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
<!--/Policies-->
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
Footnotes:
|
Footnotes:
|
||||||
@ -139,3 +138,4 @@ Footnotes:
|
|||||||
- 4 - Added in Windows 10, version 1803.
|
- 4 - Added in Windows 10, version 1803.
|
||||||
- 5 - Added in Windows 10, version 1809.
|
- 5 - Added in Windows 10, version 1809.
|
||||||
- 6 - Added in Windows 10, version 1903.
|
- 6 - Added in Windows 10, version 1903.
|
||||||
|
<!--/Policies-->
|
||||||
|
@ -13,6 +13,8 @@ manager: dansimp
|
|||||||
|
|
||||||
# Policy CSP - Update
|
# Policy CSP - Update
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
@ -204,11 +206,6 @@ manager: dansimp
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="update-activehoursend"></a>**Update/ActiveHoursEnd**
|
<a href="" id="update-activehoursend"></a>**Update/ActiveHoursEnd**
|
||||||
|
|
||||||
@ -1379,49 +1376,6 @@ Added in Windows 10, version 1803. Enable IT admin to configure feature update u
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
|
||||||
<a href="" id="update-configurefeatureupdateuninstallperiod"></a>**Update/ConfigureFeatureUpdateUninstallPeriod**
|
|
||||||
|
|
||||||
<!--SupportedSKUs-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--/SupportedSKUs-->
|
|
||||||
<!--Scope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--/Scope-->
|
|
||||||
<!--Description-->
|
|
||||||
Added in Windows 10, version 1803. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days.
|
|
||||||
|
|
||||||
<!--/Description-->
|
|
||||||
<!--/Policy-->
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="update-deferfeatureupdatesperiodindays"></a>**Update/DeferFeatureUpdatesPeriodInDays**
|
<a href="" id="update-deferfeatureupdatesperiodindays"></a>**Update/DeferFeatureUpdatesPeriodInDays**
|
||||||
|
|
||||||
|
@ -50,7 +50,7 @@ sections:
|
|||||||
text: "
|
text: "
|
||||||
<table border ='0'><tr><td width='80%'>Message</td><td width='20%'>Date</td></tr>
|
<table border ='0'><tr><td width='80%'>Message</td><td width='20%'>Date</td></tr>
|
||||||
|
|
||||||
<tr><td><a href = 'https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2019-1367' target='_blank'><b>Advisory: Scripting Engine Memory Corruption Vulnerability (CVE-2019-1367)</b></a><br><div>On September 23, 2019, Microsoft released a security update to address a remote code execution vulnerability in the way the scripting engine handles objects in memory in Internet Explorer. An attacker who successfully exploited the vulnerability could gain the same user permissions as the current user. For example, if a user is logged on with administrative rights, an attacker could take control of an affected system and install programs; view, change, or delete data; or create new accounts with full user rights. Alternatively, an attacker could host a specially crafted website targeting Internet Explorer and then entice a user to open web page or a malicious document attached to an e-mail. For more information about the vulnerability, see the Microsoft Security Guide <a href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2019-1367\" target=\"_blank\">CVE-2019-1367 | Scripting Engine Memory Corruption Vulnerability. </a></div><div> </div><div>Mitigation for this vulnerability is available from the <a href=\"https://portal.msrc.microsoft.com\" target=\"_blank\">Microsoft Security Update Guide</a>. Additionally, on September 24, 2019, mitigation for this vulnerability will be available via Windows Update (WU) and Windows Server Update Services (WSUS) as part of the 9C optional update for all supported versions of Windows, with the exception of Windows 10, version 1903. For devices running Windows 10, version 1903, mitigation for this vulnerability will be available via Windows Update and WSUS as part of the optional 9D update (targeted for September 26, 2019.) You can get the update in Windows via <strong>Settings > Windows Update > Check for Updates</strong>. (Note: Because this update requires a reboot, we are making it optional to give customers and administrators a choice to install/deploy the update now.)</div><div><br></div><div>For the best protection, we recommend you apply the latest Windows updates and follow security best practices and do not open attachments or documents from an untrusted source. For more information about the vulnerability, see the Microsoft Security Guide: <a href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2019-1367\" target=\"_blank\">CVE-2019-1367 | Scripting Engine Memory Corruption Vulnerability</a>. </div></td><td>September 24, 2019 <br>11:00 AM PT</td></tr>
|
<tr><td><a href = 'https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2019-1367' target='_blank'><b>Advisory: Scripting Engine Memory Corruption Vulnerability (CVE-2019-1367)</b></a><br><div>On September 23, 2019, Microsoft released a security update to address a remote code execution vulnerability in the way the scripting engine handles objects in memory in Internet Explorer. An attacker who successfully exploited the vulnerability could gain the same user permissions as the current user. For example, if a user is logged on with administrative rights, an attacker could take control of an affected system and install programs; view, change, or delete data; or create new accounts with full user rights. Alternatively, an attacker could host a specially crafted website targeting Internet Explorer and then entice a user to open web page or a malicious document attached to an e-mail. For more information about the vulnerability, see the Microsoft Security Guide <a href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2019-1367\" target=\"_blank\">CVE-2019-1367 | Scripting Engine Memory Corruption Vulnerability</a>. </div><div> </div><div>Mitigation for this vulnerability is available from the <a href=\"https://portal.msrc.microsoft.com/\" target=\"_blank\">Microsoft Security Update Guide</a>. For the best protection, we recommend you apply the latest Windows updates and follow security best practices and do not open attachments or documents from an untrusted source. For more information about the vulnerability, see the Microsoft Security Guide: <a href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2019-1367\" target=\"_blank\">CVE-2019-1367 | Scripting Engine Memory Corruption Vulnerability</a>. </div><div><br></div><div><strong>Update:</strong> Starting September 24, 2019, mitigation for this vulnerability is included as part of the 9C optional update, via Windows Update (WU) and Microsoft Update Catalog, for all supported versions of Windows 10, with the exception of Windows 10, version 1903 and Windows 10, version 1507 (LTSB). For devices running Windows 10, version 1903, mitigation for this vulnerability will be included as part of the 9D optional update via WU, WSUS and the Microsoft Update Catalog (targeted for September 26, 2019.) To apply this update, go to <strong>Settings > Windows Update > Check for Updates</strong>. (<strong>Note</strong> Because this update requires a reboot, we are making it optional to give customers and administrators a choice to install/deploy the update now.) </div><div><br></div><div>For customers running Windows 8.1/ Windows Server 2012 R2 or below, the 9C update is also available on Windows Server Update Services (WSUS). For other supported versions, IT admins using WSUS can import this update into WSUS/SCCM manually. See instructions on the <a href=\"https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/manage/wsus-and-the-catalog-site#the-microsoft-update-catalog-site\" target=\"_blank\"><u>WSUS and the Catalog Site</u></a>.</div></td><td>September 24, 2019 <br>05:00 PM PT</td></tr>
|
||||||
<tr><td><b>Status update: September 2019 Windows \"C\" optional release available</b><br><div>The September 2019 optional monthly “C” release for all supported versions of Windows is now available. For more information on the different types of monthly quality updates, see our <a href=\"https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376\" target=\"_blank\">Windows 10 update servicing cadence primer</a>. Follow <a href=\"https://twitter.com/windowsupdate\" target=\"_blank\">@WindowsUpdate</a> for the latest on the availability of this release.</div></td><td>September 24, 2019 <br>08:10 AM PT</td></tr>
|
<tr><td><b>Status update: September 2019 Windows \"C\" optional release available</b><br><div>The September 2019 optional monthly “C” release for all supported versions of Windows is now available. For more information on the different types of monthly quality updates, see our <a href=\"https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376\" target=\"_blank\">Windows 10 update servicing cadence primer</a>. Follow <a href=\"https://twitter.com/windowsupdate\" target=\"_blank\">@WindowsUpdate</a> for the latest on the availability of this release.</div></td><td>September 24, 2019 <br>08:10 AM PT</td></tr>
|
||||||
<tr><td><b>Plan for change: Windows Media Center Electronic Program Guide retiring in January 2020</b><br><div>Starting in January 2020, Microsoft is retiring its Electronic Program Guide (EPG) service for all versions of Windows Media Center. To continue receiving TV Program Guide information on your Windows Media Center, you’ll need to configure an alternate TV listing provider.</div></td><td>September 24, 2019 <br>08:00 AM PT</td></tr>
|
<tr><td><b>Plan for change: Windows Media Center Electronic Program Guide retiring in January 2020</b><br><div>Starting in January 2020, Microsoft is retiring its Electronic Program Guide (EPG) service for all versions of Windows Media Center. To continue receiving TV Program Guide information on your Windows Media Center, you’ll need to configure an alternate TV listing provider.</div></td><td>September 24, 2019 <br>08:00 AM PT</td></tr>
|
||||||
<tr><td><b>Status of September 2019 “C” release</b><br><div>The optional monthly “C” release for September 2019 for all supported versions of Windows and Windows Server prior to Windows 10, version 1903 and Windows Server, version 1903 will be available in the near term. For more information on the different types of monthly quality updates, see our <a href=\"https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376\" target=\"_blank\">Windows 10 update servicing cadence primer</a>. Follow <a href=\"https://twitter.com/windowsupdate\" target=\"_blank\"><u>@WindowsUpdate</u></a> for the latest on the availability of this release.</div></td><td>September 19, 2019 <br>04:11 PM PT</td></tr>
|
<tr><td><b>Status of September 2019 “C” release</b><br><div>The optional monthly “C” release for September 2019 for all supported versions of Windows and Windows Server prior to Windows 10, version 1903 and Windows Server, version 1903 will be available in the near term. For more information on the different types of monthly quality updates, see our <a href=\"https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376\" target=\"_blank\">Windows 10 update servicing cadence primer</a>. Follow <a href=\"https://twitter.com/windowsupdate\" target=\"_blank\"><u>@WindowsUpdate</u></a> for the latest on the availability of this release.</div></td><td>September 19, 2019 <br>04:11 PM PT</td></tr>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user