mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 22:07:22 +00:00
Merge pull request #5717 from MicrosoftDocs/repo_sync_working_branch
Resolve syncing conflicts from repo_sync_working_branch to public
This commit is contained in:
commit
ef7dddc49b
@ -106,6 +106,14 @@ The Advanced Recovery Companion is a new app in Microsoft Store restore the oper
|
||||
5. On the **Device info** page, select **Install software** to install the default package. (If you have a Full Flash Update (FFU) image that you want to install instead, select **Manual package selection**.)
|
||||
6. Software installation will begin. Do not use the device or disconnect the cable during installation. When you see the **Installation finished** page, you can disconnect and use your device.
|
||||
|
||||
>[!TIP]
|
||||
>In the event that a HoloLens 2 gets into a state where Advanced Recovery Companion cannot recognize the device, and it does not boot, try forcing the device into Flashing Mode and recovering it with Advanced Recovery Companion:
|
||||
|
||||
1. Connect the HoloLens 2 to a PC with Advanced Recovery Companion installed.
|
||||
1. Press and hold the **Volume Up and Power buttons** until the device reboots. Release the Power button, but continue to hold the Volume Up button until the third LED is lit. It will the the only lit LED.
|
||||
1. The device should be visible in **Device Manager** as a **Microsoft HoloLens Recovery** device:
|
||||
1. Launch Advanced Recovery Companion, and follow the on-screen prompts to reflash the OS to the HoloLens 2.
|
||||
|
||||
### HoloLens (1st gen)
|
||||
|
||||
If necessary, you can install a completely new operating system on your HoloLens (1st gen) with the Windows Device Recovery Tool.
|
||||
|
@ -105,8 +105,8 @@ To **close** the Start menu, do the Start gesture when the Start menu is open.
|
||||
> [!IMPORTANT]
|
||||
> For the one-handed Start gesture to work:
|
||||
>
|
||||
> 1. You must update to the November 2019 update (build 18363) or later.
|
||||
> 1. Your eyes must be calibrated on the device so that eye tracking functions correctly. If you do not see orbiting dots around the Start icon when you look at it, your eyes are not calibrated on the device.
|
||||
> 1. You must update to the November 2019 update (build 18363.1039) or later.
|
||||
> 1. Your eyes must be calibrated on the device so that eye tracking functions correctly. If you do not see orbiting dots around the Start icon when you look at it, your eyes are not [calibrated](https://docs.microsoft.com/hololens/hololens-calibration#calibrating-your-hololens-2) on the device.
|
||||
|
||||
You can also perform the Start gesture with only one hand. To do this, hold out your hand with your palm facing you and look at the **Start icon** on your inner wrist. **While keeping your eye on the icon**, pinch your thumb and index finger together.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: CertificateStore DDF file
|
||||
description: This topic shows the OMA DM device description framework (DDF) for the CertificateStore configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||
description: Learn about OMA DM device description framework (DDF) for the CertificateStore configuration service provider. DDF files are used with OMA DM provisioning XML.
|
||||
ms.assetid: D9A12D4E-3122-45C3-AD12-CC4FFAEC08B8
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: CleanPC CSP
|
||||
description: The CleanPC configuration service provider (CSP) allows removal of user-installed and pre-installed applications, with the option to persist user data. This CSP was added in Windows 10, version 1703.
|
||||
description: The CleanPC configuration service provider (CSP) allows you to remove user-installed and pre-installed applications, with the option to persist user data.
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: DeviceManageability CSP
|
||||
description: The DeviceManageability configuration service provider (CSP) is used retrieve the general information about MDM configuration capabilities on the device. This CSP was added in Windows 10, version 1607.
|
||||
description: The DeviceManageability configuration service provider (CSP) is used retrieve general information about MDM configuration capabilities on the device.
|
||||
ms.assetid: FE563221-D5B5-4EFD-9B60-44FE4066B0D2
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: DeviceStatus CSP
|
||||
description: The DeviceStatus configuration service provider is used by the enterprise to keep track of device inventory and query the state of compliance of these devices with their enterprise policies.
|
||||
description: The DeviceStatus configuration service provider keeps track of device inventory and queries the compliance state of devices within the enterprise.
|
||||
ms.assetid: 039B2010-9290-4A6E-B77B-B2469B482360
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: DMClient CSP
|
||||
description: The DMClient configuration service provider is used to specify additional enterprise-specific mobile device management configuration settings for identifying the device in the enterprise domain, security mitigation for certificate renewal, and server-triggered enterprise unenrollment.
|
||||
description: Understand how the DMClient configuration service provider works. It is used to specify enterprise-specific mobile device management configuration settings.
|
||||
ms.assetid: a5cf35d9-ced0-4087-a247-225f102f2544
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: EAP configuration
|
||||
description: The topic provides a step-by-step guide for creating an Extensible Authentication Protocol (EAP) configuration XML for the VPN profile and information about EAP certificate filtering in Windows 10.
|
||||
description: Learn how to create an Extensible Authentication Protocol (EAP) configuration XML for a VPN profile, plus info about EAP certificate filtering in Windows 10.
|
||||
ms.assetid: DD3F2292-4B4C-4430-A57F-922FED2A8FAE
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Provide server-side support for mobile app management on Windows
|
||||
description: The Windows version of mobile application management (MAM) is a lightweight solution for managing company data access and security on personal devices. MAM support is built into Windows on top of Windows Information Protection (WIP).
|
||||
description: The Windows version of mobile application management (MAM) is a lightweight solution for managing company data access and security on personal devices.
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Create a task sequence with Configuration Manager (Windows 10)
|
||||
description: In this topic, you will learn how to create a Microsoft System Center 2012 R2 Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard.
|
||||
description: Create a Microsoft System Center 2012 R2 Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard.
|
||||
ms.assetid: 0b069bec-5be8-47c6-bf64-7a630f41ac98
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Use Orchestrator runbooks with MDT (Windows 10)
|
||||
description: This topic will show you how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions.
|
||||
description: Learn how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions.
|
||||
ms.assetid: 68302780-1f6f-4a9c-9407-b14371fdce3f
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
@ -11,7 +11,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
author: greg-lindsay
|
||||
audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Use MDT database to stage Windows 10 deployment info (Windows 10)
|
||||
description: This topic is designed to teach you how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database, rather than include the information in a text file (CustomSettings.ini).
|
||||
description: Learn how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database.
|
||||
ms.assetid: 8956ab54-90ba-45d3-a384-4fdec72c4d46
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
|
@ -4,13 +4,15 @@ description: Deploying Windows 10 for IT professionals.
|
||||
ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
ms.audience: itpro
author: greg-lindsay
|
||||
ms.audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 11/06/2018
|
||||
audience: itpro
author: greg-lindsay
|
||||
audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
@ -35,7 +37,7 @@ Windows 10 upgrade options are discussed and information is provided about plann
|
||||
|
||||
## Related topics
|
||||
|
||||
[Modern Destop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home)
|
||||
[Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home)
|
||||
|
||||
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Applying Filters to Data in the SUA Tool (Windows 10)
|
||||
description: On the user interface for the Standard User Analyzer (SUA) tool, you can apply filters to the issues that the tool has found so that you can view only the information that interests you.
|
||||
description: Learn how to apply filters to results from the Standard User Analyzer (SUA) tool while testing your application.
|
||||
ms.assetid: 48c39919-3501-405d-bcf5-d2784cbb011f
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
@ -9,7 +9,8 @@ ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
author: greg-lindsay
|
||||
audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Create AppHelp Message in Compatibility Administrator (Windows 10)
|
||||
description: The Compatibility Administrator tool enables you to create an AppHelp text message. This is a blocking or non-blocking message that appears when a user starts an application that you know has major functionality issues on the Windows® operating system.
|
||||
description: Create an AppHelp text message with Compatibility Administrator; a message that appears upon starting an app with major issues on the Windows® operating system.
|
||||
ms.assetid: 5c6e89f5-1942-4aa4-8439-ccf0ecd02848
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
|
@ -3,7 +3,7 @@ title: Log files - Windows IT Pro
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
ms.author: greglin
|
||||
description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors.
|
||||
description: Learn how to interpret the log files generated during the Windows 10 upgrade process.
|
||||
keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
@ -27,7 +27,8 @@ ms.topic: article
|
||||
|
||||
Several log files are created during each phase of the upgrade process. These log files are essential for troubleshooting upgrade problems. By default, the folders that contain these log files are hidden on the upgrade target computer. To view the log files, configure Windows Explorer to view hidden items, or use a tool to automatically gather these logs. The most useful log is **setupact.log**. The log files are located in a different folder depending on the Windows Setup phase. Recall that you can determine the phase from the extend code.
|
||||
|
||||
Note: Also see the [Windows Error Reporting](windows-error-reporting.md) section in this document for help locating error codes and log files.
|
||||
>[!NOTE]
|
||||
>Also see the [Windows Error Reporting](windows-error-reporting.md) section in this document for help locating error codes and log files.
|
||||
|
||||
The following table describes some log files and how to use them for troubleshooting purposes:<br>
|
||||
|
||||
@ -79,7 +80,7 @@ See the following example:
|
||||
|
||||
## Analyze log files
|
||||
|
||||
>The following instructions are meant for IT professionals. Also see the [Upgrade error codes](upgrade-error-codes.md) section in this guide to familiarize yourself with [result codes](upgrade-error-codes.md#result-codes) and [extend codes](upgrade-error-codes.md#extend-codes).
|
||||
The following instructions are meant for IT professionals. Also see the [Upgrade error codes](upgrade-error-codes.md) section in this guide to familiarize yourself with [result codes](upgrade-error-codes.md#result-codes) and [extend codes](upgrade-error-codes.md#extend-codes).
|
||||
|
||||
<br>To analyze Windows Setup log files:
|
||||
|
||||
@ -110,7 +111,7 @@ See the following example:
|
||||
|
||||
For example, assume that the error code for an error is 0x8007042B - 0x2000D. Searching for "8007042B" reveals the following content from the setuperr.log file:
|
||||
|
||||
>Some lines in the text below are shortened to enhance readability. The date and time at the start of each line (ex: 2016-10-05 15:27:08) is shortened to minutes and seconds, and the certificate file name which is a long text string is shortened to just "CN."
|
||||
Some lines in the text below are shortened to enhance readability. The date and time at the start of each line (ex: 2016-10-05 15:27:08) is shortened to minutes and seconds, and the certificate file name which is a long text string is shortened to just "CN."
|
||||
|
||||
<br><B>setuperr.log</B> content:
|
||||
|
||||
|
@ -3,13 +3,14 @@ title: Quick fixes - Windows IT Pro
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
ms.author: greglin
|
||||
description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors.
|
||||
description: Learn how to quickly resolve many problems which may come up during a Windows 10 upgrade.
|
||||
keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
audience: itpro
author: greg-lindsay
|
||||
audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.localizationpriority: medium
|
||||
ms.topic: article
|
||||
---
|
||||
@ -27,6 +28,7 @@ The following list of fixes can resolve many Windows upgrade problems. You shoul
|
||||
|
||||
The Microsoft Virtual Agent provided by [Microsoft Support](https://support.microsoft.com/contactus/) can help you to analyze and correct some Windows upgrade errors. **To talk to a person about your issue**, start the Virtual Agent (click **Get started**) and enter "Talk to a person" two times.
|
||||
|
||||
> [!TIP]
|
||||
> You might also wish to try a new tool available from Microsoft that helps to diagnose many Windows upgrade errors. For more information and to download this tool, see [SetupDiag](setupdiag.md). The topic is more advanced (300 level) because several advanced options are available for using the tool. However, you can now just download and then double-click the tool to run it. By default when you click Save, the tool is saved in your **Downloads** folder. Double-click the tool in the folder and wait until it finishes running (it might take a few minutes), then double-click the **SetupDiagResults.log** file and open it using Notepad to see the results of the analysis.
|
||||
|
||||
## List of fixes
|
||||
@ -149,6 +151,7 @@ To check and repair system files:
|
||||
The operation completed successfully.
|
||||
|
||||
```
|
||||
> [!NOTE]
|
||||
> It may take several minutes for the command operations to be completed. For more information, see [Repair a Windows Image](https://msdn.microsoft.com/windows/hardware/commercialize/manufacture/desktop/repair-a-windows-image).
|
||||
|
||||
|
||||
@ -220,11 +223,12 @@ When you run Disk Cleanup and enable the option to Clean up system files, you ca
|
||||
|
||||
### Open an elevated command prompt
|
||||
|
||||
> [!TIP]
|
||||
> It is no longer necessary to open an elevated command prompt to run the [SetupDiag](setupdiag.md) tool. However, this is still the optimal way to run the tool.
|
||||
|
||||
To launch an elevated command prompt, press the Windows key on your keyboard, type **cmd**, press Ctrl+Shift+Enter, and then Alt+C to confirm the elevation prompt. Screenshots and other steps to open an administrator (aka elevated) command prompt are [here](https://answers.microsoft.com/en-us/windows/forum/windows_7-security/command-prompt-admin-windows-7/6a188166-5e23-461f-b468-f325688ec8c7).
|
||||
|
||||
Note: When you open an elevated command prompt, you will usually start in the **C:\WINDOWS\system32** directory. To run a program that you recently downloaded, you must change to the directory where the program is located. Alternatively, you can move or copy the program to a location on the computer that is automatically searched. These directories are listed in the [PATH variable](https://answers.microsoft.com/en-us/windows/forum/windows_10-other_settings-winpc/adding-path-variable/97300613-20cb-4d85-8d0e-cc9d3549ba23).
|
||||
Note: When you open an elevated command prompt, you will usually start in the **C:\WINDOWS\system32** directory. To run a program that you recently downloaded, you must change to the directory where the program is located. Alternatively, you can move or copy the program to a location on the computer that is automatically searched. These directories are listed in the [PATH variable](https://answers.microsoft.com/windows/forum/windows_10-other_settings-winpc/adding-path-variable/97300613-20cb-4d85-8d0e-cc9d3549ba23).
|
||||
|
||||
If this is too complicated for you, then use File Explorer to create a new folder under C: with a short name such as "new" then copy or move the programs you want to run (like SetupDiag) to this folder using File Explorer. When you open an elevated command prompt, change to this directory by typing "cd c:\new" and now you can run the programs in that folder.
|
||||
|
||||
|
@ -3,7 +3,7 @@ title: Resolution procedures - Windows IT Pro
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
ms.author: greglin
|
||||
description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors.
|
||||
description: Discover general troubleshooting procedures for dealing with 0xC1900101, the generic rollback code thrown when something goes wrong during a Windows 10 upgrade.
|
||||
keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -3,7 +3,7 @@ title: Troubleshoot Windows 10 upgrade errors - Windows IT Pro
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
ms.author: greglin
|
||||
description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors.
|
||||
description: Understanding the Windows 10 upgrade process can help you troubleshoot errors when something goes wrong. Find out more with this guide.
|
||||
keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -3,7 +3,7 @@ title: Upgrade error codes - Windows IT Pro
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
ms.author: greglin
|
||||
description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors.
|
||||
description: Understand the error codes that may come up if something goes wrong during the Windows 10 upgrade process.
|
||||
keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
@ -30,7 +30,7 @@ If the upgrade process is not successful, Windows Setup will return two codes:
|
||||
1. **A result code**: The result code corresponds to a specific Win32 or NTSTATUS error.
|
||||
2. **An extend code**: The extend code contains information about both the *phase* in which an error occurred, and the *operation* that was being performed when the error occurred.
|
||||
|
||||
>For example, a result code of **0xC1900101** with an extend code of **0x4000D** will be returned as: **0xC1900101 - 0x4000D**.
|
||||
For example, a result code of **0xC1900101** with an extend code of **0x4000D** will be returned as: **0xC1900101 - 0x4000D**.
|
||||
|
||||
Note: If only a result code is returned, this can be because a tool is being used that was not able to capture the extend code. For example, if you are using the [Windows 10 Upgrade Assistant](https://support.microsoft.com/kb/3159635) then only a result code might be returned.
|
||||
|
||||
@ -39,7 +39,7 @@ Note: If only a result code is returned, this can be because a tool is being use
|
||||
|
||||
## Result codes
|
||||
|
||||
>A result code of **0xC1900101** is generic and indicates that a rollback occurred. In most cases, the cause is a driver compatibility issue. <br>To troubleshoot a failed upgrade that has returned a result code of 0xC1900101, analyze the extend code to determine the Windows Setup phase, and see the [Resolution procedures](resolution-procedures.md) section later in this article.
|
||||
A result code of **0xC1900101** is generic and indicates that a rollback occurred. In most cases, the cause is a driver compatibility issue. <br>To troubleshoot a failed upgrade that has returned a result code of 0xC1900101, analyze the extend code to determine the Windows Setup phase, and see the [Resolution procedures](resolution-procedures.md) section later in this article.
|
||||
|
||||
The following set of result codes are associated with [Windows Setup](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-command-line-options) compatibility warnings:
|
||||
|
||||
@ -77,7 +77,8 @@ Some result codes are self-explanatory, whereas others are more generic and requ
|
||||
|
||||
## Extend codes
|
||||
|
||||
>**Important**: Extend codes reflect the current Windows 10 upgrade process, and might change in future releases of Windows 10. The codes discussed in this section apply to Windows 10 version 1607, also known as the Anniversary Update.
|
||||
>[!IMPORTANT]
|
||||
>Extend codes reflect the current Windows 10 upgrade process, and might change in future releases of Windows 10. The codes discussed in this section apply to Windows 10 version 1607, also known as the Anniversary Update.
|
||||
|
||||
Extend codes can be matched to the phase and operation when an error occurred. To match an extend code to the phase and operation:
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Perform in-place upgrade to Windows 10 via Configuration Manager
|
||||
description: The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade. Use a System Center Configuration Manager task sequence to completely automate the process.
|
||||
description: In-place upgrades make upgrading Windows 7, Windows 8, and Windows 8.1 to Windows 10 easy -- you can even automate the whole process with a SCCM task sequence.
|
||||
ms.assetid: F8DF6191-0DB0-4EF5-A9B1-6A11D5DE4878
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
|
@ -3,7 +3,7 @@ title: Windows error reporting - Windows IT Pro
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
ms.author: greglin
|
||||
description: Resolve Windows 10 upgrade errors for ITPros. Technical information for IT professionals to help diagnose Windows setup errors.
|
||||
description: Learn how to review the events generated by Windows Error Reporting when something goes wrong during Windows 10 setup.
|
||||
keywords: deploy, error, troubleshoot, windows, 10, upgrade, code, rollback, ITPro
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
Binary file not shown.
After Width: | Height: | Size: 20 KiB |
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: VAMT Known Issues (Windows 10)
|
||||
description: VAMT Known Issues
|
||||
title: VAMT known issues (Windows 10)
|
||||
description: Volume Activation Management Tool (VAMT) known issues
|
||||
ms.assetid: 8992f1f3-830a-4ce7-a248-f3a6377ab77f
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
@ -9,17 +9,61 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: activation
|
||||
audience: itpro
author: greg-lindsay
|
||||
ms.date: 04/25/2017
|
||||
audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.date: 12/17/2019
|
||||
ms.topic: article
|
||||
ms.custom:
|
||||
- CI 111496
|
||||
- CSSTroubleshooting
|
||||
---
|
||||
|
||||
# VAMT Known Issues
|
||||
# VAMT known issues
|
||||
|
||||
The following list contains the current known issues with the Volume Activation Management Tool (VAMT) 3.0.
|
||||
- The VAMT Windows Management Infrastructure (WMI) remote operations may take longer to execute if the target computer is in a sleep or standby state.
|
||||
- Recovery of Non-Genuine computers is a two-step process. VAMT can be used to install a new product key and activate the computer. However, the computer itself must visit the [Windows Genuine Advantage](https://go.microsoft.com/fwlink/p/?linkid=182914) Web site to revalidate the computer's Genuine status. Upon successfully completing this step, the computer will be restored to full functionality. For more information on recovering Non-Genuine Windows computers, go to [Windows Volume Activation](https://go.microsoft.com/fwlink/p/?linkid=184668).
|
||||
- When opening a Computer Information List (.cil file) saved in a previous version of VAMT, the edition information is not shown for each product in the center pane. Users must update the product status again to obtain the edition information.
|
||||
The following list and the section that follows contain the current known issues regarding the Volume Activation Management Tool (VAMT), versions 3.0. and 3.1.
|
||||
|
||||
- VAMT Windows Management Infrastructure (WMI) remote operations might take longer to execute if the target computer is in a sleep or standby state.
|
||||
- When opening a Computer Information List (CIL file) that was saved by using a previous version of VAMT, the edition information is not shown for each product in the center pane. Users must update the product status again to obtain the edition information.
|
||||
- The remaining activation count can only be retrieved for MAKs.
|
||||
|
||||
|
||||
|
||||
## Can't add CSVLKs for Windows 10 activation to VAMT 3.1
|
||||
|
||||
When you try to add a Windows 10 Key Management Service (KMS) Host key (CSVLK) or a Windows Server 2012 R2 for Windows 10 CSVLK into VAMT 3.1 (version 10.0.10240.0), you receive the following error message:
|
||||
|
||||
> The specified product key is invalid, or is unsupported by this version of VAMT. An update to support additional products may be available online.
|
||||
|
||||

|
||||
|
||||
This issue occurs because VAMT 3.1 does not contain the correct Pkconfig files to recognize this kind of key.
|
||||
|
||||
### Workaround
|
||||
|
||||
To work around this issue, use one of the following methods.
|
||||
|
||||
**Method 1**
|
||||
|
||||
Do not add the CSVLK to the VAMT 3.1 tool. Instead, use the **slmgr.vbs /ipk \<*CSVLK*>** command-line tool to install a CSVLK on a KMS host. In this command, \<*CSVLK*> represents the specific key that you want to install. For more information about how to use the Slmgr.vbs tool, see [Slmgr.vbs options for obtaining volume activation information](https://docs.microsoft.com/windows-server/get-started/activation-slmgr-vbs-options).
|
||||
|
||||
**Method 2**
|
||||
|
||||
On the KMS host computer, follow these steps:
|
||||
|
||||
1. Download the hotfix from [July 2016 update rollup for Windows 8.1 and Windows Server 2012 R2](https://support.microsoft.com/help/3172614/).
|
||||
|
||||
1. In Windows Explorer, right-click **485392_intl_x64_zip**, and then extract the hotfix to **C:\KB3058168**.
|
||||
|
||||
1. To extract the contents of the update, open a Command Prompt window and run the following command:
|
||||
|
||||
```cmd
|
||||
expand c:\KB3058168\Windows8.1-KB3058168-x64.msu -f:* C:\KB3058168\
|
||||
```
|
||||
|
||||
1. To extract the contents of Windows8.1-KB3058168-x64.cab, run the following command:
|
||||
|
||||
```cmd
|
||||
expand c:\KB3058168\Windows8.1-KB3058168-x64.cab -f:pkeyconfig-csvlk.xrm-ms c:\KB3058168
|
||||
```
|
||||
|
||||
1. In the "C:\KB3058168\x86_microsoft-windows-s..nent-sku-csvlk-pack_31bf3856ad364e35_6.3.9600.17815_none_bd26b4f34d049716\" folder, copy the **pkeyconfig-csvlk.xrm-ms** file. Paste this file to the "C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\VAMT3\pkconfig" folder.
|
||||
|
||||
1. Restart VAMT.
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows 10 deployment tools
|
||||
description: Learn about the tools available to deploy Windows 10.
|
||||
description: Browse through documentation describing Windows 10 deployment tools. Learn how to use these these tools to successfully deploy Windows 10 to your organization.
|
||||
ms.assetid: 5C4B0AE3-B2D0-4628-9E73-606F3FAA17BB
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Autopilot device guidelines
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
description: Windows Autopilot deployment
|
||||
description: Learn all about hardware, firmware, and software best practices for Windows Autopilot deployment.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows Autopilot for existing devices
|
||||
description: Windows Autopilot deployment
|
||||
description: Modern desktop deployment with Windows Autopilot enables you to easily deploy the latest version of Windows 10 to your existing devices.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows Autopilot deployment
|
||||
description: Windows Autopilot deployment
|
||||
description: Discover resources for Windows Autopilot deployment with this guide.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Autopilot known issues
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
description: Windows Autopilot deployment
|
||||
description: Inform yourself about known issues that may occur during Windows Autopilot deployment.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Configure Autopilot profiles
|
||||
description: Windows Autopilot deployment
|
||||
description: Learn how to configure device profiles while performing a Windows Autopilot deployment.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
@ -9,7 +9,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
audience: itpro
author: greg-lindsay
|
||||
audience: itpro
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.collection: M365-modern-desktop
|
||||
ms.topic: article
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows Autopilot customer consent
|
||||
description: Windows Autopilot deployment
|
||||
description: Learn how a cloud service provider (CSP) partner or an OEM can get customer authorization to register Windows Autopilot devices on the customer’s behalf.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
@ -51,7 +51,8 @@ For a CSP to register Windows Autopilot devices on behalf of a customer, the cus
|
||||
|
||||

|
||||
|
||||
NOTE: A user without global admin privileges who clicks the link will see a message similar to the following:
|
||||
> [!NOTE]
|
||||
> A user without global admin privileges who clicks the link will see a message similar to the following:
|
||||
|
||||

|
||||
|
||||
@ -69,16 +70,17 @@ Each OEM has a unique link to provide to their respective customers, which the O
|
||||
|
||||

|
||||
|
||||
NOTE: A user without global admin privileges who clicks the link will see a message similar to the following:
|
||||
> [!NOTE]
|
||||
> A user without global admin privileges who clicks the link will see a message similar to the following:
|
||||
|
||||

|
||||
3. Customer selects the **Yes** checkbox, followed by the **Accept** button, and they’re done. Authorization happens instantaneously.
|
||||
|
||||
4. The OEM can use the Validate Device Submission Data API to verify the consent has completed. This API is discussed in the latest version of the API Whitepaper, p. 14ff [https://devicepartner.microsoft.com/assets/detail/windows-autopilot-integration-with-oem-api-design-whitepaper-docx](https://devicepartner.microsoft.com/assets/detail/windows-autopilot-integration-with-oem-api-design-whitepaper-docx). **Note**: this link is only accessible by Microsoft Device Partners. As discussed in this whitepaper, it’s a best practice recommendation for OEM partners to run the API check to confirm they’ve received customer consent before attempting to register devices, thus avoiding errors in the registration process.
|
||||
|
||||
NOTE: During the OEM authorization registration process, no delegated admin permissions are granted to the OEM.
|
||||
> [!NOTE]
|
||||
> During the OEM authorization registration process, no delegated admin permissions are granted to the OEM.
|
||||
|
||||
## Summary
|
||||
|
||||
At this stage of the process, Microsoft is no longer involved; the consent exchange happens directly between the OEM and the customer. And, it all happens instantaneously - as quickly as buttons are clicked.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows Autopilot Self-Deploying mode
|
||||
description: Windows Autopilot deployment
|
||||
description: Self-deploying mode allows a device to be deployed with little to no user interaction. This mode mode is designed to deploy Windows 10 as a kiosk, digital signage device, or a shared device.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Troubleshooting Windows Autopilot
|
||||
description: Windows Autopilot deployment
|
||||
description: Learn how to handle issues as they arise during the Windows Autopilot deployment process.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows Autopilot User-Driven Mode
|
||||
description: Windows Autopilot deployment
|
||||
description: Windows Autopilot user-driven mode allows devices to be deployed to a ready-to-use state without requiring help from IT personnel.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Autopilot requirements
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
description: Windows Autopilot deployment
|
||||
description: Inform yourself about software, networking, licensing, and configuration requirements for Windows Autopilot deployment.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows Autopilot Reset
|
||||
description: Windows Autopilot deployment
|
||||
description: Windows Autopilot Reset takes the device back to a business-ready state, allowing the next user to sign in and get productive quickly and easily.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows Autopilot scenarios and capabilities
|
||||
description: Windows Autopilot deployment
|
||||
description: Follow along with several typical Windows Autopilot deployment scenarios, such as re-deploying a device in a business-ready state.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Autopilot what's new
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
description: Windows Autopilot deployment
|
||||
description: Read news and resources about the latest updates and past versions of Windows Autopilot.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Overview of Windows Autopilot
|
||||
description: Windows Autopilot deployment
|
||||
description: Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use.
|
||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||
ms.reviewer: mniehaus
|
||||
manager: laurawi
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Prepare & Deploy Windows AD FS certificate trust (Windows Hello for Business)
|
||||
description: How to Prepare and Deploy Windows Server 2016 Active Directory Federation Services (AD FS) for Windows Hello for Business
|
||||
description: How to Prepare and Deploy Windows Server 2016 Active Directory Federation Services (AD FS) for Windows Hello for Business, using certificate trust.
|
||||
keywords: identity, PIN, biometric, Hello, passport
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Validate and Deploy MFA for Windows Hello for Business with certificate trust
|
||||
description: How to Validate and Deploy Multifactor Authentication (MFA) Services for Windows Hello for Business
|
||||
description: How to Validate and Deploy Multifactor Authentication (MFA) Services for Windows Hello for Business with certificate trust
|
||||
keywords: identity, PIN, biometric, Hello, passport
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: How Windows Hello for Business works - Authentication
|
||||
description: Explains registration, authentication, key material, and infrastructure for Windows Hello for Business.
|
||||
description: Learn about the authentication flow for Windows Hello for Business.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: How Windows Hello for Business works - Provisioning
|
||||
description: Explains registration, authentication, key material, and infrastructure for Windows Hello for Business.
|
||||
description: Explore the provisioning flows for Windows Hello for Business, from within a variety of environments.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
@ -58,7 +58,7 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong,
|
||||
|
||||
[Return to top](#windows-hello-for-business-provisioning)
|
||||
## Hybrid Azure AD joined provisioning in a Key Trust deployment in a Managed environment
|
||||

|
||||

|
||||
|
||||
|
||||
| Phase | Description |
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: How Windows Hello for Business works - Technical Deep Dive
|
||||
description: Explains registration, authentication, key material, and infrastructure for Windows Hello for Business.
|
||||
description: Deeply explore how Windows Hello for Business works, and how it can help your users authenticate to services.
|
||||
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, key-trust, works
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: How Windows Hello for Business works - Technology and Terms
|
||||
description: Explains registration, authentication, key material, and infrastructure for Windows Hello for Business.
|
||||
description: Explore technology and terms associated with Windows Hello for Business. Learn how Windows Hello for Business works.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: How Windows Hello for Business works
|
||||
description: Explains registration, authentication, key material, and infrastructure for Windows Hello for Business.
|
||||
description: Learn how Windows Hello for Business works, and how it can help your users authenticate to services.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Prepare & Deploy Windows Active Directory Federation Services with key trust (Windows Hello for Business)
|
||||
description: How to Prepare and Deploy Windows Server 2016 Active Directory Federation Services for Windows Hello for Business
|
||||
description: How to Prepare and Deploy Windows Server 2016 Active Directory Federation Services for Windows Hello for Business using key trust.
|
||||
keywords: identity, PIN, biometric, Hello, passport
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: How Windows Hello for Business works (Windows 10)
|
||||
description: Explains registration, authentication, key material, and infrastructure for Windows Hello for Business.
|
||||
description: Learn about registration, authentication, key material, and infrastructure for Windows Hello for Business.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Smart Card Group Policy and Registry Settings (Windows 10)
|
||||
description: This topic for the IT professional and smart card developer describes the Group Policy settings, registry key settings, local security policy settings, and credential delegation policy settings that are available for configuring smart cards.
|
||||
description: Discover the Group Policy, registry key, local security policy, and credential delegation policy settings that are available for configuring smart cards.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: VPN and conditional access (Windows 10)
|
||||
description: The VPN client is now able to integrate with the cloud-based Conditional Access Platform to provide a device compliance option for remote clients. Conditional Access is a policy-based evaluation engine that lets you create access rules for any Azure Active Directory (Azure AD) connected application.
|
||||
description: Learn how to integrate the VPN client with the Conditional Access Platform, so you can create access rules for Azure Active Directory (Azure AD) connected apps.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: BitLocker and Active Directory Domain Services (AD DS) FAQ (Windows 10)
|
||||
description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
description: Learn more about how BitLocker and Active Directory Domain Services (AD DS) can work together to keep devices secure.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: BitLocker deployment and administration FAQ (Windows 10)
|
||||
description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
description: Browse frequently asked questions about BitLocker deployment and administration, such as, "Can BitLocker deployment be automated in an enterprise environment?"
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: BitLocker FAQ (Windows 10)
|
||||
description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
description: Find the answers you need by exploring this brief hub page listing FAQ pages for various aspects of BitLocker.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: BitLocker Key Management FAQ (Windows 10)
|
||||
description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
description: Browse frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: BitLocker Network Unlock FAQ (Windows 10)
|
||||
description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
description: Familiarize yourself with BitLocker Network Unlock. Learn how it can make desktop and server management easier within domain environments.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: BitLocker Security FAQ (Windows 10)
|
||||
description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
description: Learn more about how BitLocker security works. Browse frequently asked questions, such as, "What form of encryption does BitLocker use?"
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: BitLocker To Go FAQ (Windows 10)
|
||||
description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
description: Learn more about BitLocker To Go — BitLocker drive encryption for removable drives.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: BitLocker Upgrading FAQ (Windows 10)
|
||||
description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
description: Learn more about upgrading systems that have BitLocker enabled.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Using BitLocker with other programs FAQ (Windows 10)
|
||||
description: This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.
|
||||
description: Learn how to integrate BitLocker with other software on your device.
|
||||
ms.assetid: c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: TPM fundamentals (Windows 10)
|
||||
description: This topic for the IT professional provides a description of the components of the Trusted Platform Module (TPM 1.2 and TPM 2.0) and explains how they are used to mitigate dictionary attacks.
|
||||
description: Inform yourself about the components of the Trusted Platform Module (TPM 1.2 and TPM 2.0) and how they are used to mitigate dictionary attacks.
|
||||
ms.assetid: ac90f5f9-9a15-4e87-b00d-4adcf2ec3000
|
||||
ms.reviewer:
|
||||
ms.prod: w10
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Apply a basic audit policy on a file or folder (Windows 10)
|
||||
description: You can apply audit policies to individual files and folders on your computer by setting the permission type to record successful access attempts or failed access attempts in the security log.
|
||||
description: Apply audit policies to individual files and folders on your computer by setting the permission type to record access attempts in the security log.
|
||||
ms.assetid: 565E7249-5CD0-4B2E-B2C0-B3A0793A51E2
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Application Generated (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Application Generated, which determines whether the operating system generates audit events when applications attempt to use the Windows Auditing application programming interfaces (APIs).
|
||||
description: The policy setting, Audit Application Generated, determines if audit events are generated when applications attempt to use the Windows Auditing APIs.
|
||||
ms.assetid: 6c58a365-b25b-42b8-98ab-819002e31871
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Central Access Policy Staging (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Central Access Policy Staging, which determines permissions on a Central Access Policy.
|
||||
description: The Advanced Security Audit policy setting, Audit Central Access Policy Staging, determines permissions on a Central Access Policy.
|
||||
ms.assetid: D9BB11CE-949A-4B48-82BF-30DC5E6FC67D
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Directory Service Replication (Windows 10)
|
||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Directory Service Replication, which determines whether the operating system generates audit events when replication between two domain controllers begins and ends.
|
||||
description: Audit Directory Service Replication is a policy setting that decides if audit events are created when replication between two domain controllers begins or ends.
|
||||
ms.assetid: b95d296c-7993-4e8d-8064-a8bbe284bd56
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Kerberos Authentication Service (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Kerberos Authentication Service, which determines whether to generate audit events for Kerberos authentication ticket-granting ticket (TGT) requests.
|
||||
description: The policy setting Audit Kerberos Authentication Service decides if audit events are generated for Kerberos authentication ticket-granting ticket (TGT) requests
|
||||
ms.assetid: 990dd6d9-1a1f-4cce-97ba-5d7e0a7db859
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit MPSSVC Rule-Level Policy Change (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit MPSSVC Rule-Level Policy Change, which determines whether the operating system generates audit events when changes are made to policy rules for the Microsoft Protection Service (MPSSVC.exe).
|
||||
description: Audit MPSSVC Rule-Level Policy Change determines if audit events are generated when policy rules are altered for the Microsoft Protection Service (MPSSVC.exe).
|
||||
ms.assetid: 263461b3-c61c-4ec3-9dee-851164845019
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Network Policy Server (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Network Policy Server, which determines whether the operating system generates audit events for RADIUS (IAS) and Network Access Protection (NAP) activity on user access requests (Grant, Deny, Discard, Quarantine, Lock, and Unlock).
|
||||
description: The policy setting, Audit Network Policy Server, determines if audit events are generated for RADIUS (IAS) and NAP activity on user access requests.
|
||||
ms.assetid: 43b2aea4-26df-46da-b761-2b30f51a80f7
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Process Termination (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Process Termination, which determines whether the operating system generates audit events when an attempt is made to end a process.
|
||||
description: The Advanced Security Audit policy setting, Audit Process Termination, determines if audit events are generated when an attempt is made to end a process.
|
||||
ms.assetid: 65d88e53-14aa-48a4-812b-557cebbf9e50
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit RPC Events (Windows 10)
|
||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit RPC Events, which determines whether the operating system generates audit events when inbound remote procedure call (RPC) connections are made.
|
||||
description: Audit RPC Events is an audit policy setting that determines if audit events are generated when inbound remote procedure call (RPC) connections are made.
|
||||
ms.assetid: 868aec2d-93b4-4bc8-a150-941f88838ba6
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Security Group Management (Windows 10)
|
||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Security Group Management, which determines whether the operating system generates audit events when specific security group management tasks are performed.
|
||||
description: The policy setting, Audit Security Group Management, determines if audit events are generated when specific security group management tasks are performed.
|
||||
ms.assetid: ac2ee101-557b-4c84-b9fa-4fb23331f1aa
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit Sensitive Privilege Use (Windows 10)
|
||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Sensitive Privilege Use, which determines whether the operating system generates audit events when sensitive privileges (user rights) are used.
|
||||
description: The policy setting, Audit Sensitive Privilege Use, determines if the operating system generates audit events when sensitive privileges (user rights) are used.
|
||||
ms.assetid: 915abf50-42d2-45f6-9fd1-e7bd201b193d
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit User Account Management (Windows 10)
|
||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit User Account Management, which determines whether the operating system generates audit events when specific user account management tasks are performed.
|
||||
description: Audit User Account Management is an audit policy setting that determines if the operating system generates audit events when certain tasks are performed.
|
||||
ms.assetid: f7e72998-3858-4197-a443-19586ecc4bfb
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Audit User/Device Claims (Windows 10)
|
||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit User/Device Claims, which enables you to audit security events that are generated by user and device claims.
|
||||
description: Audit User/Device Claims is an audit policy setting which enables you to audit security events that are generated by user and device claims.
|
||||
ms.assetid: D3D2BFAF-F2C0-462A-9377-673DB49D5486
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Monitor central access policies for files or folders (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor changes to the central access policies that are associated with files and folders when you are using advanced security auditing options to monitor dynamic access control objects.
|
||||
description: Monitor changes to central access policies associated with files and folders, when using advanced security auditing options for dynamic access control objects.
|
||||
ms.assetid: 2ea8fc23-b3ac-432f-87b0-6a16506e8eed
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Monitor central access policies on a file server (Windows 10)
|
||||
description: This topic for the IT professional describes how to monitor changes to the central access policies that apply to a file server when using advanced security auditing options to monitor dynamic access control objects.
|
||||
description: Learn how to monitor changes to the central access policies that apply to a file server, when using advanced security auditing options.
|
||||
ms.assetid: 126b051e-c20d-41f1-b42f-6cff24dcf20c
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Deployment guidelines for Windows Defender Device Guard (Windows 10)
|
||||
description: To help you plan a deployment of Microsoft Windows Defender Device Guard, this article describes hardware requirements for Windows Defender Device Guard, outlines deployment approaches, and describes methods for code signing and code integrity policies.
|
||||
description: Plan your deployment of Windows Defender Device Guard. Learn about hardware requirements, deployment approaches, code signing and code integrity policies.
|
||||
keywords: virtualization, security, malware
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Get support
|
||||
description: This article, and the articles it links to, answers frequently asked question on how to get support for Windows baselines, the Security Compliance Toolkit (SCT), and related topics in your organization
|
||||
description: Frequently asked question about how to get support for Windows baselines, the Security Compliance Toolkit (SCT), and related topics in your organization.
|
||||
keywords: virtualization, security, malware
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Hello World
|
||||
title: Hello World for Microsoft Defender Advanced Threat Protection API
|
||||
ms.reviewer:
|
||||
description: Use this API to run advanced queries
|
||||
description: Create a practice 'Hello world'-style API call to the Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) API.
|
||||
keywords: apis, supported apis, advanced hunting, query
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Advanced Hunting with Powershell API Guide
|
||||
ms.reviewer:
|
||||
description: Use this API to run advanced queries
|
||||
description: Walk through a practice scenario, complete with code samples, querying several Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) APIs.
|
||||
keywords: apis, supported apis, advanced hunting, query
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
@ -30,7 +30,7 @@ In this section we share PowerShell samples to
|
||||
- Use token to retrieve the latest alerts in Microsoft Defender ATP
|
||||
- For each alert, if the alert has medium or high priority and is still in progress, check how many times the machine has connected to suspicious URL.
|
||||
|
||||
>**Prerequisite**: You first need to [create an app](apis-intro.md).
|
||||
**Prerequisite**: You first need to [create an app](apis-intro.md).
|
||||
|
||||
## Preparation Instructions
|
||||
|
||||
@ -40,16 +40,16 @@ In this section we share PowerShell samples to
|
||||
Set-ExecutionPolicy -ExecutionPolicy Bypass
|
||||
```
|
||||
|
||||
>For more details, refer to [PowerShell documentation](https://docs.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy)
|
||||
For more details, refer to [PowerShell documentation](https://docs.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy)
|
||||
|
||||
## Get token
|
||||
|
||||
- Run the below
|
||||
Run the below:
|
||||
|
||||
> - $tenantId: ID of the tenant on behalf of which you want to run the query (i.e., the query will be run on the data of this tenant)
|
||||
> - $appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Microsoft Defender ATP)
|
||||
> - $appSecret: Secret of your AAD app
|
||||
> - $suspiciousUrl: The URL
|
||||
- $tenantId: ID of the tenant on behalf of which you want to run the query (i.e., the query will be run on the data of this tenant)
|
||||
- $appId: ID of your AAD app (the app must have 'Run advanced queries' permission to Microsoft Defender ATP)
|
||||
- $appSecret: Secret of your AAD app
|
||||
- $suspiciousUrl: The URL
|
||||
|
||||
|
||||
```
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Microsoft Threat Experts
|
||||
ms.reviewer:
|
||||
description: Microsoft Threat Experts is the new managed detection and response (MDR) service in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365.
|
||||
description: Microsoft Threat Experts provides an additional layer of expertise to Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
|
||||
keywords: managed threat hunting service, managed threat hunting, managed detection and response (MDR) service, MTE, Microsoft Threat Experts
|
||||
search.product: Windows 10
|
||||
search.appverid: met150
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Advanced Hunting API
|
||||
ms.reviewer:
|
||||
description: Use this API to run advanced queries
|
||||
description: Use the Advanced hunting API to run advanced queries on Microsoft Defender Advanced Threat Protection
|
||||
keywords: apis, supported apis, advanced hunting, query
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
|
@ -22,7 +22,7 @@ ms.topic: conceptual
|
||||
**Applies to:**
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
|
||||
> [!TIP]
|
||||
> Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-supported-response-apis-abovefoldlink)
|
||||
|
||||
Learn about the supported response related API calls you can run and details such as the required request headers, and expected response from the calls.
|
||||
@ -46,6 +46,3 @@ Get MachineActions collection | Run this to get MachineAction collection.
|
||||
Get FileActions collection | Run this to get FileActions collection.
|
||||
Get FileMachineAction object | Run this to get FileMachineAction object.
|
||||
Get FileMachineActions collection | Run this to get FileMachineAction collection.
|
||||
|
||||
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Mitigate threats by using Windows 10 security features (Windows 10)
|
||||
description: This topic provides an overview of software and firmware threats faced in the current security landscape, and the mitigations that Windows 10 offers in response to these threats.
|
||||
description: An overview of software and firmware threats faced in the current security landscape, and the mitigations that Windows 10 offers in response to these threats.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Access Credential Manager as a trusted caller (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management, and security considerations for the Access Credential Manager as a trusted caller security policy setting.
|
||||
description: Describes best practices, security considerations and more for the security policy setting, Access Credential Manager as a trusted caller.
|
||||
ms.assetid: a51820d2-ca5b-47dd-8e9b-d7008603db88
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Accounts Limit local account use of blank passwords (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Accounts Limit local account use of blank passwords to console logon only security policy setting.
|
||||
description: Learn best practices, security considerations, and more for the policy setting, Accounts Limit local account use of blank passwords to console logon only.
|
||||
ms.assetid: a1bfb58b-1ae8-4de9-832b-aa889a6e64bd
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Interactive Logon Message text (Windows 10)
|
||||
description: Describes the best practices, location, values, management, and security considerations for the Interactive logon Message text for users attempting to log on security policy setting.
|
||||
description: Learn about best practices, security considerations and more for the security policy setting, Interactive logon Message text for users attempting to log on.
|
||||
ms.assetid: fcfe8a6d-ca65-4403-b9e6-2fa017a31c2e
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Microsoft network client Send unencrypted password (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Microsoft network client Send unencrypted password to third-party SMB servers security policy setting.
|
||||
description: Learn about best practices and more for the security policy setting, Microsoft network client Send unencrypted password to third-party SMB servers.
|
||||
ms.assetid: 97a76b93-afa7-4dd9-bb52-7c9e289b6017
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Microsoft network server Attempt S4U2Self (Windows 10)
|
||||
description: Describes the best practices, location, values, management, and security considerations for the Microsoft network server Attempt S4U2Self to obtain claim information security policy setting.
|
||||
description: Learn about the security policy setting, Microsoft network server Attempt S4U2Self to obtain claim information.
|
||||
ms.assetid: e4508387-35ed-4a3f-a47c-27f8396adbba
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Network access Do not allow anonymous enumeration (Windows 10)
|
||||
description: Describes the best practices, location, values, and security considerations for the Network access Do not allow anonymous enumeration of SAM accounts and shares security policy setting.
|
||||
description: Learn about best practices and more for the security policy setting, Network access Do not allow anonymous enumeration of SAM accounts and shares.
|
||||
ms.assetid: 3686788d-4cc7-4222-9163-cbc7c3362d73
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Let Everyone permissions apply to anonymous users (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Let Everyone permissions apply to anonymous users security policy setting.
|
||||
description: Learn about best practices, security considerations and more for the security policy setting, Network access Let Everyone permissions apply to anonymous users.
|
||||
ms.assetid: cdbc5159-9173-497e-b46b-7325f4256353
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Network access Named Pipes that can be accessed anonymously (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the Network access Named Pipes that can be accessed anonymously security policy setting.
|
||||
description: Describes best practices, security considerations and more for the security policy setting, Network access Named Pipes that can be accessed anonymously.
|
||||
ms.assetid: 8897d2a4-813e-4d2b-8518-fcee71e1cf2c
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Network List Manager policies (Windows 10)
|
||||
description: Network List Manager policies are security settings that you can use to configure different aspects of how networks are listed and displayed on one device or on many devices.
|
||||
description: Network List Manager policies are security settings that configure different aspects of how networks are listed and displayed on one device or on many devices.
|
||||
ms.assetid: bd8109d4-b07c-4beb-a9a6-affae2ba2fda
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Network security Restrict NTLM in this domain (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM NTLM authentication in this domain security policy setting.
|
||||
description: Learn about best practices, security considerations and more for the security policy setting, Network Security Restrict NTLM NTLM authentication in this domain.
|
||||
ms.assetid: 4c7884e9-cc11-4402-96b6-89c77dc908f8
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Network security Restrict NTLM Outgoing traffic (Windows 10)
|
||||
description: Describes the best practices, location, values, management aspects, and security considerations for the Network Security Restrict NTLM Outgoing NTLM traffic to remote servers security policy setting.
|
||||
description: Learn about best practices, security considerations and more for the policy setting, Network Security Restrict NTLM Outgoing NTLM traffic to remote servers.
|
||||
ms.assetid: 63437a90-764b-4f06-aed8-a4a26cf81bd1
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Always sign SMBv1 network client communications (Windows 10)
|
||||
description: For SMBv1 only, describes the best practices, location, values, policy management and security considerations for the Microsoft network client Digitally sign communications (always) security policy setting.
|
||||
description: Learn about best practices, security considerations and more for the security policy setting, Microsoft network client Digitally sign communications (always).
|
||||
ms.assetid: 4b7b0298-b130-40f8-960d-60418ba85f76
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Behavior of the elevation prompt for standard users (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the User Account Control Behavior of the elevation prompt for standard users security policy setting.
|
||||
description: Learn about best practices, security considerations, and more for the policy setting, User Account Control Behavior of the elevation prompt for standard users.
|
||||
ms.assetid: 1eae7def-8f6c-43b6-9474-23911fdc01ba
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Only elevate UIAccess app installed in secure location (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the User Account Control Only elevate UIAccess applications that are installed in secure locations security policy setting.
|
||||
description: Learn about best practices and more for the policy setting, User Account Control Only elevate UIAccess applications that are installed in secure locations.
|
||||
ms.assetid: 4333409e-a5be-4f2f-8808-618f53abd22c
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: UAC Run all administrators in Admin Approval Mode (Windows 10)
|
||||
description: Describes the best practices, location, values, policy management and security considerations for the User Account Control Run all administrators in Admin Approval Mode security policy setting.
|
||||
description: Learn about best practices, security considerations and more for the security policy setting, User Account Control Run all administrators in Admin Approval Mode.
|
||||
ms.assetid: b838c561-7bfc-41ef-a7a5-55857259c7bf
|
||||
ms.reviewer:
|
||||
ms.author: dansimp
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows 10 Mobile security guide (Windows 10)
|
||||
description: This guide provides a detailed description of the most important security features in the Windows 10 Mobile operating system—identity access and control, data protection, malware resistance, and app platform security.
|
||||
description: The most important security features in the Windows 10 Mobile — identity access & control, data protection, malware resistance, and app platform security.
|
||||
ms.assetid: D51EF508-699E-4A68-A7CD-91D821A97205
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: denisebmsft
|
||||
ms.author: deniseb
|
||||
ms.date: 10/14/2019
|
||||
ms.date: 12/17/2019
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
ms.custom: nextgen
|
||||
@ -23,38 +23,31 @@ ms.custom: nextgen
|
||||
|
||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
Next-generation protection includes services that use machine learning together with the cloud to protect devices in your enterprise organization. Next-generation protection services include:
|
||||
Windows Defender Antivirus is the next-generation protection component of Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP). Next-generation protection brings together machine learning, big-data analysis, in-depth threat resistance research, and cloud infrastructure to protect devices in your enterprise organization. Next-generation protection services include:
|
||||
|
||||
- [Always-on scanning](configure-real-time-protection-windows-defender-antivirus.md), also known as "real-time protection", for advanced file and process behavior monitoring
|
||||
- [Cloud-based delivery](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for near-instant detection and blocking of new and emerging threats
|
||||
- [Dedicated protection updates](manage-updates-baselines-windows-defender-antivirus.md) powered by machine-learning, big-data analysis, and in-depth threat resistance research
|
||||
- [Behavior-based, heuristic, and real-time antivirus protection](configure-protection-features-windows-defender-antivirus.md). This includes always-on scanning using file and process behavior monitoring and other heuristics (also known as "real-time protection"). It also includes detecting and blocking apps that are deemed unsafe, but may not be detected as malware.
|
||||
- [Cloud-delivered protection](utilize-microsoft-cloud-protection-windows-defender-antivirus.md). This includes near-instant detection and blocking of new and emerging threats.
|
||||
- [Dedicated protection and product updates](manage-updates-baselines-windows-defender-antivirus.md). This includes updates related to keeping Windows Defender Antivirus up to date.
|
||||
|
||||
>[!TIP]
|
||||
>Visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to see how the following features work:
|
||||
>- [Cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md)
|
||||
>- Fast learning (including [block at first sight](configure-block-at-first-sight-windows-defender-antivirus.md))
|
||||
>- [Potentially unwanted application blocking](detect-block-potentially-unwanted-apps-windows-defender-antivirus.md)
|
||||
>
|
||||
> For more information regarding what's new in each Windows version, please refer to [What's new in Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp).
|
||||
>Visit the [Microsoft Defender ATP demo website](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the following protection features are working and explore them using demo scenarios:
|
||||
> - Cloud-delivered protection
|
||||
> - Block at first sight (BAFS) protection
|
||||
> - Potentially unwanted applications (PUA) protection
|
||||
|
||||
## Minimum system requirements
|
||||
|
||||
Windows Defender Antivirus is your main vehicle for next-generation protection, and it has the same hardware requirements as Windows 10. For more information, see:
|
||||
Windows Defender Antivirus is your main vehicle for next-generation protection, and it has the same hardware requirements as of Windows 10. For more information, see:
|
||||
|
||||
- [Minimum hardware requirements](https://docs.microsoft.com/windows-hardware/design/minimum/minimum-hardware-requirements-overview)
|
||||
- [Hardware component guidelines](https://docs.microsoft.com/windows-hardware/design/component-guidelines/components)
|
||||
|
||||
## Configuring next-generation services
|
||||
## Configure next-generation protection services
|
||||
|
||||
You can use the following to configure and manage next-generation services in Windows 10 while running Windows Defender Antivirus:
|
||||
For information on how to configure next-generation protection services, see [Configure Windows Defender Antivirus features](configure-windows-defender-antivirus-features.md).
|
||||
|
||||
- System Center Configuration Manager (as System Center Endpoint Protection, or SCEP)
|
||||
- Microsoft Intune
|
||||
- PowerShell
|
||||
- Windows Management Instrumentation (WMI)
|
||||
- Group Policy
|
||||
|
||||
Configuration and management is largely the same in Windows Server 2016, while running Windows Defender Antivirus; however, there are some differences. To learn more, see [Windows Defender Antivirus on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md).
|
||||
> [!Note]
|
||||
> Configuration and management is largely the same in Windows Server 2016, while running Windows Defender Antivirus; however, there are some differences. To learn more, see [Windows Defender Antivirus on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md).
|
||||
|
||||
## Related topics
|
||||
|
||||
@ -63,5 +56,6 @@ Configuration and management is largely the same in Windows Server 2016, while r
|
||||
- [Evaluate Windows Defender Antivirus protection](evaluate-windows-defender-antivirus.md)
|
||||
- [Enable cloud protection](enable-cloud-protection-windows-defender-antivirus.md)
|
||||
- [Configure real-time protection](configure-real-time-protection-windows-defender-antivirus.md)
|
||||
- [Configure cloud block at first sight](configure-block-at-first-sight-windows-defender-antivirus.md)
|
||||
- [Enable block at first sight](configure-block-at-first-sight-windows-defender-antivirus.md)
|
||||
- [Detect and block potentially unwanted applications](detect-block-potentially-unwanted-apps-windows-defender-antivirus.md)
|
||||
- [Create and deploy cloud-protected antimalware policies](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-antimalware-policies#cloud-protection-service.md)
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user