mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'main' into privacy-update-vb
This commit is contained in:
commit
efdf8e15a0
@ -52,21 +52,18 @@
|
||||
"titleSuffix": "Windows Education",
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"Kellylorenebaker",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"AngelaMotherofDragons",
|
||||
"dstrome",
|
||||
"v-dihans",
|
||||
"garycentric",
|
||||
"v-stsavell",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"American-Dipper",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
]
|
||||
},
|
||||
"fileMetadata": {
|
||||
|
@ -56,21 +56,18 @@
|
||||
},
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"Kellylorenebaker",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"AngelaMotherofDragons",
|
||||
"dstrome",
|
||||
"v-dihans",
|
||||
"garycentric",
|
||||
"v-stsavell",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"American-Dipper",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
]
|
||||
},
|
||||
"fileMetadata": {},
|
||||
|
@ -53,17 +53,16 @@
|
||||
"titleSuffix": "Windows Application Management",
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -59,18 +59,16 @@
|
||||
"titleSuffix": "Windows Client Management",
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"american-dipper",
|
||||
"angelamotherofdragons",
|
||||
"v-stsavell",
|
||||
"stacyrch140",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -14,6 +14,9 @@ ms.date: 01/18/2024
|
||||
<!-- DMClient-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
The DMClient configuration service provider (CSP) has more enterprise-specific mobile device management (MDM) configuration settings. These settings identify the device in the enterprise domain, include security mitigation for certificate renewal, and are used for server-triggered enterprise unenrollment.
|
||||
|
||||
> [!NOTE]
|
||||
> The DMClient CSP nodes are intended to be configured by the MDM server to manage device configuration and security features. Custom URI settings for this CSP are not supported for IT admin management scenarios due to the complexity of the settings.
|
||||
<!-- DMClient-Editable-End -->
|
||||
|
||||
<!-- DMClient-Tree-Begin -->
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: ADMX_ICM Policy CSP
|
||||
description: Learn more about the ADMX_ICM Area in Policy CSP.
|
||||
ms.date: 01/18/2024
|
||||
ms.date: 02/28/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -843,7 +843,7 @@ Also see the "Configure Error Reporting", "Display Error Notification" and "Disa
|
||||
<!-- Description-Source-ADMX -->
|
||||
This policy setting allows you to remove access to Windows Update.
|
||||
|
||||
- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at <https://windowsupdate.microsoft.com>, from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you'll neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website.
|
||||
- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at `https://windowsupdate.microsoft.com`, from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you'll neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website.
|
||||
|
||||
- If you disable or don't configure this policy setting, users can access the Windows Update website and enable automatic updating to receive notifications and critical updates from Windows Update.
|
||||
|
||||
|
@ -712,7 +712,9 @@ Allows or disallows Windows Defender Realtime Monitoring functionality.
|
||||
|
||||
<!-- AllowScanningNetworkFiles-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
This policy setting allows you to configure real-time scanning for files that are accessed over the network. It is recommended to enable this setting.
|
||||
This policy setting allows you to configure scheduled scans and on-demand (manually initiated) scans for files that are accessed over the network. It is recommended to enable this setting.
|
||||
>[!NOTE]
|
||||
> Real-time protection (on-access) scanning is not impacted by this policy.
|
||||
|
||||
- If you enable this setting or do not configure this setting, network files will be scanned.
|
||||
- If you disable this setting, network files will not be scanned.
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Update Policy CSP
|
||||
description: Learn more about the Update Area in Policy CSP.
|
||||
ms.date: 01/31/2024
|
||||
ms.date: 02/14/2024
|
||||
---
|
||||
|
||||
<!-- Auto-Generated CSP Document -->
|
||||
@ -2287,7 +2287,8 @@ Allows the IT admin to manage whether to scan for app updates from Microsoft Upd
|
||||
<!-- AllowMUUpdateService-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
> [!NOTE]
|
||||
> Setting this policy back to 0 or Not configured doesn't revert the configuration to receive updates from Microsoft Update automatically. In order to revert the configuration, you can run the PowerShell commands that are listed below to remove the Microsoft Update service:
|
||||
> - For a list of other Microsoft products that might be updated, see [Update other Microsoft products](/windows/deployment/update/update-other-microsoft-products).
|
||||
> - Setting this policy back to 0 or Not configured doesn't revert the configuration to receive updates from Microsoft Update automatically. In order to revert the configuration, you can run the PowerShell commands that are listed below to remove the Microsoft Update service:
|
||||
>
|
||||
> ```powershell
|
||||
> $MUSM = New-Object -ComObject "Microsoft.Update.ServiceManager"
|
||||
|
@ -57,17 +57,16 @@
|
||||
"titleSuffix": "Configure Windows",
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -386,6 +386,8 @@
|
||||
href: /windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Additional Windows Update settings
|
||||
href: update/waas-wu-settings.md
|
||||
- name: Update other Microsoft products
|
||||
href: update/update-other-microsoft-products.md
|
||||
- name: Delivery Optimization reference
|
||||
href: do/waas-delivery-optimization-reference.md?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json
|
||||
- name: Windows client in S mode
|
||||
|
@ -52,17 +52,16 @@
|
||||
"titleSuffix": "Windows Deployment",
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
76
windows/deployment/update/update-other-microsoft-products.md
Normal file
76
windows/deployment/update/update-other-microsoft-products.md
Normal file
@ -0,0 +1,76 @@
|
||||
---
|
||||
title: Update other Microsoft products
|
||||
titleSuffix: Windows Update for Business
|
||||
description: List of other Microsoft products that are updated when install updates for other Microsoft products (allowmuupdateservice) is used.
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-updates
|
||||
ms.topic: reference
|
||||
author: mestew
|
||||
ms.author: mstewart
|
||||
manager: aaroncz
|
||||
appliesto:
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||
ms.date: 02/27/2024
|
||||
---
|
||||
|
||||
# Update other Microsoft products
|
||||
<!--8743531-->
|
||||
This article contains a list of other Microsoft products that might be updated when the following policy is used:
|
||||
|
||||
- **Group policy**: Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience\Configure Automatic Updates
|
||||
- `Install updates for other Microsoft products` element under Configure Automatic Updates
|
||||
- **MDM**: ./Device/Vendor/MSFT/Policy/Config/Update/[AllowMUUpdateService](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#allowmuupdateservice)
|
||||
|
||||
> [!Note]
|
||||
> This policy includes drivers. If you need to exclude drivers, use [ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update&bc=/windows/deployment/breadcrumb/toc.json#excludewudriversinqualityupdate).
|
||||
|
||||
|
||||
## List of other Microsoft products
|
||||
|
||||
The following is a list of other Microsoft products that might be updated:
|
||||
|
||||
- Active Directory Rights Management Service
|
||||
- AppFabric
|
||||
- Azure File Sync
|
||||
- Bing Bar
|
||||
- Bing IME
|
||||
- BizTalk
|
||||
- East Asia IME for Windows Content
|
||||
- Exchange
|
||||
- IME Dictionary Update
|
||||
- Live Search
|
||||
- MED-V
|
||||
- Microsoft Advanced Threat Analytics
|
||||
- Microsoft Application Virtualization
|
||||
- Microsoft Azure StorSimple
|
||||
- Microsoft Dynamics CRM
|
||||
- Microsoft Information Protection
|
||||
- Microsoft Lync Server and Microsoft Lync
|
||||
- Microsoft Monitoring Agent
|
||||
- Microsoft SRS Device
|
||||
- Microsoft StreamInsight
|
||||
- Mobile and IoT
|
||||
- MSRC
|
||||
- Office 2016 (MSI versions of Office)
|
||||
- PlayReady
|
||||
- Windows Admin Center
|
||||
- Silverlight
|
||||
- Skype for Business
|
||||
- SQL
|
||||
- System Center Application Controller
|
||||
- System Center Configuration Manager
|
||||
- System Center Data Protection Manager
|
||||
- System Center Operations Manager
|
||||
- System Center Orchestrator
|
||||
- System Center Virtual Machine Manager
|
||||
- Visual Studio
|
||||
- Windows Azure Hyper-V Recovery Manager
|
||||
- Windows Azure Pack - Web Sites
|
||||
- Windows Azure Pack
|
||||
- Windows Azure Service Bus
|
||||
- Windows Embedded Developer Update
|
||||
- Windows Intune
|
||||
- Windows Live Sign-in Assistant
|
||||
- Windows Small Business Server
|
||||
- Zune
|
@ -16,7 +16,7 @@ appliesto:
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2019</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016</a>
|
||||
ms.date: 11/30/2023
|
||||
ms.date: 02/27/2024
|
||||
---
|
||||
|
||||
# Configure Windows Update for Business
|
||||
@ -127,7 +127,7 @@ Starting with Windows 10, version 1703, using Settings to control the pause beha
|
||||
|
||||
Quality updates are typically published on the second Tuesday of every month, although they can be released at any time. You can define if, and for how long, you would like to defer receiving quality updates following their availability. You can defer receiving these quality updates for a period of up to 30 days from their release by setting the **DeferQualityUpdatesPeriodinDays** value.
|
||||
|
||||
You can set your system to receive updates for other Microsoft products—known as Microsoft updates (such as Microsoft Office, Visual Studio)—along with Windows updates by setting the **AllowMUUpdateService** policy. When you do this, these Microsoft updates will follow the same deferral and pause rules as all other quality updates.
|
||||
You can set your system to receive updates for other Microsoft products—known as Microsoft updates (such as Microsoft Office, Visual Studio)—along with Windows updates by setting the **AllowMUUpdateService** policy. When you do this, these Microsoft updates will follow the same deferral and pause rules as all other quality updates. For a list of other Microsoft products that might be updated, see [Update other Microsoft products](update-other-microsoft-products.md).
|
||||
|
||||
**Policy settings for deferring quality updates**
|
||||
|
||||
|
@ -11,7 +11,7 @@ ms.localizationpriority: medium
|
||||
appliesto:
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||
ms.date: 12/31/2017
|
||||
ms.date: 02/27/2024
|
||||
---
|
||||
|
||||
# Integrate Windows Update for Business with management solutions
|
||||
@ -68,6 +68,7 @@ For Windows 10, version 1607 and later, devices can be configured to receive upd
|
||||
|
||||
- Device is configured to defer quality updates using Windows Update for Business and to be managed by WSUS
|
||||
- Device is configured to **receive updates for other Microsoft products** along with updates to Windows (**Update/AllowMUUpdateService** = enabled)
|
||||
- For a list of other Microsoft products that might be updated, see [Update other Microsoft products](update-other-microsoft-products.md).
|
||||
- Admin has also placed Microsoft Update, non-Microsoft, and locally published update content on the WSUS server
|
||||
|
||||
In this example, the deferral behavior for updates to Office and other non-Windows products is slightly different than if WSUS weren't enabled.
|
||||
|
@ -17,7 +17,7 @@ appliesto:
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2019</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016</a>
|
||||
ms.date: 11/30/2023
|
||||
ms.date: 02/27/2024
|
||||
---
|
||||
|
||||
# Walkthrough: Use Group Policy to configure Windows Update for Business
|
||||
@ -65,7 +65,7 @@ You can control when updates are applied, for example by deferring when an updat
|
||||
|
||||
Both feature and quality updates are automatically offered to devices that are connected to Windows Update using Windows Update for Business policies. However, you can choose whether you want the devices to additionally receive other Microsoft Updates or drivers that are applicable to that device.
|
||||
|
||||
To enable Microsoft Updates, use the Group Policy Management Console go to **Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Automatic Updates** and select **Install updates for other Microsoft products**.
|
||||
To enable Microsoft Updates, use the Group Policy Management Console go to **Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Automatic Updates** and select **Install updates for other Microsoft products**. For a list of other Microsoft products that might be updated, see [Update other Microsoft products](update-other-microsoft-products.md).
|
||||
|
||||
Drivers are automatically enabled because they're beneficial to device systems. We recommend that you allow the driver policy to allow drivers to update on devices (the default), but you can turn off this setting if you prefer to manage drivers manually. If you want to disable driver updates for some reason, use the Group Policy Management Console to go to **Computer Configuration > Administrative Templates > Windows Components > Windows Update > Do not include drivers with Windows Updates** and enable the policy.
|
||||
|
||||
|
@ -62,7 +62,7 @@ An [Microsoft Entra dual state](/azure/active-directory/devices/hybrid-azuread-j
|
||||
|
||||
In the dual state, you end up having two Microsoft Entra device records with different join types for the same device. In this case, the Hybrid Microsoft Entra device record takes precedence over the Microsoft Entra registered device record for any type of authentication in Microsoft Entra ID, which makes the Microsoft Entra registered device record stale.
|
||||
|
||||
It's recommended to detect and clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, see [How To: Manage state devices in Microsoft Entra ID](/azure/active-directory/devices/manage-stale-devices).
|
||||
It's recommended to detect and clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, see [How To: Manage stale devices in Microsoft Entra ID](/azure/active-directory/devices/manage-stale-devices).
|
||||
|
||||
> [!WARNING]
|
||||
> If you don't clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, you might end up seeing devices failing to meet the **Intune or Cloud-Attached (Device must be either Intune-managed or Co-managed)** pre-requisite check in the **Not ready** tab because it's expected that these stale Microsoft Entra devices aren't enrolled into the Intune service anymore.
|
||||
|
@ -55,17 +55,16 @@
|
||||
"titleSuffix": "Windows for IT Pros",
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
]
|
||||
},
|
||||
"fileMetadata": {},
|
||||
|
@ -50,17 +50,16 @@
|
||||
"titleSuffix": "Windows Privacy",
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
]
|
||||
},
|
||||
"searchScope": [
|
||||
|
@ -56,20 +56,17 @@
|
||||
"titleSuffix": "Windows Security",
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"AngelaMotherofDragons",
|
||||
"dstrome",
|
||||
"v-dihans",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -52,17 +52,16 @@
|
||||
"titleSuffix": "What's new in Windows",
|
||||
"contributors_to_exclude": [
|
||||
"rjagiewich",
|
||||
"traya1",
|
||||
"rmca14",
|
||||
"claydetels19",
|
||||
"jborsecnik",
|
||||
"tiburd",
|
||||
"garycentric",
|
||||
"beccarobins",
|
||||
"Stacyrch140",
|
||||
"v-stsavell",
|
||||
"American-Dipper",
|
||||
"shdyas"
|
||||
"shdyas",
|
||||
"alekyaj",
|
||||
"rmca14"
|
||||
],
|
||||
"searchScope": [
|
||||
"Windows 10"
|
||||
|
@ -8,7 +8,7 @@ ms.author: mstewart
|
||||
manager: aaroncz
|
||||
ms.topic: conceptual
|
||||
ms.subservice: itpro-fundamentals
|
||||
ms.date: 01/30/2024
|
||||
ms.date: 02/28/2024
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
@ -48,7 +48,7 @@ The following features and functionalities have been removed from the installed
|
||||
| Rinna and Japanese Address suggestion | The Rinna and Japanese Address suggestion service for Microsoft Japanese Input Method Editor (IME) ended on August 13, 2020. For more information, see [Rinna and Japanese Address suggestion will no longer be offered](https://support.microsoft.com/help/4576767/windows-10-rinna-and-japanese-address-suggestion) | 2004 |
|
||||
| Windows To Go | Windows To Go was announced as deprecated in Windows 10, version 1903 and is removed in this release. | 2004 |
|
||||
| Mobile Plans and Messaging apps | Both apps are still supported, but are now distributed in a different way. OEMs can now include these apps in Windows images for cellular enabled devices. The apps are removed for noncellular devices.| 2004 |
|
||||
| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was removed in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. | 1909 |
|
||||
| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was shut down in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. </br></br> **[Update - February 2024]**: The corresponding Windows APIs will be removed in Windows 11, version 24H2. DNS-SD and mDNS are recommended alternatives for implementing service discovery scenarios. <!--8786119--> | 1909 |
|
||||
| Taskbar settings roaming | Roaming of taskbar settings is removed in this release. This feature was announced as no longer being developed in Windows 10, version 1903. | 1909 |
|
||||
| Desktop messaging app doesn't offer messages sync | The messaging app on Desktop has a sync feature that can be used to sync SMS text messages received from Windows Mobile and keep a copy of them on the Desktop. The sync feature has been removed from all devices. Due to this change, you'll only be able to access messages from the device that received the message. | 1903 |
|
||||
|Business Scanning also called Distributed Scan Management (DSM)|We're removing this secure scanning and scanner management capability - there are no devices that support this feature.| 1809 |
|
||||
|
Loading…
x
Reference in New Issue
Block a user