diff --git a/education/docfx.json b/education/docfx.json index 312b5ddf47..eea7a3655b 100644 --- a/education/docfx.json +++ b/education/docfx.json @@ -52,21 +52,18 @@ "titleSuffix": "Windows Education", "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "Kellylorenebaker", "jborsecnik", - "tiburd", - "AngelaMotherofDragons", "dstrome", - "v-dihans", "garycentric", "v-stsavell", "beccarobins", "Stacyrch140", "American-Dipper", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ] }, "fileMetadata": { diff --git a/store-for-business/docfx.json b/store-for-business/docfx.json index 459fd0974e..25f77170a7 100644 --- a/store-for-business/docfx.json +++ b/store-for-business/docfx.json @@ -56,21 +56,18 @@ }, "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "Kellylorenebaker", "jborsecnik", - "tiburd", - "AngelaMotherofDragons", "dstrome", - "v-dihans", "garycentric", "v-stsavell", "beccarobins", "Stacyrch140", "American-Dipper", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ] }, "fileMetadata": {}, diff --git a/windows/application-management/docfx.json b/windows/application-management/docfx.json index c8640f09dd..aaf0200895 100644 --- a/windows/application-management/docfx.json +++ b/windows/application-management/docfx.json @@ -53,17 +53,16 @@ "titleSuffix": "Windows Application Management", "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "jborsecnik", - "tiburd", "garycentric", "beccarobins", "Stacyrch140", "v-stsavell", "American-Dipper", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ], "searchScope": [ "Windows 10" diff --git a/windows/client-management/docfx.json b/windows/client-management/docfx.json index 865ebfff70..7cf011a598 100644 --- a/windows/client-management/docfx.json +++ b/windows/client-management/docfx.json @@ -59,18 +59,16 @@ "titleSuffix": "Windows Client Management", "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "jborsecnik", - "tiburd", "garycentric", "beccarobins", "american-dipper", - "angelamotherofdragons", "v-stsavell", "stacyrch140", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ], "searchScope": [ "Windows 10" diff --git a/windows/client-management/mdm/dmclient-csp.md b/windows/client-management/mdm/dmclient-csp.md index f32ff8f609..535eaf637a 100644 --- a/windows/client-management/mdm/dmclient-csp.md +++ b/windows/client-management/mdm/dmclient-csp.md @@ -14,6 +14,9 @@ ms.date: 01/18/2024 The DMClient configuration service provider (CSP) has more enterprise-specific mobile device management (MDM) configuration settings. These settings identify the device in the enterprise domain, include security mitigation for certificate renewal, and are used for server-triggered enterprise unenrollment. + +> [!NOTE] +> The DMClient CSP nodes are intended to be configured by the MDM server to manage device configuration and security features. Custom URI settings for this CSP are not supported for IT admin management scenarios due to the complexity of the settings. diff --git a/windows/client-management/mdm/policy-csp-admx-icm.md b/windows/client-management/mdm/policy-csp-admx-icm.md index 17e2fbb340..643e4044d3 100644 --- a/windows/client-management/mdm/policy-csp-admx-icm.md +++ b/windows/client-management/mdm/policy-csp-admx-icm.md @@ -1,7 +1,7 @@ --- title: ADMX_ICM Policy CSP description: Learn more about the ADMX_ICM Area in Policy CSP. -ms.date: 01/18/2024 +ms.date: 02/28/2024 --- @@ -843,7 +843,7 @@ Also see the "Configure Error Reporting", "Display Error Notification" and "Disa This policy setting allows you to remove access to Windows Update. -- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at , from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you'll neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website. +- If you enable this policy setting, all Windows Update features are removed. This includes blocking access to the Windows Update website at `https://windowsupdate.microsoft.com`, from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you'll neither be notified about nor will you receive critical updates from Windows Update. This policy setting also prevents Device Manager from automatically installing driver updates from the Windows Update website. - If you disable or don't configure this policy setting, users can access the Windows Update website and enable automatic updating to receive notifications and critical updates from Windows Update. diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index ce5814933e..ba4d3d7bde 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -712,7 +712,9 @@ Allows or disallows Windows Defender Realtime Monitoring functionality. -This policy setting allows you to configure real-time scanning for files that are accessed over the network. It is recommended to enable this setting. +This policy setting allows you to configure scheduled scans and on-demand (manually initiated) scans for files that are accessed over the network. It is recommended to enable this setting. +>[!NOTE] +> Real-time protection (on-access) scanning is not impacted by this policy. - If you enable this setting or do not configure this setting, network files will be scanned. - If you disable this setting, network files will not be scanned. diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index ff2d3b69e6..d52bea489c 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -1,7 +1,7 @@ --- title: Update Policy CSP description: Learn more about the Update Area in Policy CSP. -ms.date: 01/31/2024 +ms.date: 02/14/2024 --- @@ -2287,7 +2287,8 @@ Allows the IT admin to manage whether to scan for app updates from Microsoft Upd > [!NOTE] -> Setting this policy back to 0 or Not configured doesn't revert the configuration to receive updates from Microsoft Update automatically. In order to revert the configuration, you can run the PowerShell commands that are listed below to remove the Microsoft Update service: +> - For a list of other Microsoft products that might be updated, see [Update other Microsoft products](/windows/deployment/update/update-other-microsoft-products). +> - Setting this policy back to 0 or Not configured doesn't revert the configuration to receive updates from Microsoft Update automatically. In order to revert the configuration, you can run the PowerShell commands that are listed below to remove the Microsoft Update service: > > ```powershell > $MUSM = New-Object -ComObject "Microsoft.Update.ServiceManager" diff --git a/windows/configuration/docfx.json b/windows/configuration/docfx.json index d0ed927da8..2e2a420982 100644 --- a/windows/configuration/docfx.json +++ b/windows/configuration/docfx.json @@ -57,17 +57,16 @@ "titleSuffix": "Configure Windows", "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "jborsecnik", - "tiburd", "garycentric", "beccarobins", "Stacyrch140", "v-stsavell", "American-Dipper", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ], "searchScope": [ "Windows 10" diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml index 6559092017..47091d44c1 100644 --- a/windows/deployment/TOC.yml +++ b/windows/deployment/TOC.yml @@ -386,6 +386,8 @@ href: /windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json - name: Additional Windows Update settings href: update/waas-wu-settings.md + - name: Update other Microsoft products + href: update/update-other-microsoft-products.md - name: Delivery Optimization reference href: do/waas-delivery-optimization-reference.md?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json - name: Windows client in S mode diff --git a/windows/deployment/docfx.json b/windows/deployment/docfx.json index 9a1dbf00d0..bec5d5f304 100644 --- a/windows/deployment/docfx.json +++ b/windows/deployment/docfx.json @@ -52,17 +52,16 @@ "titleSuffix": "Windows Deployment", "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "jborsecnik", - "tiburd", "garycentric", "beccarobins", "Stacyrch140", "v-stsavell", "American-Dipper", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ], "searchScope": [ "Windows 10" diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md new file mode 100644 index 0000000000..01f1505029 --- /dev/null +++ b/windows/deployment/update/update-other-microsoft-products.md @@ -0,0 +1,76 @@ +--- +title: Update other Microsoft products +titleSuffix: Windows Update for Business +description: List of other Microsoft products that are updated when install updates for other Microsoft products (allowmuupdateservice) is used. +ms.service: windows-client +ms.subservice: itpro-updates +ms.topic: reference +author: mestew +ms.author: mstewart +manager: aaroncz +appliesto: +- ✅ Windows 11 +- ✅ Windows 10 +ms.date: 02/27/2024 +--- + +# Update other Microsoft products + +This article contains a list of other Microsoft products that might be updated when the following policy is used: + +- **Group policy**: Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience\Configure Automatic Updates + - `Install updates for other Microsoft products` element under Configure Automatic Updates +- **MDM**: ./Device/Vendor/MSFT/Policy/Config/Update/[AllowMUUpdateService](/windows/client-management/mdm/policy-csp-update?toc=/windows/deployment/toc.json&bc=/windows/deployment/breadcrumb/toc.json#allowmuupdateservice) + +> [!Note] +> This policy includes drivers. If you need to exclude drivers, use [ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update&bc=/windows/deployment/breadcrumb/toc.json#excludewudriversinqualityupdate). + + +## List of other Microsoft products + +The following is a list of other Microsoft products that might be updated: + +- Active Directory Rights Management Service +- AppFabric +- Azure File Sync +- Bing Bar +- Bing IME +- BizTalk +- East Asia IME for Windows Content +- Exchange +- IME Dictionary Update +- Live Search +- MED-V +- Microsoft Advanced Threat Analytics +- Microsoft Application Virtualization +- Microsoft Azure StorSimple +- Microsoft Dynamics CRM +- Microsoft Information Protection +- Microsoft Lync Server and Microsoft Lync +- Microsoft Monitoring Agent +- Microsoft SRS Device +- Microsoft StreamInsight +- Mobile and IoT +- MSRC +- Office 2016 (MSI versions of Office) +- PlayReady +- Windows Admin Center +- Silverlight +- Skype for Business +- SQL +- System Center Application Controller +- System Center Configuration Manager +- System Center Data Protection Manager +- System Center Operations Manager +- System Center Orchestrator +- System Center Virtual Machine Manager +- Visual Studio +- Windows Azure Hyper-V Recovery Manager +- Windows Azure Pack - Web Sites +- Windows Azure Pack +- Windows Azure Service Bus +- Windows Embedded Developer Update +- Windows Intune +- Windows Live Sign-in Assistant +- Windows Small Business Server +- Zune diff --git a/windows/deployment/update/waas-configure-wufb.md b/windows/deployment/update/waas-configure-wufb.md index 4898553b21..cf98c00264 100644 --- a/windows/deployment/update/waas-configure-wufb.md +++ b/windows/deployment/update/waas-configure-wufb.md @@ -16,7 +16,7 @@ appliesto: - ✅ Windows Server 2022 - ✅ Windows Server 2019 - ✅ Windows Server 2016 -ms.date: 11/30/2023 +ms.date: 02/27/2024 --- # Configure Windows Update for Business @@ -127,7 +127,7 @@ Starting with Windows 10, version 1703, using Settings to control the pause beha Quality updates are typically published on the second Tuesday of every month, although they can be released at any time. You can define if, and for how long, you would like to defer receiving quality updates following their availability. You can defer receiving these quality updates for a period of up to 30 days from their release by setting the **DeferQualityUpdatesPeriodinDays** value. -You can set your system to receive updates for other Microsoft products—known as Microsoft updates (such as Microsoft Office, Visual Studio)—along with Windows updates by setting the **AllowMUUpdateService** policy. When you do this, these Microsoft updates will follow the same deferral and pause rules as all other quality updates. +You can set your system to receive updates for other Microsoft products—known as Microsoft updates (such as Microsoft Office, Visual Studio)—along with Windows updates by setting the **AllowMUUpdateService** policy. When you do this, these Microsoft updates will follow the same deferral and pause rules as all other quality updates. For a list of other Microsoft products that might be updated, see [Update other Microsoft products](update-other-microsoft-products.md). **Policy settings for deferring quality updates** diff --git a/windows/deployment/update/waas-integrate-wufb.md b/windows/deployment/update/waas-integrate-wufb.md index 54a680ab36..892daae8af 100644 --- a/windows/deployment/update/waas-integrate-wufb.md +++ b/windows/deployment/update/waas-integrate-wufb.md @@ -11,7 +11,7 @@ ms.localizationpriority: medium appliesto: - ✅ Windows 11 - ✅ Windows 10 -ms.date: 12/31/2017 +ms.date: 02/27/2024 --- # Integrate Windows Update for Business with management solutions @@ -68,6 +68,7 @@ For Windows 10, version 1607 and later, devices can be configured to receive upd - Device is configured to defer quality updates using Windows Update for Business and to be managed by WSUS - Device is configured to **receive updates for other Microsoft products** along with updates to Windows (**Update/AllowMUUpdateService** = enabled) + - For a list of other Microsoft products that might be updated, see [Update other Microsoft products](update-other-microsoft-products.md). - Admin has also placed Microsoft Update, non-Microsoft, and locally published update content on the WSUS server In this example, the deferral behavior for updates to Office and other non-Windows products is slightly different than if WSUS weren't enabled. diff --git a/windows/deployment/update/waas-wufb-group-policy.md b/windows/deployment/update/waas-wufb-group-policy.md index 6b757b2706..a039f0c714 100644 --- a/windows/deployment/update/waas-wufb-group-policy.md +++ b/windows/deployment/update/waas-wufb-group-policy.md @@ -17,7 +17,7 @@ appliesto: - ✅ Windows Server 2022 - ✅ Windows Server 2019 - ✅ Windows Server 2016 -ms.date: 11/30/2023 +ms.date: 02/27/2024 --- # Walkthrough: Use Group Policy to configure Windows Update for Business @@ -65,7 +65,7 @@ You can control when updates are applied, for example by deferring when an updat Both feature and quality updates are automatically offered to devices that are connected to Windows Update using Windows Update for Business policies. However, you can choose whether you want the devices to additionally receive other Microsoft Updates or drivers that are applicable to that device. -To enable Microsoft Updates, use the Group Policy Management Console go to **Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Automatic Updates** and select **Install updates for other Microsoft products**. +To enable Microsoft Updates, use the Group Policy Management Console go to **Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Automatic Updates** and select **Install updates for other Microsoft products**. For a list of other Microsoft products that might be updated, see [Update other Microsoft products](update-other-microsoft-products.md). Drivers are automatically enabled because they're beneficial to device systems. We recommend that you allow the driver policy to allow drivers to update on devices (the default), but you can turn off this setting if you prefer to manage drivers manually. If you want to disable driver updates for some reason, use the Group Policy Management Console to go to **Computer Configuration > Administrative Templates > Windows Components > Windows Update > Do not include drivers with Windows Updates** and enable the policy. diff --git a/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md index 27c2f9f084..b7245596bf 100644 --- a/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md +++ b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md @@ -62,7 +62,7 @@ An [Microsoft Entra dual state](/azure/active-directory/devices/hybrid-azuread-j In the dual state, you end up having two Microsoft Entra device records with different join types for the same device. In this case, the Hybrid Microsoft Entra device record takes precedence over the Microsoft Entra registered device record for any type of authentication in Microsoft Entra ID, which makes the Microsoft Entra registered device record stale. -It's recommended to detect and clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, see [How To: Manage state devices in Microsoft Entra ID](/azure/active-directory/devices/manage-stale-devices). +It's recommended to detect and clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, see [How To: Manage stale devices in Microsoft Entra ID](/azure/active-directory/devices/manage-stale-devices). > [!WARNING] > If you don't clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, you might end up seeing devices failing to meet the **Intune or Cloud-Attached (Device must be either Intune-managed or Co-managed)** pre-requisite check in the **Not ready** tab because it's expected that these stale Microsoft Entra devices aren't enrolled into the Intune service anymore. diff --git a/windows/hub/docfx.json b/windows/hub/docfx.json index f7971d2b46..bc332f4606 100644 --- a/windows/hub/docfx.json +++ b/windows/hub/docfx.json @@ -55,17 +55,16 @@ "titleSuffix": "Windows for IT Pros", "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "jborsecnik", - "tiburd", "garycentric", "beccarobins", "Stacyrch140", "v-stsavell", "American-Dipper", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ] }, "fileMetadata": {}, diff --git a/windows/privacy/docfx.json b/windows/privacy/docfx.json index 45e5e07ca5..efaa2cfb39 100644 --- a/windows/privacy/docfx.json +++ b/windows/privacy/docfx.json @@ -50,17 +50,16 @@ "titleSuffix": "Windows Privacy", "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "jborsecnik", - "tiburd", "garycentric", "beccarobins", "Stacyrch140", "v-stsavell", "American-Dipper", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ] }, "searchScope": [ diff --git a/windows/security/docfx.json b/windows/security/docfx.json index a502927d7f..1968fc1509 100644 --- a/windows/security/docfx.json +++ b/windows/security/docfx.json @@ -56,20 +56,17 @@ "titleSuffix": "Windows Security", "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "jborsecnik", - "tiburd", - "AngelaMotherofDragons", "dstrome", - "v-dihans", "garycentric", "beccarobins", "Stacyrch140", "v-stsavell", "American-Dipper", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ], "searchScope": [ "Windows 10" diff --git a/windows/whats-new/docfx.json b/windows/whats-new/docfx.json index 3977d46f28..4190a4dfc5 100644 --- a/windows/whats-new/docfx.json +++ b/windows/whats-new/docfx.json @@ -52,17 +52,16 @@ "titleSuffix": "What's new in Windows", "contributors_to_exclude": [ "rjagiewich", - "traya1", - "rmca14", "claydetels19", "jborsecnik", - "tiburd", "garycentric", "beccarobins", "Stacyrch140", "v-stsavell", "American-Dipper", - "shdyas" + "shdyas", + "alekyaj", + "rmca14" ], "searchScope": [ "Windows 10" diff --git a/windows/whats-new/removed-features.md b/windows/whats-new/removed-features.md index ce69865676..149c2ffc91 100644 --- a/windows/whats-new/removed-features.md +++ b/windows/whats-new/removed-features.md @@ -8,7 +8,7 @@ ms.author: mstewart manager: aaroncz ms.topic: conceptual ms.subservice: itpro-fundamentals -ms.date: 01/30/2024 +ms.date: 02/28/2024 ms.collection: - highpri - tier1 @@ -48,7 +48,7 @@ The following features and functionalities have been removed from the installed | Rinna and Japanese Address suggestion | The Rinna and Japanese Address suggestion service for Microsoft Japanese Input Method Editor (IME) ended on August 13, 2020. For more information, see [Rinna and Japanese Address suggestion will no longer be offered](https://support.microsoft.com/help/4576767/windows-10-rinna-and-japanese-address-suggestion) | 2004 | | Windows To Go | Windows To Go was announced as deprecated in Windows 10, version 1903 and is removed in this release. | 2004 | | Mobile Plans and Messaging apps | Both apps are still supported, but are now distributed in a different way. OEMs can now include these apps in Windows images for cellular enabled devices. The apps are removed for noncellular devices.| 2004 | -| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was removed in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. | 1909 | +| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was shut down in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs.

**[Update - February 2024]**: The corresponding Windows APIs will be removed in Windows 11, version 24H2. DNS-SD and mDNS are recommended alternatives for implementing service discovery scenarios. | 1909 | | Taskbar settings roaming | Roaming of taskbar settings is removed in this release. This feature was announced as no longer being developed in Windows 10, version 1903. | 1909 | | Desktop messaging app doesn't offer messages sync | The messaging app on Desktop has a sync feature that can be used to sync SMS text messages received from Windows Mobile and keep a copy of them on the Desktop. The sync feature has been removed from all devices. Due to this change, you'll only be able to access messages from the device that received the message. | 1903 | |Business Scanning also called Distributed Scan Management (DSM)|We're removing this secure scanning and scanner management capability - there are no devices that support this feature.| 1809 |