From d9ac60e239c610995aad719264e50cc9829cfe88 Mon Sep 17 00:00:00 2001 From: Mark Aldridge Date: Wed, 31 Oct 2018 09:58:35 +1100 Subject: [PATCH 01/10] Update whats-new-windows-10-version-1809.md Fixed hyperlink and formatting --- windows/whats-new/whats-new-windows-10-version-1809.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/windows/whats-new/whats-new-windows-10-version-1809.md b/windows/whats-new/whats-new-windows-10-version-1809.md index 0080a6270c..64fcbb7821 100644 --- a/windows/whats-new/whats-new-windows-10-version-1809.md +++ b/windows/whats-new/whats-new-windows-10-version-1809.md @@ -72,7 +72,8 @@ Microsoft Edge kiosk mode running in single-app assigned access has two kiosk ty Microsoft Edge kiosk mode running in multi-app assigned access has two kiosk types. -**Note** the following Microsoft Edge kiosk mode types cannot be setup using the new simplified assigned access configuration wizard in Windows 10 Settings. +>[!NOTE] +>The following Microsoft Edge kiosk mode types cannot be setup using the new simplified assigned access configuration wizard in Windows 10 Settings. 1.__Public browsing__ supports multi-tab browsing and runs InPrivate mode with minimal features available. In this configuration, Microsoft Edge can be one of many apps available. Users can close and open multiple InPrivate mode windows. @@ -197,7 +198,6 @@ Threat Analytics is a set of interactive reports published by the Windows Defend - [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. - - [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)
Windows Defender ATP adds support for this scenario by providing MSSP integration. The integration will allow MSSPs to take the following actions: @@ -209,11 +209,10 @@ Windows Defender ATP integrates with Azure Security Center to provide a comprehe - [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. - - [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019)
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. -- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/onboard-downlevel-windows-defender-advanced-threat-protection)
+- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor ## Faster sign-in to a Windows 10 shared pc From 8479206da82293a200d9c58b89359f6bf5483af7 Mon Sep 17 00:00:00 2001 From: Trevor Gustavgreen Date: Tue, 30 Oct 2018 21:01:23 -0600 Subject: [PATCH 02/10] Changed Scan History to Threat History Seriously took me a while to figure out how to recover my file. --- .../restore-quarantined-files-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md index 485ea3e2a7..adc59b2fe8 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md @@ -23,7 +23,7 @@ ms.date: 09/03/2018 If Windows Defender Antivirus is configured to detect and remediate threats on your device, Windows Defender Antivirus quarantines suspicious files. If you are certain these files do not present a threat, you can restore them. 1. Open **Windows Security**. -2. Click **Virus & threat protection** and then click **Scan history**. +2. Click **Virus & threat protection** and then click **Threat History**. 3. Under **Quarantined threats**, click **See full history**. 4. Click **Restore** for any items you want to keep. (If you prefer to remove them, you can click **Remove**.) From 579a8ee2145fe840502a0e28491b531899ce856a Mon Sep 17 00:00:00 2001 From: Adam Gross Date: Tue, 30 Oct 2018 22:17:05 -0500 Subject: [PATCH 03/10] Update windows-autopilot-requirements-licensing.md Fixed the header. --- .../windows-autopilot-requirements-licensing.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md index b6b1551f62..2b9a7d76f8 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements-licensing.md @@ -12,7 +12,7 @@ ms.author: greg-lindsay ms.date: 10/02/2018 ms.author: greg-lindsay ms.date: 10/02/2018 - +--- # Windows Autopilot licensing requirements **Applies to: Windows 10** From 73b9c92d8983b040e6ee65321cfbfab819fb9288 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 31 Oct 2018 02:16:00 -0400 Subject: [PATCH 04/10] typo: occurences -> occurrences --- .../update/windows-analytics-FAQ-troubleshooting.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md index 8aea0bb0cc..bf0ebdf02d 100644 --- a/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md +++ b/windows/deployment/update/windows-analytics-FAQ-troubleshooting.md @@ -105,7 +105,7 @@ If you know that devices are experiencing stop error crashes that do not seem to [![Event viewer detail showing Event 1001 details](images/event_1001.png)](images/event_1001.png) - You can use the following Windows PowerShell snippet to summarize recent occurences of Event 1001. Most events should have a value for BucketID (a few intermittent blank values are OK, however). + You can use the following Windows PowerShell snippet to summarize recent occurrences of Event 1001. Most events should have a value for BucketID (a few intermittent blank values are OK, however). ```powershell $limitToMostRecentNEvents = 20 @@ -260,4 +260,4 @@ Currently, you can choose the criteria you wish to use: - To use the Upgrade Readiness criteria, export the list of ready-to-upgrade devices from the corresponding Upgrade Readiness report, and then build the SCCM collection from that spreadsheet. ### How does Upgrade Readiness collect the inventory of devices and applications? -For details about this process and some tips, see [How does Upgrade Readiness in WA collects application inventory for your OMS workspace?](https://techcommunity.microsoft.com/t5/Windows-Analytics-Blog/How-does-Upgrade-Readiness-in-WA-collects-application-inventory/ba-p/213586) on the Windows Analytics blog. \ No newline at end of file +For details about this process and some tips, see [How does Upgrade Readiness in WA collects application inventory for your OMS workspace?](https://techcommunity.microsoft.com/t5/Windows-Analytics-Blog/How-does-Upgrade-Readiness-in-WA-collects-application-inventory/ba-p/213586) on the Windows Analytics blog. From bf7876addfb99fa027e02096a1fc6bfadc087a4f Mon Sep 17 00:00:00 2001 From: Kaushik Ainapure Date: Wed, 31 Oct 2018 18:01:33 +0530 Subject: [PATCH 05/10] Update the link to the missing TAT filter file Missing wifi.tat file --- .../advanced-troubleshooting-wireless-network-connectivity.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/advanced-troubleshooting-wireless-network-connectivity.md b/windows/client-management/advanced-troubleshooting-wireless-network-connectivity.md index 0896ab5eed..5647279113 100644 --- a/windows/client-management/advanced-troubleshooting-wireless-network-connectivity.md +++ b/windows/client-management/advanced-troubleshooting-wireless-network-connectivity.md @@ -5,7 +5,7 @@ keywords: troubleshooting, wireless network connectivity, wireless, Wi-Fi ms.prod: w10 ms.mktglfcycl: ms.sitesec: library -author: mikeblodge +author: kaushika-msft ms.localizationpriority: medium ms.author: mikeblodge ms.date: 10/29/2018 @@ -99,7 +99,7 @@ Reset --> Ihv_Configuring --> Configuring --> Associating --> Authenticating --> Connected --> Roaming --> Wait_For_Disconnected --> Disconnected --> Reset -- Filtering the ETW trace with the provided [TextAnalyisTool (TAT)](https://github.com/TextAnalysisTool/Releases) filter is an easy first step to determine where a failed connection setup is breaking down: +- Filtering the ETW trace with the provided [TextAnalyisTool (TAT)](Missing wifi.tat file) filter is an easy first step to determine where a failed connection setup is breaking down: Use the **FSM transition** trace filter to see the connection state machine. Example of a good connection setup: From 700f57de720ddc71ec9d2207398d312646e9607d Mon Sep 17 00:00:00 2001 From: Patti Short <35278231+shortpatti@users.noreply.github.com> Date: Wed, 31 Oct 2018 06:18:37 -0700 Subject: [PATCH 06/10] Update onboard-configure-windows-defender-advanced-threat-protection.md --- ...-configure-windows-defender-advanced-threat-protection.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md index 33b5461d23..b2004cfea5 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard-configure-windows-defender-advanced-threat-protection.md @@ -50,7 +50,8 @@ For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us - Windows server - Windows Server 2012 R2 - Windows Server 2016 - - Windows Server, version 1803 + - Windows Server 2016, version 1803 + - Windows Server 2019 Machines on your network must be running one of these editions. @@ -163,4 +164,4 @@ Topic | Description [Configure proxy and Internet settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)| Enable communication with the Windows Defender ATP cloud service by configuring the proxy and Internet connectivity settings. [Troubleshoot onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) | Learn about resolving issues that might arise during onboarding. ->Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink) \ No newline at end of file +>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-onboardconfigure-belowfoldlink) From 768c6f53f438e6fab8d4876354033d43dd03f084 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 31 Oct 2018 10:07:03 -0400 Subject: [PATCH 07/10] chore: Remove empty file --- [!NOTE] | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 [!NOTE] diff --git a/[!NOTE] b/[!NOTE] deleted file mode 100644 index e69de29bb2..0000000000 From 0b8b96b6bcff60f182004a5dd7f9fb6c1643c145 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 31 Oct 2018 10:08:29 -0400 Subject: [PATCH 08/10] chore: Remove untranslated extra README --- README.md [FRENCH] | 26 -------------------------- 1 file changed, 26 deletions(-) delete mode 100644 README.md [FRENCH] diff --git a/README.md [FRENCH] b/README.md [FRENCH] deleted file mode 100644 index 01059ee91d..0000000000 --- a/README.md [FRENCH] +++ /dev/null @@ -1,26 +0,0 @@ -## Microsoft Open Source Code of Conduct - -This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/). -For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments. - -# Windows IT professional documentation - -Welcome! This repository houses the docs that are written for IT professionals for the following products: - -- [Windows 10](https://technet.microsoft.com/itpro/windows) -- [Internet Explorer 11](https://technet.microsoft.com/itpro/internet-explorer) -- [Microsoft Edge](https://technet.microsoft.com/itpro/microsoft-edge) -- [Surface](https://technet.microsoft.com/itpro/surface) -- [Surface Hub](https://technet.microsoft.com/itpro/surface-hub) -- [Windows 10 for Education](https://technet.microsoft.com/edu/windows) -- [HoloLens](https://technet.microsoft.com/itpro/hololens) -- [Microsoft Desktop Optimization Pack](https://technet.microsoft.com/itpro/mdop) - -## Contributing - -We actively merge contributions into this repository via [pull request](https://help.github.com/articles/using-pull-requests/) into the *master* branch. -If you are not a Microsoft employee, before you submit a pull request you must [sign a Contribution License Agreement](https://cla.microsoft.com/) to ensure that the community is free to use your submissions. -For more information on contributing, read our [contributions guide](CONTRIBUTING.md). - - -This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/). For more information, see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments. From 54d5b087ab43e870dc25ec54d8ce8d02497deff7 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 31 Oct 2018 10:12:06 -0400 Subject: [PATCH 09/10] chore: Remove old publishing file --- windows/yw45mjxz.3sx.json | Bin 2808 -> 0 bytes 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 windows/yw45mjxz.3sx.json diff --git a/windows/yw45mjxz.3sx.json b/windows/yw45mjxz.3sx.json deleted file mode 100644 index 4b4ae6ca01acc1477a8b99e726e0c1ec2531b6f7..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2808 zcmd5;O-}+b6r8h(|6%iv#NgedQ4<3{Xni&4NI&CQn5u}wam}c8< z+ihRp%)EVHpC35J5u$k!v@yj131SG&^yumeyK-GC=paXi3A(zrJ3OzPvF=OPF?U;B zcNFyWeY+?YHx6g7ixq+z%c-vGNVVseF>%@BFKb#j35JV3Ux@rWS&)!LG5g^eU{BiC zTCe70^l&gTL5i_-+xxWff5@kFIYxZ?Z`O9PL=RWtL5 z1%~q~pBhuY%3n?Pd-`4FSU)3lI9`<6^U<^D>@UTLwkkx+96*Tqh|%bkqbX;7Vxs75 aqTrX7AA&dLZ5hXN_Ehe+?dFE(rv3)Z*4v-} From 1e3aa5f406198eb674103b6df218855871942c52 Mon Sep 17 00:00:00 2001 From: Nick Schonning Date: Wed, 31 Oct 2018 10:12:40 -0400 Subject: [PATCH 10/10] chore: Remove old publishing file --- browsers/internet-explorer/nndxczrp.ojy.json | Bin 2852 -> 0 bytes 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 browsers/internet-explorer/nndxczrp.ojy.json diff --git a/browsers/internet-explorer/nndxczrp.ojy.json b/browsers/internet-explorer/nndxczrp.ojy.json deleted file mode 100644 index 824a00e16bec330aa299e2ba81b46e65737ea426..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 2852 zcmd5;O-lnY5PfIC|FF!l*os$=qJp3ns-Pe}*e|W@c1yR#g7mMeZ<3}Tw6zi2(Frm zM=Y?M*L-R~{i?re?03w&=2)u{Ivg+N+Vjz~nCve>pSCKZ^Bh2kd7shfm7@t~ePW`R wY$D^Ajvtz-4!GkxW1D&><3GM@vQFzOWmTCoV`E9m6*^wV3Cs34Xf