mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 16:27:22 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into jdholo
This commit is contained in:
commit
f161af74b5
@ -1,26 +0,0 @@
|
||||
## Microsoft Open Source Code of Conduct
|
||||
|
||||
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
|
||||
For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments.
|
||||
|
||||
# Windows IT professional documentation
|
||||
|
||||
Welcome! This repository houses the docs that are written for IT professionals for the following products:
|
||||
|
||||
- [Windows 10](https://technet.microsoft.com/itpro/windows)
|
||||
- [Internet Explorer 11](https://technet.microsoft.com/itpro/internet-explorer)
|
||||
- [Microsoft Edge](https://technet.microsoft.com/itpro/microsoft-edge)
|
||||
- [Surface](https://technet.microsoft.com/itpro/surface)
|
||||
- [Surface Hub](https://technet.microsoft.com/itpro/surface-hub)
|
||||
- [Windows 10 for Education](https://technet.microsoft.com/edu/windows)
|
||||
- [HoloLens](https://technet.microsoft.com/itpro/hololens)
|
||||
- [Microsoft Desktop Optimization Pack](https://technet.microsoft.com/itpro/mdop)
|
||||
|
||||
## Contributing
|
||||
|
||||
We actively merge contributions into this repository via [pull request](https://help.github.com/articles/using-pull-requests/) into the *master* branch.
|
||||
If you are not a Microsoft employee, before you submit a pull request you must [sign a Contribution License Agreement](https://cla.microsoft.com/) to ensure that the community is free to use your submissions.
|
||||
For more information on contributing, read our [contributions guide](CONTRIBUTING.md).
|
||||
|
||||
|
||||
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/). For more information, see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments.
|
Binary file not shown.
@ -5,7 +5,7 @@ keywords: troubleshooting, wireless network connectivity, wireless, Wi-Fi
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl:
|
||||
ms.sitesec: library
|
||||
author: mikeblodge
|
||||
author: kaushika-msft
|
||||
ms.localizationpriority: medium
|
||||
ms.author: mikeblodge
|
||||
ms.date: 10/29/2018
|
||||
@ -99,7 +99,7 @@ Reset --> Ihv_Configuring --> Configuring --> Associating --> Authenticating -->
|
||||
|
||||
Connected --> Roaming --> Wait_For_Disconnected --> Disconnected --> Reset
|
||||
|
||||
- Filtering the ETW trace with the provided [TextAnalyisTool (TAT)](https://github.com/TextAnalysisTool/Releases) filter is an easy first step to determine where a failed connection setup is breaking down:
|
||||
- Filtering the ETW trace with the provided [TextAnalyisTool (TAT)](Missing wifi.tat file) filter is an easy first step to determine where a failed connection setup is breaking down:
|
||||
Use the **FSM transition** trace filter to see the connection state machine.
|
||||
Example of a good connection setup:
|
||||
|
||||
|
@ -105,7 +105,7 @@ If you know that devices are experiencing stop error crashes that do not seem to
|
||||
|
||||
[](images/event_1001.png)
|
||||
|
||||
You can use the following Windows PowerShell snippet to summarize recent occurences of Event 1001. Most events should have a value for BucketID (a few intermittent blank values are OK, however).
|
||||
You can use the following Windows PowerShell snippet to summarize recent occurrences of Event 1001. Most events should have a value for BucketID (a few intermittent blank values are OK, however).
|
||||
|
||||
```powershell
|
||||
$limitToMostRecentNEvents = 20
|
||||
|
@ -12,7 +12,7 @@ ms.author: greg-lindsay
|
||||
ms.date: 10/02/2018
|
||||
ms.author: greg-lindsay
|
||||
ms.date: 10/02/2018
|
||||
|
||||
---
|
||||
# Windows Autopilot licensing requirements
|
||||
|
||||
**Applies to: Windows 10**
|
||||
|
@ -23,7 +23,7 @@ ms.date: 09/03/2018
|
||||
If Windows Defender Antivirus is configured to detect and remediate threats on your device, Windows Defender Antivirus quarantines suspicious files. If you are certain these files do not present a threat, you can restore them.
|
||||
|
||||
1. Open **Windows Security**.
|
||||
2. Click **Virus & threat protection** and then click **Scan history**.
|
||||
2. Click **Virus & threat protection** and then click **Threat History**.
|
||||
3. Under **Quarantined threats**, click **See full history**.
|
||||
4. Click **Restore** for any items you want to keep. (If you prefer to remove them, you can click **Remove**.)
|
||||
|
||||
|
@ -50,7 +50,8 @@ For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us
|
||||
- Windows server
|
||||
- Windows Server 2012 R2
|
||||
- Windows Server 2016
|
||||
- Windows Server, version 1803
|
||||
- Windows Server 2016, version 1803
|
||||
- Windows Server 2019
|
||||
|
||||
Machines on your network must be running one of these editions.
|
||||
|
||||
|
@ -72,7 +72,8 @@ Microsoft Edge kiosk mode running in single-app assigned access has two kiosk ty
|
||||
|
||||
Microsoft Edge kiosk mode running in multi-app assigned access has two kiosk types.
|
||||
|
||||
**Note** the following Microsoft Edge kiosk mode types cannot be setup using the new simplified assigned access configuration wizard in Windows 10 Settings.
|
||||
>[!NOTE]
|
||||
>The following Microsoft Edge kiosk mode types cannot be setup using the new simplified assigned access configuration wizard in Windows 10 Settings.
|
||||
|
||||
1.__Public browsing__ supports multi-tab browsing and runs InPrivate mode with minimal features available. In this configuration, Microsoft Edge can be one of many apps available. Users can close and open multiple InPrivate mode windows.
|
||||
|
||||
@ -197,7 +198,6 @@ Threat Analytics is a set of interactive reports published by the Windows Defend
|
||||
- [Custom detection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/overview-custom-detections)<br>
|
||||
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules.
|
||||
|
||||
|
||||
- [Managed security service provider (MSSP) support](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)<br>
|
||||
Windows Defender ATP adds support for this scenario by providing MSSP integration.
|
||||
The integration will allow MSSPs to take the following actions:
|
||||
@ -209,11 +209,10 @@ Windows Defender ATP integrates with Azure Security Center to provide a comprehe
|
||||
- [Integration with Microsoft Cloud App Security](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-cloud-app-security-integration)<br>
|
||||
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines.
|
||||
|
||||
|
||||
- [Onboard Windows Server 2019](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#windows-server-version-1803-and-windows-server-2019) <br>
|
||||
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines.
|
||||
|
||||
- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/onboard-downlevel-windows-defender-advanced-threat-protection)<br>
|
||||
- [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)<br>
|
||||
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor
|
||||
|
||||
## Faster sign-in to a Windows 10 shared pc
|
||||
|
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user