Merge remote-tracking branch 'refs/remotes/origin/master' into jd-sandbox
@ -11,6 +11,11 @@ author: greg-lindsay
|
||||
# Change history for Deploy Windows 10
|
||||
This topic lists new and updated topics in the [Deploy Windows 10](index.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md).
|
||||
|
||||
## October 2016
|
||||
| New or changed topic | Description |
|
||||
|----------------------|-------------|
|
||||
| [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) | New |
|
||||
|
||||
## September 2016
|
||||
| New or changed topic | Description |
|
||||
|----------------------|-------------|
|
||||
@ -29,11 +34,6 @@ The topics in this library have been updated for Windows 10, version 1607 (also
|
||||
|
||||
=======
|
||||
|
||||
## October 2016
|
||||
| New or changed topic | Description |
|
||||
|----------------------|-------------|
|
||||
| [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) | New |
|
||||
|
||||
## August 2016
|
||||
| New or changed topic | Description |
|
||||
|----------------------|-------------|
|
||||
|
@ -102,7 +102,7 @@ Note: If only a result code is returned, this can be because a tool is being use
|
||||
|
||||
### Result codes
|
||||
|
||||
>A result code of **0xC1900101** is generic and indicates that a rollback occurred. In most cases, the cause is a driver compatibility issue. <BR>To troubleshoot a failed upgrade that has returned a result code of 0xC1900101, analyze the extend code to determine the Windows Setup phase, and see the [Other error codes](#other-error-codes) section later in this topic.
|
||||
>A result code of **0xC1900101** is generic and indicates that a rollback occurred. In most cases, the cause is a driver compatibility issue. <BR>To troubleshoot a failed upgrade that has returned a result code of 0xC1900101, analyze the extend code to determine the Windows Setup phase, and see the [Resolution procedures](#resolution-procedures) section later in this topic.
|
||||
|
||||
Result codes can be matched to the type of error encountered. To match a result code to an error:
|
||||
|
||||
|
@ -33,15 +33,53 @@ For more information on using Windows Defender ATP CSP see, [WindowsAdvancedThre
|
||||
|
||||
1. Open the Microsoft Intune configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Windows Defender ATP portal](https://securitycenter.windows.com/):
|
||||
|
||||
a. Click **Endpoint Management** on the **Navigation pane**.
|
||||
a. Select **Endpoint Management** on the **Navigation pane**.
|
||||
|
||||
b. Select **Mobile Device Management/Microsoft Intune**, click **Download package** and save the .zip file.
|
||||
b. Select **Mobile Device Management/Microsoft Intune** > **Download package** and save the .zip file.
|
||||
|
||||

|
||||
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP.onboarding*.
|
||||
|
||||
3. Use the Microsoft Intune custom configuration policy to deploy the following supported OMA-URI settings. For more information on Microsoft Intune policy settings see, [Windows 10 policy settings in Microsoft Intune](https://docs.microsoft.com/en-us/intune/deploy-use/windows-10-policy-settings-in-microsoft-intune).
|
||||
|
||||
Onboarding - Use the onboarding policies to deploy configuration settings on endpoints. These policies can be sub-categorized to:
|
||||
a. Select **Policy** > **Configuration Policies** > **Add**.
|
||||

|
||||
|
||||
b. Under **Windows**, select **Custom Configuration (Windows 10 Desktop and Mobile and later)** > **Create and Deploy a Custom Policy** > **Create Policy**.
|
||||

|
||||
|
||||
c. Type a name and description for the policy.
|
||||

|
||||
|
||||
d. Under OMA-URI settings, select **Add...**.
|
||||

|
||||
|
||||
e. Type the following values then select **OK**:
|
||||

|
||||
|
||||
- **Setting name**: Type a name for the setting.
|
||||
- **Setting description**: Type a description for the setting.
|
||||
- **Data type**: Select **String**.
|
||||
- **OMA-URI**: *./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Onboarding*
|
||||
- **Value**: Copy and paste the contents of the *WindowsDefenderATP.onboarding* file you downloaded.
|
||||
|
||||
|
||||
f. Save the policy.
|
||||
|
||||

|
||||
|
||||
g. Deploy the policy.
|
||||
|
||||

|
||||
|
||||
h. Select the device group to deploy the policy to:
|
||||
|
||||

|
||||
|
||||
When the policy is deployed and is propagated, endpoints will be shown in the **Machines view**.
|
||||
|
||||
You can use the following onboarding policies to deploy configuration settings on endpoints. These policies can be sub-categorized to:
|
||||
- Onboarding
|
||||
- Health Status for onboarded machines
|
||||
- Configuration for onboarded machines
|
||||
@ -49,9 +87,9 @@ Onboarding - Use the onboarding policies to deploy configuration settings on end
|
||||
Policy | OMA-URI | Type | Value | Description
|
||||
:---|:---|:---|:---|:---
|
||||
Onboarding | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Onboarding | String | Copy content from onboarding MDM file | Onboarding
|
||||
Health Status for onboarded machines | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/SenseIsRunning | Boolean | TRUE | Windows Defender ATP service is running
|
||||
| ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OnBoardingState | Integer | 1 | Onboarded to Windows Defender ATP
|
||||
| ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OrgId | String | Use OrgID from onboarding file | Onboarded to Organization ID
|
||||
Health Status for onboarded machines: Sense Is Running | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/SenseIsRunning | Boolean | TRUE | Windows Defender ATP service is running
|
||||
Health Status for onboarded machines: Onboarding State | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OnBoardingState | Integer | 1 | Onboarded to Windows Defender ATP
|
||||
Health Status for onboarded machines: Organization ID | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OrgId | String | Use OrgID from onboarding file | Onboarded to Organization ID
|
||||
Configuration for onboarded machines | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Configuration/SampleSharing | Integer | 0 or 1 <br> Default value: 1 | Windows Defender ATP Sample sharing is enabled
|
||||
|
||||
|
||||
@ -83,8 +121,8 @@ Offboarding - Use the offboarding policies to remove configuration settings on e
|
||||
Policy | OMA-URI | Type | Value | Description
|
||||
:---|:---|:---|:---|:---
|
||||
Offboarding | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Offboarding | String | Copy content from offboarding MDM file | Offboarding
|
||||
Health Status for offboarded machines | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/SenseIsRunning | Boolean | FALSE |Windows Defender ATP service is not running
|
||||
| ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OnBoardingState | Integer | 0 | Offboarded from Windows Defender ATP
|
||||
Health Status for offboarded machines: Sense Is Running | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/SenseIsRunning | Boolean | FALSE |Windows Defender ATP service is not running
|
||||
Health Status for offboarded machines: Onboarding State | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OnBoardingState | Integer | 0 | Offboarded from Windows Defender ATP
|
||||
|
||||
> [!NOTE]
|
||||
> The **Health Status for offboarded machines** policy uses read-only properties and can't be remediated.
|
||||
|
BIN
windows/keep-secure/images/atp-intune-add-oma.png
Normal file
After Width: | Height: | Size: 31 KiB |
BIN
windows/keep-secure/images/atp-intune-add-policy.png
Normal file
After Width: | Height: | Size: 116 KiB |
BIN
windows/keep-secure/images/atp-intune-deploy-policy.png
Normal file
After Width: | Height: | Size: 43 KiB |
BIN
windows/keep-secure/images/atp-intune-manage-deployment.png
Normal file
After Width: | Height: | Size: 63 KiB |
BIN
windows/keep-secure/images/atp-intune-new-policy.png
Normal file
After Width: | Height: | Size: 178 KiB |
BIN
windows/keep-secure/images/atp-intune-oma-uri-setting.png
Normal file
After Width: | Height: | Size: 54 KiB |
BIN
windows/keep-secure/images/atp-intune-policy-name.png
Normal file
After Width: | Height: | Size: 45 KiB |
BIN
windows/keep-secure/images/atp-intune-save-policy.png
Normal file
After Width: | Height: | Size: 96 KiB |
BIN
windows/keep-secure/images/atp-onboard-mdm.png
Normal file
After Width: | Height: | Size: 80 KiB |
@ -12,6 +12,13 @@ author: jdeckerMS
|
||||
|
||||
This topic lists new and updated topics in the [Manage and update Windows 10](index.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md).
|
||||
|
||||
## October 2016
|
||||
|
||||
| New or changed topic | Description |
|
||||
| --- | --- |
|
||||
| [Cortana integration in your business or enterprise](manage-cortana-in-enterprise.md) |Added an important note about Cortana and Office 365 integration. |
|
||||
| [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) | Added link to the Windows Restricted Traffic Limited Functionality Baseline. |
|
||||
|
||||
## September 2016
|
||||
|
||||
| New or changed topic | Description |
|
||||
|
@ -1353,3 +1353,5 @@ You can turn off automatic updates by doing one of the following. This is not re
|
||||
- **5**. Turn off automatic updates.
|
||||
|
||||
To learn more, see [Device update management](http://msdn.microsoft.com/library/windows/hardware/dn957432.aspx) and [Configure Automatic Updates by using Group Policy](http://technet.microsoft.com/library/cc720539.aspx).
|
||||
|
||||
To help make it easier to deploy settings to restrict connections from Windows 10 to Microsoft, you can apply the [Windows Restricted Traffic Limited Functionality Baseline](https://go.microsoft.com/fwlink/?linkid=828887). This baseline was created in the same way as the [Windows security baselines](../keep-secure/windows-security-baselines.md) that are often used to efficiently configure Windows to a known secure state. Running the Windows Restricted Traffic Limited Functionality Baseline on devices in your organization will allow you to quickly configure all of the settings covered in this document. However, some of the settings reduce the functionality and security configuration of your device and are therefore not recommended. Make sure should you've chosen the right settings configuration for your environment before applying.
|
@ -24,6 +24,10 @@ Cortana in Windows 10 is already great at letting your employees quickly see wh
|
||||
|
||||
But Cortana works even harder when she connects to Office 365, helping employees prepare for meetings, learn about co-workers, and receive reminders about where they need to be so they won’t be late.
|
||||
|
||||
>**Important**<br>
|
||||
>Before your employees can use Cortana with Office 365, they must sign into Cortana using a Microsoft account (such as, @outlook.com), and then they must go to the **Connected Accounts** section of Cortana’s notebook to turn on and connect to Office 365.
|
||||
|
||||
|
||||
**More info:**
|
||||
|
||||
- For specific info about what you need to know as a company administrator, including how to turn off Cortana with Office 365, see the [Cortana integration with Office 365](https://go.microsoft.com/fwlink/p/?LinkId=717378) support topic.
|
||||
|