mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'main' of github.com:MicrosoftDocs/windows-docs-pr into security-book-24
This commit is contained in:
commit
f6fe9aadf7
@ -15,7 +15,7 @@ metadata:
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
manager: aaroncz
|
||||
ms.date: 08/27/2024
|
||||
ms.date: 11/05/2024
|
||||
ms.localizationpriority: medium
|
||||
|
||||
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
|
||||
@ -34,6 +34,8 @@ landingContent:
|
||||
url: volume-activation/plan-for-volume-activation-client.md
|
||||
- text: Windows compatibility cookbook
|
||||
url: /windows/compatibility/
|
||||
- text: Cloud-native Windows
|
||||
url: /mem/solutions/cloud-native-endpoints/cloud-native-endpoints-overview
|
||||
|
||||
- title: Prepare
|
||||
linkLists:
|
||||
|
@ -72,4 +72,6 @@ In the following example:
|
||||
|
||||
## Minimize user disruption due to updates
|
||||
|
||||
Windows Autopatch understands the importance of not disrupting end users but also updating the devices quickly. To achieve this goal, updates are automatically downloaded and installed at an optimal time determined by the device. By default, [Active hours](/windows/client-management/mdm/policy-csp-update#activehoursstart) are configured dynamically based on device usage patterns. Device restarts occur outside of active hours until the deadline is reached.
|
||||
Windows Autopatch understands the importance of not disrupting end users but also updating the devices quickly. To achieve this goal, updates are automatically downloaded and installed at an optimal time determined by the device. By default, [Active hours](/windows/client-management/mdm/policy-csp-update#activehoursstart) are configured dynamically based on device usage patterns. Device restarts occur outside of active hours until the deadline is reached.
|
||||
|
||||
Windows Autopatch doesn't modify the existing Windows Update notifications. If you wish to modify the end-user update notification experience, see [Use CSPs and MDMs to configure Windows Update for Business](/windows/deployment/update/waas-wufb-csp-mdm).
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Configure Windows Hello for Business
|
||||
description: Learn about the configuration options for Windows Hello for Business and how to implement them in your organization.
|
||||
ms.topic: how-to
|
||||
ms.date: 04/23/2024
|
||||
ms.date: 11/05/2024
|
||||
---
|
||||
|
||||
# Configure Windows Hello for Business
|
||||
@ -83,7 +83,7 @@ To check the Windows Hello for Business policy settings applied at enrollment ti
|
||||
1. Select **Windows Hello for Business**
|
||||
1. Verify the status of **Configure Windows Hello for Business** and any settings that might be configured
|
||||
|
||||
:::image type="content" source="deploy/images/whfb-intune-disable.png" alt-text="Disablement of Windows Hello for Business from Microsoft Intune admin center." lightbox="deploy/images/whfb-intune-disable.png":::
|
||||
:::image type="content" source="deploy/images/whfb-intune-disable.png" alt-text="Disablement of Windows Hello for Business from Microsoft Intune admin center." lightbox="deploy/images/whfb-intune-disable.png":::
|
||||
|
||||
## Policy conflicts from multiple policy sources
|
||||
|
||||
@ -109,7 +109,7 @@ Configuration type| Details |
|
||||
| CSP (user)|**Key path**: `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Policies\PassportForWork\<Tenant-ID>\UserSid\Policies`<br>**Key name**: `UsePassportForWork`<br>**Type**: `REG_DWORD`<br>**Value**:<br> `1` to enable<br> `0` to disable |
|
||||
| CSP (device)|**Key path**: `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Policies\PassportForWork\<Tenant-ID>\Device\Policies`<br>**Key name**: `UsePassportForWork`<br>**Type**: `REG_DWORD`<br>**Value**:<br> `1` to enable<br> `0` to disable |
|
||||
| GPO (user)|**Key path**: `HKEY_USERS\<UserSID>\SOFTWARE\Policies\Microsoft\PassportForWork`<br>**Key name**: `Enabled`<br>**Type**: `REG_DWORD`<br>**Value**:<br> `1` to enable<br> `0` to disable |
|
||||
| GPO (user)|**Key path**: `KEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\PassportForWork`<br>**Key name**: `Enabled`<br>**Type**: `REG_DWORD`<br>**Value**:<br> `1` to enable<br> `0` to disable |
|
||||
| GPO (device)|**Key path**: `KEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\PassportForWork`<br>**Key name**: `Enabled`<br>**Type**: `REG_DWORD`<br>**Value**:<br> `1` to enable<br> `0` to disable |
|
||||
|
||||
> [!NOTE]
|
||||
> If there's a conflicting device policy and user policy, the user policy takes precedence. It's not recommended to create Local GPO or registry settings that could conflict with an MDM policy. This conflict could lead to unexpected results.
|
||||
|
Loading…
x
Reference in New Issue
Block a user