mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Merge pull request #658 from MicrosoftDocs/FromPrivateRepo
From private repo
This commit is contained in:
commit
f9b6561d2d
@ -112,7 +112,7 @@ The following image shows the EnterpriseModernAppManagement configuration servic
|
|||||||
</Replace>
|
</Replace>
|
||||||
```
|
```
|
||||||
<a href="" id="appmanagement-removepackage"></a>**AppManagement/RemovePackage**
|
<a href="" id="appmanagement-removepackage"></a>**AppManagement/RemovePackage**
|
||||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Used to remove packages.
|
<p style="margin-left: 20px">Added in Windows 10, version 1703. Used to remove packages. Not supported for ./User/Vendor/MSFT.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Parameters:
|
<p style="margin-left: 20px">Parameters:
|
||||||
<ul>
|
<ul>
|
||||||
@ -121,34 +121,18 @@ The following image shows the EnterpriseModernAppManagement configuration servic
|
|||||||
<li>Name: Specifies the PackageFullName of the particular package to remove.</li>
|
<li>Name: Specifies the PackageFullName of the particular package to remove.</li>
|
||||||
<li>RemoveForAllUsers:
|
<li>RemoveForAllUsers:
|
||||||
<ul>
|
<ul>
|
||||||
<li>0 (default) – Package will be un-provisioned so that new users do not receive the package. The package will remain installed for current users.</li>
|
<li>0 (default) – Package will be un-provisioned so that new users do not receive the package. The package will remain installed for current users. This is not currently supported.</li>
|
||||||
<li>1 – Package will be removed for all users.</li>
|
<li>1 – Package will be removed for all users only if it is a provisioned package.</li>
|
||||||
</ul>
|
</ul>
|
||||||
</li>
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
</li>
|
</li>
|
||||||
<li>User (optional): Specifies the SID of the particular user for whom to remove the package; only the package for the specified user can be removed. Not required for ./User/Vendor/MSFT.</li>
|
<li>User (optional): Specifies the SID of the particular user for whom to remove the package; only the package for the specified user can be removed.</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operation is Execute.
|
<p style="margin-left: 20px">Supported operation is Execute.
|
||||||
|
|
||||||
<p style="margin-left: 20px">The following example removes a package for the specified user:
|
|
||||||
|
|
||||||
```XML
|
|
||||||
<Exec>
|
|
||||||
<CmdID>10</CmdID>
|
|
||||||
<Item>
|
|
||||||
<Target>
|
|
||||||
<LocURI>./User/Vendor/MSFT/EnterpriseModernAppManagement/AppManagement/RemovePackage</LocURI>
|
|
||||||
</Target>
|
|
||||||
<Meta><Format xmlns="syncml:metinf">xml</Format></Meta>
|
|
||||||
<Data>
|
|
||||||
<Package Name= "{PackageFullName}"/>
|
|
||||||
</Data>
|
|
||||||
</Item>
|
|
||||||
</Exec>
|
|
||||||
```
|
|
||||||
<p style="margin-left: 20px">The following example removes a package for all users:
|
<p style="margin-left: 20px">The following example removes a package for all users:
|
||||||
|
|
||||||
````XML
|
````XML
|
||||||
@ -307,7 +291,12 @@ The following image shows the EnterpriseModernAppManagement configuration servic
|
|||||||
<p style="margin-left: 20px">Supported operation is Get.
|
<p style="margin-left: 20px">Supported operation is Get.
|
||||||
|
|
||||||
<a href="" id="----packagefamilyname-packagefullname-users"></a>**.../*PackageFamilyName*/*PackageFullName*/Users**
|
<a href="" id="----packagefamilyname-packagefullname-users"></a>**.../*PackageFamilyName*/*PackageFullName*/Users**
|
||||||
<p style="margin-left: 20px">Required. Registered users of the app. If the query is at the device level, it returns all the registered users of the device. If you query the user context, it will only return the current user. Value type is string.
|
<p style="margin-left: 20px">Required. Registered users of the app and the package install state. If the query is at the device level, it returns all the registered users of the device. If you query the user context, it will only return the current user. Value type is string.
|
||||||
|
|
||||||
|
- Not Installed = 0
|
||||||
|
- Staged = 1
|
||||||
|
- Installed = 2
|
||||||
|
- Paused = 6
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operation is Get.
|
<p style="margin-left: 20px">Supported operation is Get.
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: nickbrower
|
author: nickbrower
|
||||||
ms.date: 03/12/2018
|
ms.date: 04/03/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Policy CSP - KioskBrowser
|
# Policy CSP - KioskBrowser
|
||||||
@ -14,6 +14,7 @@ ms.date: 03/12/2018
|
|||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
|
These policies only apply to kiosk browser.
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
@ -83,6 +84,9 @@ ms.date: 03/12/2018
|
|||||||
<!--Description-->
|
<!--Description-->
|
||||||
Added in Windows 10, version 1803. List of exceptions to the blocked website URLs (with wildcard support). This is used to configure URLs kiosk browsers are allowed to navigate to, which are a subset of the blocked URLs.
|
Added in Windows 10, version 1803. List of exceptions to the blocked website URLs (with wildcard support). This is used to configure URLs kiosk browsers are allowed to navigate to, which are a subset of the blocked URLs.
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> This policy only applies to kiosk browser.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
@ -127,6 +131,9 @@ Added in Windows 10, version 1803. List of exceptions to the blocked website URL
|
|||||||
<!--Description-->
|
<!--Description-->
|
||||||
Added in Windows 10, version 1803. List of blocked website URLs (with wildcard support). This is used to configure blocked URLs kiosk browsers cannot navigate to.
|
Added in Windows 10, version 1803. List of blocked website URLs (with wildcard support). This is used to configure blocked URLs kiosk browsers cannot navigate to.
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> This policy only applies to kiosk browser.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
@ -171,6 +178,9 @@ Added in Windows 10, version 1803. List of blocked website URLs (with wildcard s
|
|||||||
<!--Description-->
|
<!--Description-->
|
||||||
Added in Windows 10, version 1803. Configures the default URL kiosk browsers to navigate on launch and restart.
|
Added in Windows 10, version 1803. Configures the default URL kiosk browsers to navigate on launch and restart.
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> This policy only applies to kiosk browser.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
@ -215,6 +225,9 @@ Added in Windows 10, version 1803. Configures the default URL kiosk browsers to
|
|||||||
<!--Description-->
|
<!--Description-->
|
||||||
Added in Windows 10, version 1803. Enable/disable kiosk browser's home button.
|
Added in Windows 10, version 1803. Enable/disable kiosk browser's home button.
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> This policy only applies to kiosk browser.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
@ -259,6 +272,9 @@ Added in Windows 10, version 1803. Enable/disable kiosk browser's home button.
|
|||||||
<!--Description-->
|
<!--Description-->
|
||||||
Added in Windows 10, version 1803. Enable/disable kiosk browser's navigation buttons (forward/back).
|
Added in Windows 10, version 1803. Enable/disable kiosk browser's navigation buttons (forward/back).
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> This policy only applies to kiosk browser.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
@ -305,6 +321,9 @@ Added in Windows 10, version 1803. Amount of time in minutes the session is idle
|
|||||||
|
|
||||||
The value is an int 1-1440 that specifies the amount of minutes the session is idle until the kiosk browser restarts in a fresh state. The default value is empty which means there is no idle timeout within the kiosk browser.
|
The value is an int 1-1440 that specifies the amount of minutes the session is idle until the kiosk browser restarts in a fresh state. The default value is empty which means there is no idle timeout within the kiosk browser.
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> This policy only applies to kiosk browser.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
<hr/>
|
<hr/>
|
||||||
|
@ -8,13 +8,19 @@ ms.sitesec: library
|
|||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
ms.date: 03/23/2018
|
ms.date: 04/04/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Change history for Configure Windows 10
|
# Change history for Configure Windows 10
|
||||||
|
|
||||||
This topic lists new and updated topics in the [Configure Windows 10](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
This topic lists new and updated topics in the [Configure Windows 10](index.md) documentation for Windows 10 and Windows 10 Mobile.
|
||||||
|
|
||||||
|
## April 2018
|
||||||
|
|
||||||
|
New or changed topic | Description
|
||||||
|
--- | ---
|
||||||
|
[Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) | Updated endpoints.
|
||||||
|
|
||||||
## March 2018
|
## March 2018
|
||||||
|
|
||||||
New or changed topic | Description
|
New or changed topic | Description
|
||||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
ms.date: 10/17/2017
|
ms.date: 04/04/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure Windows diagnostic data in your organization
|
# Configure Windows diagnostic data in your organization
|
||||||
@ -143,11 +143,17 @@ All diagnostic data data is encrypted using SSL and uses certificate pinning dur
|
|||||||
|
|
||||||
The Microsoft Data Management Service routes data back to our secure cloud storage. Only Microsoft personnel with a valid business justification are permitted access.
|
The Microsoft Data Management Service routes data back to our secure cloud storage. Only Microsoft personnel with a valid business justification are permitted access.
|
||||||
|
|
||||||
The following table defines the endpoints for diagnostic data services:
|
The following table defines the endpoints for Connected User Experiences and Telemetry component:
|
||||||
|
|
||||||
|
Windows release | Endpoint
|
||||||
|
--- | ---
|
||||||
|
Windows 10, versions 1703 and 1709 | Diagnostics data: v10.vortex-win.data.microsoft.com/collect/v1</br></br>Functional: v20.vortex-win.data.microsoft.com/collect/v1</br>Windows Advanced Threat Protection is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com/collect/v1</br>settings-win.data.microsoft.com
|
||||||
|
Windows 10, version 1607 | v10.vortex-win.data.microsoft.com</br></br>settings-win.data.microsoft.com
|
||||||
|
|
||||||
|
The following table defines the endpoints for other diagnostic data services:
|
||||||
|
|
||||||
| Service | Endpoint |
|
| Service | Endpoint |
|
||||||
| - | - |
|
| - | - |
|
||||||
| Connected User Experiences and Telemetry component | v10.vortex-win.data.microsoft.com<br />settings-win.data.microsoft.com |
|
|
||||||
| [Windows Error Reporting](http://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com |
|
| [Windows Error Reporting](http://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com |
|
||||||
| [Online Crash Analysis](http://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com |
|
| [Online Crash Analysis](http://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com |
|
||||||
| OneDrive app for Windows 10 | vortex.data.microsoft.com/collect/v1 |
|
| OneDrive app for Windows 10 | vortex.data.microsoft.com/collect/v1 |
|
||||||
|
@ -29,7 +29,7 @@ This policy setting is dependent on the **Account lockout threshold** policy set
|
|||||||
|
|
||||||
If [Account lockout threshold](account-lockout-threshold.md) is configured, after the specified number of failed attempts, the account will be locked out. If th **Account lockout duration** is set to 0, the account will remain locked until an administrator unlocks it manually.
|
If [Account lockout threshold](account-lockout-threshold.md) is configured, after the specified number of failed attempts, the account will be locked out. If th **Account lockout duration** is set to 0, the account will remain locked until an administrator unlocks it manually.
|
||||||
|
|
||||||
It is advisable to set **Account lockout duration** to approximately 15 minutes. To specify that the account will never be locked out, set the Account lockout threshold value to 0.
|
It is advisable to set **Account lockout duration** to approximately 15 minutes. To specify that the account will never be locked out, set the **Account lockout threshold** value to 0.
|
||||||
|
|
||||||
### Location
|
### Location
|
||||||
|
|
||||||
|
@ -9,9 +9,9 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: iaanw
|
author: andreabichsel
|
||||||
ms.author: iawilt
|
ms.author: v-anbic
|
||||||
ms.date: 11/20/2017
|
ms.date: 04/04/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure and validate network connections for Windows Defender Antivirus
|
# Configure and validate network connections for Windows Defender Antivirus
|
||||||
@ -77,7 +77,7 @@ Microsoft Update Service (MU)
|
|||||||
Signature and product updates
|
Signature and product updates
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
*.updates.microsoft.com
|
*.update.microsoft.com
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr style="vertical-align:top">
|
<tr style="vertical-align:top">
|
||||||
|
@ -9,9 +9,9 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: iaanw
|
author: andreabichsel
|
||||||
ms.author: iawilt
|
ms.author: v-anbic
|
||||||
ms.date: 11/09/2017
|
ms.date: 04/04/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -67,7 +67,7 @@ This table indicates the functionality and features that are available in each s
|
|||||||
|
|
||||||
State | Description | [Real-time protection](configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) | [Limited periodic scanning availability](limited-periodic-scanning-windows-defender-antivirus.md) | [File scanning and detection information](customize-run-review-remediate-scans-windows-defender-antivirus.md) | [Threat remediation](configure-remediation-windows-defender-antivirus.md) | [Threat definition updates](manage-updates-baselines-windows-defender-antivirus.md)
|
State | Description | [Real-time protection](configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) | [Limited periodic scanning availability](limited-periodic-scanning-windows-defender-antivirus.md) | [File scanning and detection information](customize-run-review-remediate-scans-windows-defender-antivirus.md) | [Threat remediation](configure-remediation-windows-defender-antivirus.md) | [Threat definition updates](manage-updates-baselines-windows-defender-antivirus.md)
|
||||||
:-|:-|:-:|:-:|:-:|:-:|:-:
|
:-|:-|:-:|:-:|:-:|:-:|:-:
|
||||||
Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)]
|
Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)]
|
||||||
Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)]]
|
Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)]]
|
||||||
Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your configuration tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)]
|
Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your configuration tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)]
|
||||||
|
|
||||||
|
@ -9,7 +9,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
ms.date: 11/30/2017
|
ms.date: 04/04/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure Windows Defender ATP server endpoints
|
# Configure Windows Defender ATP server endpoints
|
||||||
@ -80,13 +80,52 @@ Once completed, you should see onboarded servers in the portal within an hour.
|
|||||||
| winatp-gw-weu.microsoft.com | 443 |
|
| winatp-gw-weu.microsoft.com | 443 |
|
||||||
|
|
||||||
|
|
||||||
### Offboard server endpoints
|
## Offboard server endpoints
|
||||||
|
You have two options to offboard servers from the service:
|
||||||
|
- Uninstall the MMA agent
|
||||||
|
- Remove the Windows Defender ATP workspace configuration
|
||||||
|
|
||||||
|
|
||||||
|
### Uninstall servers by uinstalling the MMA agent
|
||||||
To offboard the server, you can uninstall the MMA agent from the server or detach it from reporting to your Windows Defender ATP workspace. After offboarding the agent, the server will no longer send sensor data to Windows Defender ATP.
|
To offboard the server, you can uninstall the MMA agent from the server or detach it from reporting to your Windows Defender ATP workspace. After offboarding the agent, the server will no longer send sensor data to Windows Defender ATP.
|
||||||
For more information, see [To disable an agent](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents#to-disable-an-agent).
|
For more information, see [To disable an agent](https://docs.microsoft.com/en-us/azure/log-analytics/log-analytics-windows-agents#to-disable-an-agent).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Offboarding causes the server to stop sending sensor data to the portal but data from the server, including reference to any alerts it has had will be retained for up to 6 months.
|
>Offboarding causes the server to stop sending sensor data to the portal but data from the server, including reference to any alerts it has had will be retained for up to 6 months.
|
||||||
|
|
||||||
|
|
||||||
|
### Remove the Windows Defender ATP workspace configuration
|
||||||
|
To offboard the server, you can use either of the following methods:
|
||||||
|
|
||||||
|
- Remove the Windows Defender ATP workspace configuration from the MMA agent
|
||||||
|
- Run a PowerShell command to remove the configuration
|
||||||
|
|
||||||
|
#### Remove the Windows Defender ATP workspace configuration from the MMA agent
|
||||||
|
|
||||||
|
1. In the **Microsoft Monitoring Agent Properties**, select the **Azure Log Analytics (OMS)** tab.
|
||||||
|
|
||||||
|
2. Select the Windows Defender ATP workspace, and click **Remove**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
#### Run a PowerShell command to remove the configuration
|
||||||
|
|
||||||
|
1. Get your workspace ID by going to **Endpoint management** > **Servers**:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Open an elevated PowerShell and run the following command. Use the workspace ID you obtained and replacing `WorkspaceID`:
|
||||||
|
|
||||||
|
```
|
||||||
|
# Load agent scripting object
|
||||||
|
$AgentCfg = New-Object -ComObject AgentConfigManager.MgmtSvcCfg
|
||||||
|
# Remove OMS Workspace
|
||||||
|
$AgentCfg.RemoveCloudWorkspace($WorkspaceID)
|
||||||
|
# Reload the configuration and apply changes
|
||||||
|
$AgentCfg.ReloadConfiguration()
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Configure Windows Defender ATP client endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
- [Configure Windows Defender ATP client endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
|
||||||
- [Configure non-Windows endpoints](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md)
|
- [Configure non-Windows endpoints](configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md)
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 127 KiB |
Binary file not shown.
After Width: | Height: | Size: 52 KiB |
Loading…
x
Reference in New Issue
Block a user