mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Merged PR 14237: master
This commit is contained in:
commit
fc8fadc679
@ -117,6 +117,22 @@
|
|||||||
"moniker_groups": [],
|
"moniker_groups": [],
|
||||||
"version": 0
|
"version": 0
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"docset_name": "known-issues",
|
||||||
|
"build_source_folder": "windows/known-issues",
|
||||||
|
"build_output_subfolder": "known-issues",
|
||||||
|
"locale": "en-us",
|
||||||
|
"monikers": [],
|
||||||
|
"moniker_ranges": [],
|
||||||
|
"open_to_public_contributors": false,
|
||||||
|
"type_mapping": {
|
||||||
|
"Conceptual": "Content",
|
||||||
|
"ManagedReference": "Content",
|
||||||
|
"RestApi": "Content"
|
||||||
|
},
|
||||||
|
"build_entry_point": "docs",
|
||||||
|
"template_folder": "_themes"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"docset_name": "mdop-VSTS",
|
"docset_name": "mdop-VSTS",
|
||||||
"build_source_folder": "mdop",
|
"build_source_folder": "mdop",
|
||||||
|
@ -132,7 +132,7 @@ The following tables include info on Windows 10 settings that have been validate
|
|||||||
| Setting | Details | CSP reference | Supported with<br>Intune? | Supported with<br>Configuration Manager? | Supported with<br>SyncML\*? |
|
| Setting | Details | CSP reference | Supported with<br>Intune? | Supported with<br>Configuration Manager? | Supported with<br>SyncML\*? |
|
||||||
| --- | --- | --- |---- | --- | --- |
|
| --- | --- | --- |---- | --- | --- |
|
||||||
| Defender policies | Use to configure various Defender settings, including a scheduled scan time. | Defender/*`<name of policy>`* <br> See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
| Defender policies | Use to configure various Defender settings, including a scheduled scan time. | Defender/*`<name of policy>`* <br> See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
| Defender status | Use to initiate a Defender scan, force a signature update, query any threats detected. | [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/mt187856.aspx) | No. | No. | Yes |
|
| Defender status | Use to initiate a Defender scan, force a Security intelligence update, query any threats detected. | [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/mt187856.aspx) | No. | No. | Yes |
|
||||||
\*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.
|
\*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.
|
||||||
|
|
||||||
#### Remote reboot
|
#### Remote reboot
|
||||||
|
@ -25,7 +25,7 @@ Review these dependencies to make sure Surface Hub features will work in your IT
|
|||||||
|-------------|------------------|
|
|-------------|------------------|
|
||||||
| Active Directory or Azure Active Directory (Azure AD) | <p>The Surface Hub's uses an Active Directory or Azure AD account (called a **device account**) to access Exchange and Skype for Business services. The Surface Hub must be able to connect to your Active Directory domain controller or to your Azure AD tenant in order to validate the device account’s credentials, as well as to access information like the device account’s display name, alias, Exchange server, and Session Initiation Protocol (SIP) address.</p>You can also domain join or Azure AD join your Surface Hub to allow a group of authorized users to configure settings on the Surface Hub. |
|
| Active Directory or Azure Active Directory (Azure AD) | <p>The Surface Hub's uses an Active Directory or Azure AD account (called a **device account**) to access Exchange and Skype for Business services. The Surface Hub must be able to connect to your Active Directory domain controller or to your Azure AD tenant in order to validate the device account’s credentials, as well as to access information like the device account’s display name, alias, Exchange server, and Session Initiation Protocol (SIP) address.</p>You can also domain join or Azure AD join your Surface Hub to allow a group of authorized users to configure settings on the Surface Hub. |
|
||||||
| Exchange (Exchange 2013 or later, or Exchange Online) and Exchange ActiveSync | <p>Exchange is used for enabling mail and calendar features, and also lets people who use the device send meeting requests to the Surface Hub, enabling one-touch meeting join.</p>ActiveSync is used to sync the device account’s calendar and mail to the Surface Hub. If the device cannot use ActiveSync, it will not show meetings on the welcome screen, and joining meetings and emailing whiteboards will not be enabled. |
|
| Exchange (Exchange 2013 or later, or Exchange Online) and Exchange ActiveSync | <p>Exchange is used for enabling mail and calendar features, and also lets people who use the device send meeting requests to the Surface Hub, enabling one-touch meeting join.</p>ActiveSync is used to sync the device account’s calendar and mail to the Surface Hub. If the device cannot use ActiveSync, it will not show meetings on the welcome screen, and joining meetings and emailing whiteboards will not be enabled. |
|
||||||
| Skype for Business (Lync Server 2013 or later, or Skype for Business Online) | Skype for Business is used for various conferencing features, like video calls, instant messaging, and screen sharing.</br></br>If screen sharing on a Surface Hub fails and the error message **An error occurred during the screen presentation** is displayed, see [Video Based Screen Sharing not working on Surface Hub](https://support.microsoft.com/help/3179272/video-based-screen-sharing-not-working-on-surface-hub) for help. |
|
| Skype for Business (Lync Server 2013 or later, or Skype for Business Online) | Skype for Business is used for various conferencing features, like video calls, instant messaging, and screen sharing.|
|
||||||
| Mobile device management (MDM) solution (Microsoft Intune, System Center Configuration Manager, or supported third-party MDM provider) | If you want to apply settings and install apps remotely, and to multiple devices at a time, you must set up a MDM solution and enroll the device to that solution. See [Manage settings with an MDM provider](manage-settings-with-mdm-for-surface-hub.md) for details. |
|
| Mobile device management (MDM) solution (Microsoft Intune, System Center Configuration Manager, or supported third-party MDM provider) | If you want to apply settings and install apps remotely, and to multiple devices at a time, you must set up a MDM solution and enroll the device to that solution. See [Manage settings with an MDM provider](manage-settings-with-mdm-for-surface-hub.md) for details. |
|
||||||
| Microsoft Operations Managmement Suite (OMS) | OMS is used to monitor the health of Surface Hub devices. See [Monitor your Surface Hub](monitor-surface-hub.md) for details. |
|
| Microsoft Operations Managmement Suite (OMS) | OMS is used to monitor the health of Surface Hub devices. See [Monitor your Surface Hub](monitor-surface-hub.md) for details. |
|
||||||
| Network and Internet access | In order to function properly, the Surface Hub should have access to a wired or wireless network. Overall, a wired connection is preferred. 802.1X Authentication is supported for both wired and wireless connections.</br></br></br>**802.1X authentication:** In Windows 10, version 1703, 802.1X authentication for wired and wireless connections is enabled by default in Surface Hub. If your organization doesn't use 802.1X authentication, there is no configuration required and Surface Hub will continue to function as normal. If you use 802.1X authentication, you must ensure that the authentication certification is installed on Surface Hub. You can deliver the certificate to Surface Hub using the [ClientCertificateInstall CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/clientcertificateinstall-csp) in MDM, or you can [create a provisioning package](provisioning-packages-for-surface-hub.md) and install it during first run or through the Settings app. After the certificate is applied to Surface Hub, 802.1X authentication will start working automatically.</br>**Note:** For more information on enabling 802.1X wired authentication on Surface Hub, see [Enable 802.1x wired authentication](enable-8021x-wired-authentication.md).</br></br>**Dynamic IP:** The Surface Hub cannot be configured to use a static IP. It must use DHCP to assign an IP address.</br></br>**Proxy servers:** If your topology requires a connection to a proxy server to reach Internet services, then you can configure it during first run, or in Settings. Proxy credentials are stored across Surface Hub sessions and only need to be set once. |
|
| Network and Internet access | In order to function properly, the Surface Hub should have access to a wired or wireless network. Overall, a wired connection is preferred. 802.1X Authentication is supported for both wired and wireless connections.</br></br></br>**802.1X authentication:** In Windows 10, version 1703, 802.1X authentication for wired and wireless connections is enabled by default in Surface Hub. If your organization doesn't use 802.1X authentication, there is no configuration required and Surface Hub will continue to function as normal. If you use 802.1X authentication, you must ensure that the authentication certification is installed on Surface Hub. You can deliver the certificate to Surface Hub using the [ClientCertificateInstall CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/clientcertificateinstall-csp) in MDM, or you can [create a provisioning package](provisioning-packages-for-surface-hub.md) and install it during first run or through the Settings app. After the certificate is applied to Surface Hub, 802.1X authentication will start working automatically.</br>**Note:** For more information on enabling 802.1X wired authentication on Surface Hub, see [Enable 802.1x wired authentication](enable-8021x-wired-authentication.md).</br></br>**Dynamic IP:** The Surface Hub cannot be configured to use a static IP. It must use DHCP to assign an IP address.</br></br>**Proxy servers:** If your topology requires a connection to a proxy server to reach Internet services, then you can configure it during first run, or in Settings. Proxy credentials are stored across Surface Hub sessions and only need to be set once. |
|
||||||
|
@ -13,6 +13,7 @@
|
|||||||
### [Maintain optimal power settings on Surface devices](maintain-optimal-power-settings-on-Surface-devices.md)
|
### [Maintain optimal power settings on Surface devices](maintain-optimal-power-settings-on-Surface-devices.md)
|
||||||
### [Battery Limit setting](battery-limit.md)
|
### [Battery Limit setting](battery-limit.md)
|
||||||
### [Surface Brightness Control](microsoft-surface-brightness-control.md)
|
### [Surface Brightness Control](microsoft-surface-brightness-control.md)
|
||||||
|
### [Surface Asset Tag](assettag.md)
|
||||||
## [Surface firmware and driver updates](update.md)
|
## [Surface firmware and driver updates](update.md)
|
||||||
### [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)
|
### [Download the latest firmware and drivers for Surface devices](deploy-the-latest-firmware-and-drivers-for-surface-devices.md)
|
||||||
### [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)
|
### [Manage Surface driver and firmware updates](manage-surface-pro-3-firmware-updates.md)
|
||||||
|
112
devices/surface/assettag.md
Normal file
112
devices/surface/assettag.md
Normal file
@ -0,0 +1,112 @@
|
|||||||
|
---
|
||||||
|
title: Surface Asset Tag Tool
|
||||||
|
description: This topic explains how to use the Surface Asset Tag Tool.
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
ms.sitesec: library
|
||||||
|
author: coveminer
|
||||||
|
ms.author: v-jokai
|
||||||
|
ms.topic: article
|
||||||
|
ms.date: 02/01/2019
|
||||||
|
---
|
||||||
|
|
||||||
|
# Surface Asset Tag Tool
|
||||||
|
|
||||||
|
Surface Asset Tag is a command line interface (CLI) utility
|
||||||
|
that allows you to view, assign, and modify an assigned asset tag value
|
||||||
|
for Surface devices. It works on Surface Pro 3 and all newer Surface devices.
|
||||||
|
|
||||||
|
## System requirements
|
||||||
|
|
||||||
|
- Surface Pro 3 or later
|
||||||
|
|
||||||
|
- UEFI firmware version 3.9.150.0 or later
|
||||||
|
|
||||||
|
## Using Surface Asset Tag
|
||||||
|
|
||||||
|
To run Surface Asset Tag:
|
||||||
|
|
||||||
|
1. On the Surface device, download **Surface Pro 3 AssetTag.zip** from the [Microsoft Download
|
||||||
|
Center](http://www.microsoft.com/download/details.aspx?id=44076),
|
||||||
|
extract the zip file, and save AssetTag.exe in desired folder (in
|
||||||
|
this example, C:\\assets).
|
||||||
|
|
||||||
|
2. Open a command console as an Administrator and run AssetTag.exe,
|
||||||
|
entering the full path to the tool.
|
||||||
|
|
||||||
|
3. Restart Surface.
|
||||||
|
|
||||||
|
### Asset Tag tool commands
|
||||||
|
In the following examples, AssetTag.exe is saved in a directory on a local machine (C:\assets).
|
||||||
|
|
||||||
|
To get the proposed asset tag, run AssetTag -g.
|
||||||
|
|
||||||
|
**Example**
|
||||||
|
|
||||||
|
```
|
||||||
|
C:\assets\AssetTag.exe -g
|
||||||
|
```
|
||||||
|
|
||||||
|
To clear the proposed asset tag, run AssetTag -s.
|
||||||
|
|
||||||
|
**Example**
|
||||||
|
|
||||||
|
```
|
||||||
|
C:\assets\AssetTag.exe -s
|
||||||
|
```
|
||||||
|
To set the proposed asset tag, run AssetTag -s testassettag12.
|
||||||
|
|
||||||
|
**Example**
|
||||||
|
|
||||||
|
```
|
||||||
|
C:\assets\AssetTag.exe -s testassettag12
|
||||||
|
```
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The asset tag value must contain between 1 and 36 characters. Valid characters include A-Z, a-z, 0-9, period (.) and hyphen (-).
|
||||||
|
|
||||||
|
|
||||||
|
## Managing asset tags
|
||||||
|
|
||||||
|
You can view the existing asset tag in the UEFI settings under Device
|
||||||
|
Information (**Control Panel > Recovery > Advanced Startup > Restart
|
||||||
|
now**.)
|
||||||
|
|
||||||
|
The figure below shows the results of running the Asset Tag Tool on
|
||||||
|
Surface Go.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> **Figure 1.** Results of running Surface Asset Tag tool on Surface Go
|
||||||
|
|
||||||
|
Alternately, you can use WMI to query the existing asset tag on a device:
|
||||||
|
|
||||||
|
(Get-WmiObject -query “Select * from Win32_SystemEnclosure”)
|
||||||
|
|
||||||
|
**Example**
|
||||||
|
|
||||||
|
```
|
||||||
|
C:\Windows\System32> (Get-WmiObject -query “Select * from Win32_SystemEnclosure”)
|
||||||
|
```
|
||||||
|
|
||||||
|
### Using PowerShell
|
||||||
|
|
||||||
|
You can use the script below as a way of getting the proposed value and
|
||||||
|
interpreting any errors.
|
||||||
|
|
||||||
|
```
|
||||||
|
AssetTag -g \> $asset\_tag 2\> $error\_message
|
||||||
|
$asset\_tag\_return\_code = $LASTEXITCODE
|
||||||
|
$asset\_tag = $asset\_tag.Trim(“\`r\`n”)
|
||||||
|
|
||||||
|
if ($asset\_tag\_return\_code -eq 0) {
|
||||||
|
Write-Output (“Good Tag = ” + $asset\_tag)
|
||||||
|
} else {
|
||||||
|
Write-Output (
|
||||||
|
“Failure: Code = ” + $asset\_tag\_return\_code +
|
||||||
|
“Tag = ” + $asset\_tag +
|
||||||
|
“Message = ” + $error\_message)
|
||||||
|
|
||||||
|
}
|
||||||
|
```
|
@ -13,6 +13,13 @@ ms.topic: article
|
|||||||
|
|
||||||
This topic lists new and updated topics in the Surface documentation library.
|
This topic lists new and updated topics in the Surface documentation library.
|
||||||
|
|
||||||
|
## February 2019
|
||||||
|
|
||||||
|
New or changed topic | Description
|
||||||
|
--- | ---
|
||||||
|
[Surface Asset Tag](assettag.md) | New
|
||||||
|
|
||||||
|
|
||||||
## January 2019
|
## January 2019
|
||||||
|
|
||||||
New or changed topic | Description
|
New or changed topic | Description
|
||||||
|
@ -35,13 +35,13 @@ To create a Surface UEFI configuration package, follow these steps:
|
|||||||
2. Click **Start**.
|
2. Click **Start**.
|
||||||
3. Click **Configuration Package**, as shown in Figure 1.
|
3. Click **Configuration Package**, as shown in Figure 1.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
*Figure 1. Select Configuration Package to create a package for SEMM enrollment and configuration*
|
*Figure 1. Select Configuration Package to create a package for SEMM enrollment and configuration*
|
||||||
|
|
||||||
4. Click **Certificate Protection** to add your exported certificate file with private key (.pfx), as shown in Figure 2. Browse to the location of your certificate file, select the file, and then click **OK**.
|
4. Click **Certificate Protection** to add your exported certificate file with private key (.pfx), as shown in Figure 2. Browse to the location of your certificate file, select the file, and then click **OK**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
*Figure 2. Add the SEMM certificate and Surface UEFI password to a Surface UEFI configuration package*
|
*Figure 2. Add the SEMM certificate and Surface UEFI password to a Surface UEFI configuration package*
|
||||||
|
|
||||||
@ -57,14 +57,14 @@ To create a Surface UEFI configuration package, follow these steps:
|
|||||||
9. Click **Next**.
|
9. Click **Next**.
|
||||||
10. If you want to deactivate a component on managed Surface devices, on the **Choose which components you want to activate or deactivate** page, click the slider next to any device or group of devices you want to deactivate so that the slider is in the **Off** position. (Shown in Figure 4.) The default configuration for each device is **On**. Click the **Reset** button if you want to return all sliders to the default position.
|
10. If you want to deactivate a component on managed Surface devices, on the **Choose which components you want to activate or deactivate** page, click the slider next to any device or group of devices you want to deactivate so that the slider is in the **Off** position. (Shown in Figure 4.) The default configuration for each device is **On**. Click the **Reset** button if you want to return all sliders to the default position.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
*Figure 4. Disable or enable individual Surface components*
|
*Figure 4. Disable or enable individual Surface components*
|
||||||
|
|
||||||
11. Click **Next**.
|
11. Click **Next**.
|
||||||
12. To enable or disable advanced options in Surface UEFI or the display of Surface UEFI pages, on the **Choose the advanced settings for your devices** page, click the slider beside the desired setting to configure that option to **On** or **Off** (shown in Figure 5). In the **UEFI Front Page** section, you can use the sliders for **Security**, **Devices**, and **Boot** to control what pages are available to users who boot into Surface UEFI. (For more information about Surface UEFI settings, see [Manage Surface UEFI settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings).) Click **Build** when you have finished selecting options to generate and save the package.
|
12. To enable or disable advanced options in Surface UEFI or the display of Surface UEFI pages, on the **Choose the advanced settings for your devices** page, click the slider beside the desired setting to configure that option to **On** or **Off** (shown in Figure 5). In the **UEFI Front Page** section, you can use the sliders for **Security**, **Devices**, and **Boot** to control what pages are available to users who boot into Surface UEFI. (For more information about Surface UEFI settings, see [Manage Surface UEFI settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings).) Click **Build** when you have finished selecting options to generate and save the package.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
*Figure 5. Control advanced Surface UEFI settings and Surface UEFI pages with SEMM*
|
*Figure 5. Control advanced Surface UEFI settings and Surface UEFI pages with SEMM*
|
||||||
|
|
||||||
@ -74,7 +74,7 @@ To create a Surface UEFI configuration package, follow these steps:
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Record the certificate thumbprint characters that are displayed on this page, as shown in Figure 6. You will need these characters to confirm enrollment of new Surface devices in SEMM. Click **End** to complete package creation and close Microsoft Surface UEFI Configurator.
|
>Record the certificate thumbprint characters that are displayed on this page, as shown in Figure 6. You will need these characters to confirm enrollment of new Surface devices in SEMM. Click **End** to complete package creation and close Microsoft Surface UEFI Configurator.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
*Figure 6. The last two characters of the certificate thumbprint are displayed on the Successful page*
|
*Figure 6. The last two characters of the certificate thumbprint are displayed on the Successful page*
|
||||||
|
|
||||||
|
BIN
devices/surface/images/assettag-fig1.png
Normal file
BIN
devices/surface/images/assettag-fig1.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 340 KiB |
@ -52,6 +52,6 @@ Enrolling Surface devices in Windows Autopilot at the time of purchase is a capa
|
|||||||
|
|
||||||
When you purchase Surface devices from a Surface partner enabled for Windows Autopilot, your new devices can be enrolled in your Windows Autopilot deployment for you by the partner. Surface partners enabled for Windows Autopilot include:
|
When you purchase Surface devices from a Surface partner enabled for Windows Autopilot, your new devices can be enrolled in your Windows Autopilot deployment for you by the partner. Surface partners enabled for Windows Autopilot include:
|
||||||
|
|
||||||
- [SHI](https://www.shi.com/?reseller=shi)
|
- [SHI](https://www.shi.com/Surface)
|
||||||
- [Insight](https://www.insight.com/en_US/buy/partner/microsoft/surface/windows-autopilot.html)
|
- [Insight](https://www.insight.com/en_US/buy/partner/microsoft/surface/windows-autopilot.html)
|
||||||
- [Atea](https://www.atea.com/)
|
- [Atea](https://www.atea.com/)
|
||||||
|
@ -1615,7 +1615,7 @@ As a final quality control step, verify the device configuration to ensure that
|
|||||||
|
|
||||||
* The device can connect to the Internet and view the appropriate web content in Microsoft Edge.
|
* The device can connect to the Internet and view the appropriate web content in Microsoft Edge.
|
||||||
* Windows Update is active and current with software updates.
|
* Windows Update is active and current with software updates.
|
||||||
* Windows Defender is active and current with malware signatures.
|
* Windows Defender is active and current with malware Security intelligence.
|
||||||
* The SmartScreen Filter is active.
|
* The SmartScreen Filter is active.
|
||||||
* All Microsoft Store apps are properly installed and updated.
|
* All Microsoft Store apps are properly installed and updated.
|
||||||
* All Windows desktop apps are properly installed and updated.
|
* All Windows desktop apps are properly installed and updated.
|
||||||
@ -1669,7 +1669,7 @@ For more information about completing this task when you have:
|
|||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td>Verify that Windows Defender is active and current with malware signatures.<br/><br/>
|
<td>Verify that Windows Defender is active and current with malware Security intelligence.<br/><br/>
|
||||||
For more information about completing this task, see [Turn Windows Defender on or off](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab02) and [Updating Windows Defender](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab03).
|
For more information about completing this task, see [Turn Windows Defender on or off](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab02) and [Updating Windows Defender](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab03).
|
||||||
</td>
|
</td>
|
||||||
<td>x</td>
|
<td>x</td>
|
||||||
|
@ -1077,7 +1077,7 @@ As a final quality control step, verify the device configuration to ensure that
|
|||||||
|
|
||||||
- The device can connect to the Internet and view the appropriate web content in Microsoft Edge.
|
- The device can connect to the Internet and view the appropriate web content in Microsoft Edge.
|
||||||
- Windows Update is active and current with software updates.
|
- Windows Update is active and current with software updates.
|
||||||
- Windows Defender is active and current with malware signatures.
|
- Windows Defender is active and current with malware Security intelligence.
|
||||||
- The SmartScreen Filter is active.
|
- The SmartScreen Filter is active.
|
||||||
- All Microsoft Store apps are properly installed and updated.
|
- All Microsoft Store apps are properly installed and updated.
|
||||||
- All Windows desktop apps are properly installed and updated.
|
- All Windows desktop apps are properly installed and updated.
|
||||||
@ -1135,7 +1135,7 @@ For more information about completing this task when you have:
|
|||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td>Verify that Windows Defender is active and current with malware signatures.<br/><br/>
|
<td>Verify that Windows Defender is active and current with malware Security intelligence.<br/><br/>
|
||||||
For more information about completing this task, see [Turn Windows Defender on or off](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab01) and [Updating Windows Defender](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab03). </td>
|
For more information about completing this task, see [Turn Windows Defender on or off](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab01) and [Updating Windows Defender](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab03). </td>
|
||||||
<td>X</td>
|
<td>X</td>
|
||||||
<td>X</td>
|
<td>X</td>
|
||||||
|
@ -10,7 +10,7 @@ author: trudyha
|
|||||||
searchScope:
|
searchScope:
|
||||||
- Store
|
- Store
|
||||||
ms.author: trudyha
|
ms.author: trudyha
|
||||||
ms.date: 07/27/2017
|
ms.date: 01/29/2019
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -10,7 +10,7 @@ author: trudyha
|
|||||||
searchScope:
|
searchScope:
|
||||||
- Store
|
- Store
|
||||||
ms.author: trudyha
|
ms.author: trudyha
|
||||||
ms.date: 01/05/2018
|
ms.date: 01/30/2019
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -25,6 +25,19 @@ When you sign up for a [Minecraft: Education Edition](https://education.minecraf
|
|||||||
>[!Note]
|
>[!Note]
|
||||||
>If you don't have an Azure AD or Office 365 tenant, you can set up a free Office 365 Education subscription when you request Minecraft: Education Edition. For more information see [Office 365 Education plans and pricing](https://products.office.com/academic/compare-office-365-education-plans).
|
>If you don't have an Azure AD or Office 365 tenant, you can set up a free Office 365 Education subscription when you request Minecraft: Education Edition. For more information see [Office 365 Education plans and pricing](https://products.office.com/academic/compare-office-365-education-plans).
|
||||||
|
|
||||||
|
## Settings for Office 365 A3 or Office 365 A5 customers
|
||||||
|
|
||||||
|
Schools that purchased these products have an extra option for making Minecraft: Education Edition available to their students:
|
||||||
|
- Office 365 A3 or Office 365 A5
|
||||||
|
- Enterprise Mobility + Security E3 or Enterprise Mobility + Security E5
|
||||||
|
- Minecraft: Education Edition
|
||||||
|
|
||||||
|
If your school has these products in your tenant, admins can choose to enable Minecraft: Education Edition for students using Office 365 A3 or Office 365 A5. On your Office 365 A3 or Office 365 A5 details page in **Microsoft Store for Education**, under **Settings & actions**, you can select **Allow access to Minecraft: Education Edition for users of Office 365 A3 or Office 365 A5**.
|
||||||
|
|
||||||
|
When this setting is selected, students in your tenant can use Minecraft: Education Edition even if they do not have a trial or a direct license assigned to them.
|
||||||
|
|
||||||
|
If you turn off this setting after students have been using Minecraft: Education Edition, they will have 25 more days to use Minecraft: Education Edition before they do not have access.
|
||||||
|
|
||||||
## Add Minecraft to your Microsoft Store for Education
|
## Add Minecraft to your Microsoft Store for Education
|
||||||
|
|
||||||
You can start with the Minecraft: Education Edition trial to get individual copies of the app. For more information, see [Minecraft: Education Edition - direct purchase](#individual-copies).
|
You can start with the Minecraft: Education Edition trial to get individual copies of the app. For more information, see [Minecraft: Education Edition - direct purchase](#individual-copies).
|
||||||
|
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 14 KiB |
@ -42,7 +42,7 @@ The MDM security baseline includes policies that cover the following areas:
|
|||||||
- And much more
|
- And much more
|
||||||
|
|
||||||
For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [MDM Security baseline (Preview) for Windows 10, version 1809](http://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].zip).
|
For more details about the MDM policies defined in the MDM security baseline and what Microsoft’s recommended baseline policy values are, see [MDM Security baseline (Preview) for Windows 10, version 1809](http://download.microsoft.com/download/2/C/4/2C418EC7-31E0-4A74-8928-6DCD512F9A46/1809-MDM-SecurityBaseLine-Document-[Preview].zip).
|
||||||
|
For information about the MDM policies defined in the Intune security baseline public preview, see [Windows security baseline settings for Intune](https://docs.microsoft.com/en-us/intune/security-baseline-settings-windows)
|
||||||
|
|
||||||
|
|
||||||
<span id="mmat" />
|
<span id="mmat" />
|
||||||
|
@ -181,6 +181,9 @@ The following list shows the supported values:
|
|||||||
<!--Description-->
|
<!--Description-->
|
||||||
Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service.
|
Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
The following list shows the supported values:
|
The following list shows the supported values:
|
||||||
|
@ -68,7 +68,7 @@ Added in Windows 10, version 1803. This policy allows the IT admin to control wh
|
|||||||
> MDMWinsOverGP only applies to policies in Policy CSP. It does not apply to other MDM settings with equivalent GP settings that are defined on other configuration service providers.
|
> MDMWinsOverGP only applies to policies in Policy CSP. It does not apply to other MDM settings with equivalent GP settings that are defined on other configuration service providers.
|
||||||
|
|
||||||
This policy is used to ensure that MDM policy wins over GP when same setting is set by both GP and MDM channel. The default value is 0. The MDM policies in Policy CSP will behave as described if this policy value is set 1.
|
This policy is used to ensure that MDM policy wins over GP when same setting is set by both GP and MDM channel. The default value is 0. The MDM policies in Policy CSP will behave as described if this policy value is set 1.
|
||||||
Note: This policy doesn’t support Delete command. This policy doesn’t support setting the value to be 0 again after it was previously set 1. In Windows 10, version 1809, Delete command and setting the value to be 0 again if it was previously set to 1 will be supported.
|
Note: This policy doesn’t support the Delete command and doesn’t support setting the value to 0 again after it was previously set to 1. Windows 10 version 1809 will support using the Delete command to set the value to 0 again, if it was previously set to 1.
|
||||||
|
|
||||||
The following list shows the supported values:
|
The following list shows the supported values:
|
||||||
|
|
||||||
|
@ -427,7 +427,7 @@ To enable this policy, use the following SyncML. This example prevents Windows f
|
|||||||
<Meta>
|
<Meta>
|
||||||
<Format xmlns="syncml:metinf">string</Format>
|
<Format xmlns="syncml:metinf">string</Format>
|
||||||
</Meta>
|
</Meta>
|
||||||
<Data><enabled/><Data id="1"/></Data>
|
<Data><enabled/><data id="DenyUnspecified" value="1"/></Data>
|
||||||
</Item>
|
</Item>
|
||||||
</Replace>
|
</Replace>
|
||||||
</SyncBody>
|
</SyncBody>
|
||||||
@ -443,6 +443,12 @@ To verify the policy is applied, check C:\windows\INF\setupapi.dev.log and see i
|
|||||||
<<< [Exit status: SUCCESS]
|
<<< [Exit status: SUCCESS]
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Windows Defender ATP also blocks installation and usage of prohibited peripherals by using a custom profile in Intune.
|
||||||
|
|
||||||
|
For example, this custom profile blocks installation and usage of USB devices with hardware IDs "USBSTOR\DiskVendorCo" and "USBSTOR\DiskSanDisk_Cruzer_Glide_3.0", and applies to USB devices with matching hardware IDs that are already installed.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
|
@ -188,6 +188,9 @@ ms.date: 08/29/2018
|
|||||||
</dd>
|
</dd>
|
||||||
</dl>
|
</dl>
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
> [!NOTE]
|
||||||
|
> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
|
@ -424,6 +424,10 @@ Nodes under NativeProfile are required when using a Windows Inbox VPN Protocol (
|
|||||||
<a href="" id="vpnv2-profilename-nativeprofile-servers"></a>**VPNv2/***ProfileName***/NativeProfile/Servers**
|
<a href="" id="vpnv2-profilename-nativeprofile-servers"></a>**VPNv2/***ProfileName***/NativeProfile/Servers**
|
||||||
Required for native profiles. Public or routable IP address or DNS name for the VPN gateway. It can point to the external IP of a gateway or a virtual IP for a server farm. Examples, 208.147.66.130 or vpn.contoso.com.
|
Required for native profiles. Public or routable IP address or DNS name for the VPN gateway. It can point to the external IP of a gateway or a virtual IP for a server farm. Examples, 208.147.66.130 or vpn.contoso.com.
|
||||||
|
|
||||||
|
The name can be a server name plus a friendly name separated with a semi-colon. For example, server2.example.com;server2FriendlyName. When you get the value, the return will include both the server name and the friendly name; if no friendly name had been supplied it will default to the server name.
|
||||||
|
|
||||||
|
You can make a list of server by making a list of server names (with optional friendly names) seperated by commas. For example, server1.example.com,server2.example.com.
|
||||||
|
|
||||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||||
|
|
||||||
<a href="" id="vpnv2-profilename-nativeprofile-routingpolicytype"></a>**VPNv2/***ProfileName***/NativeProfile/RoutingPolicyType**
|
<a href="" id="vpnv2-profilename-nativeprofile-routingpolicytype"></a>**VPNv2/***ProfileName***/NativeProfile/RoutingPolicyType**
|
||||||
|
@ -1,24 +1,24 @@
|
|||||||
---
|
---
|
||||||
title: Find the Application User Model ID of an installed app
|
title: Find the Application User Model ID of an installed app
|
||||||
description: In order to use assigned access with Mobile Device Management (MDM), you must know the Application User Model ID (AUMID) of Microsoft Store apps installed on a device. You can find the AUMID by either using Windows PowerShell or querying the registry.
|
description: To configure assigned access (kiosk mode), you need the Application User Model ID (AUMID) of apps installed on a device.
|
||||||
MSHAttr:
|
author: jdeckerms
|
||||||
- 'PreferredSiteName:MSDN'
|
ms.author: jdecker
|
||||||
- 'PreferredLib:/library/windows/hardware'
|
|
||||||
ms.assetid: BD8BD003-887D-4EFD-9C7A-A68AB895D8CD
|
|
||||||
author: alhopper-msft
|
|
||||||
ms.author: alhopper
|
|
||||||
ms.date: 05/02/2017
|
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: windows-hardware
|
ms.localizationpriority: medium
|
||||||
ms.technology: windows-oem
|
|
||||||
---
|
---
|
||||||
# Find the Application User Model ID of an installed app
|
# Find the Application User Model ID of an installed app
|
||||||
|
|
||||||
In order to use assigned access with Mobile Device Management (MDM), you must know the Application User Model ID (AUMID) of Microsoft Store apps installed on a device. You can find the AUMID by either using Windows PowerShell or querying the registry.
|
To configure assigned access (kiosk mode), you need the Application User Model ID (AUMID) of apps installed on a device. You can find the AUMID by using Windows PowerShell, File Explorer, or the registry.
|
||||||
|
|
||||||
## To identify the AUMID of an installed app by using Windows PowerShell
|
## To find the AUMID by using Windows PowerShell
|
||||||
|
|
||||||
At a Windows PowerShell command prompt, type the following commands to list the AUMIDs for all Microsoft Store apps installed for the current user on your device:
|
To get the names and AUMIDs for all apps installed for the current user, open a Windows PowerShell command prompt and enter the following command:
|
||||||
|
|
||||||
|
```powershell
|
||||||
|
get-StartApps
|
||||||
|
```
|
||||||
|
|
||||||
|
To get the names and AUMIDs for Windows Store apps installed for another user, open a Windows PowerShell command prompt and enter the following commands:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
$installedapps = get-AppxPackage
|
$installedapps = get-AppxPackage
|
||||||
@ -37,7 +37,19 @@ $aumidList
|
|||||||
|
|
||||||
You can add the –user <username> or the –allusers parameters to the get-AppxPackage cmdlet to list AUMIDs for other users. You must use an elevated Windows PowerShell prompt to use the –user or –allusers parameters.
|
You can add the –user <username> or the –allusers parameters to the get-AppxPackage cmdlet to list AUMIDs for other users. You must use an elevated Windows PowerShell prompt to use the –user or –allusers parameters.
|
||||||
|
|
||||||
## To identify the AUMID of an installed app for the current user by using the registry
|
## To find the AUMID by using File Explorer
|
||||||
|
|
||||||
|
To get the names and AUMIDs for all apps installed for the current user, perform the following steps:
|
||||||
|
|
||||||
|
1. Open **Run**, enter **shell:Appsfolder**, and select **OK**.
|
||||||
|
|
||||||
|
2. A File Explorer window opens. Press **Alt** > **View** > **Choose details**.
|
||||||
|
|
||||||
|
3. In the **Choose Details** window, select **AppUserModelId**, and then select **OK**. (You might need to change the **View** setting from **Tiles** to **Details**.)
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## To find the AUMID of an installed app for the current user by using the registry
|
||||||
|
|
||||||
Querying the registry can only return information about Microsoft Store apps that are installed for the current user, while the Windows PowerShell query can find information for any account on the device.
|
Querying the registry can only return information about Microsoft Store apps that are installed for the current user, while the Windows PowerShell query can find information for any account on the device.
|
||||||
|
|
||||||
|
BIN
windows/configuration/images/aumid-file-explorer.png
Normal file
BIN
windows/configuration/images/aumid-file-explorer.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 28 KiB |
@ -68,6 +68,7 @@ On devices running Windows 10, you can install [the Windows Configuration Design
|
|||||||
|
|
||||||
## Current Windows Configuration Designer limitations
|
## Current Windows Configuration Designer limitations
|
||||||
|
|
||||||
|
- Windows Configuration Designer will not work properly if the Group Policy setting **Policies > Administrative Templates > Windows Components > Internet Explorer > Security Zones: Use only machine settings** is enabled. We recommend that you run Windows Configuration Designer on a different device, rather than change the security setting.
|
||||||
|
|
||||||
- You can only run one instance of Windows Configuration Designer on your computer at a time.
|
- You can only run one instance of Windows Configuration Designer on your computer at a time.
|
||||||
|
|
||||||
|
@ -1,12 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Monitor the health of devices with Device Health
|
title: Monitor the health of devices with Device Health
|
||||||
description: You can use Device Health in OMS to monitor the frequency and causes of crashes and misbehaving apps on devices in your network.
|
description: You can use Device Health in Azure Portal to monitor the frequency and causes of crashes and misbehaving apps on devices in your network.
|
||||||
keywords: oms, operations management suite, wdav, health, log analytics
|
keywords: oms, operations management suite, wdav, health, log analytics
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 11/14/2017
|
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
@ -18,9 +17,9 @@ ms.author: jaimeo
|
|||||||
|
|
||||||
Device Health is the newest Windows Analytics solution that complements the existing Upgrade Readiness and Update Compliance solutions by providing IT with reports on some common problems the end users might experience so they can be proactively remediated, thus saving support calls and improving end-user productivity.
|
Device Health is the newest Windows Analytics solution that complements the existing Upgrade Readiness and Update Compliance solutions by providing IT with reports on some common problems the end users might experience so they can be proactively remediated, thus saving support calls and improving end-user productivity.
|
||||||
|
|
||||||
Like Upgrade Readiness and Update Compliance, Device Health is a solution built within Operations Management Suite (OMS), a cloud-based monitoring and automation service that has a flexible servicing subscription based on data usage and retention. This release is free for customers to try and will not incur charges on your OMS workspace for its use. For more information about OMS, see [Operations Management Suite overview](https://azure.microsoft.com/documentation/articles/operations-management-suite-overview/).
|
Like Upgrade Readiness and Update Compliance, Device Health is a solution built in Azure Portal, a cloud-based monitoring and automation service that has a flexible servicing subscription based on data usage and retention. This release is free for customers to try and will not incur charges on your Azure Portal workspace for its use. For more information about Azure Portal, see [Windows Analytics in the Azure Portal](windows-analytics-azure-portal.md) .
|
||||||
|
|
||||||
Device Health uses Windows diagnostic data that is part of all Windows 10 devices. If you have already employed Upgrade Readiness or Update Compliance solutions, all you need to do is select Device Health from the OMS solution gallery and add it to your OMS workspace. Device Health requires enhanced diagnostic data, so you might need to implement this policy if you've not already done so.
|
Device Health uses Windows diagnostic data that is part of all Windows 10 devices. If you have already employed Upgrade Readiness or Update Compliance solutions, all you need to do is select Device Health from the Azure Portal solution gallery and add it to your Azure Portal workspace. Device Health requires enhanced diagnostic data, so you might need to implement this policy if you've not already done so.
|
||||||
|
|
||||||
|
|
||||||
Device Health provides the following:
|
Device Health provides the following:
|
||||||
@ -58,7 +57,7 @@ The Device Health architecture and data flow is summarized by the following five
|
|||||||
|
|
||||||
**(1)** User computers send diagnostic data to a secure Microsoft data center using the Microsoft Data Management Service.<BR>
|
**(1)** User computers send diagnostic data to a secure Microsoft data center using the Microsoft Data Management Service.<BR>
|
||||||
**(2)** Diagnostic data is analyzed by the Microsoft Telemetry Service.<BR>
|
**(2)** Diagnostic data is analyzed by the Microsoft Telemetry Service.<BR>
|
||||||
**(3)** Diagnostic data is pushed from the Microsoft Telemetry Service to your OMS workspace.<BR>
|
**(3)** Diagnostic data is pushed from the Microsoft Telemetry Service to your Azure Portal workspace.<BR>
|
||||||
**(4)** Diagnostic data is available in the Device Health solution.<BR>
|
**(4)** Diagnostic data is available in the Device Health solution.<BR>
|
||||||
**(5)** You are now able to proactively monitor Device Health issues in your environment.<BR>
|
**(5)** You are now able to proactively monitor Device Health issues in your environment.<BR>
|
||||||
|
|
||||||
|
@ -5,7 +5,6 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
keywords: oms, operations management suite, wdav, health, log analytics
|
keywords: oms, operations management suite, wdav, health, log analytics
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.date: 03/30/2018
|
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
@ -29,7 +28,7 @@ Device Health provides the following benefits:
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Information is refreshed daily so that health status can be monitored. Changes will be displayed about 24-48 hours after their occurrence, so you always have a recent snapshot of your devices.
|
>Information is refreshed daily so that health status can be monitored. Changes will be displayed about 24-48 hours after their occurrence, so you always have a recent snapshot of your devices.
|
||||||
|
|
||||||
In OMS, the aspects of a solution's dashboard are usually divided into <I>blades</I>. Blades are a slice of information, typically with a summarization tile and an enumeration of the items that makes up that data. All data is presented through <I>queries</I>. <I>Perspectives</I> are also possible, wherein a given query has a unique view designed to display custom data. The terminology of blades, tiles, and perspectives will be used in the sections that follow.
|
In Azure Portal, the aspects of a solution's dashboard are usually divided into <I>blades</I>. Blades are a slice of information, typically with a summarization tile and an enumeration of the items that makes up that data. All data is presented through <I>queries</I>. <I>Perspectives</I> are also possible, wherein a given query has a unique view designed to display custom data. The terminology of blades, tiles, and perspectives will be used in the sections that follow.
|
||||||
|
|
||||||
|
|
||||||
## Device Reliability
|
## Device Reliability
|
||||||
@ -260,16 +259,16 @@ In this chart view, you can click a particular app listing, which will open addi
|
|||||||
|
|
||||||
Here you can copy the WipAppid and use that for adjusting the WIP policy.
|
Here you can copy the WipAppid and use that for adjusting the WIP policy.
|
||||||
|
|
||||||
## Data model and OMS built-in extensibility
|
## Data model and built-in extensibility
|
||||||
|
|
||||||
All of the views and blades display slices of the most useful data by using pre-formed queries. You have access to the full set of data collected by Device Health, which means you can construct your own queries to expose any data that is of interest to you. For documentation on working with log searches, see [Find data using log searches](https://docs.microsoft.com/azure/log-analytics/log-analytics-log-searches). This topic section provides information about the data types being populated specifically by Device Health.
|
All of the views and blades display slices of the most useful data by using pre-formed queries. You have access to the full set of data collected by Device Health, which means you can construct your own queries to expose any data that is of interest to you. For documentation on working with log searches, see [Find data using log searches](https://docs.microsoft.com/azure/log-analytics/log-analytics-log-searches). This topic section provides information about the data types being populated specifically by Device Health.
|
||||||
|
|
||||||
### Example queries
|
### Example queries
|
||||||
|
|
||||||
You can run these queries from the OMS **Log Search** interface (available at several points in the Device Health interface) by just typing them in. There are few details to be aware of:
|
You can run these queries from the Azure Portal **Log Search** interface (available at several points in the Device Health interface) by just typing them in. There are few details to be aware of:
|
||||||
|
|
||||||
- After running a query, make sure to set the date range (which appears upper left after running initial query) to "7 days" to ensure you get data back.
|
- After running a query, make sure to set the date range (which appears upper left after running initial query) to "7 days" to ensure you get data back.
|
||||||
- If you see the search tutorial dialog appearing frequently, it's likely because you are have read-only access to the OMS workspace. Ask a workspace administrator to grant you "contributor" permissions (which is required for the "completed tutorial" state to persist).
|
- If you see the search tutorial dialog appearing frequently, it's likely because you are have read-only access to the Azure Portal workspace. Ask a workspace administrator to grant you "contributor" permissions (which is required for the "completed tutorial" state to persist).
|
||||||
- If you use the search filters in the left pane, you might notice there is no control to undo a filter selection. To undo a selection, delete the (FilterName="FilterValue") element that is appended to the search query and then click the search button again. For example, after you run a base query of *Type = DHOSReliability KernelModeCrashCount > 0*, a number of filter options appear on the left. If you then filter on **Manufacturer** (for example, by setting *Manufacturer="Microsoft Corporation"* and then clicking **Apply**), the query will change to *Type = DHOSReliability KernelModeCrashCount > 0 (Manufacturer="Microsoft Corporation")*. Delete *(Manufacturer="Microsoft Corporation")* and then click the **search** button again to re-run the query without that filter.
|
- If you use the search filters in the left pane, you might notice there is no control to undo a filter selection. To undo a selection, delete the (FilterName="FilterValue") element that is appended to the search query and then click the search button again. For example, after you run a base query of *Type = DHOSReliability KernelModeCrashCount > 0*, a number of filter options appear on the left. If you then filter on **Manufacturer** (for example, by setting *Manufacturer="Microsoft Corporation"* and then clicking **Apply**), the query will change to *Type = DHOSReliability KernelModeCrashCount > 0 (Manufacturer="Microsoft Corporation")*. Delete *(Manufacturer="Microsoft Corporation")* and then click the **search** button again to re-run the query without that filter.
|
||||||
|
|
||||||
### Device reliability query examples
|
### Device reliability query examples
|
||||||
@ -300,7 +299,7 @@ You can run these queries from the OMS **Log Search** interface (available at se
|
|||||||
|
|
||||||
### Exporting data and configuring alerts
|
### Exporting data and configuring alerts
|
||||||
|
|
||||||
OMS enables you to export data to other tools. To do this, in any view that shows **Log Search** just click the **Export** button. Similarly, clicking the **Alert** button will enable you to run a query automaticlaly on a schedule and receive email alerts for particular query results that you set. If you have a PowerBI account, then you will also see a **PowerBI** button that enables you to run a query on a schedule and have the results automatically saved as a PowerBI data set.
|
Azure Portal enables you to export data to other tools. To do this, in any view that shows **Log Search** just click the **Export** button. Similarly, clicking the **Alert** button will enable you to run a query automaticlaly on a schedule and receive email alerts for particular query results that you set. If you have a PowerBI account, then you will also see a **PowerBI** button that enables you to run a query on a schedule and have the results automatically saved as a PowerBI data set.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 - How to make FoDs and language packs available when you're using WSUS/SCCM
|
title: Windows 10 - How to make FoD and language packs available when you're using WSUS/SCCM
|
||||||
description: Learn how to make FoDs and language packs available for updates when you're using WSUS/SCCM.
|
description: Learn how to make FoD and language packs available when you're using WSUS/SCCM
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -14,10 +14,10 @@ ms.date: 10/18/2018
|
|||||||
|
|
||||||
> Applies to: Windows 10
|
> Applies to: Windows 10
|
||||||
|
|
||||||
As of Windows 10, version 1709, you can't use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) and language packs for Windows 10 clients. Instead, you can pull them directly from Windows Update - you just need to change a Group Policy setting that lets clients download these directly from Windows Update. You can also host Features on Demand and language packs on a network share, but starting with Windows 10, version 1809, language packs can only be installed from Windows Update.
|
As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, language packs can only be installed from Windows Update.
|
||||||
|
|
||||||
For Active Directory and Group Policy environments running in a WSUS\SCCM environment change the **Specify settings for optional component installation and component repair** policy to enable downloading Features on Demand directly from Windows Update or a local share. This setting is located in Computer Configuration\Administrative Templates\System in the Group Policy Editor.
|
For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading language and FOD packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor.
|
||||||
|
|
||||||
Changing this policy only enables Features on Demand and language pack downloads from Windows Update - it doesn't affect how clients get feature and quality updates. Feature and quality updates will continue to come directly from WSUS\SCCM. It also doesn't affect the schedule for your clients to receive updates.
|
Changing this policy does not affect how other updates are distributed. They continue to come from WSUS or SCCM as you have scheduled them.
|
||||||
|
|
||||||
Learn about other client management options, including using Group Policy and ADMX, in [Manage clients in Windows 10](https://docs.microsoft.com/windows/client-management/).
|
Learn about other client management options, including using Group Policy and administrative templates, in [Manage clients in Windows 10](https://docs.microsoft.com/windows/client-management/).
|
||||||
|
@ -7,7 +7,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/04/2018
|
|
||||||
keywords: oms, operations management suite, optimization, downloads, updates, log analytics
|
keywords: oms, operations management suite, optimization, downloads, updates, log analytics
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
@ -7,7 +7,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: Jaimeo
|
author: Jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/04/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Feature Update Status
|
# Feature Update Status
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Get started with Update Compliance (Windows 10)
|
title: Get started with Update Compliance (Windows 10)
|
||||||
description: Configure Update Compliance in OMS to see the status of updates and antimalware protection on devices in your network.
|
description: Configure Update Compliance in Azure Portal to see the status of updates and antimalware protection on devices in your network.
|
||||||
keywords: update compliance, oms, operations management suite, prerequisites, requirements, updates, upgrades, antivirus, antimalware, signature, log analytics, wdav
|
keywords: update compliance, oms, operations management suite, prerequisites, requirements, updates, upgrades, antivirus, antimalware, signature, log analytics, wdav
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -8,7 +8,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: Jaimeo
|
author: Jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/04/2018
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Monitor Windows Updates and Windows Defender AV with Update Compliance (Windows 10)
|
title: Monitor Windows Updates and Windows Defender AV with Update Compliance (Windows 10)
|
||||||
description: You can use Update Compliance in OMS to monitor the progress of updates and key antimalware protection features on devices in your network.
|
description: You can use Update Compliance in Azure Portal to monitor the progress of updates and key antimalware protection features on devices in your network.
|
||||||
keywords: oms, operations management suite, wdav, updates, upgrades, antivirus, antimalware, signature, log analytics
|
keywords: oms, operations management suite, wdav, updates, upgrades, antivirus, antimalware, signature, log analytics
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -8,7 +8,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: Jaimeo
|
author: Jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/04/2018
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: Jaimeo
|
author: Jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/04/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Needs attention!
|
# Needs attention!
|
||||||
|
@ -5,9 +5,8 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: DaniHalfin
|
author: jaimeo
|
||||||
ms.author: daniha
|
ms.author: jaimeo
|
||||||
ms.date: 10/13/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Perspectives
|
# Perspectives
|
||||||
|
@ -7,7 +7,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: Jaimeo
|
author: Jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/04/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Security Update Status
|
# Security Update Status
|
||||||
|
@ -8,7 +8,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/04/2018
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -78,7 +77,7 @@ This means you should generally expect to see new data every 24-36 hours, except
|
|||||||
|
|
||||||
## Using Log Analytics
|
## Using Log Analytics
|
||||||
|
|
||||||
Update Compliance is built on the Log Analytics platform that is integrated into Operations Management Suite. All data in the workspace is the direct result of a query. Understanding the tools and features at your disposal, all integrated within OMS, can deeply enhance your experience and complement Update Compliance.
|
Update Compliance is built on the Log Analytics platform that is integrated into Operations Management Suite. All data in the workspace is the direct result of a query. Understanding the tools and features at your disposal, all integrated within Azure Portal, can deeply enhance your experience and complement Update Compliance.
|
||||||
|
|
||||||
See below for a few topics related to Log Analytics:
|
See below for a few topics related to Log Analytics:
|
||||||
* Learn how to effectively execute custom Log Searches by referring to Microsoft Azure’s excellent documentation on [querying data in Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-log-searches).
|
* Learn how to effectively execute custom Log Searches by referring to Microsoft Azure’s excellent documentation on [querying data in Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-log-searches).
|
||||||
|
@ -7,7 +7,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/04/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender AV Status
|
# Windows Defender AV Status
|
||||||
|
@ -201,7 +201,7 @@ Starting with Windows 10, version 1803, the device name is no longer collected b
|
|||||||
|
|
||||||
If you want to stop using Upgrade Readiness and stop sending diagnostic data to Microsoft, follow these steps:
|
If you want to stop using Upgrade Readiness and stop sending diagnostic data to Microsoft, follow these steps:
|
||||||
|
|
||||||
1. Unsubscribe from the Upgrade Readiness solution in the OMS portal. In the OMS portal, go to **Settings** > **Connected Sources** > **Windows Telemetry** and choose the **Unsubscribe** option.
|
1. Unsubscribe from the Upgrade Readiness solution in Azure Portal. In Azure Portal, go to **Settings** > **Connected Sources** > **Windows Telemetry** and choose the **Unsubscribe** option.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -5,14 +5,13 @@ keywords: Device Health, oms, Azure, portal, operations management suite, add, m
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.date: 10/05/2018
|
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Analytics in the Azure portal
|
# Windows Analytics in the Azure Portal
|
||||||
|
|
||||||
Windows Analytics uses Azure Log Analytics (formerly known as Operations Management Suite or OMS), a collection of cloud-based servicing for monitoring and automating your on-premises and cloud environments.
|
Windows Analytics uses Azure Log Analytics (formerly known as Operations Management Suite or OMS), a collection of cloud-based servicing for monitoring and automating your on-premises and cloud environments.
|
||||||
|
|
||||||
@ -65,4 +64,4 @@ From there, select the settings page to adjust specific settings:
|
|||||||
[](images/azure-portal-UR-settings.png)
|
[](images/azure-portal-UR-settings.png)
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>To adjust these settings, both the subscription and workspace require "contributor" permissions. You can view your current role and make changes in other roles by using the **Access control (IAM)** tab in Azure.
|
>To access these settings, both the subscription and workspace require "contributor" permissions. You can view your current role and make changes in other roles by using the **Access control (IAM)** tab in Azure.
|
||||||
|
@ -47,20 +47,20 @@ To enable data sharing, configure your proxy server to whitelist the following e
|
|||||||
|
|
||||||
| **Endpoint** | **Function** |
|
| **Endpoint** | **Function** |
|
||||||
|---------------------------------------------------------|-----------|
|
|---------------------------------------------------------|-----------|
|
||||||
|`https://ceuswatcab01.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health and Update Compliance AV reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness. |
|
|`https://ceuswatcab01.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness or Update Compliance AV reports. |
|
||||||
| `https://ceuswatcab02.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health and Update Compliance AV reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness. |
|
| `https://ceuswatcab02.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness or Update Compliance AV reports. |
|
||||||
| `https://eaus2watcab01.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health and Update Compliance AV reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness. |
|
| `https://eaus2watcab01.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness or Update Compliance AV reports. |
|
||||||
| `https://eaus2watcab02.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health and Update Compliance AV reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness. |
|
| `https://eaus2watcab02.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness or Update Compliance AV reports. |
|
||||||
| `https://weus2watcab01.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health and Update Compliance AV reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness. |
|
| `https://weus2watcab01.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness or Update Compliance AV reports. |
|
||||||
| `https://weus2watcab02.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health and Update Compliance AV reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness. |
|
| `https://weus2watcab02.blob.core.windows.net` | Windows Error Reporting (WER); required for Device Health reports in Windows 10, version 1809 or later. Not used by Upgrade Readiness or Update Compliance AV reports. |
|
||||||
| `https://v10c.events.data.microsoft.com` | Connected User Experience and Diagnostic component endpoint for use with devices running Windows 10, version 1803 or later **that also have the 2018-09 Cumulative Update (KB4458469, KB4457136, KB4457141) or later installed** |
|
| `https://v10c.events.data.microsoft.com` | Connected User Experience and Diagnostic component endpoint for use with devices running Windows 10, version 1803 or later **that also have the 2018-09 Cumulative Update (KB4458469, KB4457136, KB4457141) or later installed** |
|
||||||
| `https://v10.events.data.microsoft.com` | Connected User Experience and Diagnostic component endpoint for use with Windows 10, version 1803 *without* the 2018-09 Cumulative Update installed |
|
| `https://v10.events.data.microsoft.com` | Connected User Experience and Diagnostic component endpoint for use with Windows 10, version 1803 *without* the 2018-09 Cumulative Update installed |
|
||||||
| `https://v10.vortex-win.data.microsoft.com` | Connected User Experience and Diagnostic component endpoint for Windows 10, version 1709 or earlier |
|
| `https://v10.vortex-win.data.microsoft.com` | Connected User Experience and Diagnostic component endpoint for Windows 10, version 1709 or earlier |
|
||||||
| `https://vortex-win.data.microsoft.com` | Connected User Experience and Diagnostic component endpoint for operating systems older than Windows 10 |
|
| `https://vortex-win.data.microsoft.com` | Connected User Experience and Diagnostic component endpoint for operating systems older than Windows 10 |
|
||||||
| `https://settings-win.data.microsoft.com` | Enables the compatibility update to send data to Microsoft. |
|
| `https://settings-win.data.microsoft.com` | Enables the compatibility update to send data to Microsoft. |
|
||||||
| `http://adl.windows.com` | Allows the compatibility update to receive the latest compatibility data from Microsoft. |
|
| `http://adl.windows.com` | Allows the compatibility update to receive the latest compatibility data from Microsoft. |
|
||||||
| `https://watson.telemetry.microsoft.com` | Windows Error Reporting (WER); required for Device Health and Update Compliance AV reports. Not used by Upgrade Readiness. |
|
| `https://watson.telemetry.microsoft.com` | Windows Error Reporting (WER); required for Device Health reports. Not used by Upgrade Readiness or Update Compliance AV reports. |
|
||||||
| `https://oca.telemetry.microsoft.com` | Online Crash Analysis; required for Device Health and Update Compliance AV reports. Not used by Upgrade Readiness. |
|
| `https://oca.telemetry.microsoft.com` | Online Crash Analysis; required for Device Health reports. Not used by Upgrade Readiness or Update Compliance AV reports. |
|
||||||
| `https://login.live.com` | This endpoint is required by Device Health to ensure data integrity and provides a more reliable device identity for all of the Windows Analytics solutions on Windows 10. If you want to disable end-user managed service account (MSA) access, you should apply the appropriate [policy](https://docs.microsoft.com/windows/security/identity-protection/access-control/microsoft-accounts#block-all-consumer-microsoft-account-user-authentication) instead of blocking this endpoint. |
|
| `https://login.live.com` | This endpoint is required by Device Health to ensure data integrity and provides a more reliable device identity for all of the Windows Analytics solutions on Windows 10. If you want to disable end-user managed service account (MSA) access, you should apply the appropriate [policy](https://docs.microsoft.com/windows/security/identity-protection/access-control/microsoft-accounts#block-all-consumer-microsoft-account-user-authentication) instead of blocking this endpoint. |
|
||||||
| `https://www.msftncsi.com` | Windows Error Reporting (WER); required for Device Health to check connectivity |
|
| `https://www.msftncsi.com` | Windows Error Reporting (WER); required for Device Health to check connectivity |
|
||||||
| `https://www.msftconnecttest.com` | Windows Error Reporting (WER); required for Device Health to check connectivity |
|
| `https://www.msftconnecttest.com` | Windows Error Reporting (WER); required for Device Health to check connectivity |
|
||||||
@ -85,7 +85,7 @@ The compatibility update scans your devices and enables application usage tracki
|
|||||||
|
|
||||||
| **Operating System** | **Updates** |
|
| **Operating System** | **Updates** |
|
||||||
|----------------------|-----------------------------------------------------------------------------|
|
|----------------------|-----------------------------------------------------------------------------|
|
||||||
| Windows 10 | Windows 10 includes the compatibility update, so you will automatically have the latest compatibility update so long as you continue to keep your Windows 10 devices up-to-date with cumulative updates. |
|
| Windows 10 | Windows 10 includes the compatibility update, so you will automatically have the latest compatibility update so long as you continue to keep your Windows 10 devices up to date with cumulative updates. |
|
||||||
| Windows 8.1 | [KB 2976978](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB2976978)<br>Performs diagnostics on the Windows 8.1 systems that participate in the Windows Customer Experience Improvement Program. These diagnostics help determine whether compatibility issues might be encountered when the latest Windows operating system is installed. <br>For more information about this update, see <https://support.microsoft.com/kb/2976978>|
|
| Windows 8.1 | [KB 2976978](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB2976978)<br>Performs diagnostics on the Windows 8.1 systems that participate in the Windows Customer Experience Improvement Program. These diagnostics help determine whether compatibility issues might be encountered when the latest Windows operating system is installed. <br>For more information about this update, see <https://support.microsoft.com/kb/2976978>|
|
||||||
| Windows 7 SP1 | [KB2952664](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB2952664) <br>Performs diagnostics on the Windows 7 SP1 systems that participate in the Windows Customer Experience Improvement Program. These diagnostics help determine whether compatibility issues might be encountered when the latest Windows operating system is installed. <br>For more information about this update, see <https://support.microsoft.com/kb/2952664>|
|
| Windows 7 SP1 | [KB2952664](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB2952664) <br>Performs diagnostics on the Windows 7 SP1 systems that participate in the Windows Customer Experience Improvement Program. These diagnostics help determine whether compatibility issues might be encountered when the latest Windows operating system is installed. <br>For more information about this update, see <https://support.microsoft.com/kb/2952664>|
|
||||||
|
|
||||||
@ -103,7 +103,10 @@ If you are planning to enable IE Site Discovery in Upgrade Readiness, you will n
|
|||||||
|
|
||||||
| **Site discovery** | **Update** |
|
| **Site discovery** | **Update** |
|
||||||
|----------------------|-----------------------------------------------------------------------------|
|
|----------------------|-----------------------------------------------------------------------------|
|
||||||
| [Review site discovery](../upgrade/upgrade-readiness-additional-insights.md#site-discovery) | [KB3080149](https://www.catalog.update.microsoft.com/Search.aspx?q=3080149)<br>Updates the Diagnostic and Telemetry tracking service to existing devices. This update is only necessary on Windows 7 and Windows 8.1 devices. <br>For more information about this update, see <https://support.microsoft.com/kb/3150513><br><br>Install the latest [Windows Monthly Rollup](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=security%20monthly%20quality%20rollup). This functionality has been included in Internet Explorer 11 starting with the July 2016 Cumulative Update. |
|
| [Review site discovery](../upgrade/upgrade-readiness-additional-insights.md#site-discovery) | [KB3080149](https://www.catalog.update.microsoft.com/Search.aspx?q=3080149)<br>Updates the Diagnostic and Telemetry tracking service to existing devices. This update is only necessary on Windows 7 and Windows 8.1 devices. <br>For more information about this update, see <https://support.microsoft.com/kb/3080149><br><br>Install the latest [Windows Monthly Rollup](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=security%20monthly%20quality%20rollup). This functionality has been included in Internet Explorer 11 starting with the July 2016 Cumulative Update. |
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> IE site discovery is disabled on devices running Windows 7 and Windows 8.1 that are in Switzerland and EU countries.
|
||||||
|
|
||||||
## Set diagnostic data levels
|
## Set diagnostic data levels
|
||||||
|
|
||||||
|
@ -5,7 +5,6 @@ keywords: Device Health, Upgrade Readiness, Update Compliance, oms, operations m
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.date: 03/09/2018
|
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
@ -14,7 +13,7 @@ ms.localizationpriority: medium
|
|||||||
|
|
||||||
# Windows Analytics overview
|
# Windows Analytics overview
|
||||||
|
|
||||||
Windows Analytics is a set of solutions for Microsoft Operations Management Suite (OMS) that provide you with extensive data about the state of devices in your deployment. There are currently three solutions which you can use singly or in any combination:
|
Windows Analytics is a set of solutions for Azure Portal that provide you with extensive data about the state of devices in your deployment. There are currently three solutions which you can use singly or in any combination:
|
||||||
|
|
||||||
## Device Health
|
## Device Health
|
||||||
|
|
||||||
@ -38,7 +37,7 @@ Windows Analytics is a set of solutions for Microsoft Operations Management Suit
|
|||||||
|
|
||||||
## Upgrade Readiness
|
## Upgrade Readiness
|
||||||
|
|
||||||
[Upgrade Readiness](../upgrade/upgrade-readiness-get-started.md) offers a set of tools to plan and manage the upgrade process end to end, allowing you to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released. Upgrade Readiness not only supports upgrade management from Windows 7 and Windows 8.1 to Windows 10, but also Windows 10 upgrades in the Windows as a Service model.
|
[Upgrade Readiness](../upgrade/upgrade-readiness-get-started.md) offers a set of tools to plan and manage the upgrade process end to end, allowing you to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released. Upgrade Readiness not only supports upgrade management from Windows 7 and Windows 8.1 to Windows 10, but also Windows 10 upgrades in the Windows as a service model.
|
||||||
|
|
||||||
Use Upgrade Readiness to get:
|
Use Upgrade Readiness to get:
|
||||||
|
|
||||||
@ -50,4 +49,4 @@ Use Upgrade Readiness to get:
|
|||||||
- Application usage information, allowing targeted validation; workflow to track validation progress and decisions
|
- Application usage information, allowing targeted validation; workflow to track validation progress and decisions
|
||||||
- Data export to commonly used software deployment tools, including System Center Configuration Manager
|
- Data export to commonly used software deployment tools, including System Center Configuration Manager
|
||||||
|
|
||||||
To get started with any of these solutions, visit the links for instructions to add it to OMS.
|
To get started with any of these solutions, visit the links for instructions to add it to Azure Portal.
|
@ -8,7 +8,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 12/11/2018
|
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -56,6 +56,7 @@ Written by IT pros for IT pros, sharing real world examples and scenarios for Wi
|
|||||||
|
|
||||||
<img src="images/champs-2.png" alt="" width="640" height="320">
|
<img src="images/champs-2.png" alt="" width="640" height="320">
|
||||||
|
|
||||||
|
<a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Classifying-Windows-updates-in-common-deployment-tools/ba-p/331175">**NEW** Classifying Windows updates in common deployment tools</a>
|
||||||
|
|
||||||
<a href="waas-servicing-differences.md">**NEW** Understanding the differences between servicing Windows 10-era and legacy Windows operating systems</a>
|
<a href="waas-servicing-differences.md">**NEW** Understanding the differences between servicing Windows 10-era and legacy Windows operating systems</a>
|
||||||
|
|
||||||
|
@ -50,6 +50,43 @@ The Settings UI is talking to the Update Orchestrator service which in turn is t
|
|||||||
- Update State Orchestrator
|
- Update State Orchestrator
|
||||||
- Windows Update
|
- Windows Update
|
||||||
|
|
||||||
|
## Feature updates are not being offered while other updates are
|
||||||
|
On computers running [Windows 10 1709 or higher](#BKMK_DCAT) configured to update from Windows Update (usually WUfB scenario) servicing and definition updates are being installed successfully, but feature updates are never offered.
|
||||||
|
|
||||||
|
Checking the WindowsUpdate.log reveals the following error:
|
||||||
|
```
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent * START * Finding updates CallerId = Update;taskhostw Id = 25
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent Online = Yes; Interactive = No; AllowCachedResults = No; Ignore download priority = No
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent ServiceID = {855E8A7C-ECB4-4CA3-B045-1DFA50104289} Third party service
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent Search Scope = {Current User}
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent Caller SID for Applicability: S-1-12-1-2933642503-1247987907-1399130510-4207851353
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc Got 855E8A7C-ECB4-4CA3-B045-1DFA50104289 redir Client/Server URL: https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx""
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc Token Requested with 0 category IDs.
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc GetUserTickets: No user tickets found. Returning WU_E_NO_USERTOKEN.
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Method failed [AuthTicketHelper::GetDeviceTickets:570]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Method failed [AuthTicketHelper::GetDeviceTickets:570]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] GetDeviceTickets
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Method failed [AuthTicketHelper::AddTickets:1092]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Method failed [CUpdateEndpointProvider::GenerateSecurityTokenWithAuthTickets:1587]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] GetAgentTokenFromServer
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] GetAgentToken
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] EP:Call to GetEndpointToken
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Failed to obtain service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 plugin Client/Server auth token of type 0x00000001
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID ProtocolTalker *FAILED* [80070426] Method failed [CAgentProtocolTalkerContext::DetermineServiceEndpoint:377]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID ProtocolTalker *FAILED* [80070426] Initialization failed for Protocol Talker Context
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent Exit code = 0x80070426
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent * END * Finding updates CallerId = Update;taskhostw Id = 25
|
||||||
|
```
|
||||||
|
|
||||||
|
The 0x80070426 error code translates to:
|
||||||
|
```
|
||||||
|
ERROR_SERVICE_NOT_ACTIVE - # The service has not been started.
|
||||||
|
```
|
||||||
|
|
||||||
|
Microsoft Account Sign In Assistant (MSA or wlidsvc) is the service in question. The DCAT Flighting service (ServiceId: 855E8A7C-ECB4-4CA3-B045-1DFA50104289) relies on the Microsoft Account Sign In Assistant (MSA) to get the Global Device ID for the device. Without the MSA service running, the global device ID will not be generated and sent by the client and the search for feature updates never completes successfully.
|
||||||
|
|
||||||
|
In order to solve this issue, we need to reset the MSA service to the default StartType of manual.
|
||||||
|
|
||||||
## Issues related to HTTP/Proxy
|
## Issues related to HTTP/Proxy
|
||||||
Windows Update uses WinHttp with Partial Range requests (RFC 7233) to download updates and applications from Windows Update servers or on-premises WSUS servers. Because of this proxy servers configured on the network must support HTTP RANGE requests. If a proxy was configured in Internet Explorer (User level) but not in WinHTTP (System level), connections to Windows Update will fail.
|
Windows Update uses WinHttp with Partial Range requests (RFC 7233) to download updates and applications from Windows Update servers or on-premises WSUS servers. Because of this proxy servers configured on the network must support HTTP RANGE requests. If a proxy was configured in Internet Explorer (User level) but not in WinHTTP (System level), connections to Windows Update will fail.
|
||||||
|
|
||||||
@ -115,7 +152,7 @@ Check the output for the Name and OffersWindowsUPdates parameters, which you can
|
|||||||
|Output|Interpretation|
|
|Output|Interpretation|
|
||||||
|-|-|
|
|-|-|
|
||||||
|- Name: Microsoft Update <br>-OffersWindowsUpdates: True| - The update source is Microsoft Update, which means that updates for other Microsoft products besides the operating system could also be delivered.<br>- Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.) |
|
|- Name: Microsoft Update <br>-OffersWindowsUpdates: True| - The update source is Microsoft Update, which means that updates for other Microsoft products besides the operating system could also be delivered.<br>- Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.) |
|
||||||
|- Name: DCat Flighting Prod <br>- OffersWindowsUpdates: False|- The update source is the Windows Insider Program.<br>- Indicates that the client will not receive or is not configured to receive these updates. |
|
|- <a name="BKMK_DCAT"></a>Name: DCat Flighting Prod <br>- OffersWindowsUpdates: True |- Starting with Windows 10 1709, feature updates are always delivered through the DCAT service.<br>- Indicates that the client is configured to receive feature updates from Windows Update. |
|
||||||
|- Name: Windows Store (DCat Prod) <br>- OffersWindowsUpdates: False |-The update source is Insider Updates for Store Apps.<br>- Indicates that the client will not receive or is not configured to receive these updates.|
|
|- Name: Windows Store (DCat Prod) <br>- OffersWindowsUpdates: False |-The update source is Insider Updates for Store Apps.<br>- Indicates that the client will not receive or is not configured to receive these updates.|
|
||||||
|- Name: Windows Server Update Service <br>- OffersWindowsUpdates: True |- The source is a Windows Server Updates Services server. <br>- The client is configured to receive updates from WSUS. |
|
|- Name: Windows Server Update Service <br>- OffersWindowsUpdates: True |- The source is a Windows Server Updates Services server. <br>- The client is configured to receive updates from WSUS. |
|
||||||
|- Name: Windows Update<br>- OffersWindowsUpdates: True|- The source is Windows Update. <br>- The client is configured to receive updates from Windows Update Online.|
|
|- Name: Windows Update<br>- OffersWindowsUpdates: True|- The source is Windows Update. <br>- The client is configured to receive updates from Windows Update Online.|
|
||||||
|
@ -3,7 +3,6 @@ title: Upgrade Readiness - Additional insights
|
|||||||
description: Explains additional features of Upgrade Readiness.
|
description: Explains additional features of Upgrade Readiness.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.date: 07/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrade Readiness - Additional insights
|
# Upgrade Readiness - Additional insights
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
title: Upgrade Readiness architecture (Windows 10)
|
title: Upgrade Readiness architecture (Windows 10)
|
||||||
description: Describes Upgrade Readiness architecture.
|
description: Describes Upgrade Readiness architecture.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: greg-lindsay
|
author: jaimeo
|
||||||
ms.date: 04/25/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrade Readiness architecture
|
# Upgrade Readiness architecture
|
||||||
@ -16,7 +15,7 @@ Microsoft analyzes system, application, and driver diagnostic data to help you
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
After you enable Windows diagnostic data on user computers and install the compatibility update KB (1), user computers send computer, application and driver diagnostic data to a secure Microsoft data center through the Microsoft Data Management Service (2). After you configure Upgrade Readiness, diagnostic data is analyzed by the Upgrade Readiness Service (3) and pushed to your OMS workspace (4). You can then use the Upgrade Readiness solution (5) to plan and manage Windows upgrades.
|
After you enable Windows diagnostic data on user computers and install the compatibility update KB (1), user computers send computer, application and driver diagnostic data to a secure Microsoft data center through the Microsoft Data Management Service (2). After you configure Upgrade Readiness, diagnostic data is analyzed by the Upgrade Readiness Service (3) and pushed to your workspace (4). You can then use the Upgrade Readiness solution (5) to plan and manage Windows upgrades.
|
||||||
|
|
||||||
For more information about what diagnostic data Microsoft collects and how that data is used and protected by Microsoft, see:
|
For more information about what diagnostic data Microsoft collects and how that data is used and protected by Microsoft, see:
|
||||||
|
|
||||||
|
@ -5,8 +5,7 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: jaimeo
|
||||||
ms.date: 04/19/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrade Readiness data sharing
|
# Upgrade Readiness data sharing
|
||||||
|
@ -3,7 +3,6 @@ title: Upgrade Readiness - Get a list of computers that are upgrade ready (Windo
|
|||||||
description: Describes how to get a list of computers that are ready to be upgraded in Upgrade Readiness.
|
description: Describes how to get a list of computers that are ready to be upgraded in Upgrade Readiness.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.date: 04/19/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrade Readiness - Step 3: Deploy Windows
|
# Upgrade Readiness - Step 3: Deploy Windows
|
||||||
@ -35,7 +34,7 @@ Select **Export computers** for more details, including computer name, manufactu
|
|||||||
|
|
||||||
## Computer groups
|
## Computer groups
|
||||||
|
|
||||||
Computer groups allow you to segment your environment by creating device groups based on OMS log search results, or by importing groups from Active Directory, WSUS or System Center Configuration Manager. Computer groups are an OMS feature. For more information, see [Computer groups in OMS](https://blogs.technet.microsoft.com/msoms/2016/04/04/computer-groups-in-oms/).
|
Computer groups allow you to segment your environment by creating device groups based on log search results, or by importing groups from Active Directory, WSUS or System Center Configuration Manager. Computer groups are an OMS feature. For more information, see [Computer groups in OMS](https://blogs.technet.microsoft.com/msoms/2016/04/04/computer-groups-in-oms/).
|
||||||
|
|
||||||
Query based computer groups are recommended in the initial release of this feature. A feature known as **Configuration Manager Upgrade Readiness Connector** is anticipated in a future release that will enable synchronization of **ConfigMgr Collections** with computer groups in OMS.
|
Query based computer groups are recommended in the initial release of this feature. A feature known as **Configuration Manager Upgrade Readiness Connector** is anticipated in a future release that will enable synchronization of **ConfigMgr Collections** with computer groups in OMS.
|
||||||
|
|
||||||
|
@ -6,7 +6,6 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.date: 12/12/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrade Readiness deployment script
|
# Upgrade Readiness deployment script
|
||||||
@ -46,7 +45,7 @@ To run the Upgrade Readiness deployment script:
|
|||||||
|
|
||||||
1. Provide a storage location for log information. You can store log information on a remote file share or a local directory. If the script is blocked from creating the log file for the given path, it creates the log files in the drive with the Windows directory. Example: %SystemDrive%\\UADiagnostics
|
1. Provide a storage location for log information. You can store log information on a remote file share or a local directory. If the script is blocked from creating the log file for the given path, it creates the log files in the drive with the Windows directory. Example: %SystemDrive%\\UADiagnostics
|
||||||
|
|
||||||
2. Input your commercial ID key. This can be found in your OMS workspace under Settings -> Connected Sources -> Windows Telemetry.
|
2. Input your commercial ID key. To find your commercial ID, first navigate to the **Solutions** tab for your workspace, and then select the solution. From there, select the **Settings** page, where you can find and copy your commercial ID:
|
||||||
|
|
||||||
3. By default, the script sends log information to both the console and the log file. To change the default behavior, use one of the following options:
|
3. By default, the script sends log information to both the console and the log file. To change the default behavior, use one of the following options:
|
||||||
|
|
||||||
@ -130,12 +129,12 @@ Error creating or updating registry key: **CommercialId** at **HKLM:\SOFTWARE\Mi
|
|||||||
| 43 - Function **EndImpersonatingLoggedOnUser** failed with an unexpected exception. | Check the logs for the exception message and HResult. |
|
| 43 - Function **EndImpersonatingLoggedOnUser** failed with an unexpected exception. | Check the logs for the exception message and HResult. |
|
||||||
| 44 - Diagtrack.dll version is old, so Auth Proxy will not work. | Update the device using Windows Update or Windows Server Update Services. |
|
| 44 - Diagtrack.dll version is old, so Auth Proxy will not work. | Update the device using Windows Update or Windows Server Update Services. |
|
||||||
| 45 - Diagtrack.dll was not found. | Update the device using Windows Update or Windows Server Update Services. |
|
| 45 - Diagtrack.dll was not found. | Update the device using Windows Update or Windows Server Update Services. |
|
||||||
| 48 - **CommercialID** mentioned in RunConfig.bat should be a GUID. | Copy the commercialID from your workspace. To find the commercialID, in the OMS portal click **Upgrade Readiness > Settings**. |
|
| 48 - **CommercialID** mentioned in RunConfig.bat should be a GUID. | Copy the commercial ID from your workspace. To find your commercial ID, first navigate to the Solutions tab for your workspace in Azure Portal, and then select the solution. From there, select the **Settings** page, where you can find and copy your commercial ID.|
|
||||||
| 50 - Diagtrack Service is not running. | The Diagtrack service is required to send data to Microsoft. Enable and run the "Connected User Experiences and Telemetry" service. |
|
| 50 - Diagtrack Service is not running. | The Diagtrack service is required to send data to Microsoft. Enable and run the "Connected User Experiences and Telemetry" service. |
|
||||||
| 51 - RunCensus failed with an unexpected exception. | RunCensus explitly runs the process used to collect device information. The method failed with an unexpected exception. Check the ExceptionHResult and ExceptionMessage for more details. |
|
| 51 - RunCensus failed with an unexpected exception. | RunCensus explitly runs the process used to collect device information. The method failed with an unexpected exception. The most common cause is incorrect setup of diagnostic data. Check the ExceptionHResult and ExceptionMessage for more details. |
|
||||||
| 52 - DeviceCensus.exe not found on a Windows 10 machine. | On computers running Windows 10, the process devicecensus.exe should be present in the \system32 directory. Error code 52 is returned if the process was not found. Ensure that it exists at the specified location. |
|
| 52 - DeviceCensus.exe not found on a Windows 10 machine. | On computers running Windows 10, the process devicecensus.exe should be present in the \system32 directory. Error code 52 is returned if the process was not found. Ensure that it exists at the specified location. |
|
||||||
| 53 - There is a different CommercialID present at the GPO path: **HKLM:\SOFTWARE\Policies\Microsoft \Windows\DataCollection**. This will take precedence over the CommercialID provided in the script. | Provide the correct CommercialID at the GPO location. |
|
| 53 - There is a different CommercialID present at the GPO path: **HKLM:\SOFTWARE\Policies\Microsoft \Windows\DataCollection**. This will take precedence over the CommercialID provided in the script. | Provide the correct CommercialID at the GPO location. |
|
||||||
| 54 - Microsoft Account Sign In Assistant Service is Disabled. | This service is required for devices running Windows 10. The diagnostic data client relies on the Microsoft Account Sign In Assistant (MSA) to get the Global Device ID for the device. Without the MSA service running, the global device ID will not be generated and sent by the client. |
|
| 54 - Microsoft Account Sign In Assistant Service is Disabled. | This service is required for devices running Windows 10. The diagnostic data client relies on the Microsoft Account Sign In Assistant (MSA) to get the Global Device ID for the device. Without the MSA service running, the global device ID will not be generated and sent by the client and Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are). |
|
||||||
| 55 - SetDeviceNameOptIn function failed to create registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | The function SetDeviceNameOptIn sets the registry key value which determines whether to send the device name in diagnostic data. The function tries to create the registry key path if it does not already exist. Verify that the account has the correct permissions to change or add registry keys. |
|
| 55 - SetDeviceNameOptIn function failed to create registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | The function SetDeviceNameOptIn sets the registry key value which determines whether to send the device name in diagnostic data. The function tries to create the registry key path if it does not already exist. Verify that the account has the correct permissions to change or add registry keys. |
|
||||||
| 56 - SetDeviceNameOptIn function failed to create property AllowDeviceNameInTelemetry at registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | Verify that the account has the correct permissions to change or add registry keys.|
|
| 56 - SetDeviceNameOptIn function failed to create property AllowDeviceNameInTelemetry at registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | Verify that the account has the correct permissions to change or add registry keys.|
|
||||||
| 57 - SetDeviceNameOptIn function failed to update AllowDeviceNameInTelemetry property to value 1 at registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | Verify that the account has the correct permissions to change or add registry keys. |
|
| 57 - SetDeviceNameOptIn function failed to update AllowDeviceNameInTelemetry property to value 1 at registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | Verify that the account has the correct permissions to change or add registry keys. |
|
||||||
@ -143,6 +142,9 @@ Error creating or updating registry key: **CommercialId** at **HKLM:\SOFTWARE\Mi
|
|||||||
| 59 - CleanupOneSettings failed to delete LastPersistedEventTimeOrFirstBoot property at registry key path: **HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\Diagtrack** |The CleanupOneSettings function clears some of the cached values needed by the Appraiser which is the data collector on the monitored device. This helps in the download of the most recent for accurate running of the data collector. Verify that the account has the correct permissions to change or add registry keys. |
|
| 59 - CleanupOneSettings failed to delete LastPersistedEventTimeOrFirstBoot property at registry key path: **HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\Diagtrack** |The CleanupOneSettings function clears some of the cached values needed by the Appraiser which is the data collector on the monitored device. This helps in the download of the most recent for accurate running of the data collector. Verify that the account has the correct permissions to change or add registry keys. |
|
||||||
| 60 - CleanupOneSettings failed to delete registry key: **HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\ Diagnostics\Diagtrack\SettingsRequests** | Verify that the account has the correct permissions to change or add registry keys. |
|
| 60 - CleanupOneSettings failed to delete registry key: **HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\ Diagnostics\Diagtrack\SettingsRequests** | Verify that the account has the correct permissions to change or add registry keys. |
|
||||||
| 61 - CleanupOneSettings failed with an exception | CleanupOneSettings failed with an unexpected exception. |
|
| 61 - CleanupOneSettings failed with an exception | CleanupOneSettings failed with an unexpected exception. |
|
||||||
|
| 63 - Diagnostic data is disabled for the device | If AllowTelemetry == 0, devices cannot send diagnostic data. To resolve this, set the **AllowTelemetry** value at **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection**. |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -8,7 +8,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/10/2018
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -30,7 +29,7 @@ Before you begin, consider reviewing the following helpful information:<BR>
|
|||||||
When you are ready to begin using Upgrade Readiness, perform the following steps:
|
When you are ready to begin using Upgrade Readiness, perform the following steps:
|
||||||
|
|
||||||
1. Review [data collection and privacy](#data-collection-and-privacy) information.
|
1. Review [data collection and privacy](#data-collection-and-privacy) information.
|
||||||
2. [Add Upgrade Readiness to OMS](#add-upgrade-readiness-to-operations-management-suite).
|
2. [Add the Upgrade Readiness solution to your Azure subsctiption](#add-the-upgrade-readiness-solution-to-your-Azure-subscription).
|
||||||
3. [Enroll devices in Windows Analytics](#enroll-devices-in-windows-analytics).
|
3. [Enroll devices in Windows Analytics](#enroll-devices-in-windows-analytics).
|
||||||
4. [Use Upgrade Readiness to manage Windows Upgrades](#use-upgrade-readiness-to-manage-windows-upgrades) once your devices are enrolled.
|
4. [Use Upgrade Readiness to manage Windows Upgrades](#use-upgrade-readiness-to-manage-windows-upgrades) once your devices are enrolled.
|
||||||
|
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
title: Upgrade Readiness - Identify important apps (Windows 10)
|
title: Upgrade Readiness - Identify important apps (Windows 10)
|
||||||
description: Describes how to prepare your environment so that you can use Upgrade Readiness to manage Windows upgrades.
|
description: Describes how to prepare your environment so that you can use Upgrade Readiness to manage Windows upgrades.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: greg-lindsay
|
author: jaimeo
|
||||||
ms.date: 04/19/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrade Readiness - Step 1: Identify important apps
|
# Upgrade Readiness - Step 1: Identify important apps
|
||||||
|
@ -6,7 +6,6 @@ ms.localizationpriority: medium
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 11/07/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrade Readiness - Step 4: Monitor
|
# Upgrade Readiness - Step 4: Monitor
|
||||||
|
@ -4,8 +4,7 @@ description: Provides requirements for Upgrade Readiness.
|
|||||||
keywords: windows analytics, oms, operations management suite, prerequisites, requirements, upgrades, log analytics,
|
keywords: windows analytics, oms, operations management suite, prerequisites, requirements, upgrades, log analytics,
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author:
|
ms.author: jaimeo
|
||||||
ms.date: 06/12/2018
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -38,14 +37,14 @@ While Upgrade Readiness can be used to assist with updating devices from Windows
|
|||||||
|
|
||||||
## Operations Management Suite or Azure Log Analytics
|
## Operations Management Suite or Azure Log Analytics
|
||||||
|
|
||||||
Upgrade Readiness is offered as a solution in Microsoft Operations Management Suite (OMS) and Azure Log Analytics, a collection of cloud based services for managing on premises and cloud computing environments. For more information about OMS, see [Operations Management Suite overview](https://azure.microsoft.com/documentation/articles/operations-management-suite-overview/) or the Azure [Log Analytics overview](https://azure.microsoft.com/services/log-analytics/).
|
Upgrade Readiness is offered as a solution in Azure Portal and Azure Log Analytics, a collection of cloud-based services for managing on premises and cloud computing environments. For more information about Azure Portal, see [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) or the Azure [Log Analytics overview](https://azure.microsoft.com/services/log-analytics/).
|
||||||
|
|
||||||
If you’re already using OMS or Azure Log Analytics, you’ll find Upgrade Readiness in the Solutions Gallery. Click the **Upgrade Readiness** tile in the gallery and then click **Add** on the solution’s details page. Upgrade Readiness is now visible in your workspace.
|
If you’re already using Azure Portal or Azure Log Analytics, you’ll find Upgrade Readiness in the Solutions Gallery. Click the **Upgrade Readiness** tile in the gallery and then click **Add** on the solution’s details page. Upgrade Readiness is now visible in your workspace.
|
||||||
|
|
||||||
If you are not using OMS or Azure Log Analytics, go to [Log Analytics](https://azure.microsoft.com/services/log-analytics/) on Microsoft.com and select **Start free** to start the setup process. During the process, you’ll create a workspace and add the Upgrade Readiness solution to it.
|
If you are not using Azure Portal or Azure Log Analytics, go to [Log Analytics](https://azure.microsoft.com/services/log-analytics/) on Microsoft.com and select **Start free** to start the setup process. During the process, you’ll create a workspace and add the Upgrade Readiness solution to it.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>You can use either a Microsoft Account or a Work or School account to create a workspace. If your company is already using Azure Active Directory, use a Work or School account when you sign in to OMS. Using a Work or School account allows you to use identities from your Azure AD to manage permissions in OMS. You also need an Azure subscription to link to your OMS workspace. The account you used to create the workspace must have administrator permissions on the Azure subscription in order to link the workspace to the Azure account. Once the link has been established, you can revoke the administrator permissions.
|
>You can use either a Microsoft Account or a Work or School account to create a workspace. If your company is already using Azure Active Directory, use a Work or School account when you sign in to Azure Portal. Using a Work or School account allows you to use identities from your Azure AD to manage permissions in Azure Portal. You also need an Azure subscription to link to your Azure Portal workspace. The account you used to create the workspace must have administrator permissions on the Azure subscription in order to link the workspace to the Azure account. Once the link has been established, you can revoke the administrator permissions.
|
||||||
|
|
||||||
## System Center Configuration Manager integration
|
## System Center Configuration Manager integration
|
||||||
|
|
||||||
@ -59,13 +58,13 @@ Before you get started configuring Upgrade Anatlyics, review the following tips
|
|||||||
|
|
||||||
**Upgrade Readiness does not support on-premises Windows deployments.** Upgrade Readiness is built as a cloud service, which allows Upgrade Readiness to provide you with insights based on the data from user computers and other Microsoft compatibility services. Cloud services are easy to get up and running and are cost-effective because there is no requirement to physically implement and maintain services on-premises.
|
**Upgrade Readiness does not support on-premises Windows deployments.** Upgrade Readiness is built as a cloud service, which allows Upgrade Readiness to provide you with insights based on the data from user computers and other Microsoft compatibility services. Cloud services are easy to get up and running and are cost-effective because there is no requirement to physically implement and maintain services on-premises.
|
||||||
|
|
||||||
**In-region data storage requirements.** Windows diagnostic data from user computers is encrypted, sent to, and processed at Microsoft-managed secure data centers located in the US. Our analysis of the upgrade readiness-related data is then provided to you through the Upgrade Readiness solution in the Microsoft Operations Management Suite (OMS) portal. Upgrade Readiness is supported in all OMS regions; however, selecting an international OMS region does not prevent diagnostic data from being sent to and processed in Microsoft's secure data centers in the US.
|
**In-region data storage requirements.** Windows diagnostic data from user computers is encrypted, sent to, and processed at Microsoft-managed secure data centers located in the US. Our analysis of the upgrade readiness-related data is then provided to you through the Upgrade Readiness solution in Azure Portal. Upgrade Readiness is supported in all Azure regions; however, selecting an international Azure region does not prevent diagnostic data from being sent to and processed in Microsoft's secure data centers in the US.
|
||||||
|
|
||||||
### Tips
|
### Tips
|
||||||
|
|
||||||
- When viewing inventory items in table view, the maximum number of rows that can be viewed and exported is limited to 5,000. If you need to view or export more than 5,000 items, reduce the scope of the query so you can export a list with fewer items.
|
- When viewing inventory items in table view, the maximum number of rows that can be viewed and exported is limited to 5,000. If you need to view or export more than 5,000 items, reduce the scope of the query so you can export a list with fewer items.
|
||||||
|
|
||||||
- Sorting data by clicking a column heading may not sort your complete list of items. For information about how to sort data in OMS, see [Sorting DocumentDB data using Order By](https://azure.microsoft.com/documentation/articles/documentdb-orderby).
|
- Sorting data by clicking a column heading may not sort your complete list of items. For information about how to sort data in Azure Portal, see [Sorting DocumentDB data using Order By](https://azure.microsoft.com/documentation/articles/documentdb-orderby).
|
||||||
|
|
||||||
## Get started
|
## Get started
|
||||||
|
|
||||||
|
@ -5,7 +5,6 @@ keywords: windows analytics, oms, operations management suite, prerequisites, re
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 08/31/2017
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -3,7 +3,6 @@ title: Upgrade Readiness - Targeting a new operating system version
|
|||||||
description: Explains how to run Upgrade Readiness again to target a different operating system version or bulk-approve all apps from a given vendor
|
description: Explains how to run Upgrade Readiness again to target a different operating system version or bulk-approve all apps from a given vendor
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.date: 05/31/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Targeting a new operating system version
|
# Targeting a new operating system version
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
title: Upgrade Readiness - Upgrade Overview (Windows 10)
|
title: Upgrade Readiness - Upgrade Overview (Windows 10)
|
||||||
description: Displays the total count of computers sharing data and upgraded.
|
description: Displays the total count of computers sharing data and upgraded.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: greg-lindsay
|
author: jaimeo
|
||||||
ms.date: 08/15/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Upgrade Readiness - Upgrade overview
|
# Upgrade Readiness - Upgrade overview
|
||||||
|
@ -64,7 +64,7 @@ For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products &
|
|||||||
- Devices must be Azure AD-joined or Active Directory joined with Azure AD Connect. Workgroup-joined devices are not supported.
|
- Devices must be Azure AD-joined or Active Directory joined with Azure AD Connect. Workgroup-joined devices are not supported.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>In issue has been identified with Hybrid Azure AD joined devices that have enabled [multi-factor authentication](https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-getstarted) (MFA). If a user signs into a device using their Active Directory account and MFA is enabled, the device will not successfully upgrade to their Windows Enterprise subscription. To resolve this issue, the user must either sign in with an Azure Active Directory account, or you must disable MFA for this user during the 30-day polling period and renewal.
|
>An issue has been identified with Hybrid Azure AD joined devices that have enabled [multi-factor authentication](https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-getstarted) (MFA). If a user signs into a device using their Active Directory account and MFA is enabled, the device will not successfully upgrade to their Windows Enterprise subscription. To resolve this issue, the user must either sign in with an Azure Active Directory account, or you must disable MFA for this user during the 30-day polling period and renewal.
|
||||||
|
|
||||||
For Microsoft customers that do not have EA or MPSA, you can obtain Windows 10 Enterprise E3 or E5 through a cloud solution provider (CSP). Identity management and device requirements are the same when you use CSP to manage licenses, with the exception that Windows 10 Enterprise E3 is also available through CSP to devices running Windows 10, version 1607. For more information about obtaining Windows 10 Enterprise E3 through your CSP, see [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md).
|
For Microsoft customers that do not have EA or MPSA, you can obtain Windows 10 Enterprise E3 or E5 through a cloud solution provider (CSP). Identity management and device requirements are the same when you use CSP to manage licenses, with the exception that Windows 10 Enterprise E3 is also available through CSP to devices running Windows 10, version 1607. For more information about obtaining Windows 10 Enterprise E3 through your CSP, see [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md).
|
||||||
|
|
||||||
|
@ -7,25 +7,49 @@ ms.localizationpriority: medium
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
ms.date: 12/03/2018
|
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
---
|
---
|
||||||
|
|
||||||
# Switch to Windows 10 Pro/Enterprise from S mode
|
# Switch to Windows 10 Pro or Enterprise from S mode
|
||||||
|
|
||||||
We recommend staying in S mode. However, in some limited scenarios, you might need to switch to Windows 10 Pro. You can switch devices running Windows 10, version 1709 or later. Use the following information to switch to Windows 10 Pro through the Microsoft Store.
|
We recommend staying in S mode. However, in some limited scenarios, you might need to switch to Windows 10 Pro, Home, or Enterprise (not in S mode). You can switch devices running Windows 10, version 1709 or later.
|
||||||
|
|
||||||
|
|
||||||
|
A number of other transformations are possible depending on which version and edition of Windows 10 you are starting with. Depending on the details, you might *switch* between S mode and the ordinary version or *convert* between different editions while staying in or out of S mode. The following quick reference table summarizes all of the switches or conversions that are supported by various means:
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
| If a device is running this version of Windows 10 | and this edition of Windows 10 | then you can switch or convert it to this edition of Windows 10 by these methods: | | |
|
||||||
|
|-------------|---------------------|-----------------------------------|-------------------------------|--------------------------------------------|
|
||||||
|
| | | **Store for Education** (switch/convert all devices in your tenant) | **Microsoft Store** (switch/convert one device at a time) | **Intune** (switch/convert any number of devices selected by admin) |
|
||||||
|
| **Windows 10, version 1709** | Pro in S mode | Pro EDU | Pro | Not by this method |
|
||||||
|
| | Pro | Pro EDU | Not by any method | Not by any method |
|
||||||
|
| | Home | Not by any method | Not by any method | Not by any method |
|
||||||
|
| | | | | |
|
||||||
|
| **Windows 10, version 1803** | Pro in S mode | Pro EDU in S mode | Pro | Not by this method |
|
||||||
|
| | Pro | Pro EDU | Not by any method | Not by any method |
|
||||||
|
| | Home in S mode | Not by any method | Home | Not by this method |
|
||||||
|
| | Home | Not by any method | Not by any method | Not by any method |
|
||||||
|
| | | | | |
|
||||||
|
| **Windows 10, version 1809** | Pro in S mode | Pro EDU in S mode | Pro | Pro |
|
||||||
|
| | Pro | Pro EDU | Not by any method | Not by any method |
|
||||||
|
| | Home in S mode | Not by any method | Home | Home |
|
||||||
|
| | Home | Not by any method | Not by any method | Not by any method |
|
||||||
|
|
||||||
|
|
||||||
|
Use the following information to switch to Windows 10 Pro through the Microsoft Store.
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> While it’s free to switch to Windows 10 Pro, it’s not reversible. The only way to rollback this kind of switch is through a [bare metal recovery (BMR)](https://docs.microsoft.com/windows-hardware/manufacture/desktop/create-media-to-run-push-button-reset-features-s14) reset. This restores a Windows device to the factory state, even if the user needs to replace the hard drive or completely wipe the drive clean. If a device is switched out of S mode via the Microsoft Store, it will remain out of S mode even after the device is reset.
|
> While it’s free to switch to Windows 10 Pro, it’s not reversible. The only way to rollback this kind of switch is through a [bare-metal recovery (BMR)](https://docs.microsoft.com/windows-hardware/manufacture/desktop/create-media-to-run-push-button-reset-features-s14) reset. This restores a Windows device to the factory state, even if the user needs to replace the hard drive or completely wipe the drive clean. If a device is switched out of S mode via the Microsoft Store, it will remain out of S mode even after the device is reset.
|
||||||
|
|
||||||
## Switch one device through the Microsoft Store
|
## Switch one device through the Microsoft Store
|
||||||
Use the following information to switch to Windows 10 Pro through the Microsoft Store.
|
Use the following information to switch to Windows 10 Pro through the Microsoft Store or by navigating to **Settings** and then **Activation** on the device.
|
||||||
|
|
||||||
Note these differences affecting switching modes in various releases of Windows 10:
|
Note these differences affecting switching modes in various releases of Windows 10:
|
||||||
|
|
||||||
- In Windows 10, version 1709, you can switch devices one at a time from Windows 10 Pro in S mode to Windows 10 Pro by using the Microsoft Store. No other switches are possible.
|
- In Windows 10, version 1709, you can switch devices one at a time from Windows 10 Pro in S mode to Windows 10 Pro by using the Microsoft Store or **Settings**. No other switches are possible.
|
||||||
- In Windows 10, version 1803, you can switch devices running any S mode edition to the equivalent non-S mode edition one at a time by using the Microsoft Store.
|
- In Windows 10, version 1803, you can switch devices running any S mode edition to the equivalent non-S mode edition one at a time by using the Microsoft Store or **Settings**.
|
||||||
- Windows 10, version 1809, you can switch devices running any S mode edition to the equivalent non-S mode edition one at a time by using the Microsoft Store or you can switch multiple devices in bulk by using Intune. You can also block users from switching devices themselves.
|
- Windows 10, version 1809, you can switch devices running any S mode edition to the equivalent non-S mode edition one at a time by using the Microsoft Store, **Settings**, or you can switch multiple devices in bulk by using Intune. You can also block users from switching devices themselves.
|
||||||
|
|
||||||
|
|
||||||
1. Sign into the Microsoft Store using your Microsoft account.
|
1. Sign into the Microsoft Store using your Microsoft account.
|
||||||
|
@ -39,6 +39,7 @@ For a CSP to register Windows Autopilot devices on behalf of a customer, the cus
|
|||||||

|

|
||||||
- Select the checkbox indicating whether or not you want delegated admin rights:
|
- Select the checkbox indicating whether or not you want delegated admin rights:
|
||||||

|

|
||||||
|
- NOTE: Depending on your partner, they might request Delegated Admin Permissions (DAP) when requesting this consent. You should ask them to use the newer DAP-free process (shown in tihs document) if possible. If not, you can easily remove their DAP status either from Microsoft Store for Business or the Office 365 admin portal: https://docs.microsoft.com/en-us/partner-center/customers_revoke_admin_privileges
|
||||||
- Send the template above to the customer via email.
|
- Send the template above to the customer via email.
|
||||||
2. Customer with global administrator privileges in Microsoft Store for Business (MSfB) clicks the link in the body of the email once they receive it from the CSP, which takes them directly to the following MSfB page:
|
2. Customer with global administrator privileges in Microsoft Store for Business (MSfB) clicks the link in the body of the email once they receive it from the CSP, which takes them directly to the following MSfB page:
|
||||||
|
|
||||||
|
@ -29,6 +29,7 @@ Windows Autopilot depends on specific capabilities available in Windows 10 and A
|
|||||||
- [Microsoft 365 Academic A1, A3, or A5 subscriptions](https://www.microsoft.com/en-us/education/buy-license/microsoft365/default.aspx)
|
- [Microsoft 365 Academic A1, A3, or A5 subscriptions](https://www.microsoft.com/en-us/education/buy-license/microsoft365/default.aspx)
|
||||||
- [Microsoft 365 Enterprise E3 or E5 subscriptions](https://www.microsoft.com/en-us/microsoft-365/enterprise), which include all Windows 10, Office 365, and EM+S features (Azure AD and Intune)
|
- [Microsoft 365 Enterprise E3 or E5 subscriptions](https://www.microsoft.com/en-us/microsoft-365/enterprise), which include all Windows 10, Office 365, and EM+S features (Azure AD and Intune)
|
||||||
- [Enterprise Mobility + Security E3 or E5 subscriptions](https://www.microsoft.com/en-us/cloud-platform/enterprise-mobility-security), which include all needed Azure AD and Intune features
|
- [Enterprise Mobility + Security E3 or E5 subscriptions](https://www.microsoft.com/en-us/cloud-platform/enterprise-mobility-security), which include all needed Azure AD and Intune features
|
||||||
|
- [Intune for Education subscriptions](https://docs.microsoft.com/en-us/intune-education/what-is-intune-for-education), which include all needed Azure AD and Intune features
|
||||||
- [Azure Active Directory Premium P1 or P2](https://azure.microsoft.com/en-us/services/active-directory/) and [Microsoft Intune subscriptions](https://www.microsoft.com/en-us/cloud-platform/microsoft-intune) (or an alternative MDM service)
|
- [Azure Active Directory Premium P1 or P2](https://azure.microsoft.com/en-us/services/active-directory/) and [Microsoft Intune subscriptions](https://www.microsoft.com/en-us/cloud-platform/microsoft-intune) (or an alternative MDM service)
|
||||||
|
|
||||||
Additionally, the following are also recommended but not required:
|
Additionally, the following are also recommended but not required:
|
||||||
|
2
windows/known-issues/TOC.yml
Normal file
2
windows/known-issues/TOC.yml
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
- name: Index
|
||||||
|
href: index.md
|
3
windows/known-issues/breadcrumb/toc.yml
Normal file
3
windows/known-issues/breadcrumb/toc.yml
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
- name: Docs
|
||||||
|
tocHref: /
|
||||||
|
topicHref: /
|
47
windows/known-issues/docfx.json
Normal file
47
windows/known-issues/docfx.json
Normal file
@ -0,0 +1,47 @@
|
|||||||
|
{
|
||||||
|
"build": {
|
||||||
|
"content": [
|
||||||
|
{
|
||||||
|
"files": [
|
||||||
|
"**/*.md",
|
||||||
|
"**/*.yml"
|
||||||
|
],
|
||||||
|
"exclude": [
|
||||||
|
"**/obj/**",
|
||||||
|
"**/includes/**",
|
||||||
|
"_themes/**",
|
||||||
|
"_themes.pdf/**",
|
||||||
|
"README.md",
|
||||||
|
"LICENSE",
|
||||||
|
"LICENSE-CODE",
|
||||||
|
"ThirdPartyNotices"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"resource": [
|
||||||
|
{
|
||||||
|
"files": [
|
||||||
|
"**/*.png",
|
||||||
|
"**/*.jpg"
|
||||||
|
],
|
||||||
|
"exclude": [
|
||||||
|
"**/obj/**",
|
||||||
|
"**/includes/**",
|
||||||
|
"_themes/**",
|
||||||
|
"_themes.pdf/**"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"overwrite": [],
|
||||||
|
"externalReference": [],
|
||||||
|
"globalMetadata": {
|
||||||
|
"breadcrumb_path": "/windows/known-issues/breadcrumb/toc.json",
|
||||||
|
"extendBreadcrumb": true,
|
||||||
|
"feedback_system": "None"
|
||||||
|
},
|
||||||
|
"fileMetadata": {},
|
||||||
|
"template": [],
|
||||||
|
"dest": "known-issues",
|
||||||
|
"markdownEngineName": "markdig"
|
||||||
|
}
|
||||||
|
}
|
1
windows/known-issues/index.md
Normal file
1
windows/known-issues/index.md
Normal file
@ -0,0 +1 @@
|
|||||||
|
# Welcome to known-issues!
|
@ -119,7 +119,7 @@ The following table lists management options for each setting, beginning with Wi
|
|||||||
| [11. Microsoft Account](#bkmk-microsoft-account) | |  |  |  | |
|
| [11. Microsoft Account](#bkmk-microsoft-account) | |  |  |  | |
|
||||||
| [12. Microsoft Edge](#bkmk-edge) |  |  |  |  | |
|
| [12. Microsoft Edge](#bkmk-edge) |  |  |  |  | |
|
||||||
| [13. Network Connection Status Indicator](#bkmk-ncsi) | |  |  |  | |
|
| [13. Network Connection Status Indicator](#bkmk-ncsi) | |  |  |  | |
|
||||||
| [14. Offline maps](#bkmk-offlinemaps) |  |  | |  | |
|
| [14. Offline maps](#bkmk-offlinemaps) |  |  |  |  | |
|
||||||
| [15. OneDrive](#bkmk-onedrive) | |  | |  | |
|
| [15. OneDrive](#bkmk-onedrive) | |  | |  | |
|
||||||
| [16. Preinstalled apps](#bkmk-preinstalledapps) |  | | | |  |
|
| [16. Preinstalled apps](#bkmk-preinstalledapps) |  | | | |  |
|
||||||
| [17. Settings > Privacy](#bkmk-settingssection) | | | | | |
|
| [17. Settings > Privacy](#bkmk-settingssection) | | | | | |
|
||||||
@ -156,6 +156,7 @@ The following table lists management options for each setting, beginning with Wi
|
|||||||
| [26.1 Apps for websites](#bkmk-apps-for-websites) | |  | | |
|
| [26.1 Apps for websites](#bkmk-apps-for-websites) | |  | | |
|
||||||
| [27. Windows Update Delivery Optimization](#bkmk-updates) |  |  |  |  | |
|
| [27. Windows Update Delivery Optimization](#bkmk-updates) |  |  |  |  | |
|
||||||
| [28. Windows Update](#bkmk-wu) |  |  |  | | |
|
| [28. Windows Update](#bkmk-wu) |  |  |  | | |
|
||||||
|
| [29. License Manager](#bkmk-licmgr) | | | |  | |
|
||||||
|
|
||||||
### Settings for Windows Server 2016 with Desktop Experience
|
### Settings for Windows Server 2016 with Desktop Experience
|
||||||
|
|
||||||
@ -518,13 +519,14 @@ Alternatively, you could use the registry to set the Group Policies.
|
|||||||
| Turn off browser geolocation | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Geolocation<br/>REG_DWORD: PolicyDisableGeolocation <br />Value: 1 |
|
| Turn off browser geolocation | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Geolocation<br/>REG_DWORD: PolicyDisableGeolocation <br />Value: 1 |
|
||||||
| Prevent managing SmartScreen filter | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\PhishingFilter<br/>REG_DWORD: EnabledV9 <br />Value: 0 |
|
| Prevent managing SmartScreen filter | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\PhishingFilter<br/>REG_DWORD: EnabledV9 <br />Value: 0 |
|
||||||
|
|
||||||
There are three more Group Policy objects that are used by Internet Explorer:
|
There are more Group Policy objects that are used by Internet Explorer:
|
||||||
|
|
||||||
| Path | Policy | Description |
|
| Path | Policy | Description |
|
||||||
| - | - | - |
|
| - | - | - |
|
||||||
| **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Compatibility View** > **Turn off Compatibility View** | Choose whether employees can configure Compatibility View. | Choose whether an employee can swipe across a screen or click forward to go to the next pre-loaded page of a website. <br /> Default: Disabled |
|
| **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Compatibility View** > **Turn off Compatibility View** | Choose whether employees can configure Compatibility View. | Choose whether an employee can swipe across a screen or click forward to go to the next pre-loaded page of a website. <br /> Default: Disabled |
|
||||||
| **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Internet Control Panel** > **Advanced Page** | Turn off the flip ahead with page prediction feature | Choose whether an employee can swipe across a screen or click forward to go to the next pre-loaded page of a website. <br /> Default: Enabled |
|
| **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Internet Control Panel** > **Advanced Page** | Turn off the flip ahead with page prediction feature | Choose whether an employee can swipe across a screen or click forward to go to the next pre-loaded page of a website. <br /> Default: Enabled |
|
||||||
| **Computer Configuration** > **Administrative Templates** > **Windows Components** > **RSS Feeds** | Turn off background synchronization for feeds and Web Slices | Choose whether to have background synchronization for feeds and Web Slices. <br /> Default: Enabled |
|
| **Computer Configuration** > **Administrative Templates** > **Windows Components** > **RSS Feeds** | Turn off background synchronization for feeds and Web Slices | Choose whether to have background synchronization for feeds and Web Slices. <br /> Default: Enabled |
|
||||||
|
| **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Allow Online Tips** | Allow Online Tips | Enables or disables the retrieval of online tips and help for the Settings app. <br /> Set to : Disabled |
|
||||||
|
|
||||||
You can also use registry entries to set these Group Policies.
|
You can also use registry entries to set these Group Policies.
|
||||||
|
|
||||||
@ -533,6 +535,10 @@ You can also use registry entries to set these Group Policies.
|
|||||||
| Choose whether employees can configure Compatibility View. | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\BrowserEmulation<br/>REG_DWORD: MSCompatibilityMode <br />Value: 0|
|
| Choose whether employees can configure Compatibility View. | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\BrowserEmulation<br/>REG_DWORD: MSCompatibilityMode <br />Value: 0|
|
||||||
| Turn off the flip ahead with page prediction feature | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\FlipAhead<br/>REG_DWORD: Enabled <br />Value: 0|
|
| Turn off the flip ahead with page prediction feature | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\FlipAhead<br/>REG_DWORD: Enabled <br />Value: 0|
|
||||||
| Turn off background synchronization for feeds and Web Slices | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Feeds<br/>REG_DWORD: BackgroundSyncStatus <br/>Value: 0|
|
| Turn off background synchronization for feeds and Web Slices | HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Internet Explorer\\Feeds<br/>REG_DWORD: BackgroundSyncStatus <br/>Value: 0|
|
||||||
|
| Turn off Online Tips | HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer<br/>REG_DWORD: AllowOnlineTips <br/>Value: 0|
|
||||||
|
|
||||||
|
1. HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer!AllowOnlineTips, 0, Null, Fail
|
||||||
|
|
||||||
|
|
||||||
To turn off the home page, enable the Group Policy: **User Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Disable changing home page settings**, and set it to **about:blank**.
|
To turn off the home page, enable the Group Policy: **User Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer** > **Disable changing home page settings**, and set it to **about:blank**.
|
||||||
|
|
||||||
@ -590,13 +596,15 @@ To turn off the Windows Mail app:
|
|||||||
|
|
||||||
### <a href="" id="bkmk-microsoft-account"></a>11. Microsoft Account
|
### <a href="" id="bkmk-microsoft-account"></a>11. Microsoft Account
|
||||||
|
|
||||||
To prevent communication to the Microsoft Account cloud authentication service. Many apps and system components that depend on Microsoft Account authentication may lose functionality. Some of them could be in unexpected ways.
|
To prevent communication to the Microsoft Account cloud authentication service. Many apps and system components that depend on Microsoft Account authentication may lose functionality. Some of them could be in unexpected ways. For example, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
||||||
|
|
||||||
- Apply the Group Policy: **Computer Configuration** > **Windows Settings** > **Security Settings** > **Local Policies** > **Security Options** > **Accounts: Block Microsoft Accounts** and set it to **Users can't add Microsoft accounts**.
|
- Apply the Group Policy: **Computer Configuration** > **Windows Settings** > **Security Settings** > **Local Policies** > **Security Options** > **Accounts: Block Microsoft Accounts** and set it to **Users can't add Microsoft accounts**.
|
||||||
|
|
||||||
-or-
|
-or-
|
||||||
|
|
||||||
- Create a REG\_DWORD registry setting named **NoConnectedUser** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System** with a value of 3.
|
- Create a REG\_DWORD registry setting named **NoConnectedUser** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System** with a value of 3.
|
||||||
|
|
||||||
|
|
||||||
To disable the Microsoft Account Sign-In Assistant:
|
To disable the Microsoft Account Sign-In Assistant:
|
||||||
|
|
||||||
- Apply the Accounts/AllowMicrosoftAccountSignInAssistant MDM policy from the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where 0 is turned off and 1 is turned on.
|
- Apply the Accounts/AllowMicrosoftAccountSignInAssistant MDM policy from the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where 0 is turned off and 1 is turned on.
|
||||||
@ -623,8 +631,7 @@ Find the Microsoft Edge Group Policy objects under **Computer Configuration** &g
|
|||||||
| Configure Windows Defender SmartScreen (Windows 10, version 1703) | Choose whether Windows Defender SmartScreen is turned on or off. <br /> Default: Enabled |
|
| Configure Windows Defender SmartScreen (Windows 10, version 1703) | Choose whether Windows Defender SmartScreen is turned on or off. <br /> Default: Enabled |
|
||||||
| Allow web content on New Tab page | Choose whether a new tab page appears. <br /> Default: Enabled |
|
| Allow web content on New Tab page | Choose whether a new tab page appears. <br /> Default: Enabled |
|
||||||
| Configure Start pages | Choose the Start page for domain-joined devices. <br /> Set this to **\<about:blank\>** |
|
| Configure Start pages | Choose the Start page for domain-joined devices. <br /> Set this to **\<about:blank\>** |
|
||||||
| Prevent the First Run webpage from opening on Microsoft Edge | Choose whether employees see the First Run webpage. <br /> Default: Disabled |
|
| Prevent the First Run webpage from opening on Microsoft Edge | Choose whether employees see the First Run webpage. <br /> Set to: Enable |
|
||||||
|
|
||||||
|
|
||||||
The Windows 10, version 1511 Microsoft Edge Group Policy names are:
|
The Windows 10, version 1511 Microsoft Edge Group Policy names are:
|
||||||
|
|
||||||
@ -652,6 +659,7 @@ Alternatively, you can configure the Microsoft Group Policies using the followin
|
|||||||
| Configure Windows Defender SmartScreen Filter (Windows 10, version 1703) | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\PhishingFilter<br/>REG_DWORD name: EnabledV9 <br/>Value: 0 |
|
| Configure Windows Defender SmartScreen Filter (Windows 10, version 1703) | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\PhishingFilter<br/>REG_DWORD name: EnabledV9 <br/>Value: 0 |
|
||||||
| Allow web content on New Tab page | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\SearchScopes<br/>REG_DWORD name: AllowWebContentOnNewTabPage <br/>Value: 0 |
|
| Allow web content on New Tab page | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\SearchScopes<br/>REG_DWORD name: AllowWebContentOnNewTabPage <br/>Value: 0 |
|
||||||
| Configure corporate Home pages | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\ServiceUI<br/>REG_DWORD name: ProvisionedHomePages <br/>Value: 0|
|
| Configure corporate Home pages | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\ServiceUI<br/>REG_DWORD name: ProvisionedHomePages <br/>Value: 0|
|
||||||
|
| Prevent the First Run webpage from opening on Microsoft Edge | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main <br>REG_DWORD name: PreventFirstRunPage <br/>Value: 1|
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-edge-mdm"></a>12.2 Microsoft Edge MDM policies
|
### <a href="" id="bkmk-edge-mdm"></a>12.2 Microsoft Edge MDM policies
|
||||||
@ -700,6 +708,10 @@ You can turn off the ability to download and update offline maps.
|
|||||||
|
|
||||||
- Create a REG\_DWORD registry setting named **AutoDownloadAndUpdateMapData** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Maps** with a value of 0 (zero).
|
- Create a REG\_DWORD registry setting named **AutoDownloadAndUpdateMapData** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Maps** with a value of 0 (zero).
|
||||||
|
|
||||||
|
-or-
|
||||||
|
|
||||||
|
- In Windows 10, version 1607 and later, apply the Maps/EnableOfflineMapsAutoUpdate MDM policy from the [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-maps#maps-enableofflinemapsautoupdate) with a value of 0.
|
||||||
|
|
||||||
-and-
|
-and-
|
||||||
|
|
||||||
- In Windows 10, version 1607 and later, apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Maps** > **Turn off unsolicited network traffic on the Offline Maps settings page**
|
- In Windows 10, version 1607 and later, apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Maps** > **Turn off unsolicited network traffic on the Offline Maps settings page**
|
||||||
@ -708,6 +720,10 @@ You can turn off the ability to download and update offline maps.
|
|||||||
|
|
||||||
- Create a REG\_DWORD registry setting named **AllowUntriggeredNetworkTrafficOnSettingsPage** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Maps** with a value of 0 (zero).
|
- Create a REG\_DWORD registry setting named **AllowUntriggeredNetworkTrafficOnSettingsPage** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Maps** with a value of 0 (zero).
|
||||||
|
|
||||||
|
-or-
|
||||||
|
|
||||||
|
- In Windows 10, version 1703 and later, apply the Settings/PageVisibilityList MDM policy from the [Policy CSP](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-settings#settings-pagevisibilitylist) with a value of "hide:maps;maps-downloadmaps".
|
||||||
|
|
||||||
### <a href="" id="bkmk-onedrive"></a>15. OneDrive
|
### <a href="" id="bkmk-onedrive"></a>15. OneDrive
|
||||||
|
|
||||||
To turn off OneDrive in your organization:
|
To turn off OneDrive in your organization:
|
||||||
@ -720,6 +736,10 @@ To turn off OneDrive in your organization:
|
|||||||
|
|
||||||
-and-
|
-and-
|
||||||
|
|
||||||
|
- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **OneDrive** > **Prevent OneDrive from generating network traffic until the user signs in to OneDrive (Enable)**
|
||||||
|
|
||||||
|
-or-
|
||||||
|
|
||||||
- Create a REG\_DWORD registry setting named **PreventNetworkTrafficPreUserSignIn** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\OneDrive** with a value of 1 (one).
|
- Create a REG\_DWORD registry setting named **PreventNetworkTrafficPreUserSignIn** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\OneDrive** with a value of 1 (one).
|
||||||
|
|
||||||
### <a href="" id="bkmk-preinstalledapps"></a>16. Preinstalled apps
|
### <a href="" id="bkmk-preinstalledapps"></a>16. Preinstalled apps
|
||||||
@ -1388,6 +1408,16 @@ To turn off **Choose apps that can read or send messages**:
|
|||||||
|
|
||||||
- Turn off the feature in the UI for each app.
|
- Turn off the feature in the UI for each app.
|
||||||
|
|
||||||
|
**To turn off Message Sync**
|
||||||
|
|
||||||
|
- Create a REG\_DWORD registry setting named **AllowMessageSync** in **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\Messaging and set the value to 0.
|
||||||
|
|
||||||
|
-or-
|
||||||
|
|
||||||
|
- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Messaging**
|
||||||
|
|
||||||
|
- Set the **Allow Message Service Cloud** to **Disable**.
|
||||||
|
|
||||||
### <a href="" id="bkmk-priv-phone-calls"></a>17.13 Phone calls
|
### <a href="" id="bkmk-priv-phone-calls"></a>17.13 Phone calls
|
||||||
|
|
||||||
In the **Phone calls** area, you can choose which apps can make phone calls.
|
In the **Phone calls** area, you can choose which apps can make phone calls.
|
||||||
@ -1707,8 +1737,11 @@ The Windows activation status will be valid for a rolling period of 180 days wit
|
|||||||
Enterprise customers can manage updates to the Disk Failure Prediction Model.
|
Enterprise customers can manage updates to the Disk Failure Prediction Model.
|
||||||
|
|
||||||
For Windows 10:
|
For Windows 10:
|
||||||
|
- Disable this Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Storage Health** > **Allow downloading updates to the Disk Failure Prediction Model**
|
||||||
|
|
||||||
- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Storage Health** > **Allow downloading updates to the Disk Failure Prediction Model**
|
-or-
|
||||||
|
|
||||||
|
- Create a REG\_DWORD registry setting named **AllowDiskHealthModelUpdates** in **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\StorageHealth** with a value of 0.
|
||||||
|
|
||||||
### <a href="" id="bkmk-syncsettings"></a>20. Sync your settings
|
### <a href="" id="bkmk-syncsettings"></a>20. Sync your settings
|
||||||
|
|
||||||
@ -1738,7 +1771,8 @@ You can control if your settings are synchronized:
|
|||||||
|
|
||||||
To turn off Messaging cloud sync:
|
To turn off Messaging cloud sync:
|
||||||
|
|
||||||
- Create a REG\_DWORD registry setting named **CloudServiceSyncEnabled** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\Messaging** with a value of 0 (zero).
|
- Set the Group Policy Allow Message Service Cloud to Disable. The Group Policy path is Computer Configuration\Administrative templates\Windows Components\Messaging\Allow Message Service Cloud
|
||||||
|
- Create a REG\_DWORD registry setting named **CloudServiceSyncEnabled** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\Messaging** with a value of 0 (zero).
|
||||||
|
|
||||||
### <a href="" id="bkmk-teredo"></a>21. Teredo
|
### <a href="" id="bkmk-teredo"></a>21. Teredo
|
||||||
|
|
||||||
@ -1909,6 +1943,16 @@ If you're running Windows 10, version 1607 or later, you only need to enable the
|
|||||||
|
|
||||||
- Create a new REG\_DWORD registry setting named **DisableWindowsSpotlightFeatures** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Policies\\Microsoft\\Windows\\CloudContent** with a value of 1 (one).
|
- Create a new REG\_DWORD registry setting named **DisableWindowsSpotlightFeatures** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Policies\\Microsoft\\Windows\\CloudContent** with a value of 1 (one).
|
||||||
|
|
||||||
|
|
||||||
|
-and-
|
||||||
|
|
||||||
|
|
||||||
|
- **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Personalization** > **Do not display the Lock Screen**
|
||||||
|
|
||||||
|
-or-
|
||||||
|
|
||||||
|
- Create a new REG\_DWORD registry setting named **NoLockScreen** in **HKEY\Local\Machine\\SOFTWARE\\Policies\\Microsoft\\Windows\\Personalization** with a value of 1 (one).
|
||||||
|
|
||||||
If you're not running Windows 10, version 1607 or later, you can use the other options in this section.
|
If you're not running Windows 10, version 1607 or later, you can use the other options in this section.
|
||||||
|
|
||||||
- Configure the following in **Settings**:
|
- Configure the following in **Settings**:
|
||||||
@ -1932,7 +1976,7 @@ If you're not running Windows 10, version 1607 or later, you can use the other o
|
|||||||
- Set the **Turn off fun facts, tips, tricks, and more on lock screen** check box.
|
- Set the **Turn off fun facts, tips, tricks, and more on lock screen** check box.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This will only take effect if the policy is applied before the first logon. If you cannot apply the **Force a specific default lock screen image** policy before the first logon to the device, you can apply this policy: **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Personalization** > **Do not display the lock screen**. Alternatively, you can create a new REG\_SZ registry setting nameed **LockScreenImage** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Personalization** with a value of **C:\\windows\\web\\screen\\lockscreen.jpg** and create a new REG\_DWORD registry setting named **LockScreenOverlaysDisabled** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Personalization** with a value of 1 (one).
|
> This will only take effect if the policy is applied before the first logon. If you cannot apply the **Force a specific default lock screen image** policy before the first logon to the device, you can apply this policy: **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Personalization** > **Do not display the lock screen**. Alternatively, you can create a new REG\_SZ registry setting named **LockScreenImage** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Personalization** with a value of **C:\\windows\\web\\screen\\lockscreen.jpg** and create a new REG\_DWORD registry setting named **LockScreenOverlaysDisabled** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Personalization** with a value of 1 (one).
|
||||||
|
|
||||||
|
|
||||||
- **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Cloud Content** > **Do not show Windows tips**.
|
- **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Cloud Content** > **Do not show Windows tips**.
|
||||||
@ -1947,6 +1991,13 @@ If you're not running Windows 10, version 1607 or later, you can use the other o
|
|||||||
|
|
||||||
- Create a new REG\_DWORD registry setting named **DisableWindowsConsumerFeatures** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\CloudContent** with a value of 1 (one).
|
- Create a new REG\_DWORD registry setting named **DisableWindowsConsumerFeatures** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\CloudContent** with a value of 1 (one).
|
||||||
|
|
||||||
|
- This policy setting controls whether the lock screen appears for users. The Do not display the lock screen Group Policy should be set to Enable to prevent the lock screen from being displayed. The Group Computer Configuration\Administrative templates\Control Panel\Personalization!Do not display the lock screen.
|
||||||
|
|
||||||
|
- If you enable this policy setting, users that are not required to press CTRL + ALT + DEL before signing in will see their selected tile after locking their PC.
|
||||||
|
|
||||||
|
- If you disable or do not configure this policy setting, users that are not required to press CTRL + ALT + DEL before signing in will see a lock screen after locking their PC. They must dismiss the lock screen using touch, the keyboard, or by dragging it with the mouse.
|
||||||
|
|
||||||
|
|
||||||
For more info, see [Windows Spotlight on the lock screen](/windows/configuration/windows-spotlight).
|
For more info, see [Windows Spotlight on the lock screen](/windows/configuration/windows-spotlight).
|
||||||
|
|
||||||
### <a href="" id="bkmk-windowsstore"></a>26. Microsoft Store
|
### <a href="" id="bkmk-windowsstore"></a>26. Microsoft Store
|
||||||
@ -1996,13 +2047,13 @@ You can find the Delivery Optimization Group Policy objects under **Computer Con
|
|||||||
|
|
||||||
| Policy | Description |
|
| Policy | Description |
|
||||||
|---------------------------|-----------------------------------------------------------------------------------------------------|
|
|---------------------------|-----------------------------------------------------------------------------------------------------|
|
||||||
| Download Mode | Lets you choose where Delivery Optimization gets or sends updates and apps, including <ul><li><p><strong>None</strong>. Turns off Delivery Optimization.</p></li><li><p><strong>Group</strong>. Gets or sends updates and apps to PCs on the same local network domain.</p></li><li><p><strong>Internet</strong>. Gets or sends updates and apps to PCs on the Internet.</p></li><li><p><strong>LAN</strong>. Gets or sends updates and apps to PCs on the same NAT only.</p></li><li><p><strong>Simple</strong>. Simple download mode with no peering.</p></li><li><p><strong>Bypass</strong>. Use BITS instead of Windows Update Delivery Optimization.</p></li></ul>|
|
| Download Mode | Lets you choose where Delivery Optimization gets or sends updates and apps, including <ul><li><p><strong>None</strong>. Turns off Delivery Optimization.</p></li><li><p><strong>Group</strong>. Gets or sends updates and apps to PCs on the same local network domain.</p></li><li><p><strong>Internet</strong>. Gets or sends updates and apps to PCs on the Internet.</p></li><li><p><strong>LAN</strong>. Gets or sends updates and apps to PCs on the same NAT only.</p></li><li><p><strong>Simple</strong>. Simple download mode with no peering.</p></li><li><p><strong>Bypass</strong>. Use BITS instead of Windows Update Delivery Optimization.Set to Bypass to restrict traffic.</p></li></ul>|
|
||||||
| Group ID | Lets you provide a Group ID that limits which PCs can share apps and updates. <br /> **Note:** This ID must be a GUID.|
|
| Group ID | Lets you provide a Group ID that limits which PCs can share apps and updates. <br /> **Note:** This ID must be a GUID.|
|
||||||
| Max Cache Age | Lets you specify the maximum time (in seconds) that a file is held in the Delivery Optimization cache. <br /> The default value is 259200 seconds (3 days).|
|
| Max Cache Age | Lets you specify the maximum time (in seconds) that a file is held in the Delivery Optimization cache. <br /> The default value is 259200 seconds (3 days).|
|
||||||
| Max Cache Size | Lets you specify the maximum cache size as a percentage of disk size. <br /> The default value is 20, which represents 20% of the disk.|
|
| Max Cache Size | Lets you specify the maximum cache size as a percentage of disk size. <br /> The default value is 20, which represents 20% of the disk.|
|
||||||
| Max Upload Bandwidth | Lets you specify the maximum upload bandwidth (in KB/second) that a device uses across all concurrent upload activity. <br /> The default value is 0, which means unlimited possible bandwidth.|
|
| Max Upload Bandwidth | Lets you specify the maximum upload bandwidth (in KB/second) that a device uses across all concurrent upload activity. <br /> The default value is 0, which means unlimited possible bandwidth.|
|
||||||
|
|
||||||
You can also set the **Download Mode** policy by creating a new REG\_DWORD registry setting named **DODownloadMode** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\DeliveryOptimization** with a value of 100 (one hundred).
|
Set the Delivery Optimization Group Policy to "Bypass" to prevent traffic. Alternatively, you can set the **Download Mode** policy by creating a new REG\_DWORD registry setting named **DODownloadMode** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\DeliveryOptimization** to a value of 100 (one hundred).
|
||||||
|
|
||||||
### <a href="" id="bkmk-wudo-mdm"></a>27.3 Delivery Optimization MDM policies
|
### <a href="" id="bkmk-wudo-mdm"></a>27.3 Delivery Optimization MDM policies
|
||||||
|
|
||||||
@ -2010,7 +2061,7 @@ The following Delivery Optimization MDM policies are available in the [Policy CS
|
|||||||
|
|
||||||
| Policy | Description |
|
| Policy | Description |
|
||||||
|---------------------------|-----------------------------------------------------------------------------------------------------|
|
|---------------------------|-----------------------------------------------------------------------------------------------------|
|
||||||
| DeliveryOptimization/DODownloadMode | Lets you choose where Delivery Optimization gets or sends updates and apps, including <ul><li><p><strong>0</strong>. Turns off Delivery Optimization.</p></li><li><p><strong>1</strong>. Gets or sends updates and apps to PCs on the same NAT only.</p></li><li><p><strong>2</strong>. Gets or sends updates and apps to PCs on the same local network domain.</p></li><li><p><strong>3</strong>. Gets or sends updates and apps to PCs on the Internet.</p></li><li><p><strong>99</strong>. Simple download mode with no peering.</p></li><li><p><strong>100</strong>. Use BITS instead of Windows Update Delivery Optimization.</p></li></ul>|
|
| DeliveryOptimization/DODownloadMode | Lets you choose where Delivery Optimization gets or sends updates and apps, including <ul><li><p><strong>0</strong>. Turns off Delivery Optimization.</p></li><li><p><strong>1</strong>. Gets or sends updates and apps to PCs on the same NAT only.</p></li><li><p><strong>2</strong>. Gets or sends updates and apps to PCs on the same local network domain.</p></li><li><p><strong>3</strong>. Gets or sends updates and apps to PCs on the Internet.</p></li><li><p><strong>99</strong>. Simple download mode with no peering.</p></li><li><p><strong>100</strong>. Use BITS instead of Windows Update Delivery Optimization.</p></li></ul>|
|
||||||
| DeliveryOptimization/DOGroupID | Lets you provide a Group ID that limits which PCs can share apps and updates. <br /> **Note** This ID must be a GUID.|
|
| DeliveryOptimization/DOGroupID | Lets you provide a Group ID that limits which PCs can share apps and updates. <br /> **Note** This ID must be a GUID.|
|
||||||
| DeliveryOptimization/DOMaxCacheAge | Lets you specify the maximum time (in seconds) that a file is held in the Delivery Optimization cache. <br /> The default value is 259200 seconds (3 days).|
|
| DeliveryOptimization/DOMaxCacheAge | Lets you specify the maximum time (in seconds) that a file is held in the Delivery Optimization cache. <br /> The default value is 259200 seconds (3 days).|
|
||||||
| DeliveryOptimization/DOMaxCacheSize | Lets you specify the maximum cache size as a percentage of disk size. <br /> The default value is 20, which represents 20% of the disk.|
|
| DeliveryOptimization/DOMaxCacheSize | Lets you specify the maximum cache size as a percentage of disk size. <br /> The default value is 20, which represents 20% of the disk.|
|
||||||
@ -2080,4 +2131,23 @@ You can turn off automatic updates by doing one of the following. This is not re
|
|||||||
|
|
||||||
- **5**. Turn off automatic updates.
|
- **5**. Turn off automatic updates.
|
||||||
|
|
||||||
|
|
||||||
|
### <a href="" id="bkmk-licmgr"></a>29. License Manager
|
||||||
|
|
||||||
|
You can turn off License Manager related traffic by setting the following registry entry:
|
||||||
|
|
||||||
|
- Add a REG\_DWORD value named **Start** to **HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Services\\LicenseManager** and set the value to 4
|
||||||
|
|
||||||
|
- The value 4 is to disable the service. Here are the available options to set the registry:
|
||||||
|
|
||||||
|
- **0x00000000** = Boot
|
||||||
|
|
||||||
|
- **0x00000001** = System
|
||||||
|
|
||||||
|
- **0x00000002** = Automatic
|
||||||
|
|
||||||
|
- **0x00000003** = Manual
|
||||||
|
|
||||||
|
- **0x00000004** = Disabled
|
||||||
|
|
||||||
To learn more, see [Device update management](https://msdn.microsoft.com/library/windows/hardware/dn957432.aspx) and [Configure Automatic Updates by using Group Policy](https://technet.microsoft.com/library/cc720539.aspx).
|
To learn more, see [Device update management](https://msdn.microsoft.com/library/windows/hardware/dn957432.aspx) and [Configure Automatic Updates by using Group Policy](https://technet.microsoft.com/library/cc720539.aspx).
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Connection endpoints for Windows 10, version 1803
|
title: Connection endpoints for Windows 10, version 1809
|
||||||
description: Explains what Windows 10 endpoints are used for, how to turn off traffic to them, and the impact.
|
description: Explains what Windows 10 endpoints are used for, how to turn off traffic to them, and the impact.
|
||||||
keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016
|
keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -511,13 +511,15 @@ If you disable this endpoint, Windows Defender won't be able to update its malwa
|
|||||||
|
|
||||||
## Other Windows 10 editions
|
## Other Windows 10 editions
|
||||||
|
|
||||||
To view endpoints for other versions of Windows 10 enterprise, see:
|
To view endpoints for other versions of Windows 10 Enterprise, see:
|
||||||
- [Manage connection endpoints for Windows 10, version 1709](manage-windows-1709-endpoints.md)
|
|
||||||
- [Manage connection endpoints for Windows 10, version 1803](manage-windows-1803-endpoints.md)
|
- [Manage connection endpoints for Windows 10, version 1803](manage-windows-1803-endpoints.md)
|
||||||
|
- [Manage connection endpoints for Windows 10, version 1709](manage-windows-1709-endpoints.md)
|
||||||
|
|
||||||
To view endpoints for non-Enterprise Windows 10 editions, see:
|
To view endpoints for non-Enterprise Windows 10 editions, see:
|
||||||
- [Windows 10, version 1709, connection endpoints for non-Enterprise editions](windows-endpoints-1709-non-enterprise-editions.md)
|
- [Windows 10, version 1809, connection endpoints for non-Enterprise editions](windows-endpoints-1809-non-enterprise-editions.md)
|
||||||
- [Windows 10, version 1803, connection endpoints for non-Enterprise editions](windows-endpoints-1803-non-enterprise-editions.md)
|
- [Windows 10, version 1803, connection endpoints for non-Enterprise editions](windows-endpoints-1803-non-enterprise-editions.md)
|
||||||
|
- [Windows 10, version 1709, connection endpoints for non-Enterprise editions](windows-endpoints-1709-non-enterprise-editions.md)
|
||||||
|
|
||||||
|
|
||||||
## Related links
|
## Related links
|
||||||
|
|
||||||
|
@ -81,7 +81,7 @@ Device Registration is a prerequisite to Windows Hello for Business provisioning
|
|||||||
|C | For the federated environments, the computer authenticates the enterprise device registration endpoint using Windows integrated authentication. The enterprise device registration service creates and returns a token that includes claims for the object GUID, computer SID, and domain joined state. The task submits the token and claims to Azure Active Directory where it is validated. Azure Active Directory returns an ID token to the running task.
|
|C | For the federated environments, the computer authenticates the enterprise device registration endpoint using Windows integrated authentication. The enterprise device registration service creates and returns a token that includes claims for the object GUID, computer SID, and domain joined state. The task submits the token and claims to Azure Active Directory where it is validated. Azure Active Directory returns an ID token to the running task.
|
||||||
|D | The application creates TPM bound (preferred) RSA 2048 bit key-pair known as the device key (dkpub/dkpriv). The application create a certificate request using dkpub and the public key and signs the certificate request with using dkpriv. Next, the application derives second key pair from the TPM's storage root key. This is the transport key (tkpub/tkpriv).|
|
|D | The application creates TPM bound (preferred) RSA 2048 bit key-pair known as the device key (dkpub/dkpriv). The application create a certificate request using dkpub and the public key and signs the certificate request with using dkpriv. Next, the application derives second key pair from the TPM's storage root key. This is the transport key (tkpub/tkpriv).|
|
||||||
|E | To provide SSO for on-premises federated application, the task requests an enterprise PRT from the on-premises STS. Windows Server 2016 running the Active Directory Federation Services role validate the request and return it the running task.|
|
|E | To provide SSO for on-premises federated application, the task requests an enterprise PRT from the on-premises STS. Windows Server 2016 running the Active Directory Federation Services role validate the request and return it the running task.|
|
||||||
|F | The task sends a device registration request to Azure DRS that includes the ID token, certificate request, tkpub, and attestation data. Azure DRS validates the ID token, creates a device ID, and creates a certificate based on the included certificate request. Azure DRS then writes a device object in Azure Active Directory and sends the device ID and the device certificate to the client. Device registration completes by receiving the device ID and the device certificate from Azure DRS. The device ID is saved for future reference (viewable from dsregcmd.exe /status), and the device certificate is installed in the Personal store of the computer. With device registration complete, the task exits.|
|
|F | The task sends a device registration request to Azure DRS that includes the ID token, certificate request, tkpub, and attestation data. Azure DRS validates the ID token, creates a device ID, and creates a certificate based on the included certificate request. Azure DRS then writes a device object in Azure Active Directory and sends the device ID and the device certificate to the client. Device registration completes by receiving the device ID and the device certificate from Azure DRS. The device ID is saved for future reference (viewable from dsregcmd.exe /status), and the device certificate is installed in the Personal store of the computer. With device registration complete, the task exits.|
|
||||||
|G |If device write-back is enabled, on it's next synchronization cycle, Azure AD Connect requests updates from Azure Active Directory. Azure Active Directory correlates the device object with a matching synchronized computer object. Azure AD Connect receives the device object that includes the object GUID and computer SID and writes the device object to Active Directory.|
|
|G | If Azure AD Connect device write-back is enabled, Azure AD Connect requests updates from Azure Active Directory at its next synchronization cycle (device write-back is required for hybrid deployment using certificate trust). Azure Active Directory correlates the device object with a matching synchronized computer object. Azure AD Connect receives the device object that includes the object GUID and computer SID and writes the device object to Active Directory.|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-and-Device-Registration)
|
[Return to top](#Windows-Hello-for-Business-and-Device-Registration)
|
@ -22,11 +22,12 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong,
|
|||||||
|
|
||||||
[Azure AD joined provisioning in a Managed environment](#Azure-AD-joined-provisioning-in-a-Managed-environment)<br>
|
[Azure AD joined provisioning in a Managed environment](#Azure-AD-joined-provisioning-in-a-Managed-environment)<br>
|
||||||
[Azure AD joined provisioning in a Federated environment](#Azure-AD-joined-provisioning-in-a-Federated-environment)<br>
|
[Azure AD joined provisioning in a Federated environment](#Azure-AD-joined-provisioning-in-a-Federated-environment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a Key Trust deployment](#Hybrid-Azure-AD-joined-provisioning-in-a-Key-Trust-deployment)<br>
|
[Hybrid Azure AD joined provisioning in a Key Trust deployment in a Managed envrionment](#Hybrid-Azure-AD-joined-provisioning-in-a-Key-Trust-deployment-in-a-Managed-envrionment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a Certificate Trust deployment](#Hybrid-Azure-AD-joined-provisioning-in-a-Certificate-Trust-deployment)<br>
|
[Hybrid Azure AD joined provisioning in a Certificate Trust deployment in a Managed environment](#Hybrid-Azure-AD-joined-provisioning-in-a-Certificate-Trust-deployment-in-a-Managed-environment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment](#Hybrid-Azure-AD-joined-provisioning-in-a-synchronous-Certificate-Trust-deployment)<br>
|
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Managed environment](#Hybrid-Azure-AD-joined-provisioning-in-a-synchronous-Certificate-Trust-deployment-in-a-Managed-environment)<br>
|
||||||
[Domain joined provisioning in an On-premises Key Trust deployment](#Domain-joined-provisioning-in-an-Onpremises-Key-Trust-deployment)<br>
|
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Federated environment](#Hybrid-Azure-AD-joined-provisioning-in-a-synchronous-Certificate-Trust-deployment-in-a-Federated-environment)<br>
|
||||||
[Domain joined provisioning in an On-premises Certificate Trust deployment](#Domain-joined-provisioning-in-an-Onpremises-Certificate-Trust-deployment)<br>
|
[Domain joined provisioning in an On-premises Key Trust deployment](#Domain-joined-provisioning-in-an-On-premises-Key-Trust-deployment)<br>
|
||||||
|
[Domain joined provisioning in an On-premises Certificate Trust deployment](#Domain-joined-provisioning-in-an-On-premises-Certificate-Trust-deployment)<br>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -85,7 +86,7 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong,
|
|||||||
|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-Provisioning)
|
[Return to top](#Windows-Hello-for-Business-Provisioning)
|
||||||
## Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Managed environmnet
|
## Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Managed environment
|
||||||

|

|
||||||
|
|
||||||
| Phase | Description |
|
| Phase | Description |
|
||||||
@ -140,6 +141,6 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong,
|
|||||||
|D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.<br> The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.<br> After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentailsLink for a list of registered public keys.|
|
|D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.<br> The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.<br> After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentailsLink for a list of registered public keys.|
|
||||||
|E | The registration authority validates the public key in the certificate request matches a registered key for the user.<br> After validating the public key, the registration authority signs the certificate request using its enrollment agent certificate.|
|
|E | The registration authority validates the public key in the certificate request matches a registered key for the user.<br> After validating the public key, the registration authority signs the certificate request using its enrollment agent certificate.|
|
||||||
|F |The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application.|
|
|F |The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application.|
|
||||||
|G | The application receives the newly issued certificate and installs the it into the Personal store of the user. This signals the end of provisioning.|
|
|G | The application receives the newly issued certificate and installs it into the Personal store of the user. This signals the end of provisioning.|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-Provisioning)
|
[Return to top](#Windows-Hello-for-Business-Provisioning)
|
@ -37,7 +37,7 @@ Domain controllers automatically request a certificate from the *Domain Controll
|
|||||||
|
|
||||||
To continue automatic enrollment and renewal of domain controller certificates that understand newer certificate template and superseded certificate template configurations, create and configure a Group Policy object for automatic certificate enrollment and link the Group Policy object to the Domain Controllers OU.
|
To continue automatic enrollment and renewal of domain controller certificates that understand newer certificate template and superseded certificate template configurations, create and configure a Group Policy object for automatic certificate enrollment and link the Group Policy object to the Domain Controllers OU.
|
||||||
|
|
||||||
#### Create a Domain Controller Automatic Certifiacte Enrollment Group Policy object
|
#### Create a Domain Controller Automatic Certificate Enrollment Group Policy object
|
||||||
|
|
||||||
Sign-in a domain controller or management workstations with _Domain Admin_ equivalent credentials.
|
Sign-in a domain controller or management workstations with _Domain Admin_ equivalent credentials.
|
||||||
|
|
||||||
|
@ -197,8 +197,7 @@ Sign-in a domain controller or management workstation with _Domain Admin_ equiva
|
|||||||
4. Click the **Members** tab and click **Add…**
|
4. Click the **Members** tab and click **Add…**
|
||||||
5. In the **Enter the object names to select** text box, type **adfssvc**. Click **OK**.
|
5. In the **Enter the object names to select** text box, type **adfssvc**. Click **OK**.
|
||||||
6. Click **OK** to return to **Active Directory Users and Computers**.
|
6. Click **OK** to return to **Active Directory Users and Computers**.
|
||||||
7. Click **OK** to return to **Active Directory Users and Computers**.
|
7. Change to server hosting the AD FS role and restart it.
|
||||||
8. Change to server hosting the AD FS role and restart it.
|
|
||||||
|
|
||||||
|
|
||||||
## Configure the Device Registration Service
|
## Configure the Device Registration Service
|
||||||
|
@ -38,7 +38,7 @@ A lab or proof-of-concept environment does not need high-availability or scalabi
|
|||||||
Please follow [Download the Azure Multi-Factor Authentication Server](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-server#download-the-azure-multi-factor-authentication-server) to download Azure MFA server.
|
Please follow [Download the Azure Multi-Factor Authentication Server](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-server#download-the-azure-multi-factor-authentication-server) to download Azure MFA server.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Make sure to validate the requirements for Azure MFA server, as outlined in [Install and Configure the Azure Multi-Factor Authentication Server](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-server#install-and-configure-the-azure-multi-factor-authentication-server) before proceeding. Do not use instllation instructions provided in the article.
|
>Make sure to validate the requirements for Azure MFA server, as outlined in [Install and Configure the Azure Multi-Factor Authentication Server](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication-get-started-server#install-and-configure-the-azure-multi-factor-authentication-server) before proceeding. Do not use installation instructions provided in the article.
|
||||||
|
|
||||||
Once you have validated all the requirements, please proceed to [Configure or Deploy Multifactor Authentication Services](hello-key-trust-deploy-mfa.md).
|
Once you have validated all the requirements, please proceed to [Configure or Deploy Multifactor Authentication Services](hello-key-trust-deploy-mfa.md).
|
||||||
|
|
||||||
|
@ -64,7 +64,7 @@ Sign-in to a certificate authority or management workstations with _Domain Admin
|
|||||||
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2008 R2** from the **Certification Authority** list. Select **Windows 7.Server 2008 R2** from the **Certification Recipient** list.
|
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2008 R2** from the **Certification Authority** list. Select **Windows 7.Server 2008 R2** from the **Certification Recipient** list.
|
||||||
5. On the **General** tab, type **Domain Controller Authentication (Kerberos)** in Template display name. Adjust the validity and renewal period to meet your enterprise’s needs.
|
5. On the **General** tab, type **Domain Controller Authentication (Kerberos)** in Template display name. Adjust the validity and renewal period to meet your enterprise’s needs.
|
||||||
**Note**If you use different template names, you’ll need to remember and substitute these names in different portions of the lab.
|
**Note**If you use different template names, you’ll need to remember and substitute these names in different portions of the lab.
|
||||||
6. On the **Subject** tab, select the **Build from this Active Directory information** button if it is not already selected. Select **None** from the **Subject name format** list. Select **DNS name** from the **Include this information in alternate subject** list. Clear all other items.
|
6. On the **Subject Name** tab, select the **Build from this Active Directory information** button if it is not already selected. Select **None** from the **Subject name format** list. Select **DNS name** from the **Include this information in alternate subject** list. Clear all other items.
|
||||||
7. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list. Click **OK**.
|
7. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list. Click **OK**.
|
||||||
8. Close the console.
|
8. Close the console.
|
||||||
|
|
||||||
|
@ -9,12 +9,11 @@ ms.pagetype: security, mobile
|
|||||||
author: mikestephens-MS
|
author: mikestephens-MS
|
||||||
ms.author: mstephen
|
ms.author: mstephen
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.date: 05/05/2018
|
|
||||||
---
|
---
|
||||||
# Windows Hello for Business Overview
|
# Windows Hello for Business Overview
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN.
|
In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN.
|
||||||
|
|
||||||
|
@ -0,0 +1,35 @@
|
|||||||
|
---
|
||||||
|
title: Reset-security-key
|
||||||
|
description: Windows 10 enables users to sign in to their device using a security key. How to reset a security key
|
||||||
|
keywords: FIDO2, security key, CTAP, Microsoft-compatible security key
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
author: aabhathipsay
|
||||||
|
ms.author: aathipsa
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.date: 11/14/2018
|
||||||
|
---
|
||||||
|
# How to reset a Microsoft-compatible security key?
|
||||||
|
> [!Warning]
|
||||||
|
> Some information relates to pre-released product that may change before it is commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>This operation will wipe everything from your security key and reset it to factory defaults.</br> **All data and credentials will be cleared.**
|
||||||
|
|
||||||
|
|
||||||
|
A [Microsoft-compatible security key](https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key) can be reset via Settings app ( Settings > Accounts > Sign-in options > Security key ).
|
||||||
|
</br>
|
||||||
|
Follow the instructions in the Settings app and look for specific instructions based on your security key manufacturer below:
|
||||||
|
|
||||||
|
|
||||||
|
|Security key manufacturer</br> | Reset instructions </br> |
|
||||||
|
| --- | --- |
|
||||||
|
|Yubico | **USB:** Remove and re-insert the security key. When the LED on the security key begins flashing, touch the metal contact <br> **NFC:** Tap the security key on the reader <br>|
|
||||||
|
|Feitian | Touch the blinking fingerprint sensor twice to reset the key|
|
||||||
|
|HID | Tap the card on the reader twice to reset it |
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The steps to reset your security key may vary based on the security key manufacturer.</br>
|
||||||
|
>If your security key is not listed here, please reach out to your security key manufacturer for reset instructions.
|
@ -40,8 +40,8 @@
|
|||||||
#### [Create a WIP policy with MAM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-mam-intune-azure.md)
|
#### [Create a WIP policy with MAM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-mam-intune-azure.md)
|
||||||
### [Create a WIP policy using System Center Configuration Manager](windows-information-protection\overview-create-wip-policy-sccm.md)
|
### [Create a WIP policy using System Center Configuration Manager](windows-information-protection\overview-create-wip-policy-sccm.md)
|
||||||
#### [Create and deploy a WIP policy using System Center Configuration Manager](windows-information-protection\create-wip-policy-using-sccm.md)
|
#### [Create and deploy a WIP policy using System Center Configuration Manager](windows-information-protection\create-wip-policy-using-sccm.md)
|
||||||
### [Create and verify an EFS Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md)
|
#### [Create and verify an EFS Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md)
|
||||||
### [Determine the Enterprise Context of an app running in WIP](windows-information-protection\wip-app-enterprise-context.md)
|
#### [Determine the Enterprise Context of an app running in WIP](windows-information-protection\wip-app-enterprise-context.md)
|
||||||
### [Mandatory tasks and settings required to turn on WIP](windows-information-protection\mandatory-settings-for-wip.md)
|
### [Mandatory tasks and settings required to turn on WIP](windows-information-protection\mandatory-settings-for-wip.md)
|
||||||
### [Testing scenarios for WIP](windows-information-protection\testing-scenarios-for-wip.md)
|
### [Testing scenarios for WIP](windows-information-protection\testing-scenarios-for-wip.md)
|
||||||
### [Limitations while using WIP](windows-information-protection\limitations-with-wip.md)
|
### [Limitations while using WIP](windows-information-protection\limitations-with-wip.md)
|
||||||
|
@ -1,31 +1,23 @@
|
|||||||
---
|
---
|
||||||
title: BitLocker How to deploy on Windows Server 2012 and later (Windows 10)
|
title: BitLocker How to deploy on Windows Server 2012 and later
|
||||||
description: This topic for the IT professional explains how to deploy BitLocker and Windows Server 2012 and later.
|
description: This topic for the IT professional explains how to deploy BitLocker and Windows Server 2012 and later
|
||||||
ms.assetid: 91c18e9e-6ab4-4607-8c75-d983bbe2542f
|
ms.assetid: 91c18e9e-6ab4-4607-8c75-d983bbe2542f
|
||||||
ms.prod: w10
|
ms.prod: windows-server-threshold
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
ms.date: 04/19/2017
|
ms.date: 02/04/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# BitLocker: How to deploy on Windows Server 2012 and later
|
# BitLocker: How to deploy on Windows Server 2012 and later
|
||||||
|
|
||||||
**Applies to**
|
> Applies to: Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019
|
||||||
- Windows 10
|
|
||||||
|
|
||||||
This topic for the IT professional explains how to deploy BitLocker on Windows Server 2012 and later.
|
This topic for the IT professional explains how to deploy BitLocker on Windows Server 2012 and later. For all Windows Server editions, BitLocker can be installed using Server Manager or Windows PowerShell cmdlets. BitLocker requires administrator privileges on the server to install.
|
||||||
|
|
||||||
For all Windows Server editions, BitLocker must be installed using Server Manager. However, you can still provision BitLocker before the server operating system is installed as part of your deployment.
|
|
||||||
|
|
||||||
## <a href="" id="installing-bitlocker-"></a>Installing BitLocker
|
## <a href="" id="installing-bitlocker-"></a>Installing BitLocker
|
||||||
|
|
||||||
BitLocker requires administrator privileges on the server to install. You can install BitLocker either by using Server Manager or Windows PowerShell cmdlets.
|
|
||||||
|
|
||||||
- To install BitLocker using Server Manager
|
|
||||||
- To install BitLocker using Windows PowerShell
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-blinstallsrvmgr"></a>To install BitLocker using Server Manager
|
### <a href="" id="bkmk-blinstallsrvmgr"></a>To install BitLocker using Server Manager
|
||||||
|
|
||||||
1. Open Server Manager by selecting the Server Manager icon or running servermanager.exe.
|
1. Open Server Manager by selecting the Server Manager icon or running servermanager.exe.
|
||||||
|
@ -8,7 +8,7 @@ ms.mktglfcycl: explore
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.author: justinha
|
ms.author: justinha
|
||||||
ms.date: 11/08/2018
|
ms.date: 02/11/2019
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -24,6 +24,9 @@ With the increase of employee-owned devices in the enterprise, there’s also an
|
|||||||
|
|
||||||
Windows Information Protection (WIP), previously known as enterprise data protection (EDP), helps to protect against this potential data leakage without otherwise interfering with the employee experience. WIP also helps to protect enterprise apps and data against accidental data leak on enterprise-owned devices and personal devices that employees bring to work without requiring changes to your environment or other apps. Finally, another data protection technology, Azure Rights Management also works alongside WIP to extend data protection for data that leaves the device, such as when email attachments are sent from an enterprise aware version of a rights management mail client.
|
Windows Information Protection (WIP), previously known as enterprise data protection (EDP), helps to protect against this potential data leakage without otherwise interfering with the employee experience. WIP also helps to protect enterprise apps and data against accidental data leak on enterprise-owned devices and personal devices that employees bring to work without requiring changes to your environment or other apps. Finally, another data protection technology, Azure Rights Management also works alongside WIP to extend data protection for data that leaves the device, such as when email attachments are sent from an enterprise aware version of a rights management mail client.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>While WIP can stop accidental data leaks from honest employees, it is not intended to stop malicious insiders from removing enterprise data. For more details about the benefits WIP provides, see [Why use WIP?](#why-use-wip) later in this topic.
|
||||||
|
|
||||||
## Video: Protect enterprise data from being accidentally copied to the wrong place
|
## Video: Protect enterprise data from being accidentally copied to the wrong place
|
||||||
|
|
||||||
> [!Video https://www.microsoft.com/en-us/videoplayer/embed/RE2IGhh]
|
> [!Video https://www.microsoft.com/en-us/videoplayer/embed/RE2IGhh]
|
||||||
@ -73,28 +76,28 @@ WIP provides:
|
|||||||
- Integration with your existing management system (Microsoft Intune, System Center Configuration Manager, or your current mobile device management (MDM) system) to configure, deploy, and manage WIP for your company.
|
- Integration with your existing management system (Microsoft Intune, System Center Configuration Manager, or your current mobile device management (MDM) system) to configure, deploy, and manage WIP for your company.
|
||||||
|
|
||||||
## Why use WIP?
|
## Why use WIP?
|
||||||
WIP gives you a new way to manage data policy enforcement for apps and documents, along with the ability to remove access to enterprise data from both enterprise and personal devices (after enrollment in an enterprise management solution, like Intune).
|
WIP is the mobile application management (MAM) mechanism on Windows 10. WIP gives you a new way to manage data policy enforcement for apps and documents on Windows 10 desktop operating systems, along with the ability to remove access to enterprise data from both enterprise and personal devices (after enrollment in an enterprise management solution, like Intune).
|
||||||
|
|
||||||
- **Change the way you think about data policy enforcement.** As an enterprise admin, you need to maintain compliance in your data policy and data access. WIP helps make sure that your enterprise data is protected on both corporate and employee-owned devices, even when the employee isn’t using the device. When employees create content on an enterprise-protected device, they can choose to save it as a work document. If it's a work document, it becomes locally-maintained as enterprise data.
|
- **Change the way you think about data policy enforcement.** As an enterprise admin, you need to maintain compliance in your data policy and data access. WIP helps protect enterprise on both corporate and employee-owned devices, even when the employee isn’t using the device. When employees create content on an enterprise-protected device, they can choose to save it as a work document. If it's a work document, it becomes locally-maintained as enterprise data.
|
||||||
|
|
||||||
- **Manage your enterprise documents, apps, and encryption modes.**
|
- **Manage your enterprise documents, apps, and encryption modes.**
|
||||||
|
|
||||||
- **Copying or downloading enterprise data.** When an employee or an app downloads content from a location like SharePoint, a network share, or an enterprise web location, while using a WIP-protected device, WIP encrypts the data on the device.
|
- **Copying or downloading enterprise data.** When an employee or an app downloads content from a location like SharePoint, a network share, or an enterprise web location, while using a WIP-protected device, WIP encrypts the data on the device.
|
||||||
|
|
||||||
- **Using allowed apps.** Managed apps (apps that you've included on the **Protected apps** list in your WIP policy) are allowed to access your enterprise data and will interact differently when used with unallowed, non-enterprise aware, or personal-only apps. For example, if WIP management is set to **Block**, your employees can copy and paste from one protected app to another allowed app, but not to personal apps. Imagine an HR person wants to copy a job description from an allowed app to the internal career website, an enterprise-protected location, but goofs and tries to paste into a personal app instead. The paste action fails and a notification pops up, saying that the app couldn’t paste because of a policy restriction. The HR person then correctly pastes to the career website without a problem.
|
- **Using protected apps.** Managed apps (apps that you've included on the **Protected apps** list in your WIP policy) are allowed to access your enterprise data and will interact differently when used with unallowed, non-enterprise aware, or personal-only apps. For example, if WIP management is set to **Block**, your employees can copy and paste from one protected app to another protected app, but not to personal apps. Imagine an HR person wants to copy a job description from a protected app to the internal career website, an enterprise-protected location, but goofs and tries to paste into a personal app instead. The paste action fails and a notification pops up, saying that the app couldn’t paste because of a policy restriction. The HR person then correctly pastes to the career website without a problem.
|
||||||
|
|
||||||
- **Managed apps and restrictions.** With WIP you can control which apps can access and use your enterprise data. After adding an app to your allowed apps list, the app is trusted with enterprise data. All apps not on this list are stopped from accessing your enterprise data, depending on your WIP management-mode.
|
- **Managed apps and restrictions.** With WIP you can control which apps can access and use your enterprise data. After adding an app to your protected apps list, the app is trusted with enterprise data. All apps not on this list are stopped from accessing your enterprise data, depending on your WIP management-mode.
|
||||||
|
|
||||||
You don’t have to modify line-of-business apps that never touch personal data to list them as allowed apps; just include them in the allowed apps list.
|
You don’t have to modify line-of-business apps that never touch personal data to list them as protected apps; just include them in the protected apps list.
|
||||||
|
|
||||||
- **Deciding your level of data access.** WIP lets you block, allow overrides, or audit employees' data sharing actions. Hiding overrides stops the action immediately. Allowing overrides lets the employee know there's a risk, but lets him or her continue to share the data while recording and auditing the action. Silent just logs the action without stopping anything that the employee could've overridden while using that setting; collecting info that can help you to see patterns of inappropriate sharing so you can take educative action or find apps that should be added to your allowed apps list. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).
|
- **Deciding your level of data access.** WIP lets you block, allow overrides, or audit employees' data sharing actions. Hiding overrides stops the action immediately. Allowing overrides lets the employee know there's a risk, but lets him or her continue to share the data while recording and auditing the action. Silent just logs the action without stopping anything that the employee could've overridden while using that setting; collecting info that can help you to see patterns of inappropriate sharing so you can take educative action or find apps that should be added to your protected apps list. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).
|
||||||
|
|
||||||
|
|
||||||
- **Data encryption at rest.** WIP helps protect enterprise data on local files and on removable media.
|
- **Data encryption at rest.** WIP helps protect enterprise data on local files and on removable media.
|
||||||
|
|
||||||
Apps such as Microsoft Word work with WIP to help continue your data protection across local files and removable media. These apps are being referred to as, enterprise aware. For example, if an employee opens WIP-encrypted content from Word, edits the content, and then tries to save the edited version with a different name, Word automatically applies WIP to the new document.
|
Apps such as Microsoft Word work with WIP to help continue your data protection across local files and removable media. These apps are being referred to as, enterprise aware. For example, if an employee opens WIP-encrypted content from Word, edits the content, and then tries to save the edited version with a different name, Word automatically applies WIP to the new document.
|
||||||
|
|
||||||
- **Helping prevent accidental data disclosure to public spaces.** WIP helps protect your enterprise data from being accidentally shared to public spaces, such as public cloud storage. For example, if Dropbox™ isn’t on your allowed apps list, employees won’t be able to sync encrypted files to their personal cloud storage. Instead, if the employee stores the content to an app on your allowed apps list, like Microsoft OneDrive for Business, the encrypted files can sync freely to the business cloud, while maintaining the encryption locally.
|
- **Helping prevent accidental data disclosure to public spaces.** WIP helps protect your enterprise data from being accidentally shared to public spaces, such as public cloud storage. For example, if Dropbox™ isn’t on your protected apps list, employees won’t be able to sync encrypted files to their personal cloud storage. Instead, if the employee stores the content to an app on your protected apps list, like Microsoft OneDrive for Business, the encrypted files can sync freely to the business cloud, while maintaining the encryption locally.
|
||||||
|
|
||||||
- **Helping prevent accidental data disclosure to removable media.** WIP helps prevent enterprise data from leaking when it's copied or transferred to removable media. For example, if an employee puts enterprise data on a Universal Serial Bus (USB) drive that also has personal data, the enterprise data remains encrypted while the personal data doesn’t.
|
- **Helping prevent accidental data disclosure to removable media.** WIP helps prevent enterprise data from leaking when it's copied or transferred to removable media. For example, if an employee puts enterprise data on a Universal Serial Bus (USB) drive that also has personal data, the enterprise data remains encrypted while the personal data doesn’t.
|
||||||
|
|
||||||
@ -120,14 +123,14 @@ WIP currently addresses these enterprise scenarios:
|
|||||||
|
|
||||||
- You can remotely wipe enterprise data off managed computers, including employee-owned computers, without affecting the personal data.
|
- You can remotely wipe enterprise data off managed computers, including employee-owned computers, without affecting the personal data.
|
||||||
|
|
||||||
- You can select specific apps that can access enterprise data, called "allowed apps" that are clearly recognizable to employees. You can also stop non-protected apps from accessing enterprise data.
|
- You can protect specific apps that can access enterprise data that are clearly recognizable to employees. You can also stop non-protected apps from accessing enterprise data.
|
||||||
|
|
||||||
- Your employees won't have their work otherwise interrupted while switching between personal and enterprise apps while the enterprise policies are in place. Switching environments or signing in multiple times isn’t required.
|
- Your employees won't have their work otherwise interrupted while switching between personal and enterprise apps while the enterprise policies are in place. Switching environments or signing in multiple times isn’t required.
|
||||||
|
|
||||||
### <a href="" id="bkmk-modes"></a>WIP-protection modes
|
### <a href="" id="bkmk-modes"></a>WIP-protection modes
|
||||||
Enterprise data is automatically encrypted after it’s loaded on a device from an enterprise source or if an employee marks the data as corporate. Then, when the enterprise data is written to disk, WIP uses the Windows-provided Encrypting File System (EFS) to protect it and associate it with your enterprise identity.
|
Enterprise data is automatically encrypted after it’s loaded on a device from an enterprise source or if an employee marks the data as corporate. Then, when the enterprise data is written to disk, WIP uses the Windows-provided Encrypting File System (EFS) to protect it and associate it with your enterprise identity.
|
||||||
|
|
||||||
Your WIP policy includes a list of trusted apps that are allowed to access and process corporate data. This list of apps is implemented through the [AppLocker](/windows/device-security/applocker/applocker-overview) functionality, controlling what apps are allowed to run and letting the Windows operating system know that the apps can edit corporate data. Apps included on this list don’t have to be modified to open corporate data because their presence on the list allows Windows to determine whether to grant them access. However, new for Windows 10, app developers can use a new set of application programming interfaces (APIs) to create *enlightened* apps that can use and edit both enterprise and personal data. A huge benefit to working with enlightened apps is that dual-use apps, like Microsoft Word, can be used with less concern about encrypting personal data by mistake because the APIs allow the app to determine whether data is owned by the enterprise or if it’s personally owned.
|
Your WIP policy includes a list of trusted apps that are protected to access and process corporate data. This list of apps is implemented through the [AppLocker](/windows/device-security/applocker/applocker-overview) functionality, controlling what apps are allowed to run and letting the Windows operating system know that the apps can edit corporate data. Apps included on this list don’t have to be modified to open corporate data because their presence on the list allows Windows to determine whether to grant them access. However, new for Windows 10, app developers can use a new set of application programming interfaces (APIs) to create *enlightened* apps that can use and edit both enterprise and personal data. A huge benefit to working with enlightened apps is that dual-use apps, like Microsoft Word, can be used with less concern about encrypting personal data by mistake because the APIs allow the app to determine whether data is owned by the enterprise or if it’s personally owned.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).
|
>For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).
|
||||||
|
@ -7,7 +7,7 @@ ms.mktglfcycl: explore
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.author: justinha
|
ms.author: justinha
|
||||||
ms.date: 10/18/2018
|
ms.date: 02/11/2019
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -33,6 +33,9 @@ This table includes the recommended URLs to add to your Enterprise Cloud Resourc
|
|||||||
|Visual Studio Online |contoso.visualstudio.com |
|
|Visual Studio Online |contoso.visualstudio.com |
|
||||||
|Power BI |contoso.powerbi.com |
|
|Power BI |contoso.powerbi.com |
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>You can add other work-only apps to the Cloud Resource list, or you can create a packaged app rule for the .exe file to protect every file the app creates or modifies. Depending on how the app is accessed, you might want to add both.
|
||||||
|
|
||||||
## Recommended Neutral Resources
|
## Recommended Neutral Resources
|
||||||
We recommended adding these URLs if you use the Neutral Resources network setting with Windows Information Protection (WIP).
|
We recommended adding these URLs if you use the Neutral Resources network setting with Windows Information Protection (WIP).
|
||||||
<ul>
|
<ul>
|
||||||
|
@ -7,7 +7,7 @@ ms.mktglfcycl: explore
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.author: justinha
|
ms.author: justinha
|
||||||
ms.date: 05/30/2018
|
ms.date: 02/07/2019
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -25,7 +25,7 @@ Because Outlook on the web can be used both personally and as part of your organ
|
|||||||
|-------|-------------|
|
|-------|-------------|
|
||||||
|Disable Outlook on the web. Employees can only use Microsoft Outlook 2016 or the Mail for Windows 10 app. | Disabled. |
|
|Disable Outlook on the web. Employees can only use Microsoft Outlook 2016 or the Mail for Windows 10 app. | Disabled. |
|
||||||
|Don't configure outlook.office.com in any of your networking settings. |All mailboxes are automatically marked as personal. This means employees attempting to copy work content into Outlook on the web receive prompts and that files downloaded from Outlook on the web aren't automatically protected as corporate data. |
|
|Don't configure outlook.office.com in any of your networking settings. |All mailboxes are automatically marked as personal. This means employees attempting to copy work content into Outlook on the web receive prompts and that files downloaded from Outlook on the web aren't automatically protected as corporate data. |
|
||||||
|Add outlook.office.com to the Cloud resources network element in your WIP policy. |All mailboxes are automatically marked as corporate. This means any personal inboxes hosted on Office 365 are also automatically marked as corporate data. |
|
|Add outlook.office.com and outlook.office365.com to the Cloud resources network element in your WIP policy. |All mailboxes are automatically marked as corporate. This means any personal inboxes hosted on Office 365 are also automatically marked as corporate data. |
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>These limitations don’t apply to Outlook 2016, the Mail for Windows 10 app, or the Calendar for Windows 10 app. These apps will work properly, marking an employee’s mailbox as corporate data, regardless of how you’ve configured outlook.office.com in your network settings.
|
>These limitations don’t apply to Outlook 2016, the Mail for Windows 10 app, or the Calendar for Windows 10 app. These apps will work properly, marking an employee’s mailbox as corporate data, regardless of how you’ve configured outlook.office.com in your network settings.
|
||||||
|
@ -8,7 +8,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: justinha
|
ms.author: justinha
|
||||||
author: justinha
|
author: justinha
|
||||||
ms.date: 12/20/2018
|
ms.date: 02/06/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to control USB devices and other removable media using Windows Defender ATP
|
# How to control USB devices and other removable media using Windows Defender ATP
|
||||||
@ -167,10 +167,9 @@ Allowing installation of specific devices requires also enabling [DeviceInstalla
|
|||||||
|
|
||||||
### Prevent installation of specifically prohibited peripherals
|
### Prevent installation of specifically prohibited peripherals
|
||||||
|
|
||||||
Windows Defender ATP also blocks installation and usage of prohibited peripherals with a custom profile in Intune.
|
Windows Defender ATP also blocks installation and usage of prohibited peripherals either by using **Administrative Templates** or [Device Installation CSP settings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation) with a custom profile in Intune.
|
||||||
For example, this custom profile blocks installation and usage of USB devices with hardware IDs "USBSTOR\DiskVendorCo" and "USBSTOR\DiskSanDisk_Cruzer_Glide_3.0", and applies to USB devices with matching hardware IDs that are already installed.
|
|
||||||
|
|
||||||

|
For more information about using **Administrative Templates**, see [Windows 10 templates to configure Group Policy settings in Microsoft Intune](https://docs.microsoft.com/intune/administrative-templates-windows).
|
||||||
|
|
||||||
For a SyncML example that prevents installation of specific device IDs, see [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventinstallationofmatchingdeviceids). To prevent specific device classes, see [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventinstallationofmatchingdevicesetupclasses).
|
For a SyncML example that prevents installation of specific device IDs, see [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventinstallationofmatchingdeviceids). To prevent specific device classes, see [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventinstallationofmatchingdevicesetupclasses).
|
||||||
|
|
||||||
|
@ -145,7 +145,7 @@ Advertisements shown to you must:
|
|||||||
|
|
||||||
#### Consumer opinion
|
#### Consumer opinion
|
||||||
|
|
||||||
Microsoft maintains a worldwide network of analysts and intelligence systems where you can [submit software for analysis](https://www.microsoft.com/wdsi/filesubmission). Your participation helps us identify new malware quickly. After analysis, Microsoft creates definitions for software that meets the described criteria. These definitions identify the software as malware and are available to all users through Windows Defender Antivirus and other Microsoft antimalware solutions.
|
Microsoft maintains a worldwide network of analysts and intelligence systems where you can [submit software for analysis](https://www.microsoft.com/wdsi/filesubmission). Your participation helps us identify new malware quickly. After analysis, Microsoft creates Security intelligence for software that meets the described criteria. This Security intelligence identifies the software as malware and are available to all users through Windows Defender Antivirus and other Microsoft antimalware solutions.
|
||||||
|
|
||||||
## Potentially unwanted application (PUA)
|
## Potentially unwanted application (PUA)
|
||||||
|
|
||||||
|
@ -20,6 +20,6 @@ Learn about the common questions we receive from software developers and get oth
|
|||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[Software developer FAQ](developer-faq.md) | Provides answers to common questions we receive from software developers.
|
[Software developer FAQ](developer-faq.md) | Provides answers to common questions we receive from software developers.
|
||||||
[Developer resources](developer-resources.md) | Provides information about how to submit files, detection criteria, and how to check your software against the latest definitions and cloud protection from Microsoft.
|
[Developer resources](developer-resources.md) | Provides information about how to submit files, detection criteria, and how to check your software against the latest Security intelligence and cloud protection from Microsoft.
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Software developer resources
|
title: Software developer resources
|
||||||
description: This page provides information for developers such as detection criteria, developer questions, and how to check your software against definitions.
|
description: This page provides information for developers such as detection criteria, developer questions, and how to check your software against Security intelligence.
|
||||||
keywords: wdsi, software, developer, resources, detection, criteria, questions, scan, software, definitions, cloud, protection
|
keywords: wdsi, software, developer, resources, detection, criteria, questions, scan, software, definitions, cloud, protection, security intelligence
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -34,4 +34,4 @@ Find more guidance about the file submission and detection dispute process in ou
|
|||||||
|
|
||||||
### Scan your software
|
### Scan your software
|
||||||
|
|
||||||
Use [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10?ocid=cx-docs-avreports) to check your software against the latest definitions and cloud protection from Microsoft.
|
Use [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10?ocid=cx-docs-avreports) to check your software against the latest Security intelligence and cloud protection from Microsoft.
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How Microsoft identifies malware and potentially unwanted applications
|
title: How Microsoft identifies malware and potentially unwanted applications
|
||||||
description: Learn how to submit files to Microsoft for malware analysis, how to track your submissions, and dispute detections.
|
description: Learn how to submit files to Microsoft for malware analysis, how to track your submissions, and dispute detections.
|
||||||
keywords: security, sample submission help, malware file, virus file, trojan file, submit, send to Microsoft, submit a sample, virus, trojan, worm, undetected, doesn’t detect, email microsoft, email malware, I think this is malware, I think it's a virus, where can I send a virus, is this a virus, MSE, doesn’t detect, no signature, no detection, suspect file, MMPC, Microsoft Malware Protection Center, researchers, analyst, WDSI
|
keywords: security, sample submission help, malware file, virus file, trojan file, submit, send to Microsoft, submit a sample, virus, trojan, worm, undetected, doesn’t detect, email microsoft, email malware, I think this is malware, I think it's a virus, where can I send a virus, is this a virus, MSE, doesn’t detect, no signature, no detection, suspect file, MMPC, Microsoft Malware Protection Center, researchers, analyst, WDSI, security intelligence
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: secure
|
ms.mktglfcycl: secure
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -34,7 +34,7 @@ Your organization must meet the following eligibility requirements to participat
|
|||||||
1. Offer an antimalware or antivirus product that is one of the following:
|
1. Offer an antimalware or antivirus product that is one of the following:
|
||||||
|
|
||||||
* Your organization's own creation.
|
* Your organization's own creation.
|
||||||
* Licensed from another organization, but your organization adds value such as additional definitions to its signatures.
|
* Licensed from another organization, but your organization adds value such as additional Security intelligence.
|
||||||
* Developed by using an SDK (engine and other components) from another MVI Partner AM company and your organization adds a custom UI and/or other functionality (white box versions).
|
* Developed by using an SDK (engine and other components) from another MVI Partner AM company and your organization adds a custom UI and/or other functionality (white box versions).
|
||||||
|
|
||||||
2. Have your own malware research team unless you distribute a Whitebox product.
|
2. Have your own malware research team unless you distribute a Whitebox product.
|
||||||
|
@ -42,14 +42,14 @@ Command | Description
|
|||||||
\-Trace [-Grouping #] [-Level #] | Starts diagnostic tracing
|
\-Trace [-Grouping #] [-Level #] | Starts diagnostic tracing
|
||||||
\-GetFiles | Collects support information
|
\-GetFiles | Collects support information
|
||||||
\-GetFilesDiagTrack | Same as Getfiles but outputs to temporary DiagTrack folder
|
\-GetFilesDiagTrack | Same as Getfiles but outputs to temporary DiagTrack folder
|
||||||
\-RemoveDefinitions [-All] | Restores the installed signature definitions to a previous backup copy or to the original default set of signatures
|
\-RemoveDefinitions [-All] | Restores the installed Security intelligence to a previous backup copy or to the original default set
|
||||||
\-RemoveDefinitions [-DynamicSignatures] | Removes only the dynamically downloaded signatures
|
\-RemoveDefinitions [-DynamicSignatures] | Removes only the dynamically downloaded Security intelligence
|
||||||
\-RemoveDefinitions [-Engine] | Restores the previous installed engine
|
\-RemoveDefinitions [-Engine] | Restores the previous installed engine
|
||||||
\-SignatureUpdate [-UNC \| -MMPC] | Checks for new definition updates
|
\-SignatureUpdate [-UNC \| -MMPC] | Checks for new Security intelligence updates
|
||||||
\-Restore [-ListAll \| [[-Name <name>] [-All] \| [-FilePath <filePath>]] [-Path <path>]] | Restores or lists quarantined item(s)
|
\-Restore [-ListAll \| [[-Name <name>] [-All] \| [-FilePath <filePath>]] [-Path <path>]] | Restores or lists quarantined item(s)
|
||||||
\-AddDynamicSignature [-Path] | Loads a dynamic signature
|
\-AddDynamicSignature [-Path] | Loads dynamic Security intelligence
|
||||||
\-ListAllDynamicSignatures | Lists the loaded dynamic signatures
|
\-ListAllDynamicSignatures | Lists the loaded dynamic Security intelligence
|
||||||
\-RemoveDynamicSignature [-SignatureSetID] | Removes a dynamic signature
|
\-RemoveDynamicSignature [-SignatureSetID] | Removes dynamic Security intelligence
|
||||||
\-CheckExclusion -path <path> | Checks whether a path is excluded
|
\-CheckExclusion -path <path> | Checks whether a path is excluded
|
||||||
|
|
||||||
|
|
||||||
|
@ -38,7 +38,7 @@ See the Enterprise Mobility and Security blog post [Important changes to Microso
|
|||||||
The Windows Defender Antivirus cloud service provides fast, strong protection for your endpoints. Enabling the cloud-delivered protection service is optional, however it is highly recommended because it provides very important protection against malware on your endpoints and across your network.
|
The Windows Defender Antivirus cloud service provides fast, strong protection for your endpoints. Enabling the cloud-delivered protection service is optional, however it is highly recommended because it provides very important protection against malware on your endpoints and across your network.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional signature updates.
|
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
||||||
|
|
||||||
See [Enable cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) for details on enabling the service with Intune, System Center Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
See [Enable cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) for details on enabling the service with Intune, System Center Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
||||||
|
|
||||||
@ -70,7 +70,7 @@ The following table lists the services and their associated URLs that your netwo
|
|||||||
Microsoft Update Service (MU)
|
Microsoft Update Service (MU)
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
Signature and product updates
|
Security intelligence and product updates
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
*.update.microsoft.com
|
*.update.microsoft.com
|
||||||
@ -78,10 +78,10 @@ Signature and product updates
|
|||||||
</tr>
|
</tr>
|
||||||
<tr style="vertical-align:top">
|
<tr style="vertical-align:top">
|
||||||
<td>
|
<td>
|
||||||
Definition updates alternate download location (ADL)
|
Security intelligence updates alternate download location (ADL)
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
Alternate location for Windows Defender Antivirus definition updates if the installed definitions fall out of date (7 or more days behind)
|
Alternate location for Windows Defender Antivirus Security intelligence updates if the installed Security intelligence falls out of date (7 or more days behind)
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
*.download.microsoft.com
|
*.download.microsoft.com
|
||||||
|
@ -38,7 +38,7 @@ Windows Defender Antivirus uses the Deployment Image Servicing and Management (D
|
|||||||
|
|
||||||
## Opt out of automatic exclusions
|
## Opt out of automatic exclusions
|
||||||
|
|
||||||
In Windows Server 2016, the predefined exclusions delivered by definition updates only exclude the default paths for a role or feature. If you installed a role or feature in a custom path, or you want to manually control the set of exclusions, you need to opt out of the automatic exclusions delivered in definition updates.
|
In Windows Server 2016, the predefined exclusions delivered by Security intelligence updates only exclude the default paths for a role or feature. If you installed a role or feature in a custom path, or you want to manually control the set of exclusions, you need to opt out of the automatic exclusions delivered in Security intelligence updates.
|
||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Opting out of automatic exclusions may adversely impact performance, or result in data corruption. The exclusions that are delivered automatically are optimized for Windows Server 2016 roles.
|
> Opting out of automatic exclusions may adversely impact performance, or result in data corruption. The exclusions that are delivered automatically are optimized for Windows Server 2016 roles.
|
||||||
|
@ -78,5 +78,5 @@ Microsoft Azure|Deploy Microsoft Antimalware for Azure in the [Azure portal, by
|
|||||||
Topic | Description
|
Topic | Description
|
||||||
---|---
|
---|---
|
||||||
[Deploy and enable Windows Defender Antivirus protection](deploy-windows-defender-antivirus.md) | While the client is installed as a core part of Windows 10, and traditional deployment does not apply, you will still need to enable the client on your endpoints with System Center Configuration Manager, Microsoft Intune, or Group Policy Objects.
|
[Deploy and enable Windows Defender Antivirus protection](deploy-windows-defender-antivirus.md) | While the client is installed as a core part of Windows 10, and traditional deployment does not apply, you will still need to enable the client on your endpoints with System Center Configuration Manager, Microsoft Intune, or Group Policy Objects.
|
||||||
[Manage Windows Defender Antivirus updates and apply baselines](manage-updates-baselines-windows-defender-antivirus.md) | There are two parts to updating Windows Defender Antivirus: updating the client on endpoints (product updates), and updating definitions (protection updates). You can update definitions in a number of ways, using System Center Configuration Manager, Group Policy, PowerShell, and WMI.
|
[Manage Windows Defender Antivirus updates and apply baselines](manage-updates-baselines-windows-defender-antivirus.md) | There are two parts to updating Windows Defender Antivirus: updating the client on endpoints (product updates), and updating Security intelligence (protection updates). You can update Security intelligence in a number of ways, using System Center Configuration Manager, Group Policy, PowerShell, and WMI.
|
||||||
[Monitor and report on Windows Defender Antivirus protection](report-monitor-windows-defender-antivirus.md) | You can use Microsoft Intune, System Center Configuration Manager, the Update Compliance add-in for Microsoft Operations Management Suite, or a third-party SIEM product (by consuming Windows event logs) to monitor protection status and create reports about endpoint protection.
|
[Monitor and report on Windows Defender Antivirus protection](report-monitor-windows-defender-antivirus.md) | You can use Microsoft Intune, System Center Configuration Manager, the Update Compliance add-in for Microsoft Operations Management Suite, or a third-party SIEM product (by consuming Windows event logs) to monitor protection status and create reports about endpoint protection.
|
||||||
|
@ -116,7 +116,7 @@ How you manage your VDI will affect the performance impact of Windows Defender A
|
|||||||
|
|
||||||
Because Windows Defender Antivirus downloads protection updates every day, or [based on your protection update settings](manage-protection-updates-windows-defender-antivirus.md), network bandwidth can be a problem if multiple VMs attempt to download updates at the same time.
|
Because Windows Defender Antivirus downloads protection updates every day, or [based on your protection update settings](manage-protection-updates-windows-defender-antivirus.md), network bandwidth can be a problem if multiple VMs attempt to download updates at the same time.
|
||||||
|
|
||||||
Following the guidelines in this means the VMs will only need to download “delta” updates, which are the differences between an existing definition set and the next one. Delta updates are typically much smaller (a few kilobytes) than a full definition download (which can average around 150 mb).
|
Following the guidelines in this means the VMs will only need to download “delta” updates, which are the differences between an existing Security intelligence set and the next one. Delta updates are typically much smaller (a few kilobytes) than a full Security intelligence download (which can average around 150 mb).
|
||||||
|
|
||||||
### Manage updates for persistent VDIs
|
### Manage updates for persistent VDIs
|
||||||
|
|
||||||
@ -160,7 +160,7 @@ These settings can be configured as part of creating your base image, or as a da
|
|||||||
|
|
||||||
### Randomize scheduled scans
|
### Randomize scheduled scans
|
||||||
|
|
||||||
Windows Defender Antivirus supports the randomization of scheduled scans and signature updates. This can be extremely helpful in reducing boot storms (especially when used in conjunction with [Disable scans from occurring after every update](#disable-scans-after-an-update) and [Scan out-of-date machines or machines that have been offline for a while](#scan-vms-that-have-been-offline).
|
Windows Defender Antivirus supports the randomization of scheduled scans and Security intelligence updates. This can be extremely helpful in reducing boot storms (especially when used in conjunction with [Disable scans from occurring after every update](#disable-scans-after-an-update) and [Scan out-of-date machines or machines that have been offline for a while](#scan-vms-that-have-been-offline).
|
||||||
|
|
||||||
Scheduled scans run in addition to [real-time protection and scanning](configure-real-time-protection-windows-defender-antivirus.md).
|
Scheduled scans run in addition to [real-time protection and scanning](configure-real-time-protection-windows-defender-antivirus.md).
|
||||||
|
|
||||||
@ -178,7 +178,7 @@ The start time of the scan itself is still based on the scheduled scan policy
|
|||||||
|
|
||||||
4. Expand the tree to **Windows components > Windows Defender** and configure the following setting:
|
4. Expand the tree to **Windows components > Windows Defender** and configure the following setting:
|
||||||
|
|
||||||
- Double-click **Randomize scheduled task times** and set the option to **Enabled**. Click **OK**. This adds a true randomization (it is still random if the disk image is replicated) of plus or minus 30 minutes (using all of the intervals) to the start of the scheduled scan and the signature update. For example, if the schedule start time was set at 2.30pm, then enabling this setting could cause one machine to scan and update at 2.33pm and another machine to scan and update at 2.14pm.
|
- Double-click **Randomize scheduled task times** and set the option to **Enabled**. Click **OK**. This adds a true randomization (it is still random if the disk image is replicated) of plus or minus 30 minutes (using all of the intervals) to the start of the scheduled scan and the Security intelligence update. For example, if the schedule start time was set at 2.30pm, then enabling this setting could cause one machine to scan and update at 2.33pm and another machine to scan and update at 2.14pm.
|
||||||
|
|
||||||
**Use Configuration Manager to randomize scheduled scans:**
|
**Use Configuration Manager to randomize scheduled scans:**
|
||||||
|
|
||||||
@ -245,7 +245,7 @@ Sometimes, Windows Defender Antivirus notifications may be sent to or persist ac
|
|||||||
This setting will prevent a scan from occurring after receiving an update. You can apply this when creating the base image if you have also run a quick scan. This prevents the newly updated VM from performing a scan again (as you've already scanned it when you created the base image).
|
This setting will prevent a scan from occurring after receiving an update. You can apply this when creating the base image if you have also run a quick scan. This prevents the newly updated VM from performing a scan again (as you've already scanned it when you created the base image).
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Running scans after an update will help ensure your VMs are protected with the latest definition updates. Disabling this option will reduce the protection level of your VMs and should only be used when first creating or deploying the base image.
|
>Running scans after an update will help ensure your VMs are protected with the latest Security intelligence updates. Disabling this option will reduce the protection level of your VMs and should only be used when first creating or deploying the base image.
|
||||||
|
|
||||||
**Use Group Policy to disable scans after an update:**
|
**Use Group Policy to disable scans after an update:**
|
||||||
|
|
||||||
@ -265,7 +265,7 @@ This setting will prevent a scan from occurring after receiving an update. You c
|
|||||||
|
|
||||||
2. Go to the **Scheduled scans** section and configure the following setting:
|
2. Go to the **Scheduled scans** section and configure the following setting:
|
||||||
|
|
||||||
3. Set **Check for the latest definition updates before running a scan** to **No**. This prevents a scan after an update.
|
3. Set **Check for the latest Security intelligence updates before running a scan** to **No**. This prevents a scan after an update.
|
||||||
|
|
||||||
4. Click **OK**.
|
4. Click **OK**.
|
||||||
|
|
||||||
|
@ -21,7 +21,7 @@ ms.date: 09/03/2018
|
|||||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional signature updates.
|
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
||||||
|
|
||||||
You can enable or disable Windows Defender Antivirus cloud-delivered protection with Microsoft Intune, System Center Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
You can enable or disable Windows Defender Antivirus cloud-delivered protection with Microsoft Intune, System Center Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
||||||
|
|
||||||
|
@ -95,11 +95,11 @@ You can also specify the number of days after which Windows Defender Antivirus p
|
|||||||
|
|
||||||
5. Expand the tree to **Windows components > Windows Defender Antivirus > Signature Updates** and configure the following settings:
|
5. Expand the tree to **Windows components > Windows Defender Antivirus > Signature Updates** and configure the following settings:
|
||||||
|
|
||||||
1. Double-click the **Define the number of days before spyware definitions are considered out of date** setting and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider spyware definitions as out-of-date.
|
1. Double-click **Define the number of days before spyware definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider spyware Security intelligence to be out-of-date.
|
||||||
|
|
||||||
2. Click **OK**.
|
2. Click **OK**.
|
||||||
|
|
||||||
3. Double-click the **Define the number of days before virus definitions are considered out of date** setting and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider virus and other threat definitions as out-of-date.
|
3. Double-click **Define the number of days before virus definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider virus Security intelligence to be out-of-date.
|
||||||
|
|
||||||
4. Click **OK**.
|
4. Click **OK**.
|
||||||
|
|
||||||
|
@ -42,7 +42,7 @@ You can use the following sources:
|
|||||||
- [Windows Server Update Service (WSUS)](https://technet.microsoft.com/windowsserver/bb332157.aspx)
|
- [Windows Server Update Service (WSUS)](https://technet.microsoft.com/windowsserver/bb332157.aspx)
|
||||||
- System Center Configuration Manager
|
- System Center Configuration Manager
|
||||||
- A network file share
|
- A network file share
|
||||||
- The [Microsoft Malware Protection Center definitions page (MMPC)](https://www.microsoft.com/security/portal/definitions/adl.aspx)
|
- The [Microsoft Malware Protection Center Security intelligence page (MMPC)](https://www.microsoft.com/security/portal/definitions/adl.aspx)
|
||||||
|
|
||||||
|
|
||||||
When updates are published, some logic will be applied to minimize the size of the update. In most cases, only the "delta" (or the differences between the latest update and the update that is currently installed on the endpoint) will be downloaded and applied. However, the size of the delta depends on:
|
When updates are published, some logic will be applied to minimize the size of the update. In most cases, only the "delta" (or the differences between the latest update and the update that is currently installed on the endpoint) will be downloaded and applied. However, the size of the delta depends on:
|
||||||
@ -108,7 +108,7 @@ The procedures in this article first describe how to set the order, and then how
|
|||||||
|
|
||||||
**Use Configuration Manager to manage the update location:**
|
**Use Configuration Manager to manage the update location:**
|
||||||
|
|
||||||
See [Configure Definition Updates for Endpoint Protection](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-definition-updates) for details on configuring System Center Configuration Manager (current branch).
|
See [Configure Security intelligence Updates for Endpoint Protection](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-definition-updates) for details on configuring System Center Configuration Manager (current branch).
|
||||||
|
|
||||||
|
|
||||||
**Use PowerShell cmdlets to manage the update location:**
|
**Use PowerShell cmdlets to manage the update location:**
|
||||||
|
@ -28,7 +28,7 @@ You can also apply [Windows security baselines](https://technet.microsoft.com/it
|
|||||||
|
|
||||||
## Protection updates
|
## Protection updates
|
||||||
|
|
||||||
Windows Defender Antivirus uses both [cloud-delivered protection](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) (also called the Microsoft Advanced Protection Service or MAPS) and periodically downloaded protection updates to provide protection. These protection updates are also known as "definitions" or "signature updates".
|
Windows Defender Antivirus uses both [cloud-delivered protection](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) (also called the Microsoft Advanced Protection Service or MAPS) and periodically downloaded protection updates to provide protection. These protection updates are also known as Security intelligence updates.
|
||||||
|
|
||||||
The cloud-delivered protection is always on and requires an active connection to the Internet to function, while the protection updates generally occur once a day (although this can be configured). See the [Utilize Microsoft cloud-provided protection in Windows Defender Antivirus](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) topic for more details about enabling and configuring cloud-provided protection.
|
The cloud-delivered protection is always on and requires an active connection to the Internet to function, while the protection updates generally occur once a day (although this can be configured). See the [Utilize Microsoft cloud-provided protection in Windows Defender Antivirus](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) topic for more details about enabling and configuring cloud-provided protection.
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ Mobile devices and VMs may require additional configuration to ensure performanc
|
|||||||
There are two settings that are particularly useful for these devices:
|
There are two settings that are particularly useful for these devices:
|
||||||
|
|
||||||
- Opt-in to Microsoft Update on mobile computers without a WSUS connection
|
- Opt-in to Microsoft Update on mobile computers without a WSUS connection
|
||||||
- Prevent definition updates when running on battery power
|
- Prevent Security intelligence updates when running on battery power
|
||||||
|
|
||||||
The following topics may also be useful in these situations:
|
The following topics may also be useful in these situations:
|
||||||
- [Configuring scheduled and catch-up scans](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
- [Configuring scheduled and catch-up scans](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
||||||
@ -34,7 +34,7 @@ The following topics may also be useful in these situations:
|
|||||||
|
|
||||||
## Opt-in to Microsoft Update on mobile computers without a WSUS connection
|
## Opt-in to Microsoft Update on mobile computers without a WSUS connection
|
||||||
|
|
||||||
You can use Microsoft Update to keep definitions on mobile devices running Windows Defender Antivirus up to date when they are not connected to the corporate network or don't otherwise have a WSUS connection.
|
You can use Microsoft Update to keep Security intelligence on mobile devices running Windows Defender Antivirus up to date when they are not connected to the corporate network or don't otherwise have a WSUS connection.
|
||||||
|
|
||||||
This means that protection updates can be delivered to devices (via Microsoft Update) even if you have set WSUS to override Microsoft Update.
|
This means that protection updates can be delivered to devices (via Microsoft Update) even if you have set WSUS to override Microsoft Update.
|
||||||
|
|
||||||
@ -69,7 +69,7 @@ You can opt-in to Microsoft Update on the mobile device in one of the following
|
|||||||
2. Click **Advanced** options.
|
2. Click **Advanced** options.
|
||||||
3. Select the checkbox for **Give me updates for other Microsoft products when I update Windows**.
|
3. Select the checkbox for **Give me updates for other Microsoft products when I update Windows**.
|
||||||
|
|
||||||
## Prevent definition updates when running on battery power
|
## Prevent Security intelligence updates when running on battery power
|
||||||
|
|
||||||
You can configure Windows Defender Antivirus to only download protection updates when the PC is connected to a wired power source.
|
You can configure Windows Defender Antivirus to only download protection updates when the PC is connected to a wired power source.
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@
|
|||||||
### [Report on Windows Defender Antivirus protection](report-monitor-windows-defender-antivirus.md)
|
### [Report on Windows Defender Antivirus protection](report-monitor-windows-defender-antivirus.md)
|
||||||
#### [Troubleshoot Windows Defender Antivirus reporting in Update Compliance](troubleshoot-reporting.md)
|
#### [Troubleshoot Windows Defender Antivirus reporting in Update Compliance](troubleshoot-reporting.md)
|
||||||
### [Manage updates and apply baselines](manage-updates-baselines-windows-defender-antivirus.md)
|
### [Manage updates and apply baselines](manage-updates-baselines-windows-defender-antivirus.md)
|
||||||
#### [Manage protection and definition updates](manage-protection-updates-windows-defender-antivirus.md)
|
#### [Manage protection and Security intelligence updates](manage-protection-updates-windows-defender-antivirus.md)
|
||||||
#### [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md)
|
#### [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md)
|
||||||
#### [Manage updates for endpoints that are out of date](manage-outdated-endpoints-windows-defender-antivirus.md)
|
#### [Manage updates for endpoints that are out of date](manage-outdated-endpoints-windows-defender-antivirus.md)
|
||||||
#### [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
#### [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
||||||
|
@ -220,7 +220,7 @@ You can force a scan to occur after every [protection update](manage-protection-
|
|||||||
|
|
||||||
Location | Setting | Description | Default setting (if not configured)
|
Location | Setting | Description | Default setting (if not configured)
|
||||||
---|---|---|---
|
---|---|---|---
|
||||||
Signature updates | Turn on scan after signature update | A scan will occur immediately after a new protection update is downloaded | Enabled
|
Signature updates | Turn on scan after Security intelligence update | A scan will occur immediately after a new protection update is downloaded | Enabled
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.date: 09/03/2018
|
|||||||
You can specify the level of cloud-protection offered by Windows Defender Antivirus with Group Policy and System Center Configuration Manager.
|
You can specify the level of cloud-protection offered by Windows Defender Antivirus with Group Policy and System Center Configuration Manager.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional signature updates.
|
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -122,21 +122,21 @@ Scan | Specify the scan type to use for a scheduled scan | [Configure scheduled
|
|||||||
Scan | Specify the time for a daily quick scan | [Configure scheduled scans for Windows Defender Antivirus](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
Scan | Specify the time for a daily quick scan | [Configure scheduled scans for Windows Defender Antivirus](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
||||||
Scan | Specify the time of day to run a scheduled scan | [Configure scheduled scans for Windows Defender Antivirus](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
Scan | Specify the time of day to run a scheduled scan | [Configure scheduled scans for Windows Defender Antivirus](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
||||||
Scan | Start the scheduled scan only when computer is on but not in use | [Configure scheduled scans for Windows Defender Antivirus](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
Scan | Start the scheduled scan only when computer is on but not in use | [Configure scheduled scans for Windows Defender Antivirus](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
||||||
Signature updates | Allow definition updates from Microsoft Update | [Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
|
Security intelligence updates | Allow definition updates from Microsoft Update | [Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
|
||||||
Signature updates | Allow definition updates when running on battery power | [Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
|
Security intelligence updates | Allow definition updates when running on battery power | [Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
|
||||||
Signature updates | Allow notifications to disable definitions based repots to Microsoft MAPS | [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
Security intelligence updates | Allow notifications to disable definitions based repots to Microsoft MAPS | [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
||||||
Signature updates | Allow real-time definition updates based on reports to Microsoft MAPS | [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
Security intelligence updates | Allow real-time definition updates based on reports to Microsoft MAPS | [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
||||||
Signature updates | Check for the latest virus and spyware definitions on startup | [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
Security intelligence updates | Check for the latest virus and spyware definitions on startup | [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
||||||
Signature updates | Define file shares for downloading definition updates | [Manage Windows Defender Antivirus protection and definition updates](manage-protection-updates-windows-defender-antivirus.md)
|
Security intelligence updates | Define file shares for downloading definition updates | [Manage Windows Defender Antivirus protection and definition updates](manage-protection-updates-windows-defender-antivirus.md)
|
||||||
Signature updates | Define the number of days after which a catch up definition update is required | [Manage updates for endpoints that are out of date](manage-outdated-endpoints-windows-defender-antivirus.md)
|
Security intelligence updates | Define the number of days after which a catch up definition update is required | [Manage updates for endpoints that are out of date](manage-outdated-endpoints-windows-defender-antivirus.md)
|
||||||
Signature updates | Define the number of days before spyware definitions are considered out of date | [Manage updates for endpoints that are out of date](manage-outdated-endpoints-windows-defender-antivirus.md)
|
Security intelligence updates | Define the number of days before spyware definitions are considered out of date | [Manage updates for endpoints that are out of date](manage-outdated-endpoints-windows-defender-antivirus.md)
|
||||||
Signature updates | Define the number of days before virus definitions are considered out of date | [Manage updates for endpoints that are out of date](manage-outdated-endpoints-windows-defender-antivirus.md)
|
Security intelligence updates | Define the number of days before virus definitions are considered out of date | [Manage updates for endpoints that are out of date](manage-outdated-endpoints-windows-defender-antivirus.md)
|
||||||
Signature updates | Define the order of sources for downloading definition updates | [Manage Windows Defender Antivirus protection and definition updates](manage-protection-updates-windows-defender-antivirus.md)
|
Security intelligence updates | Define the order of sources for downloading definition updates | [Manage Windows Defender Antivirus protection and definition updates](manage-protection-updates-windows-defender-antivirus.md)
|
||||||
Signature updates | Initiate definition update on startup | [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
Security intelligence updates | Initiate definition update on startup | [Manage event-based forced updates](manage-event-based-updates-windows-defender-antivirus.md)
|
||||||
Signature updates | Specify the day of the week to check for definition updates | [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md)
|
Security intelligence updates | Specify the day of the week to check for definition updates | [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md)
|
||||||
Signature updates | Specify the interval to check for definition updates | [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md)
|
Security intelligence updates | Specify the interval to check for definition updates | [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md)
|
||||||
Signature updates | Specify the time to check for definition updates | [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md)
|
Security intelligence updates | Specify the time to check for definition updates | [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-windows-defender-antivirus.md)
|
||||||
Signature updates | Turn on scan after signature update | [Configure scheduled scans for Windows Defender Antivirus](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
Security intelligence updates | Turn on scan after Security intelligence update | [Configure scheduled scans for Windows Defender Antivirus](scheduled-catch-up-scans-windows-defender-antivirus.md)
|
||||||
Threats | Specify threat alert levels at which default action should not be taken when detected | [Configure remediation for Windows Defender Antivirus scans](configure-remediation-windows-defender-antivirus.md)
|
Threats | Specify threat alert levels at which default action should not be taken when detected | [Configure remediation for Windows Defender Antivirus scans](configure-remediation-windows-defender-antivirus.md)
|
||||||
Threats | Specify threats upon which default action should not be taken when detected | [Configure remediation for Windows Defender Antivirus scans](configure-remediation-windows-defender-antivirus.md)
|
Threats | Specify threats upon which default action should not be taken when detected | [Configure remediation for Windows Defender Antivirus scans](configure-remediation-windows-defender-antivirus.md)
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Use PowerShell cmdlets to configure and run Windows Defender AV
|
title: Use PowerShell cmdlets to configure and run Windows Defender AV
|
||||||
description: In Windows 10, you can use PowerShell cmdlets to run scans, update definitions, and change settings in Windows Defender Antivirus.
|
description: In Windows 10, you can use PowerShell cmdlets to run scans, update Security intelligence, and change settings in Windows Defender Antivirus.
|
||||||
keywords: scan, command line, mpcmdrun, defender
|
keywords: scan, command line, mpcmdrun, defender
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -26,7 +26,7 @@ To take advantage of the power and speed of these next-gen technologies, Windows
|
|||||||
|
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional signature updates.
|
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
||||||
|
|
||||||
With cloud-delivered protection, next-gen technologies provide rapid identification of new threats, sometimes even before a single machine is infected. Watch the following video about Microsoft AI and Windows Defender Antivirus in action:
|
With cloud-delivered protection, next-gen technologies provide rapid identification of new threats, sometimes even before a single machine is infected. Watch the following video about Microsoft AI and Windows Defender Antivirus in action:
|
||||||
|
|
||||||
@ -75,5 +75,5 @@ You can also [configure Windows Defender AV to automatically receive new protect
|
|||||||
[Enable cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) | You can enable cloud-delivered protection with System Center Configuration Manager, Group Policy, Microsoft Intune, and PowerShell cmdlets.
|
[Enable cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) | You can enable cloud-delivered protection with System Center Configuration Manager, Group Policy, Microsoft Intune, and PowerShell cmdlets.
|
||||||
[Specify the cloud-delivered protection level](specify-cloud-protection-level-windows-defender-antivirus.md) | You can specify the level of protection offered by the cloud with Group Policy and System Center Configuration Manager. The protection level will affect the amount of information shared with the cloud and how aggressively new files are blocked.
|
[Specify the cloud-delivered protection level](specify-cloud-protection-level-windows-defender-antivirus.md) | You can specify the level of protection offered by the cloud with Group Policy and System Center Configuration Manager. The protection level will affect the amount of information shared with the cloud and how aggressively new files are blocked.
|
||||||
[Configure and validate network connections for Windows Defender Antivirus](configure-network-connections-windows-defender-antivirus.md) | There are certain Microsoft URLs that your network and endpoints must be able to connect to for cloud-delivered protection to work effectively. This topic lists the URLs that should be allowed via firewall or network filtering rules, and instructions for confirming your network is properly enrolled in cloud-delivered protection.
|
[Configure and validate network connections for Windows Defender Antivirus](configure-network-connections-windows-defender-antivirus.md) | There are certain Microsoft URLs that your network and endpoints must be able to connect to for cloud-delivered protection to work effectively. This topic lists the URLs that should be allowed via firewall or network filtering rules, and instructions for confirming your network is properly enrolled in cloud-delivered protection.
|
||||||
[Configure the block at first sight feature](configure-block-at-first-sight-windows-defender-antivirus.md) | The Block at First Sight feature can block new malware within seconds, without having to wait hours for a traditional signature. You can enable and configure it with System Center Configuration Manager and Group Policy.
|
[Configure the block at first sight feature](configure-block-at-first-sight-windows-defender-antivirus.md) | The Block at First Sight feature can block new malware within seconds, without having to wait hours for traditional Security intelligence . You can enable and configure it with System Center Configuration Manager and Group Policy.
|
||||||
[Configure the cloud block timeout period](configure-cloud-block-timeout-period-windows-defender-antivirus.md) | Windows Defender Antivirus can block suspicious files from running while it queries our cloud-delivered protection service. You can configure the amount of time the file will be prevented from running with System Center Configuration Manager and Group Policy.
|
[Configure the cloud block timeout period](configure-cloud-block-timeout-period-windows-defender-antivirus.md) | Windows Defender Antivirus can block suspicious files from running while it queries our cloud-delivered protection service. You can configure the amount of time the file will be prevented from running with System Center Configuration Manager and Group Policy.
|
||||||
|
@ -57,7 +57,7 @@ See the [Windows Defender Antivirus on Windows Server 2016](windows-defender-ant
|
|||||||
|
|
||||||
This table indicates the functionality and features that are available in each state:
|
This table indicates the functionality and features that are available in each state:
|
||||||
|
|
||||||
State | Description | [Real-time protection](configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) | [Limited periodic scanning availability](limited-periodic-scanning-windows-defender-antivirus.md) | [File scanning and detection information](customize-run-review-remediate-scans-windows-defender-antivirus.md) | [Threat remediation](configure-remediation-windows-defender-antivirus.md) | [Threat definition updates](manage-updates-baselines-windows-defender-antivirus.md)
|
State | Description | [Real-time protection](configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) | [Limited periodic scanning availability](limited-periodic-scanning-windows-defender-antivirus.md) | [File scanning and detection information](customize-run-review-remediate-scans-windows-defender-antivirus.md) | [Threat remediation](configure-remediation-windows-defender-antivirus.md) | [Security intelligence updates](manage-updates-baselines-windows-defender-antivirus.md)
|
||||||
:-|:-|:-:|:-:|:-:|:-:|:-:
|
:-|:-|:-:|:-:|:-:|:-:|:-:
|
||||||
Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)]
|
Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)]
|
||||||
Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)]
|
Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark yes](images/svg/check-yes.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)] | [!include[Check mark no](images/svg/check-no.svg)]
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user