mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 10:23:37 +00:00
Merged PR 3675: Policy CSP bug fixes.
[Bug 13932995](https://microsoft.visualstudio.com/OS/_workitems/edit/13932995)
This commit is contained in:
@ -496,13 +496,6 @@ ms.date: 09/29/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows disabling of the retail catalog and only enables the Private store.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> This node must be accessed using the following paths:
|
||||
>
|
||||
> - **./User/Vendor/MSFT/Policy/Config/ApplicationManagement/RequirePrivateStoreOnly** to set the policy.
|
||||
> - **./User/Vendor/MSFT/Policy/Result/ApplicationManagement/RequirePrivateStoreOnly** to get the result.
|
||||
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Allow both public and Private store.
|
||||
|
@ -119,13 +119,6 @@ ms.date: 09/29/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows an EAP cert-based authentication for a single sign on (SSO) to access internal resources.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> This node must be accessed using the following paths:
|
||||
>
|
||||
> - **./User/Vendor/MSFT/Policy/Config/Authentication/AllowEAPCertSSO** to set the policy.
|
||||
> - **./User/Vendor/MSFT/Policy/Result/Authentication/AllowEAPCertSSO** to get the result.
|
||||
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 09/29/2017
|
||||
ms.date: 10/10/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Browser
|
||||
@ -231,7 +231,7 @@ ms.date: 09/29/2017
|
||||
|
||||
<p style="margin-left: 20px">To verify AllowAutofill is set to 0 (not allowed):
|
||||
|
||||
1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile.
|
||||
1. Open Microsoft Edge.
|
||||
2. In the upper-right corner of the browser, click **…**.
|
||||
3. Click **Settings** in the drop down list, and select **View Advanced Settings**.
|
||||
4. Verify the setting **Save form entries** is greyed out.
|
||||
@ -1177,8 +1177,8 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
<td></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
|
@ -736,13 +736,6 @@ ms.date: 09/29/2017
|
||||
|
||||
<p style="margin-left: 20px">This policy allows IT admins to turn on experiences that are typically for consumers only, such as Start suggestions, Membership notifications, Post-OOBE app install and redirect tiles.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> This node must be accessed using the following paths:
|
||||
>
|
||||
> - **./User/Vendor/MSFT/Policy/Config/Experience/AllowWindowsConsumerFeatures** to set the policy.
|
||||
> - **./User/Vendor/MSFT/Policy/Result/Experience/AllowWindowsConsumerFeatures** to get the result.
|
||||
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 09/29/2017
|
||||
ms.date: 10/05/2017
|
||||
---
|
||||
|
||||
# Policy CSP - LocalPoliciesSecurityOptions
|
||||
@ -999,17 +999,17 @@ This policy setting controls the behavior of the elevation prompt for administra
|
||||
|
||||
The options are:
|
||||
|
||||
• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments.
|
||||
- 0 - Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments.
|
||||
|
||||
• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege.
|
||||
- 1 - Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege.
|
||||
|
||||
• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
|
||||
- 2 - Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
|
||||
|
||||
• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
- 3 - Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
|
||||
• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
|
||||
- 4 - Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
|
||||
|
||||
• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
|
||||
- 5 - Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
@ -1057,11 +1057,11 @@ This policy setting controls the behavior of the elevation prompt for standard u
|
||||
|
||||
The options are:
|
||||
|
||||
• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
- 3 - Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
|
||||
• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
|
||||
- 0 - Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
|
||||
|
||||
• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
- 1 - Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
|
@ -64,13 +64,6 @@ ms.date: 09/29/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Boolean value that turns off notification mirroring.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> This node must be accessed using the following paths:
|
||||
>
|
||||
> - **./User/Vendor/MSFT/Policy/Config/Notifications/DisallowNotificationMirroring** to set the policy.
|
||||
> - **./User/Vendor/MSFT/Policy/Result/Notifications/DisallowNotificationMirroring** to get the result.
|
||||
|
||||
|
||||
<p style="margin-left: 20px">For each user logged into the device, if you enable this policy (set value to 1) the app and system notifications received by this user on this device will not get mirrored to other devices of the same logged in user. If you disable or do not configure this policy (set value to 0) the notifications received by this user on this device will be mirrored to other devices of the same logged in user. This feature can be turned off by apps that do not want to participate in Notification Mirroring. This feature can also be turned off by the user in the Cortana setting page.
|
||||
|
||||
<p style="margin-left: 20px">No reboot or service restart is required for this policy to take effect.
|
||||
|
@ -1536,15 +1536,7 @@ ms.date: 09/29/2017
|
||||
<!--EndScope-->
|
||||
<!--StartDescription-->
|
||||
> [!IMPORTANT]
|
||||
> This node is set on a per-user basis and must be accessed using the following paths:
|
||||
> - **./User/Vendor/MSFT/Policy/Config/Start/StartLayout** to configure the policy.
|
||||
> - **./User/Vendor/MSFT/Policy/Result/Start/StartLayout** to query the current value of the policy.
|
||||
>
|
||||
>
|
||||
> Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis using the following paths:
|
||||
> - **./Device/Vendor/MSFT/Policy/Config/Start/StartLayout** to configure the policy.
|
||||
> - **./Device/Vendor/MSFT/Policy/Result/Start/StartLayout** to query the current value of the policy.
|
||||
|
||||
> Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis. For more information, see [Policy scope](./policy-configuration-service-provider.md#policy-scope)
|
||||
|
||||
<p style="margin-left: 20px">Allows you to override the default Start layout and prevents the user from changing it. If both user and device policies are set, the user policy will be used. Apps pinned to the taskbar can also be changed with this policy
|
||||
|
||||
|
@ -234,7 +234,12 @@ ms.date: 09/29/2017
|
||||
|
||||
<!--EndScope-->
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703.
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Setting this policy controls whether or not the wireless display can send input—keyboard, mouse, pen, and touch input if the display supports it—back to the source device.
|
||||
|
||||
<p style="margin-left: 20px">Allowed values:
|
||||
|
||||
- 0 - Wireless display input disabled.
|
||||
- 1 (default) - Wireless display input enabled.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--EndPolicy-->
|
||||
|
Reference in New Issue
Block a user