mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Merge pull request #1162 from MicrosoftDocs/FromPrivateRepo
From private repo
This commit is contained in:
commit
fe960a8918
@ -12,7 +12,7 @@ ms.date: 04/17/2018
|
|||||||
# Accounts CSP
|
# Accounts CSP
|
||||||
|
|
||||||
|
|
||||||
The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and joint it to a local user group. This CSP was added in Windows 10, version 1803.
|
The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and join it to a local user group. This CSP was added in Windows 10, version 1803.
|
||||||
|
|
||||||
|
|
||||||
The following diagram shows the Accounts configuration service provider in tree format.
|
The following diagram shows the Accounts configuration service provider in tree format.
|
||||||
|
@ -7,13 +7,27 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: MariciaAlforque
|
author: MariciaAlforque
|
||||||
ms.date: 06/26/2017
|
ms.date: 06/25/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Diagnose MDM failures in Windows 10
|
# Diagnose MDM failures in Windows 10
|
||||||
|
|
||||||
To help diagnose enrollment or device management issues in Windows 10 devices managed by an MDM server, you can examine the MDM logs collected from the desktop or mobile device. The following sections describe the procedures for collecting MDM logs.
|
To help diagnose enrollment or device management issues in Windows 10 devices managed by an MDM server, you can examine the MDM logs collected from the desktop or mobile device. The following sections describe the procedures for collecting MDM logs.
|
||||||
|
|
||||||
|
## Download the MDM Diagnostic Information log from Windows 10 PCs
|
||||||
|
|
||||||
|
1. On your managed device go to **Settings** > **Accounts** > **Access work or school**.
|
||||||
|
1. Click your work or school account, then click **Info.**
|
||||||
|

|
||||||
|
|
||||||
|
1. At the bottom of the **Settings** page, click **Create report**.
|
||||||
|

|
||||||
|
1. A window opens that shows the path to the log files. Click **Export**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. In File Explorer, navigate to c:\Users\Public\Documents\MDMDiagnostics to see the report.
|
||||||
|
|
||||||
## Collect logs directly from Windows 10 PCs
|
## Collect logs directly from Windows 10 PCs
|
||||||
|
|
||||||
Starting with the Windows 10, version 1511, MDM logs are captured in the Event Viewer in the following location:
|
Starting with the Windows 10, version 1511, MDM logs are captured in the Event Viewer in the following location:
|
||||||
@ -96,9 +110,9 @@ Example: Export the Debug logs
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
## Collect logs from Windows 10 Mobile devices
|
## Collect logs from Windows 10 Mobile devices
|
||||||
|
|
||||||
Since there is no Event Viewer in Windows 10 Mobile, you can use the [Field Medic]( http://go.microsoft.com/fwlink/p/?LinkId=718232) app to collect logs.
|
Since there is no Event Viewer in Windows 10 Mobile, you can use the [Field Medic](https://www.microsoft.com/en-us/p/field-medic/9wzdncrfjb82?activetab=pivot%3aoverviewtab) app to collect logs.
|
||||||
|
|
||||||
**To collect logs manually**
|
**To collect logs manually**
|
||||||
|
|
||||||
@ -168,9 +182,9 @@ The following table contains a list of common providers and their corresponding
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Collect logs remotely from Windows 10 Mobile devices
|
## Collect logs remotely from Windows 10 Holographic or Windows 10 Mobile devices
|
||||||
|
|
||||||
For mobile devices already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](diagnosticlog-csp.md).
|
For holographic or mobile devices already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](diagnosticlog-csp.md).
|
||||||
|
|
||||||
You can use the DiagnosticLog CSP to enable the ETW provider. The provider ID is 3DA494E4-0FE2-415C-B895-FB5265C5C83B. The following examples show how to enable the ETW provider:
|
You can use the DiagnosticLog CSP to enable the ETW provider. The provider ID is 3DA494E4-0FE2-415C-B895-FB5265C5C83B. The following examples show how to enable the ETW provider:
|
||||||
|
|
||||||
|
BIN
windows/client-management/mdm/images/diagnose-mdm-failures15.png
Normal file
BIN
windows/client-management/mdm/images/diagnose-mdm-failures15.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 154 KiB |
BIN
windows/client-management/mdm/images/diagnose-mdm-failures16.png
Normal file
BIN
windows/client-management/mdm/images/diagnose-mdm-failures16.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 18 KiB |
BIN
windows/client-management/mdm/images/diagnose-mdm-failures17.png
Normal file
BIN
windows/client-management/mdm/images/diagnose-mdm-failures17.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 17 KiB |
@ -1627,6 +1627,28 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
|||||||
|
|
||||||
## Change history in MDM documentation
|
## Change history in MDM documentation
|
||||||
|
|
||||||
|
### June 2018
|
||||||
|
|
||||||
|
<table class="mx-tdBreakAll">
|
||||||
|
<colgroup>
|
||||||
|
<col width="25%" />
|
||||||
|
<col width="75%" />
|
||||||
|
</colgroup>
|
||||||
|
<thead>
|
||||||
|
<tr class="header">
|
||||||
|
<th>New or updated topic</th>
|
||||||
|
<th>Description</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody>
|
||||||
|
<tr>
|
||||||
|
<td style="vertical-align:top">[Diagnose MDM failures in Windows 10](diagnose-mdm-failures-in-windows-10.md)</td>
|
||||||
|
<td style="vertical-align:top"><p>Added procedure for collecting logs remotely from Windows 10 Holographic.</p>
|
||||||
|
</td></tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
|
||||||
### May 2018
|
### May 2018
|
||||||
|
|
||||||
<table class="mx-tdBreakAll">
|
<table class="mx-tdBreakAll">
|
||||||
|
@ -4790,7 +4790,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
||||||
- [Settings/AllowDateTime](#settings-allowdatetime)
|
- [Settings/AllowDateTime](#settings-allowdatetime)
|
||||||
- [Settings/AllowVPN](#settings-allowvpn)
|
- [Settings/AllowVPN](#settings-allowvpn)
|
||||||
- [System/AllowFontProviders](#system-allowfontproviders)
|
|
||||||
- [System/AllowLocation](#system-allowlocation)
|
- [System/AllowLocation](#system-allowlocation)
|
||||||
- [System/AllowTelemetry](#system-allowtelemetry)
|
- [System/AllowTelemetry](#system-allowtelemetry)
|
||||||
- [Update/AllowAutoUpdate](#update-allowautoupdate)
|
- [Update/AllowAutoUpdate](#update-allowautoupdate)
|
||||||
|
@ -1204,7 +1204,6 @@ Footnote:
|
|||||||
<!--StartHoloLens-->
|
<!--StartHoloLens-->
|
||||||
## <a href="" id="hololenspolicies"></a>System policies supported by Windows Holographic for Business
|
## <a href="" id="hololenspolicies"></a>System policies supported by Windows Holographic for Business
|
||||||
|
|
||||||
- [System/AllowFontProviders](#system-allowfontproviders)
|
|
||||||
- [System/AllowLocation](#system-allowlocation)
|
- [System/AllowLocation](#system-allowlocation)
|
||||||
- [System/AllowTelemetry](#system-allowtelemetry)
|
- [System/AllowTelemetry](#system-allowtelemetry)
|
||||||
<!--EndHoloLens-->
|
<!--EndHoloLens-->
|
||||||
|
@ -634,7 +634,7 @@ Follow these steps to create a bootable USB stick from the offline media content
|
|||||||
|
|
||||||
## <a href="" id="sec11"></a>Unified Extensible Firmware Interface (UEFI)-based deployments
|
## <a href="" id="sec11"></a>Unified Extensible Firmware Interface (UEFI)-based deployments
|
||||||
|
|
||||||
As referenced in [Windows 10 deployment tools](https://go.microsoft.com/fwlink/p/?LinkId=619546), Unified Extensible Firmware Interface (UEFI)-based deployments are becoming more common. In fact, when you create a generation 2 virtual machine in Hyper-V, you get a UEFI-based computer. During deployment, MDT automatically detects that you have an UEFI-based machine and creates the partitions UEFI requires. You do not need to update or change your task sequences in any way to accommodate UFEI.
|
As referenced in [Windows 10 deployment tools](https://go.microsoft.com/fwlink/p/?LinkId=619546), Unified Extensible Firmware Interface (UEFI)-based deployments are becoming more common. In fact, when you create a generation 2 virtual machine in Hyper-V, you get a UEFI-based computer. During deployment, MDT automatically detects that you have an UEFI-based machine and creates the partitions UEFI requires. You do not need to update or change your task sequences in any way to accommodate UEFI.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
ms.date: 07/27/2017
|
ms.date: 06/18/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Trusted Platform Module Technology Overview
|
# Trusted Platform Module Technology Overview
|
||||||
|
@ -73,7 +73,7 @@ A deployment's trust type defines how each Windows Hello for Business client aut
|
|||||||
|
|
||||||
The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during an in-box provisioning experience, which requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more.
|
The key trust type does not require issuing authentication certificates to end users. Users authenticate using a hardware-bound key created during an in-box provisioning experience, which requires an adequate distribution of Windows Server 2016 domain controllers relative to your existing authentication and the number of users included in your Windows Hello for Business deployment. Read the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) to learn more.
|
||||||
|
|
||||||
The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the in-box provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers. Users can authentication using their certificate to any Windows Server 2008 R2 or later domain controller.
|
The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate requested using a hardware-bound key created during the in-box provisioning experience. Unlike key trust, certificate trust does not require Windows Server 2016 domain controllers. Users can authentice using their certificate to any Windows Server 2008 R2 or later domain controller.
|
||||||
|
|
||||||
#### Device registration
|
#### Device registration
|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
ms.date: 05/03/2018
|
ms.date: 06/25/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# BitLocker Deployment and Administration FAQ
|
# BitLocker Deployment and Administration FAQ
|
||||||
@ -44,7 +44,7 @@ No, BitLocker does not encrypt and decrypt the entire drive when reading and wri
|
|||||||
|
|
||||||
## How can I prevent users on a network from storing data on an unencrypted drive?
|
## How can I prevent users on a network from storing data on an unencrypted drive?
|
||||||
|
|
||||||
You can can Group Policy settings to require that data drives be BitLocker-protected before a BitLocker-protected computer can write data to them. For more info, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md).
|
You can configure Group Policy settings to require that data drives be BitLocker-protected before a BitLocker-protected computer can write data to them. For more info, see [BitLocker Group Policy settings](bitlocker-group-policy-settings.md).
|
||||||
When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only.
|
When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only.
|
||||||
|
|
||||||
## What is Used Disk Space Only encryption?
|
## What is Used Disk Space Only encryption?
|
||||||
|
@ -103,7 +103,7 @@ Use optional query parameters to specify and control the amount of data returned
|
|||||||
|
|
||||||
Name | Value| Description
|
Name | Value| Description
|
||||||
:---|:---|:---
|
:---|:---|:---
|
||||||
DateTime?sinceTimeUtc | string | Defines the lower time bound alerts are retrieved from, based on field: <br> `LastProccesedTimeUtc` <br> The time range will be: from sinceTimeUtc time to current time. <br><br> **NOTE**: When not specified, all alerts generated in the last two hours are retrieved.
|
DateTime?sinceTimeUtc | string | Defines the lower time bound alerts are retrieved from, based on field: <br> `LastProcessedTimeUtc` <br> The time range will be: from sinceTimeUtc time to current time. <br><br> **NOTE**: When not specified, all alerts generated in the last two hours are retrieved.
|
||||||
DateTime?untilTimeUtc | string | Defines the upper time bound alerts are retrieved. <br> The time range will be: from `sinceTimeUtc` time to `untilTimeUtc` time. <br><br> **NOTE**: When not specified, the default value will be the current time.
|
DateTime?untilTimeUtc | string | Defines the upper time bound alerts are retrieved. <br> The time range will be: from `sinceTimeUtc` time to `untilTimeUtc` time. <br><br> **NOTE**: When not specified, the default value will be the current time.
|
||||||
string ago | string | Pulls alerts in the following time range: from `(current_time - ago)` time to `current_time` time. <br><br> Value should be set according to **ISO 8601** duration format <br> E.g. `ago=PT10M` will pull alerts received in the last 10 minutes.
|
string ago | string | Pulls alerts in the following time range: from `(current_time - ago)` time to `current_time` time. <br><br> Value should be set according to **ISO 8601** duration format <br> E.g. `ago=PT10M` will pull alerts received in the last 10 minutes.
|
||||||
int?limit | int | Defines the number of alerts to be retrieved. Most recent alerts will be retrieved based on the number defined.<br><br> **NOTE**: When not specified, all alerts available in the time range will be retrieved.
|
int?limit | int | Defines the number of alerts to be retrieved. Most recent alerts will be retrieved based on the number defined.<br><br> **NOTE**: When not specified, all alerts available in the time range will be retrieved.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user