mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
commit
ff33ea4680
@ -49,7 +49,7 @@ To reset your HoloLens 2, go to **Settings > Update > Reset** and select **Reset
|
|||||||
|
|
||||||
If the device is still having a problem after reset, you can use Advanced Recovery Companion to flash the device with a new image.
|
If the device is still having a problem after reset, you can use Advanced Recovery Companion to flash the device with a new image.
|
||||||
|
|
||||||
1. On your computer, get [Advanced Recovery Companion](need store link) from Microsoft Store.
|
1. On your computer, get [Advanced Recovery Companion](https://www.microsoft.com/p/advanced-recovery-companion/9p74z35sfrs8?activetab=pivot:overviewtab) from Microsoft Store.
|
||||||
2. Connect HoloLens 2 to your computer.
|
2. Connect HoloLens 2 to your computer.
|
||||||
3. Start Advanced Recovery Companion.
|
3. Start Advanced Recovery Companion.
|
||||||
4. On the **Welcome** page, select your device.
|
4. On the **Welcome** page, select your device.
|
||||||
|
@ -64,8 +64,11 @@ Surface Hubs use Azure AD join to:
|
|||||||
- Grant admin rights to the appropriate users in your Azure AD tenant.
|
- Grant admin rights to the appropriate users in your Azure AD tenant.
|
||||||
- Backup the device's BitLocker recovery key by storing it under the account that was used to Azure AD join the device. See [Save your BitLocker key](save-bitlocker-key-surface-hub.md) for details.
|
- Backup the device's BitLocker recovery key by storing it under the account that was used to Azure AD join the device. See [Save your BitLocker key](save-bitlocker-key-surface-hub.md) for details.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
### Automatic enrollment via Azure Active Directory join
|
||||||
> Surface Hub does not currently support automatic enrollment to Microsoft Intune through Azure AD join. If your organization automatically enrolls Azure AD joined devices into Intune, you must disable this policy for Surface Hub before joining the device to Azure AD.
|
|
||||||
|
Surface Hub now supports the ability to automatically enroll in Intune by joining the device to Azure Active Directory.
|
||||||
|
|
||||||
|
For more information, see [Enable Windows 10 automatic enrollment](https://docs.microsoft.com/intune/windows-enroll#enable-windows-10-automatic-enrollment).
|
||||||
|
|
||||||
### Which should I choose?
|
### Which should I choose?
|
||||||
|
|
||||||
|
@ -63,9 +63,12 @@ There are several items to download or create for offline-licensed apps. The app
|
|||||||
**To download an offline-licensed app**
|
**To download an offline-licensed app**
|
||||||
|
|
||||||
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com/) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com/) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
||||||
2. Click **Manage**, and then choose **Apps & software**.
|
2. Click **Manage**.
|
||||||
3. Refine results by **License type** to show apps with offline licenses.
|
3. Under **Shopping Experience**, set **Show offline apps** to **On**.
|
||||||
4. Find the app you want to download, click the ellipses under **Actions**, and then choose **Download for offline use**.
|
4. Click **Shop for my group**. Search for the required inbox-app, select it, change the License type to **Offline**, and click **Get the app**, which will add the app to your inventory.
|
||||||
|
5. Click **Manage**. You now have access to download the appx bundle package metadata and license file.
|
||||||
|
6. Go to **Products & services**, and select **Apps & software**. (The list may be empty, but it will auto-populate after some time.)
|
||||||
|
|
||||||
- **To download app metadata**: Choose the language for the app metadata, and then click **Download**. Save the downloaded app metadata. This is optional.
|
- **To download app metadata**: Choose the language for the app metadata, and then click **Download**. Save the downloaded app metadata. This is optional.
|
||||||
- **To download app package**: Click to expand the package details information, choose the Platform and Architecture combination that you need for your organization, and then click **Download**. Save the downloaded app package. This is required.
|
- **To download app package**: Click to expand the package details information, choose the Platform and Architecture combination that you need for your organization, and then click **Download**. Save the downloaded app package. This is required.
|
||||||
- **To download an app license**: Choose either **Encoded**, or **Unencoded**, and then click **Generate license**. Save the downloaded license. This is required.
|
- **To download an app license**: Choose either **Encoded**, or **Unencoded**, and then click **Generate license**. Save the downloaded license. This is required.
|
||||||
|
@ -338,7 +338,7 @@ Delete a provider
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
<a href="" id="etwlog-collectors-collectorname-providers-provderguid-tracelevel"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProvderGUID*/TraceLevel**
|
<a href="" id="etwlog-collectors-collectorname-providers-providerguid-tracelevel"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProviderGUID*/TraceLevel**
|
||||||
Specifies the level of detail included in the trace log.
|
Specifies the level of detail included in the trace log.
|
||||||
|
|
||||||
The data type is an integer.
|
The data type is an integer.
|
||||||
@ -407,7 +407,7 @@ Set provider **TraceLevel**
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
<a href="" id="etwlog-collectors-collectorname-providers-provderguid-keywords"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProvderGUID*/Keywords**
|
<a href="" id="etwlog-collectors-collectorname-providers-providerguid-keywords"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProviderGUID*/Keywords**
|
||||||
Specifies the provider keywords to be used as MatchAnyKeyword for this provider.
|
Specifies the provider keywords to be used as MatchAnyKeyword for this provider.
|
||||||
|
|
||||||
the data type is a string.
|
the data type is a string.
|
||||||
@ -461,7 +461,7 @@ Set provider **Keywords**
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
<a href="" id="etwlog-collectors-collectorname-providers-provderguid-state"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProvderGUID*/State**
|
<a href="" id="etwlog-collectors-collectorname-providers-providerguid-state"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProviderGUID*/State**
|
||||||
Specifies if this provider is enabled in the trace session.
|
Specifies if this provider is enabled in the trace session.
|
||||||
|
|
||||||
The data type is a boolean.
|
The data type is a boolean.
|
||||||
|
@ -76,8 +76,8 @@ The data type is string. Supported operations are Get and Replace. Starting in W
|
|||||||
Specifies whether the proxy server should be used for local (intranet) addresses.
|
Specifies whether the proxy server should be used for local (intranet) addresses.
|
||||||
Valid values:
|
Valid values:
|
||||||
<ul>
|
<ul>
|
||||||
<li>0 (default) - Do not use proxy server for local addresses</li>
|
<li>0 (default) - Use proxy server for local addresses</li>
|
||||||
<li>1 - Use proxy server for local addresses</li>
|
<li>1 - Do not use proxy server for local addresses</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
The data type is int. Supported operations are Get and Replace. Starting in Window 10, version 1803, the Delete operation is also supported.
|
The data type is int. Supported operations are Get and Replace. Starting in Window 10, version 1803, the Delete operation is also supported.
|
||||||
|
@ -66,6 +66,15 @@ Here are examples of data fields. The encoded 0xF000 is the standard delimiter/s
|
|||||||
```
|
```
|
||||||
<Data></Data>
|
<Data></Data>
|
||||||
```
|
```
|
||||||
|
If you use Intune custom profiles to assign UserRights policies, you must use the CDATA tag (`<![CDATA[...]]>`) to wrap the data fields. You can specify one or more user groups within the CDATA tag by using 0xF000 as the delimiter/separator.
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> `` is the entity encoding of 0xF000.
|
||||||
|
|
||||||
|
For example, the following syntax grants user rights to Authenticated Users and Replicator user groups:
|
||||||
|
```
|
||||||
|
<![CDATA[Authenticated UsersReplicator]]>
|
||||||
|
```
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
|
@ -53,7 +53,7 @@ If you've followed the steps in the [Enrolling devices in Windows Analytics](win
|
|||||||
|
|
||||||
In Log Analytics, go to **Settings > Connected sources > Windows telemetry** and verify that you are subscribed to the Windows Analytics solutions you intend to use.
|
In Log Analytics, go to **Settings > Connected sources > Windows telemetry** and verify that you are subscribed to the Windows Analytics solutions you intend to use.
|
||||||
|
|
||||||
Even though devices can take 2-3 days after enrollment to show up due to latency in the system, you can now verify the status of your devices with a few hours of running the deployment script as described in [You can now check on the status of your computers within hours of running the deployment script](https://blogs.technet.microsoft.com/upgradeanalytics/2017/05/12/wheres-my-data/) on the Windows Analytics blog.
|
Even though devices can take 2-3 days after enrollment to show up due to latency in the system, you can now verify the status of your devices within a few hours of running the deployment script as described in [You can now check on the status of your computers within hours of running the deployment script](https://techcommunity.microsoft.com/t5/Windows-Analytics-Blog/You-can-now-check-on-the-status-of-your-computers-within-hours/ba-p/187213) on the Tech Community Blog.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> If you generate the status report and get an error message saying "Sorry! We’re not recognizing your Commercial Id," go to **Settings > Connected sources > Windows telemetry** remove the Upgrade Readiness solution, and then re-add it.
|
> If you generate the status report and get an error message saying "Sorry! We’re not recognizing your Commercial Id," go to **Settings > Connected sources > Windows telemetry** remove the Upgrade Readiness solution, and then re-add it.
|
||||||
|
@ -29,7 +29,7 @@ Go to the [Azure portal](https://portal.azure.com), select **All services**, and
|
|||||||
|
|
||||||
It's important to understand the difference between Azure Active Directory and an Azure subscription:
|
It's important to understand the difference between Azure Active Directory and an Azure subscription:
|
||||||
|
|
||||||
**Azure Active Directory** is the directory that Azure uses. Azure Active Directory (AD) is a separate service which sits by itself and is used by all of Azure and also Office 365.
|
**Azure Active Directory** is the directory that Azure uses. Azure Active Directory (Azure AD) is a separate service which sits by itself and is used by all of Azure and also Office 365.
|
||||||
|
|
||||||
An **Azure subscription** is a container for billing, but also acts as a security boundary. Every Azure subscription has a trust relationship with at least one Azure AD instance. This means that a subscription trusts that directory to authenticate users, services, and devices.
|
An **Azure subscription** is a container for billing, but also acts as a security boundary. Every Azure subscription has a trust relationship with at least one Azure AD instance. This means that a subscription trusts that directory to authenticate users, services, and devices.
|
||||||
|
|
||||||
|
@ -18,14 +18,15 @@ Find the tools and resources you need to help deploy and support Windows as a se
|
|||||||
|
|
||||||
Find the latest and greatest news on Windows 10 deployment and servicing.
|
Find the latest and greatest news on Windows 10 deployment and servicing.
|
||||||
|
|
||||||
**Working to make Windows updates clear and transparent**
|
**Discovering the Windows 10 Update history pages**
|
||||||
> [!VIDEO https://www.youtube-nocookie.com/embed/u5P20y39DrA]
|
> [!VIDEO https://www.youtube-nocookie.com/embed/GADIXBf9R58]
|
||||||
|
|
||||||
Everyone wins when transparency is a top priority. We want you to know when updates are available, as well as alert you to any potential issues you may encounter during or after you install an update. The Windows update history page is for anyone looking to gain an immediate, precise understanding of particular Windows update issues.
|
Everyone wins when transparency is a top priority. We want you to know when updates are available, as well as alert you to any potential issues you may encounter during or after you install an update. The Windows update history page is for anyone looking to gain an immediate, precise understanding of particular Windows update issues.
|
||||||
|
|
||||||
The latest news:
|
The latest news:
|
||||||
<ul compact style="list-style: none">
|
<ul compact style="list-style: none">
|
||||||
<li><a href="https://blogs.windows.com/windowsexperience/2019/04/04/improving-the-windows-10-update-experience-with-control-quality-and-transparency">Improving the Windows 10 update experience with control, quality and transparency</a> - April 4, 2019</li>
|
<li><a href="https://blogs.windows.com/windowsexperience/2019/04/04/improving-the-windows-10-update-experience-with-control-quality-and-transparency">Improving the Windows 10 update experience with control, quality and transparency</a> - April 4, 2019</li>
|
||||||
|
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Call-to-action-review-your-Windows-Update-for-Business-deferral/ba-p/394244">Call to action: review your Windows Update for Business deferral values</a> - April 3, 2019</li>
|
||||||
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-version-1809-designated-for-broad-deployment/ba-p/389540">Windows 10, version 1809 designated for broad deployment</a> - March 28, 2019</li>
|
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-version-1809-designated-for-broad-deployment/ba-p/389540">Windows 10, version 1809 designated for broad deployment</a> - March 28, 2019</li>
|
||||||
<li><a href="https://blogs.windows.com/windowsexperience/2019/03/06/data-insights-and-listening-to-improve-the-customer-experience">Data, insights and listening to improve the customer experience</a> - March 6, 2019</li>
|
<li><a href="https://blogs.windows.com/windowsexperience/2019/03/06/data-insights-and-listening-to-improve-the-customer-experience">Data, insights and listening to improve the customer experience</a> - March 6, 2019</li>
|
||||||
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Getting-to-know-the-Windows-update-history-pages/ba-p/355079">Getting to know the Windows update history pages</a> - February 21, 2019</li>
|
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Getting-to-know-the-Windows-update-history-pages/ba-p/355079">Getting to know the Windows update history pages</a> - February 21, 2019</li>
|
||||||
|
@ -25,7 +25,7 @@ By default, all users are migrated. The only way to specify which users to inclu
|
|||||||
- [To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain](#bkmk-migratemoveuserone)
|
- [To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain](#bkmk-migratemoveuserone)
|
||||||
|
|
||||||
## <a href="" id="bkmk-migrateall"></a>To migrate all user accounts and user settings
|
## <a href="" id="bkmk-migrateall"></a>To migrate all user accounts and user settings
|
||||||
|
Links to detailed explanations of commands are available in the Related Topics section.
|
||||||
|
|
||||||
1. Log on to the source computer as an administrator, and specify the following in a **Command-Prompt** window:
|
1. Log on to the source computer as an administrator, and specify the following in a **Command-Prompt** window:
|
||||||
|
|
||||||
@ -49,7 +49,7 @@ By default, all users are migrated. The only way to specify which users to inclu
|
|||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-migratetwo"></a>To migrate two domain accounts (User1 and User2)
|
## <a href="" id="bkmk-migratetwo"></a>To migrate two domain accounts (User1 and User2)
|
||||||
|
Links to detailed explanations of commands are available in the Related Topics section.
|
||||||
|
|
||||||
1. Log on to the source computer as an administrator, and specify:
|
1. Log on to the source computer as an administrator, and specify:
|
||||||
|
|
||||||
@ -62,7 +62,7 @@ By default, all users are migrated. The only way to specify which users to inclu
|
|||||||
`loadstate \\server\share\migration\mystore /i:migdocs.xml /i:migapp.xml`
|
`loadstate \\server\share\migration\mystore /i:migdocs.xml /i:migapp.xml`
|
||||||
|
|
||||||
## <a href="" id="bkmk-migratemoveuserone"></a>To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain
|
## <a href="" id="bkmk-migratemoveuserone"></a>To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain
|
||||||
|
Links to detailed explanations of commands are available in the Related Topics section.
|
||||||
|
|
||||||
1. Log on to the source computer as an administrator, and type the following at the command-line prompt:
|
1. Log on to the source computer as an administrator, and type the following at the command-line prompt:
|
||||||
|
|
||||||
|
@ -155,14 +155,18 @@ The following table defines the endpoints for Connected User Experiences and Tel
|
|||||||
|
|
||||||
Windows release | Endpoint
|
Windows release | Endpoint
|
||||||
--- | ---
|
--- | ---
|
||||||
Windows 10, versions 1703 and 1709 | Diagnostics data: v10.vortex-win.data.microsoft.com/collect/v1</br></br>Functional: v20.vortex-win.data.microsoft.com/collect/v1</br>Windows Advanced Threat Protection is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com/collect/v1</br>settings-win.data.microsoft.com
|
Windows 10, versions 1703 or later, with the 2018-09 cumulative update installed| Diagnostics data: v10c.vortex-win.data.microsoft.com</br></br>Functional: v20.vortex-win.data.microsoft.com</br>Windows Advanced Threat Protection is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com</br>settings-win.data.microsoft.com
|
||||||
Windows 10, version 1607 | v10.vortex-win.data.microsoft.com</br></br>settings-win.data.microsoft.com
|
Windows 10, versions 1803 or later, without the 2018-09 cumulative update installed | Diagnostics data: v10.events.data.microsoft.com</br></br>Functional: v20.vortex-win.data.microsoft.com</br>Windows Advanced Threat Protection is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com</br>settings-win.data.microsoft.com
|
||||||
|
Windows 10, version 1709 or earlier | Diagnostics data: v10.vortex-win.data.microsoft.com</br></br>Functional: v20.vortex-win.data.microsoft.com</br>Windows Advanced Threat Protection is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com</br>settings-win.data.microsoft.com
|
||||||
|
Windows 7 and Windows 8.1 | vortex-win.data.microsoft.com
|
||||||
|
|
||||||
The following table defines the endpoints for other diagnostic data services:
|
The following table defines the endpoints for other diagnostic data services:
|
||||||
|
|
||||||
| Service | Endpoint |
|
| Service | Endpoint |
|
||||||
| - | - |
|
| - | - |
|
||||||
| [Windows Error Reporting](https://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com |
|
| [Windows Error Reporting](https://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com |
|
||||||
|
| | umwatsonc.events.data.microsoft.com |
|
||||||
|
| | kmwatsonc.events.data.microsoft.com |
|
||||||
| | ceuswatcab01.blob.core.windows.net |
|
| | ceuswatcab01.blob.core.windows.net |
|
||||||
| | ceuswatcab02.blob.core.windows.net |
|
| | ceuswatcab02.blob.core.windows.net |
|
||||||
| | eaus2watcab01.blob.core.windows.net |
|
| | eaus2watcab01.blob.core.windows.net |
|
||||||
@ -170,7 +174,7 @@ The following table defines the endpoints for other diagnostic data services:
|
|||||||
| | weus2watcab01.blob.core.windows.net |
|
| | weus2watcab01.blob.core.windows.net |
|
||||||
| | weus2watcab02.blob.core.windows.net |
|
| | weus2watcab02.blob.core.windows.net |
|
||||||
| [Online Crash Analysis](https://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com |
|
| [Online Crash Analysis](https://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com |
|
||||||
| OneDrive app for Windows 10 | vortex.data.microsoft.com/collect/v1 |
|
| OneDrive app for Windows 10 | vortex.data.microsoft.com |
|
||||||
|
|
||||||
### Data use and access
|
### Data use and access
|
||||||
|
|
||||||
|
@ -43,6 +43,14 @@ You can use Group Policy to enable Windows Defender Credential Guard. This will
|
|||||||
|
|
||||||
To enforce processing of the group policy, you can run ```gpupdate /force```.
|
To enforce processing of the group policy, you can run ```gpupdate /force```.
|
||||||
|
|
||||||
|
### Enable Windows Defender Credential Guard by using Intune
|
||||||
|
|
||||||
|
1. From **Home** click **Microsoft Intune**
|
||||||
|
2. Click **Device configuration**
|
||||||
|
3. Click **Profiles** > **Create Profile** > **Endpoint protection** > **Windows Defender Credential Guard**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> It will enable VBS and Secure Boot and you can do it with or without UEFI Lock. If you will need to disable Credential Guard remotely, enable it without UEFI lock.
|
||||||
|
|
||||||
### Enable Windows Defender Credential Guard by using the registry
|
### Enable Windows Defender Credential Guard by using the registry
|
||||||
|
|
||||||
|
@ -35,9 +35,9 @@ On-premises certificate-based deployments of Windows Hello for Business needs th
|
|||||||
|
|
||||||
## Enable Windows Hello for Business Group Policy
|
## Enable Windows Hello for Business Group Policy
|
||||||
|
|
||||||
The Enable Windows Hello for Business Group Policy setting is the configuration needed for Windows to determine if a user should be attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is configured to enabled.
|
The Group Policy setting determines whether users are allowed, and prompted, to enroll for Windows Hello for Business. It can be configured for computers or users.
|
||||||
|
|
||||||
You can configure the Enable Windows Hello for Business Group Policy setting for computer or users. Deploying this policy setting to computers results in ALL users that sign-in that computer to attempt a Windows Hello for Business enrollment. Deploying this policy setting to a user results in only that user attempting a Windows Hello for Business enrollment. Additionally, you can deploy the policy setting to a group of users so only those users attempt a Windows Hello for Business enrollment. If both user and computer policy settings are deployed, the user policy setting has precedence.
|
If you configure the Group Policy for computers, all users that sign-in to those computers will be allowed and prompted to enroll for Windows Hello for Business. If you configure the Group Policy for users, only those users will be allowed and prompted to enroll for Windows Hello for Business.
|
||||||
|
|
||||||
## Use certificate for on-premises authentication
|
## Use certificate for on-premises authentication
|
||||||
|
|
||||||
|
@ -187,7 +187,7 @@ Joining a device is an extension to registering a device. This means, it provide
|
|||||||
|
|
||||||
[Return to Top](hello-how-it-works-technology.md)
|
[Return to Top](hello-how-it-works-technology.md)
|
||||||
## Key Trust
|
## Key Trust
|
||||||
The key trust model uses the user's Windows Hello for Business identity to authenticate to on-premises Active Directory. The certificate trust model is supported in hybrid and on-premises deployments and requires Windows Server 2016 domain controllers.
|
The key trust model uses the user's Windows Hello for Business identity to authenticate to on-premises Active Directory. The key trust model is supported in hybrid and on-premises deployments and requires Windows Server 2016 domain controllers.
|
||||||
|
|
||||||
### Related topics
|
### Related topics
|
||||||
[Certificate Trust](#certificate-trust), [Deployment Type](#deployment-type), [Hybrid Azure AD Joined](#hybrid-azure-ad-joined), [Hybrid Deployment](#hybrid-deployment), [On-premises Deployment](#on-premises-deployment), [Trust Type](#trust-type)
|
[Certificate Trust](#certificate-trust), [Deployment Type](#deployment-type), [Hybrid Azure AD Joined](#hybrid-azure-ad-joined), [Hybrid Deployment](#hybrid-deployment), [On-premises Deployment](#on-premises-deployment), [Trust Type](#trust-type)
|
||||||
|
@ -82,7 +82,7 @@ Organizations using older directory synchronization technology, such as DirSync
|
|||||||
<br>
|
<br>
|
||||||
|
|
||||||
## Federation ##
|
## Federation ##
|
||||||
Federating your on-premises Active Directory with Azure Active Directory ensures all identities have access to all resources regardless if they reside in cloud or on-premises. Windows Hello for Business hybrid certificate trust needs Windows Server 2016 Active Directory Federation Services. All nodes in the AD FS farm must run the same version of AD FS. Additionally, you need to configure your AD FS farm to support Azure registered devices.
|
Windows Hello for Business hybrid certificate trust requires Active Directory being federated with Azure Active Directory and needs Windows Server 2016 Active Directory Federation Services or newer. Windows Hello for Business hybrid certificate trust doesn’t support Managed Azure Active Directory using Pass-through authentication or password hash sync. All nodes in the AD FS farm must run the same version of AD FS. Additionally, you need to configure your AD FS farm to support Azure registered devices.
|
||||||
|
|
||||||
The AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of [KB4088889 (14393.2155)](https://support.microsoft.com/help/4088889). If your AD FS farm is not running the AD FS role with updates from Windows Server 2016, then read [Upgrading to AD FS in Windows Server 2016](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/upgrading-to-ad-fs-in-windows-server-2016)
|
The AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of [KB4088889 (14393.2155)](https://support.microsoft.com/help/4088889). If your AD FS farm is not running the AD FS role with updates from Windows Server 2016, then read [Upgrading to AD FS in Windows Server 2016](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/upgrading-to-ad-fs-in-windows-server-2016)
|
||||||
|
|
||||||
|
@ -50,7 +50,7 @@ The table shows the minimum requirements for each deployment. For key trust in a
|
|||||||
| Windows 10, version 1511 or later| **Hybrid Azure AD Joined:**<br> *Minimum:* Windows 10, version 1703<br> *Best experience:* Windows 10, version 1709 or later (supports synchronous certificate enrollment).</br>**Azure AD Joined:**<br> Windows 10, version 1511 or later| Windows 10, version 1511 or later | Windows 10, version 1511 or later |
|
| Windows 10, version 1511 or later| **Hybrid Azure AD Joined:**<br> *Minimum:* Windows 10, version 1703<br> *Best experience:* Windows 10, version 1709 or later (supports synchronous certificate enrollment).</br>**Azure AD Joined:**<br> Windows 10, version 1511 or later| Windows 10, version 1511 or later | Windows 10, version 1511 or later |
|
||||||
| Windows Server 2016 Schema | Windows Server 2016 Schema | Windows Server 2016 Schema | Windows Server 2016 Schema |
|
| Windows Server 2016 Schema | Windows Server 2016 Schema | Windows Server 2016 Schema | Windows Server 2016 Schema |
|
||||||
| Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level| Windows Server 2008 R2 Domain/Forest functional level |Windows Server 2008 R2 Domain/Forest functional level |
|
| Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level| Windows Server 2008 R2 Domain/Forest functional level |Windows Server 2008 R2 Domain/Forest functional level |
|
||||||
| Windows Server 2016 Domain Controllers | Windows Server 2008 R2 or later Domain Controllers | Windows Server 2016 Domain Controllers | Windows Server 2008 R2 or later Domain Controllers |
|
| Windows Server 2016 or later Domain Controllers | Windows Server 2008 R2 or later Domain Controllers | Windows Server 2016 or later Domain Controllers | Windows Server 2008 R2 or later Domain Controllers |
|
||||||
| Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority |
|
| Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority |
|
||||||
| N/A | Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) (hybrid Azure AD joined clients),<br> and</br>Windows Server 2012 or later Network Device Enrollment Service (Azure AD joined) | N/A | Windows Server 2012 or later Network Device Enrollment Service |
|
| N/A | Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) (hybrid Azure AD joined clients),<br> and</br>Windows Server 2012 or later Network Device Enrollment Service (Azure AD joined) | N/A | Windows Server 2012 or later Network Device Enrollment Service |
|
||||||
| Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter| Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter | Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter | Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter |
|
| Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter| Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter | Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter | Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter |
|
||||||
@ -67,7 +67,7 @@ The table shows the minimum requirements for each deployment.
|
|||||||
| Windows 10, version 1703 or later | Windows 10, version 1703 or later |
|
| Windows 10, version 1703 or later | Windows 10, version 1703 or later |
|
||||||
| Windows Server 2016 Schema | Windows Server 2016 Schema|
|
| Windows Server 2016 Schema | Windows Server 2016 Schema|
|
||||||
| Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level |
|
| Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level |
|
||||||
| Windows Server 2016 Domain Controllers | Windows Server 2008 R2 or later Domain Controllers |
|
| Windows Server 2016 or later Domain Controllers | Windows Server 2008 R2 or later Domain Controllers |
|
||||||
| Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority |
|
| Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority |
|
||||||
| Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) | Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) |
|
| Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) | Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) |
|
||||||
| AD FS with Azure MFA Server, or</br>AD FS with 3rd Party MFA Adapter | AD FS with Azure MFA Server, or</br>AD FS with 3rd Party MFA Adapter |
|
| AD FS with Azure MFA Server, or</br>AD FS with 3rd Party MFA Adapter | AD FS with Azure MFA Server, or</br>AD FS with 3rd Party MFA Adapter |
|
||||||
|
@ -89,7 +89,7 @@ To use Windows Defender Remote Credential Guard, the Remote Desktop client and r
|
|||||||
|
|
||||||
The Remote Desktop client device:
|
The Remote Desktop client device:
|
||||||
|
|
||||||
- Must be running at least Windows 10, version 1703 to be able to supply credentials.
|
- Must be running at least Windows 10, version 1703 to be able to supply credentials, which is sent to the remote device. This allows users to run as different users without having to send credentials to the remote machine.
|
||||||
- Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user’s signed-in credentials. This requires the user’s account be able to sign in to both the client device and the remote host.
|
- Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user’s signed-in credentials. This requires the user’s account be able to sign in to both the client device and the remote host.
|
||||||
- Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard.
|
- Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard.
|
||||||
- Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk.
|
- Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk.
|
||||||
|
@ -132,7 +132,7 @@ This event is generated only on domain controllers.
|
|||||||
| 0x8 | TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE | If this bit is set, the trust link is a [cross-forest trust](https://msdn.microsoft.com/library/cc223126.aspx#gt_86f3dbf2-338f-462e-8c5b-3c8e05798dbc) [\[MS-KILE\]](https://msdn.microsoft.com/library/cc233855.aspx) between the root domains of two [forests](https://msdn.microsoft.com/library/cc223126.aspx#gt_fd104241-4fb3-457c-b2c4-e0c18bb20b62), both of which are running in a [forest functional level](https://msdn.microsoft.com/library/cc223126.aspx#gt_b3240417-ca43-4901-90ec-fde55b32b3b8) of DS\_BEHAVIOR\_WIN2003 or greater.<br>Only evaluated on Windows Server 2003 operating system, Windows Server 2008 operating system, Windows Server 2008 R2 operating system, Windows Server 2012 operating system, Windows Server 2012 R2 operating system, and Windows Server 2016 operating system.<br>Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
|
| 0x8 | TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE | If this bit is set, the trust link is a [cross-forest trust](https://msdn.microsoft.com/library/cc223126.aspx#gt_86f3dbf2-338f-462e-8c5b-3c8e05798dbc) [\[MS-KILE\]](https://msdn.microsoft.com/library/cc233855.aspx) between the root domains of two [forests](https://msdn.microsoft.com/library/cc223126.aspx#gt_fd104241-4fb3-457c-b2c4-e0c18bb20b62), both of which are running in a [forest functional level](https://msdn.microsoft.com/library/cc223126.aspx#gt_b3240417-ca43-4901-90ec-fde55b32b3b8) of DS\_BEHAVIOR\_WIN2003 or greater.<br>Only evaluated on Windows Server 2003 operating system, Windows Server 2008 operating system, Windows Server 2008 R2 operating system, Windows Server 2012 operating system, Windows Server 2012 R2 operating system, and Windows Server 2016 operating system.<br>Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
|
||||||
| 0x10 | TRUST\_ATTRIBUTE\_CROSS\_ORGANIZATION | If this bit is set, then the trust is to a domain or forest that is not part of the [organization](https://msdn.microsoft.com/library/cc223126.aspx#gt_6fae7775-5232-4206-b452-f298546ab54f). The behavior controlled by this bit is explained in [\[MS-KILE\]](https://msdn.microsoft.com/library/cc233855.aspx) section [3.3.5.7.5](https://msdn.microsoft.com/library/cc233949.aspx) and [\[MS-APDS\]](https://msdn.microsoft.com/library/cc223948.aspx) section [3.1.5](https://msdn.microsoft.com/library/cc223991.aspx).<br>Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016.<br>Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
|
| 0x10 | TRUST\_ATTRIBUTE\_CROSS\_ORGANIZATION | If this bit is set, then the trust is to a domain or forest that is not part of the [organization](https://msdn.microsoft.com/library/cc223126.aspx#gt_6fae7775-5232-4206-b452-f298546ab54f). The behavior controlled by this bit is explained in [\[MS-KILE\]](https://msdn.microsoft.com/library/cc233855.aspx) section [3.3.5.7.5](https://msdn.microsoft.com/library/cc233949.aspx) and [\[MS-APDS\]](https://msdn.microsoft.com/library/cc223948.aspx) section [3.1.5](https://msdn.microsoft.com/library/cc223991.aspx).<br>Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016.<br>Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
|
||||||
| 0x20 | TRUST\_ATTRIBUTE\_WITHIN\_FOREST | If this bit is set, then the trusted domain is within the same forest.<br>Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016. |
|
| 0x20 | TRUST\_ATTRIBUTE\_WITHIN\_FOREST | If this bit is set, then the trusted domain is within the same forest.<br>Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016. |
|
||||||
| 0x40 | TRUST\_ATTRIBUTE\_TREAT\_AS\_EXTERNAL | If this bit is set, then a cross-forest trust to a domain is to be treated as an external trust for the purposes of SID Filtering. Cross-forest trusts are [more stringently filtered](https://docs.microsoft.com/openspecs/windows_protocols/ms-adts/e9a2d23c-c31e-4a6f-88a0-6646fdb51a3c) than external trusts. This attribute relaxes those cross-forest trusts to be equivalent to external trusts. For more information on how each trust type is filtered, see [\[MS-PAC\]](https://msdn.microsoft.com/library/cc237917.aspx) section 4.1.2.2.<br>Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016.<br>Only evaluated if SID Filtering is used.<br>Only evaluated on cross-forest trusts having TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE.<br>Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
|
| 0x40 | TRUST\_ATTRIBUTE\_TREAT\_AS\_EXTERNAL | If this bit is set, then a cross-forest trust to a domain is to be treated as an external trust for the purposes of SID Filtering. Cross-forest trusts are [more stringently filtered](https://docs.microsoft.com/openspecs/windows_protocols/ms-adts/e9a2d23c-c31e-4a6f-88a0-6646fdb51a3c) than external trusts. This attribute relaxes those cross-forest trusts to be equivalent to external trusts.<br>Only evaluated on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016.<br>Only evaluated if SID Filtering is used.<br>Only evaluated on cross-forest trusts having TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE.<br>Can only be set if forest and trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WIN2003 or greater. |
|
||||||
| 0x80 | TRUST\_ATTRIBUTE\_USES\_RC4\_ENCRYPTION | This bit is set on trusts with the [trustType](https://msdn.microsoft.com/library/cc220955.aspx) set to TRUST\_TYPE\_MIT, which are capable of using RC4 keys. Historically, MIT Kerberos distributions supported only DES and 3DES keys ([\[RFC4120\]](https://go.microsoft.com/fwlink/?LinkId=90458), [\[RFC3961\]](https://go.microsoft.com/fwlink/?LinkId=90450)). MIT 1.4.1 adopted the RC4HMAC encryption type common to Windows 2000 [\[MS-KILE\]](https://msdn.microsoft.com/library/cc233855.aspx), so trusted domains deploying later versions of the MIT distribution required this bit. For more information, see "Keys and Trusts", section [6.1.6.9.1](https://msdn.microsoft.com/library/cc223782.aspx).<br>Only evaluated on TRUST\_TYPE\_MIT |
|
| 0x80 | TRUST\_ATTRIBUTE\_USES\_RC4\_ENCRYPTION | This bit is set on trusts with the [trustType](https://msdn.microsoft.com/library/cc220955.aspx) set to TRUST\_TYPE\_MIT, which are capable of using RC4 keys. Historically, MIT Kerberos distributions supported only DES and 3DES keys ([\[RFC4120\]](https://go.microsoft.com/fwlink/?LinkId=90458), [\[RFC3961\]](https://go.microsoft.com/fwlink/?LinkId=90450)). MIT 1.4.1 adopted the RC4HMAC encryption type common to Windows 2000 [\[MS-KILE\]](https://msdn.microsoft.com/library/cc233855.aspx), so trusted domains deploying later versions of the MIT distribution required this bit. For more information, see "Keys and Trusts", section [6.1.6.9.1](https://msdn.microsoft.com/library/cc223782.aspx).<br>Only evaluated on TRUST\_TYPE\_MIT |
|
||||||
| 0x200 | TRUST\_ATTRIBUTE\_CROSS\_ORGANIZATION\_NO\_TGT\_DELEGATION | If this bit is set, tickets granted under this trust MUST NOT be trusted for delegation. The behavior controlled by this bit is as specified in [\[MS-KILE\]](https://msdn.microsoft.com/library/cc233855.aspx) section 3.3.5.7.5.<br>Only supported on Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016. |
|
| 0x200 | TRUST\_ATTRIBUTE\_CROSS\_ORGANIZATION\_NO\_TGT\_DELEGATION | If this bit is set, tickets granted under this trust MUST NOT be trusted for delegation. The behavior controlled by this bit is as specified in [\[MS-KILE\]](https://msdn.microsoft.com/library/cc233855.aspx) section 3.3.5.7.5.<br>Only supported on Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016. |
|
||||||
| 0x400 | TRUST\_ATTRIBUTE\_PIM\_TRUST | If this bit and the TATE bit are set, then a cross-forest trust to a domain is to be treated as Privileged Identity Management trust for the purposes of SID Filtering. For more information on how each trust type is filtered, see [\[MS-PAC\]](https://msdn.microsoft.com/library/cc237917.aspx) section 4.1.2.2.<br>Evaluated only on Windows Server 2016<br>Evaluated only if SID Filtering is used.<br>Evaluated only on cross-forest trusts having TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE.<br>Can be set only if the forest and the trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WINTHRESHOLD or greater. |
|
| 0x400 | TRUST\_ATTRIBUTE\_PIM\_TRUST | If this bit and the TATE bit are set, then a cross-forest trust to a domain is to be treated as Privileged Identity Management trust for the purposes of SID Filtering. For more information on how each trust type is filtered, see [\[MS-PAC\]](https://msdn.microsoft.com/library/cc237917.aspx) section 4.1.2.2.<br>Evaluated only on Windows Server 2016<br>Evaluated only if SID Filtering is used.<br>Evaluated only on cross-forest trusts having TRUST\_ATTRIBUTE\_FOREST\_TRANSITIVE.<br>Can be set only if the forest and the trusted forest are running in a forest functional level of DS\_BEHAVIOR\_WINTHRESHOLD or greater. |
|
||||||
|
@ -24,7 +24,7 @@ Describes the best practices, location, values, management, and security conside
|
|||||||
|
|
||||||
## Reference
|
## Reference
|
||||||
|
|
||||||
Beginning with Windows Server 2012 and Windows 8, Windows detects user-input inactivity of a sign-in (logon) session by using the security policy setting **Interactive logon: Machine inactivity limit**. If the amount of inactive time exceeds the inactivity limit set by this policy, then the user’s session locks by invoking the screen saver. This policy setting allows you to control the locking time by using Group Policy.
|
Beginning with Windows Server 2012 and Windows 8, Windows detects user-input inactivity of a sign-in (logon) session by using the security policy setting **Interactive logon: Machine inactivity limit**. If the amount of inactive time exceeds the inactivity limit set by this policy, then the user’s session locks by invoking the screen saver (screen saver should be active on the destination machine). This policy setting allows you to control the locking time by using Group Policy.
|
||||||
|
|
||||||
### Possible values
|
### Possible values
|
||||||
|
|
||||||
@ -40,6 +40,8 @@ Set the time for elapsed user-input inactivity based on the device’s usage and
|
|||||||
|
|
||||||
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
|
Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options
|
||||||
|
|
||||||
|
Computer Configuration\\Policies\\Windows Settings\\Security Settings\\Local Policies\\Security Options (While creating and linking group policy on server)
|
||||||
|
|
||||||
### Default values
|
### Default values
|
||||||
|
|
||||||
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
|
The following table lists the actual and effective default values for this policy. Default values are also listed on the policy’s property page.
|
||||||
|
@ -14,7 +14,8 @@ ms.localizationpriority: medium
|
|||||||
# Use Windows Event Forwarding to help with intrusion detection
|
# Use Windows Event Forwarding to help with intrusion detection
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
- Windows Server
|
||||||
|
|
||||||
Learn about an approach to collect events from devices in your organization. This article talks about events in both normal operations and when an intrusion is suspected.
|
Learn about an approach to collect events from devices in your organization. This article talks about events in both normal operations and when an intrusion is suspected.
|
||||||
|
|
||||||
|
@ -24,6 +24,9 @@ You can exclude certain files from Windows Defender Antivirus scans by modifying
|
|||||||
|
|
||||||
Generally, you shouldn't need to apply exclusions. Windows Defender Antivirus includes a number of automatic exclusions based on known operating system behaviors and typical management files, such as those used in enterprise management, database management, and other enterprise scenarios and situations.
|
Generally, you shouldn't need to apply exclusions. Windows Defender Antivirus includes a number of automatic exclusions based on known operating system behaviors and typical management files, such as those used in enterprise management, database management, and other enterprise scenarios and situations.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Automatic exclusions apply only to Windows Server 2016 and above.
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
>The default antimalware policy we deploy at Microsoft doesn't set any exclusions by default.
|
>The default antimalware policy we deploy at Microsoft doesn't set any exclusions by default.
|
||||||
|
|
||||||
|
@ -56,14 +56,11 @@ SIP is a built-in macOS security feature that prevents low-level tampering with
|
|||||||
## Installation and configuration overview
|
## Installation and configuration overview
|
||||||
There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac.
|
There are various methods and deployment tools that you can use to install and configure Microsoft Defender ATP for Mac.
|
||||||
In general you'll need to take the following steps:
|
In general you'll need to take the following steps:
|
||||||
- [Register macOS devices](#register-macos-devices) with Windows Defender ATP
|
- Ensure you have a Windows Defender ATP subscription and have access to the Windows Defender ATP Portal
|
||||||
- Deploy Microsoft Defender ATP for Mac using any of the following deployment methods and tools:
|
- Deploy Microsoft Defender ATP for Mac using one of the following deployment methods:
|
||||||
- [Microsoft Intune based deployment](#microsoft-intune-based-deployment)
|
* [Microsoft Intune based deployment](#microsoft-intune-based-deployment)
|
||||||
- [JAMF based deployment](#jamf-based-deployment)
|
* [JAMF based deployment](#jamf-based-deployment)
|
||||||
- [Manual deployment](#manual-deployment)
|
* [Manual deployment](#manual-deployment)
|
||||||
|
|
||||||
## Deploy Microsoft Defender ATP for Mac
|
|
||||||
Use any of the supported methods to deploy Microsoft Defender ATP for Mac
|
|
||||||
|
|
||||||
## Microsoft Intune based deployment
|
## Microsoft Intune based deployment
|
||||||
|
|
||||||
@ -293,7 +290,6 @@ After some time, the machine's User Approved MDM status will change to Yes.
|
|||||||
|
|
||||||
You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned.
|
You can enroll additional machines now. Optionally, can do it after system configuration and application packages are provisioned.
|
||||||
|
|
||||||
|
|
||||||
### Deployment
|
### Deployment
|
||||||
Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected.
|
Enrolled client machines periodically poll the JAMF Server and install new configuration profiles and policies as soon as they are detected.
|
||||||
|
|
||||||
@ -329,7 +325,7 @@ Thu Feb 21 11:17:23 mavel-mojave jamf[8051]: No patch policies were found.
|
|||||||
|
|
||||||
You can also check the onboarding status:
|
You can also check the onboarding status:
|
||||||
```
|
```
|
||||||
mavel-mojave:~ testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
mavel-mojave:~ testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
orgid : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
||||||
orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
orgid managed : 79109c9d-83bb-4f3e-9152-8d75ee59ae22
|
||||||
@ -351,13 +347,13 @@ For example, this script removes Microsoft Defender ATP from the /Applications d
|
|||||||
|
|
||||||
```
|
```
|
||||||
echo "Is WDAV installed?"
|
echo "Is WDAV installed?"
|
||||||
ls -ld '/Applications/Microsoft Defender.app' 2>/dev/null
|
ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null
|
||||||
|
|
||||||
echo "Uninstalling WDAV..."
|
echo "Uninstalling WDAV..."
|
||||||
rm -rf '/Applications/Microsoft Defender.app'
|
rm -rf '/Applications/Microsoft Defender ATP.app'
|
||||||
|
|
||||||
echo "Is WDAV still installed?"
|
echo "Is WDAV still installed?"
|
||||||
ls -ld '/Applications/Microsoft Defender.app' 2>/dev/null
|
ls -ld '/Applications/Microsoft Defender ATP.app' 2>/dev/null
|
||||||
|
|
||||||
echo "Done!"
|
echo "Done!"
|
||||||
```
|
```
|
||||||
@ -374,7 +370,7 @@ Configure the appropriate scope in the **Scope** tab to specify the machines tha
|
|||||||
You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded:
|
You can check that machines are correctly onboarded by creating a script. For example, the following script checks that enrolled machines are onboarded:
|
||||||
|
|
||||||
```
|
```
|
||||||
/Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+'
|
sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py | grep -E 'orgid effective : [-a-zA-Z0-9]+'
|
||||||
```
|
```
|
||||||
|
|
||||||
This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered.
|
This script returns 0 if Microsoft Defender ATP is registered with the Windows Defender ATP service, and another exit code if it is not installed or registered.
|
||||||
@ -435,7 +431,7 @@ The installation will proceed.
|
|||||||
The client machine is not associated with orgId. Note that the orgid is blank.
|
The client machine is not associated with orgId. Note that the orgid is blank.
|
||||||
|
|
||||||
```
|
```
|
||||||
mavel-mojave:wdavconfig testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
orgid :
|
orgid :
|
||||||
```
|
```
|
||||||
@ -449,7 +445,7 @@ The installation will proceed.
|
|||||||
3. Verify that the machine is now associated with orgId:
|
3. Verify that the machine is now associated with orgId:
|
||||||
|
|
||||||
```
|
```
|
||||||
mavel-mojave:wdavconfig testuser$ /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
mavel-mojave:wdavconfig testuser$ sudo /Library/Extensions/wdavkext.kext/Contents/Resources/Tools/wdavconfig.py
|
||||||
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
uuid : 69EDB575-22E1-53E1-83B8-2E1AB1E410A6
|
||||||
orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8
|
orgid : E6875323-A6C0-4C60-87AD-114BBE7439B8
|
||||||
```
|
```
|
||||||
|
@ -61,7 +61,7 @@ AppLocker uses path variables for well-known directories in Windows. Path variab
|
|||||||
| Windows directory or drive | AppLocker path variable | Windows environment variable |
|
| Windows directory or drive | AppLocker path variable | Windows environment variable |
|
||||||
| - | - | - |
|
| - | - | - |
|
||||||
| Windows | %WINDIR% | %SystemRoot% |
|
| Windows | %WINDIR% | %SystemRoot% |
|
||||||
| System32 | %SYSTEM32%| %SystemDirectory%|
|
| System32 and sysWOW64 | %SYSTEM32%| %SystemDirectory%|
|
||||||
| Windows installation directory | %OSDRIVE%|%SystemDrive%|
|
| Windows installation directory | %OSDRIVE%|%SystemDrive%|
|
||||||
| Program Files | %PROGRAMFILES%| %ProgramFiles% and %ProgramFiles(x86)%|
|
| Program Files | %PROGRAMFILES%| %ProgramFiles% and %ProgramFiles(x86)%|
|
||||||
| Removable media (for example, CD or DVD) | %REMOVABLE%| |
|
| Removable media (for example, CD or DVD) | %REMOVABLE%| |
|
||||||
|
@ -60,6 +60,8 @@ Unless your use scenarios explicitly require them, Microsoft recommends that you
|
|||||||
|Lee Christensen|@tifkin_|
|
|Lee Christensen|@tifkin_|
|
||||||
|Vladas Bulavas | Kaspersky Lab |
|
|Vladas Bulavas | Kaspersky Lab |
|
||||||
|Lasse Trolle Borup | Langkjaer Cyber Defence |
|
|Lasse Trolle Borup | Langkjaer Cyber Defence |
|
||||||
|
|Jimmy Bayne | @bohops |
|
||||||
|
|Philip Tsukerman | @PhilipTsukerman |
|
||||||
|
|
||||||
<br />
|
<br />
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Overview of Configuration score in Microsoft Defender Security Center
|
title: Overview of Configuration score in Microsoft Defender Security Center
|
||||||
description: Expand your visibility into the overall security configuration posture of your organization
|
description: Expand your visibility into the overall security configuration posture of your organization
|
||||||
keywords: configuration score, mdatp configuration score, secure score, security controls, improvement opportunities, security configuration score over time, security posture, baseline
|
keywords: configuration score, mdatp configuration score, secure score, security controls, improvement opportunities, security configuration score over time, security posture, baseline
|
||||||
search.product: Windows 10
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -49,7 +49,7 @@ If the machine was offboarded it will still appear in machines list. After 7 day
|
|||||||
If the machine is not sending any signals for more than 7 days to any of the Windows Defender ATP channels for any reason including conditions that fall under misconfigured machines classification, a machine can be considered inactive.
|
If the machine is not sending any signals for more than 7 days to any of the Windows Defender ATP channels for any reason including conditions that fall under misconfigured machines classification, a machine can be considered inactive.
|
||||||
|
|
||||||
|
|
||||||
Do you expect a machine to be in ‘Active’ status? [Open a support ticket ticket](https://support.microsoft.com/getsupport?wf=0&tenant=ClassicCommercial&oaspworkflow=start_1.0.0.0&locale=en-us&supportregion=en-us&pesid=16055&ccsid=636206786382823561).
|
Do you expect a machine to be in ‘Active’ status? [Open a support ticket](https://support.microsoft.com/getsupport?wf=0&tenant=ClassicCommercial&oaspworkflow=start_1.0.0.0&locale=en-us&supportregion=en-us&pesid=16055&ccsid=636206786382823561).
|
||||||
|
|
||||||
## Misconfigured machines
|
## Misconfigured machines
|
||||||
Misconfigured machines can further be classified to:
|
Misconfigured machines can further be classified to:
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Next-generation Threat & Vulnerability Management
|
title: Next-generation Threat & Vulnerability Management
|
||||||
description: This new capability uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.
|
description: This new capability uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations.
|
||||||
keywords: threat and vulnerability management, MDATP-TVM, vulnerability management, threat and vulnerability scanning
|
keywords: threat and vulnerability management, MDATP-TVM, vulnerability management, threat and vulnerability scanning
|
||||||
search.product: Windows 10
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -112,7 +112,6 @@ Icon | Description
|
|||||||
 | Threat & Vulnerability Management - possible active alert
|
 | Threat & Vulnerability Management - possible active alert
|
||||||
 | Threat & Vulnerability Management - recommendation insights
|
 | Threat & Vulnerability Management - recommendation insights
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Understand the Windows Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md)
|
- [Understand the Windows Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md)
|
||||||
- [View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md)
|
- [View the Security operations dashboard](security-operations-dashboard-windows-defender-advanced-threat-protection.md)
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Threat & Vulnerability Management scenarios
|
title: Threat & Vulnerability Management scenarios
|
||||||
description:
|
description: Learn how to use Threat & Vulnerability Management in the context of scenarios that Security Administrators encounter when collaborating with IT Administrators and SecOps while protecting their organization from cybersecurity threats.
|
||||||
keywords:
|
keywords: mdatp-tvm scenarios, mdatp, tvm, tvm scenarios, reduce threat & vulnerability exposure, reduce threat and vulnerability, improve security configuration, increase configuration score, increase threat & vulnerability configuration score, configuration score, exposure score, security controls
|
||||||
search.product: Windows 10
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,10 +1,10 @@
|
|||||||
---
|
---
|
||||||
title: What's in the dashboard and what it means for my organization's security posture
|
title: What's in the dashboard and what it means for my organization's security posture
|
||||||
description:
|
description: What's in the Threat & Vulnerability Management dashboard and how it can help SecOps and Security Administrators arrive at informed decisions in addressing cybersecurity threat vulnerabilities and building their organization's security resilience.
|
||||||
keywords:
|
keywords: mdatp-tvm, mdatp-tvm dashboard, threat & vulnerability management, risk-based threat & vulnerability management, security configuration, configuration score, exposure score
|
||||||
search.product: Windows 10
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
ms.prod: w10
|
ms.prod: eADQiWindows 10XVcnh
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -100,6 +100,9 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi
|
|||||||
>The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*.
|
>The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*.
|
||||||
>CFG will be enabled for *miles.exe*.
|
>CFG will be enabled for *miles.exe*.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If you have found any issues in this article, you can report it directly to a Windows Server/Windows Client partner or use the Microsoft technical support numbers for your country.
|
||||||
|
|
||||||
### Configure system-level mitigations with the Windows Security app
|
### Configure system-level mitigations with the Windows Security app
|
||||||
|
|
||||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||||
|
@ -17,7 +17,7 @@ ms.author: v-anbic
|
|||||||
|
|
||||||
[Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019.
|
[Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) help prevent actions and apps that malware often uses to infect computers. You can set attack surface reduction rules for computers running Windows 10 or Windows Server 2019.
|
||||||
|
|
||||||
To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjuction with ASR rules.
|
To use ASR rules, you need either a Windows 10 Enterprise E3 or E5 license. We recommend an E5 license so you can take advantage of the advanced monitoring and reporting capabilities available in Windows Defender Advanced Threat Protection (Windows Defender ATP). These advanced capabilities aren't available with an E3 license, but you can develop your own monitoring and reporting tools to use in conjunction with ASR rules.
|
||||||
|
|
||||||
## Exclude files and folders from ASR rules
|
## Exclude files and folders from ASR rules
|
||||||
|
|
||||||
|
@ -49,10 +49,11 @@ You can also use Group Policy, Intune, MDM, or System Center Configuration Manag
|
|||||||
|
|
||||||
The following controlled folder access events appear in Windows Event Viewer.
|
The following controlled folder access events appear in Windows Event Viewer.
|
||||||
|
|
||||||
Event ID | Description
|
| Event ID | Description |
|
||||||
5007 | Event when settings are changed
|
| --- | --- |
|
||||||
1124 | Audited controlled folder access event
|
| 5007 | Event when settings are changed |
|
||||||
1123 | Blocked controlled folder access event
|
| 1124 | Audited controlled folder access event |
|
||||||
|
| 1123 | Blocked controlled folder access event |
|
||||||
|
|
||||||
## Customize protected folders and apps
|
## Customize protected folders and apps
|
||||||
|
|
||||||
|
@ -29,7 +29,6 @@ Windows 10 provides IT professionals with advanced protection against modern sec
|
|||||||
|
|
||||||
## Learn more
|
## Learn more
|
||||||
|
|
||||||
- [Windows 10 roadmap](https://www.microsoft.com/en-us/WindowsForBusiness/windows-roadmap)
|
|
||||||
- [Windows 10 release information](https://technet.microsoft.com/windows/release-info)
|
- [Windows 10 release information](https://technet.microsoft.com/windows/release-info)
|
||||||
- [Windows 10 update history](https://support.microsoft.com/help/12387/windows-10-update-history)
|
- [Windows 10 update history](https://support.microsoft.com/help/12387/windows-10-update-history)
|
||||||
- [Windows 10 content from Microsoft Ignite](https://go.microsoft.com/fwlink/p/?LinkId=613210)
|
- [Windows 10 content from Microsoft Ignite](https://go.microsoft.com/fwlink/p/?LinkId=613210)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user