Commit Graph

6238 Commits

Author SHA1 Message Date
dcdb1770c8 Merge branch 'main' into vp-collapse 2023-04-18 12:58:25 -04:00
7ba6866c3f Update policy-csp-audit.md 2023-04-14 16:10:14 -05:00
49bd2e1c33 Update passportforwork-csp.md
Acro edits.
2023-04-14 16:08:01 -05:00
2328fc5c58 Merge branch 'main' into vp-csp-changes 2023-04-14 15:48:56 -05:00
ee710a0333 Update PDE CSP 2023-04-14 16:00:36 -04:00
0ac5a4a9d3 Fix broken links 2023-04-14 14:26:07 -04:00
94c3b6b8a8 Fix indentation 2023-04-14 13:26:21 -04:00
40302015c1 Remove collapsible sections 2023-04-14 12:51:37 -04:00
7111b7ce46 Update ms.topic to reference for CSP articles 2023-04-14 10:31:58 -04:00
5d94ca3538 Update mandatory-user-profile.md 2023-04-13 10:35:59 -04:00
dc13afe1fd Update mandatory-user-profile.md
add steps to set the correct owner for the mandatory profile folders
2023-04-13 15:08:39 +02:00
309999997a Update defender-csp.md
Acro edits.
2023-04-12 10:08:31 -05:00
a86ec42861 Update policy-csp-controlpolicyconflict.md 2023-04-12 10:14:49 -04:00
0ecd9deff8 Update defender-csp.md
Move the note inside editable section
2023-04-12 10:09:14 -04:00
7c6db515fe Update defender-csp.md
Adding info about MDMWinsOverGP not being relevant for the Defender CSP.  MDMWinsOverGP only applies to the Windows Client Management CSP.
2023-04-12 06:57:39 -07:00
9c634d7184 Remove Unknown OS Name 2023-04-07 12:05:15 -04:00
0f1ded3b21 Update LAPS CSP 2023-04-07 11:43:30 -04:00
cd7ac96a53 Update docfx.json 2023-04-06 10:58:03 -04:00
68dbabe256 Update policy-csp-admx-ncsi.md 2023-04-03 10:46:03 -04:00
235ff8862c Update policy-csp-admx-ncsi.md
Added information about policy options that apply exclusively to DirectAccess technology.
2023-04-03 11:19:48 +03:00
8f4699ff43 Update dynamicmanagement-csp.md
Removed highpri tag
2023-03-30 16:52:13 -04:00
cca3f13f8e More exclusions 2023-03-28 18:15:33 -04:00
01014008b3 Update Surface Hub applicability 2023-03-28 17:28:03 -04:00
750b34aa2e Add override for AllowScanningNetworkFiles 2023-03-27 16:30:51 -04:00
30329054f8 Mo Updates 2023-03-27 15:19:01 -04:00
baa321ad17 Merge branch 'main' of https://github.com/vinaypamnani-msft/windows-docs-pr into vp-csp-2303 2023-03-27 14:49:32 -04:00
14a6d5db74 Update policy-csp-admx-smartcard.md
Acro edit.
2023-03-27 11:25:17 -05:00
7bc4dc315b Update laps-csp.md
Acro edits.
2023-03-27 11:22:23 -05:00
abe2cdddf2 Fix "the the" grammar typos. 2023-03-26 06:06:28 -07:00
480beb22a2 Change Surface Hub to Windows 10 Team 2023-03-24 12:24:29 -04:00
deb3f68bed Minor updates 2023-03-23 16:39:25 -04:00
432aedbdf3 Fix issue 11377 2023-03-23 14:11:42 -04:00
d60b9559e0 2303 CSP Updates 2023-03-23 12:13:46 -04:00
025cfd1870 Merge branch 'vp-csp-2303' of https://github.com/vinaypamnani-msft/windows-docs-pr into vp-csp-2303 2023-03-20 10:14:54 -04:00
f234cd3e7a Update TOC 2023-03-20 10:14:38 -04:00
da0cfac79d Merge branch 'main' into vp-csp-2303 2023-03-17 17:28:51 -06:00
e96f275160 Update windows/client-management/connect-to-remote-aadj-pc.md 2023-03-17 16:11:12 -07:00
e716104449 Learn Editor: Update connect-to-remote-aadj-pc.md 2023-03-17 15:35:22 -07:00
992c30bb00 Merge branch 'main' into vp-csp-2303 2023-03-17 16:33:20 -06:00
42da51b1ea Fix bookmark links 2023-03-17 18:05:45 -04:00
a5bd9984a0 Sort policies 2023-03-17 17:51:51 -04:00
e9df2acc54 Update Surface Hub applicability article 2023-03-17 17:37:19 -04:00
a5eb49416f Remove unreleased SurfaceHub policies 2023-03-17 16:46:44 -04:00
42b4ac59fc Merge branch 'main' into main 2023-03-17 13:41:36 -07:00
2a06b2ea77 Update connect-to-remote-aadj-pc.md 2023-03-17 14:32:02 -04:00
c7685c7057 Update connect-to-remote-aadj-pc.md
I added some new suggested verbiage to the page.

Also some other feedback. 
- It took me a while to figure out that the Supported configurations table only applied to the Connect without Azure AD authentication section.  Can you add a table or note to the Connect with Azure AD Authentication section that either enumerates all the credential types that are supported or that makes this more clear?  To me it first made me think that credentials like FIDO2 security keys were not supported with Azure AD Authentication, but after testing I discovered that they are in fact supported.  

- Can you add notes about how long the RDP session lives by default. WIth Azure AD Authentication, even signing out of the remote desktop does not cause the user to reauth again when signing back in. The session length seems quite long. Maybe add a suggestion for CA Policy Session Controls to limit the session length also. 

- The App name/appID needed in the CA Policy isn't easy to find, so I put a specific mention of it in the page.
2023-03-17 08:47:08 -07:00
381af7cc81 add the adobe-target metadata for A/B testing 2023-03-17 18:02:37 +08:00
a29f4c4b42 Update new-in-windows-mdm-enrollment-management.md
Line 32: Asssessments > Assessments
Line 165: Add a comma to enclose a clause.
Line 312: check-in > check in (verb)
[Correctness section of the scorecard](https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/11404e7b-c19b-419f-8da4-af0caf0f0f59#CORRECTNESS)
2023-03-14 16:25:07 -06:00
0b74c27ad4 Remove change-history-for-mdm-documentation.md 2023-03-14 15:49:18 -04:00
3859eff552 Update TOC 2023-03-14 15:26:16 -04:00