0db214517c
do-wufbr-MAXADO-7715481
2023-03-20 15:26:09 -07:00
6ece451d8d
Second draft
2023-03-20 15:49:05 -04:00
e85a6a6a79
Draft TOC update
2023-03-20 15:27:05 -04:00
dc31693aa1
Clarify where VM can be hosted
...
Clarified where VM can be hosted
2023-03-20 15:07:40 -04:00
d2ab2ee076
Merge branch 'main' into repo_sync_working_branch
2023-03-20 13:24:13 -05:00
1b55db9c49
Merge pull request #11350 from msbemba/patch-34
...
Update windows-10-subscription-activation.md
2023-03-20 13:52:18 -04:00
0ab0223ba5
broken links MAXADO-7714674
2023-03-20 10:50:29 -07:00
eb8596a851
rearrange perms
2023-03-20 10:16:36 -07:00
95221c1731
rearrange perms
2023-03-20 10:04:15 -07:00
84baf6c47d
Merge branch 'main' into v-alemieux-working
2023-03-20 12:53:46 -04:00
8139d5c203
Merge branch 'main' into vp-smartscreen
2023-03-20 11:02:16 -05:00
854addccb7
Merge branch 'main' into repo_sync_working_branch
2023-03-20 10:44:58 -05:00
aed7dd5ed9
Merge branch 'main' into vp-smartscreen
2023-03-20 10:43:30 -05:00
bb31a7396c
Merge branch 'main' into WDAC-Docs
2023-03-20 10:40:46 -05:00
f79dab126a
Refresh SmartScreen overview
2023-03-20 11:27:57 -04:00
e25af64192
Merge pull request #11417 from HerbertMauerer/patch-7
...
Update event-4769.md
2023-03-20 11:22:25 -04:00
daee9cb7d3
wufbr-upload-latency
2023-03-20 08:21:57 -07:00
0c3889419f
Update windows/security/threat-protection/auditing/event-4769.md
2023-03-20 11:08:10 -04:00
c1053033ec
Update windows/security/threat-protection/auditing/event-4769.md
2023-03-20 11:08:04 -04:00
47a7c7eaaf
Update windows/security/threat-protection/auditing/event-4769.md
2023-03-20 11:07:57 -04:00
d617c38cbc
Merge pull request #11416 from mudeeb/patch-1
...
Update hello-faq.yml
2023-03-20 11:03:11 -04:00
34c16a9719
Update event-4769.md
...
Add details to some of the error logging details...
2023-03-20 15:49:46 +01:00
025cfd1870
Merge branch 'vp-csp-2303' of https://github.com/vinaypamnani-msft/windows-docs-pr into vp-csp-2303
2023-03-20 10:14:54 -04:00
f234cd3e7a
Update TOC
2023-03-20 10:14:38 -04:00
3e30d1f303
Update hello-faq.yml
...
PIN 1231 doesn't have a constant delta (1,1,8), so it's allowed ====>must be change to ====>PIN 1231 doesn't have a constant delta (1,1,2), so it's allowed.
8 to 2 this is the change
2023-03-20 12:51:55 +03:00
8b11ac9cc3
Clarify when certificates are re-validated
...
The original wording implied that the client would trigger when the certificate expired. It doesn't; the client instead triggers whenever and at that point determines if the certificate has expired.
2023-03-19 20:30:54 -07:00
9702ca1520
Merge branch 'main' into WDAC-Docs
2023-03-18 07:18:54 -07:00
0964d37f99
Update introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
2023-03-18 07:17:58 -07:00
da0cfac79d
Merge branch 'main' into vp-csp-2303
2023-03-17 17:28:51 -06:00
e96f275160
Update windows/client-management/connect-to-remote-aadj-pc.md
2023-03-17 16:11:12 -07:00
e716104449
Learn Editor: Update connect-to-remote-aadj-pc.md
2023-03-17 15:35:22 -07:00
992c30bb00
Merge branch 'main' into vp-csp-2303
2023-03-17 16:33:20 -06:00
42da51b1ea
Fix bookmark links
2023-03-17 18:05:45 -04:00
a5bd9984a0
Sort policies
2023-03-17 17:51:51 -04:00
e9df2acc54
Update Surface Hub applicability article
2023-03-17 17:37:19 -04:00
a5eb49416f
Remove unreleased SurfaceHub policies
2023-03-17 16:46:44 -04:00
42b4ac59fc
Merge branch 'main' into main
2023-03-17 13:41:36 -07:00
49fd334af8
Merge branch 'main' into repo_sync_working_branch
2023-03-17 13:53:42 -05:00
2a06b2ea77
Update connect-to-remote-aadj-pc.md
2023-03-17 14:32:02 -04:00
caa42dc9fe
Merge branch 'MicrosoftDocs:main' into WDAC-Docs
2023-03-17 10:31:42 -07:00
c7685c7057
Update connect-to-remote-aadj-pc.md
...
I added some new suggested verbiage to the page.
Also some other feedback.
- It took me a while to figure out that the Supported configurations table only applied to the Connect without Azure AD authentication section. Can you add a table or note to the Connect with Azure AD Authentication section that either enumerates all the credential types that are supported or that makes this more clear? To me it first made me think that credentials like FIDO2 security keys were not supported with Azure AD Authentication, but after testing I discovered that they are in fact supported.
- Can you add notes about how long the RDP session lives by default. WIth Azure AD Authentication, even signing out of the remote desktop does not cause the user to reauth again when signing back in. The session length seems quite long. Maybe add a suggestion for CA Policy Session Controls to limit the session length also.
- The App name/appID needed in the CA Policy isn't easy to find, so I put a specific mention of it in the page.
2023-03-17 08:47:08 -07:00
381af7cc81
add the adobe-target metadata for A/B testing
2023-03-17 18:02:37 +08:00
4b8cbf7789
Merge branch 'main' into repo_sync_working_branch
2023-03-16 14:31:37 -07:00
e7f1d63bf3
Merge branch 'main' into WDAC-Docs
2023-03-16 14:02:17 -07:00
41926946f5
Updates to memory integrity topics
2023-03-16 13:57:31 -07:00
2e0c5a07af
Merge pull request #11391 from mitschmi/patch-2
...
Remove references to Kerberos from authentication documentation
2023-03-16 16:37:50 -04:00
a6d75e8261
Removed redundancy
2023-03-16 11:38:50 -07:00
e331954538
Merge branch 'patch-2' of https://github.com/SteveDiAcetis/windows-docs-pr into patch-2
2023-03-16 11:20:15 -07:00
1ed052d6ab
edit
2023-03-16 11:19:57 -07:00
213a8e179e
Consolidating tenant access and enterprise application information
2023-03-16 11:17:19 -07:00