Commit Graph

51382 Commits

Author SHA1 Message Date
0db214517c do-wufbr-MAXADO-7715481 2023-03-20 15:26:09 -07:00
6ece451d8d Second draft 2023-03-20 15:49:05 -04:00
e85a6a6a79 Draft TOC update 2023-03-20 15:27:05 -04:00
dc31693aa1 Clarify where VM can be hosted
Clarified where VM can be hosted
2023-03-20 15:07:40 -04:00
d2ab2ee076 Merge branch 'main' into repo_sync_working_branch 2023-03-20 13:24:13 -05:00
1b55db9c49 Merge pull request #11350 from msbemba/patch-34
Update windows-10-subscription-activation.md
2023-03-20 13:52:18 -04:00
0ab0223ba5 broken links MAXADO-7714674 2023-03-20 10:50:29 -07:00
eb8596a851 rearrange perms 2023-03-20 10:16:36 -07:00
95221c1731 rearrange perms 2023-03-20 10:04:15 -07:00
84baf6c47d Merge branch 'main' into v-alemieux-working 2023-03-20 12:53:46 -04:00
8139d5c203 Merge branch 'main' into vp-smartscreen 2023-03-20 11:02:16 -05:00
854addccb7 Merge branch 'main' into repo_sync_working_branch 2023-03-20 10:44:58 -05:00
aed7dd5ed9 Merge branch 'main' into vp-smartscreen 2023-03-20 10:43:30 -05:00
bb31a7396c Merge branch 'main' into WDAC-Docs 2023-03-20 10:40:46 -05:00
f79dab126a Refresh SmartScreen overview 2023-03-20 11:27:57 -04:00
e25af64192 Merge pull request #11417 from HerbertMauerer/patch-7
Update event-4769.md
2023-03-20 11:22:25 -04:00
daee9cb7d3 wufbr-upload-latency 2023-03-20 08:21:57 -07:00
0c3889419f Update windows/security/threat-protection/auditing/event-4769.md 2023-03-20 11:08:10 -04:00
c1053033ec Update windows/security/threat-protection/auditing/event-4769.md 2023-03-20 11:08:04 -04:00
47a7c7eaaf Update windows/security/threat-protection/auditing/event-4769.md 2023-03-20 11:07:57 -04:00
d617c38cbc Merge pull request #11416 from mudeeb/patch-1
Update hello-faq.yml
2023-03-20 11:03:11 -04:00
34c16a9719 Update event-4769.md
Add details to some of the error logging details...
2023-03-20 15:49:46 +01:00
025cfd1870 Merge branch 'vp-csp-2303' of https://github.com/vinaypamnani-msft/windows-docs-pr into vp-csp-2303 2023-03-20 10:14:54 -04:00
f234cd3e7a Update TOC 2023-03-20 10:14:38 -04:00
3e30d1f303 Update hello-faq.yml
PIN 1231 doesn't have a constant delta (1,1,8), so it's allowed ====>must be change to ====>PIN 1231 doesn't have a constant delta (1,1,2), so it's allowed.

8 to 2 this is the change
2023-03-20 12:51:55 +03:00
8b11ac9cc3 Clarify when certificates are re-validated
The original wording implied that the client would trigger when the certificate expired. It doesn't; the client instead triggers whenever and at that point determines if the certificate has expired.
2023-03-19 20:30:54 -07:00
9702ca1520 Merge branch 'main' into WDAC-Docs 2023-03-18 07:18:54 -07:00
0964d37f99 Update introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md 2023-03-18 07:17:58 -07:00
da0cfac79d Merge branch 'main' into vp-csp-2303 2023-03-17 17:28:51 -06:00
e96f275160 Update windows/client-management/connect-to-remote-aadj-pc.md 2023-03-17 16:11:12 -07:00
e716104449 Learn Editor: Update connect-to-remote-aadj-pc.md 2023-03-17 15:35:22 -07:00
992c30bb00 Merge branch 'main' into vp-csp-2303 2023-03-17 16:33:20 -06:00
42da51b1ea Fix bookmark links 2023-03-17 18:05:45 -04:00
a5bd9984a0 Sort policies 2023-03-17 17:51:51 -04:00
e9df2acc54 Update Surface Hub applicability article 2023-03-17 17:37:19 -04:00
a5eb49416f Remove unreleased SurfaceHub policies 2023-03-17 16:46:44 -04:00
42b4ac59fc Merge branch 'main' into main 2023-03-17 13:41:36 -07:00
49fd334af8 Merge branch 'main' into repo_sync_working_branch 2023-03-17 13:53:42 -05:00
2a06b2ea77 Update connect-to-remote-aadj-pc.md 2023-03-17 14:32:02 -04:00
caa42dc9fe Merge branch 'MicrosoftDocs:main' into WDAC-Docs 2023-03-17 10:31:42 -07:00
c7685c7057 Update connect-to-remote-aadj-pc.md
I added some new suggested verbiage to the page.

Also some other feedback. 
- It took me a while to figure out that the Supported configurations table only applied to the Connect without Azure AD authentication section.  Can you add a table or note to the Connect with Azure AD Authentication section that either enumerates all the credential types that are supported or that makes this more clear?  To me it first made me think that credentials like FIDO2 security keys were not supported with Azure AD Authentication, but after testing I discovered that they are in fact supported.  

- Can you add notes about how long the RDP session lives by default. WIth Azure AD Authentication, even signing out of the remote desktop does not cause the user to reauth again when signing back in. The session length seems quite long. Maybe add a suggestion for CA Policy Session Controls to limit the session length also. 

- The App name/appID needed in the CA Policy isn't easy to find, so I put a specific mention of it in the page.
2023-03-17 08:47:08 -07:00
381af7cc81 add the adobe-target metadata for A/B testing 2023-03-17 18:02:37 +08:00
4b8cbf7789 Merge branch 'main' into repo_sync_working_branch 2023-03-16 14:31:37 -07:00
e7f1d63bf3 Merge branch 'main' into WDAC-Docs 2023-03-16 14:02:17 -07:00
41926946f5 Updates to memory integrity topics 2023-03-16 13:57:31 -07:00
2e0c5a07af Merge pull request #11391 from mitschmi/patch-2
Remove references to Kerberos from authentication documentation
2023-03-16 16:37:50 -04:00
a6d75e8261 Removed redundancy 2023-03-16 11:38:50 -07:00
e331954538 Merge branch 'patch-2' of https://github.com/SteveDiAcetis/windows-docs-pr into patch-2 2023-03-16 11:20:15 -07:00
1ed052d6ab edit 2023-03-16 11:19:57 -07:00
213a8e179e Consolidating tenant access and enterprise application information 2023-03-16 11:17:19 -07:00