Commit Graph

1538 Commits

Author SHA1 Message Date
cd70b5b44c fixed link 2020-03-23 13:19:44 -07:00
b984f28547 renamed file with underscores 2020-03-23 13:18:49 -07:00
1e1aa93e8d update screenshot and missing feature description
https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6054
2020-03-23 19:29:34 +02:00
69c1584504 pencil edit 2020-03-17 16:46:12 -07:00
a658b3d194 Edit Pass: Windows Security articles 2020-03-17 16:30:42 -07:00
6e1db8a449 Update windows/security/identity-protection/hello-for-business/hello-deployment-guide.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2020-03-17 11:35:03 +05:00
2113db1064 Update the content
WHFB has 3 deployment models whereas the document was showing 2. Updated the content.

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6168
2020-03-16 19:49:13 +05:00
421ee5cea2 Merge pull request #6179 from SoccerCore11/patch-1
Update feature-multifactor-unlock.md
2020-03-12 11:04:00 -07:00
895de7e1d9 replaced invalid link to new link
as per user report #6214 .  i replaced  invalid to correct link 
**https://docs.microsoft.com/windows/security/information-protection/tpm/tpm-recommendations**
2020-03-12 22:12:24 +05:30
cdc35354c6 added dg readiness tool link
i added  the dg readiness tool website link next to  hardware readiness tool
2020-03-12 21:27:43 +05:30
c9c0159b8d Merge pull request #2219 from mapalko/whfb-bio-changes
Whfb bio changes
2020-03-06 09:17:40 -08:00
ffee722399 Update feature-multifactor-unlock.md
Updated Requirements section to be more clear that the device deployment options were 'or' rather than 'and'.
2020-03-06 10:30:25 -05:00
aaf5a133db adding more information about template storage 2020-03-05 16:39:31 -08:00
2da1ac16e1 removing fingerprint section from WHFB overview 2020-03-05 16:14:39 -08:00
e34089b9ca Adding additional notes about server 2019 key trust bug 2020-03-05 15:59:04 -08:00
32de797871 Subject update
we have had cases coming, since we have the word optional, Customer leaves subject empty and PIN authentication fails as DC -KDC service can not accept its own DC certificate issued by internal CA. 

previous line 
Optionally, the certificate Subject section should contain the directory path of the server object (the distinguished name).
corrected 
The certificate Subject section should contain the directory path of the server object (the distinguished name).
2020-03-05 11:36:31 -08:00
ffb182a4a2 Corrected note markup, added white space 2020-03-04 14:04:52 -08:00
fbf8b42ff6 Merge pull request #6057 from joinimran/patch-57
Addition of a question
2020-03-04 08:50:00 -08:00
56f1d269c5 Unite the bold text of a selected option
This is a single option in the configuration and splitting the bold text sections makes it look like there are 3 different options.
2020-03-01 14:49:57 +02:00
88dec4cd87 Merge pull request #6137 from Towstie/patch-1
Fix Typo
2020-02-29 14:53:05 +00:00
68085758d2 Changing working of Enterprise vs Pro note. 2020-02-28 15:18:30 -08:00
962e3c835d Fix Typo
Changed "memebers" to "members".
2020-02-28 13:38:42 -07:00
b873735097 Update windows/security/identity-protection/hello-for-business/hello-faq.md
Co-Authored-By: mapalko <mapalko@microsoft.com>
2020-02-27 14:32:48 +05:00
4f92b35f8c Update windows/security/identity-protection/hello-for-business/hello-faq.md
Co-Authored-By: mapalko <mapalko@microsoft.com>
2020-02-27 14:32:36 +05:00
0d2ee0d912 CAT Auto Pulish for Windows Release Messages - 20200219134607 (#2081)
* Update vpnv2-profile-xsd.md

<MachineMethod>Eap</MachineMethod> should’t be in the example, because

1.  MachineMethod can only be Certificate 
------ see https://docs.microsoft.com/en-gb/windows/client-management/mdm/vpnv2-csp 
........................VPNv2/ProfileName/NativeProfile/Authentication/MachineMethod
                         This is only supported in IKEv2.
                                This value can be one of the following:
                                •	Certificate

2. A profile conatins either UserMethod or MachineMethod but not both

* Update advanced-troubleshooting-802-authentication.md

* missing "r" in $OSArch

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5972

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>

* Test, updated Caps

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Multiple corrections required (see notes)

@Dansimp 

1) This note is contradictory - need to clarify this:
"> [!NOTE]
> Device credential group policy setting is not supported for enrolling into Microsoft Intune. "
2) We should remove all references to "Primary Domain Controller" (PDC) - it's not the 90's with Windows NT 4.0 anymore !
3) "Restart the Domain Controller for the policy to be available."
   A reboot is not required
4) "Enforce a GPO link"
   This is in contradiction with our recommended practices. We should not be suggesting this.

* Update web-content-filtering.md

fixed extra space

* CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200219114538 (#2080)

Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>

Co-authored-by: rogersoMS <44718379+rogersoMS@users.noreply.github.com>
Co-authored-by: Daniel Simpson <dansimp@microsoft.com>
Co-authored-by: Office Content Publishing <34616516+officedocspr@users.noreply.github.com>
Co-authored-by: Tina Burden <v-tibur@microsoft.com>
Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>
2020-02-19 13:58:02 -08:00
cf625df02c Update windows/security/identity-protection/hello-for-business/hello-faq.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2020-02-18 11:05:21 +05:00
b80d20de5f Update windows/security/identity-protection/hello-for-business/hello-hybrid-key-whfb-settings-pki.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2020-02-16 08:04:44 +05:00
069729b22d Update windows/security/identity-protection/hello-for-business/hello-faq.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2020-02-14 22:44:55 +05:00
b9672d67dc Update windows/security/identity-protection/hello-for-business/hello-faq.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2020-02-14 22:44:12 +05:00
c5fe080f8b Addition of a question
I have added a question based on user feedback.

Problem:  https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5423
2020-02-14 19:55:56 +05:00
de343d2287 Merge pull request #2055 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
2020-02-13 10:33:10 -08:00
3353fb409a Merge pull request #6020 from illfated/windows_server_20016
Local Accounts/Administrator account: 20016 typo
2020-02-12 15:13:16 -08:00
cc88b4b155 Added end punctuation and a space 2020-02-12 13:40:41 -08:00
6e3a4b1002 Added missing end punctuation 2020-02-12 13:35:12 -08:00
0e91e0d6fb Merge pull request #6012 from VLG17/patch-60
Preferred should be TPM 2.0, not firmware
2020-02-12 10:51:56 -08:00
a21cfd5924 Merge pull request #6015 from aczechowski/patch-1
revise ConfigMgr FAQ for WHfB
2020-02-12 10:49:14 -08:00
cd1b6b8b3d Local Accounts/Administrator account: 20016 typo
Description:

As pointed out in issue ticket #6017 (Double 0 typo), Windows Server
2016 contains a double 0 typo which needs correction.

Thanks to vainkop for making us aware of this typo issue.

Proposed change:
- Remove the extra 0 to spell Windows Server 2016 correctly.

issue ticket closure or reference:

Closes #6017
2020-02-08 17:27:43 +01:00
85d4d35fb4 CAT Auto Pulish for Windows Release Messages - 20200207135623 (#2013)
* updated links

* updated links

* CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200207130559 (#2011)

Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>

* added an s

Co-authored-by: Beth Levin <40870842+levinec@users.noreply.github.com>
Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>
2020-02-07 14:15:12 -08:00
201dbc6404 revise ConfigMgr FAQ 2020-02-07 10:26:09 -08:00
102979dd9b Preffered should be TPM 2.0, not firmware
https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5853
2020-02-07 15:12:39 +02:00
7d086b8170 Merge branch 'master' into ConfigRebrand-Four 2020-02-06 17:26:32 -08:00
8fc7455bef Merge pull request #5968 from mapalko/patch-9
Update error with non-destructive PIN reset note
2020-02-05 15:37:56 -08:00
0cce48ddf0 Fixing build warnings 2020-02-03 08:42:43 +02:00
27f74cb32f Merging changes synced from https://github.com/MicrosoftDocs/windows-docs-pr (branch live) 2020-01-31 23:54:28 +00:00
7e09ce0ea2 Update error with non-destructive PIN reset note 2020-01-31 15:51:41 -08:00
8985b4a89e Update windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-pki.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2020-01-30 12:05:15 +05:00
3415504f5b Merge branch 'master' into ConfigRebrand-Four 2020-01-29 17:48:57 -08:00
fabf1b6d14 Update hello-hybrid-cert-whfb-settings-pki.md 2020-01-29 09:59:21 +05:00
6cd020755d Note about request hash vs certificate hash.
https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5657
2020-01-28 12:09:34 +02:00
4e93139105 thirteen files from identity and threat 2020-01-27 11:39:49 -08:00