profile
viewpoint

VLG17/azure-docs 0

Open source documentation of Microsoft Azure

VLG17/Devices-docs 0

Contains documentation for Surface and Surface Hub

VLG17/IntuneDocs 0

Public repo for Intune content in OPS

VLG17/mdop-docs 0

Contains documentation for Microsoft Desktop Optimization Pack

VLG17/microsoft-365-docs 0

This repo is used to host the source for the Microsoft 365 documentation on https://docs.microsoft.com.

VLG17/msteams-docs 0

Source for the Microsoft Teams developer platform documentation.

VLG17/office-docs-powershell 0

PowerShell Reference for Office Products - Short URL: aka.ms/office-powershell

VLG17/OfficeDocs-DeployOffice 0

Office client deployment documentation

VLG17/OfficeDocs-Enterprise 0

Documentation for Office 365 Enterprise features

issue commentMicrosoftDocs/windows-itpro-docs

Table is misleading or poorly labled

@dsbrodbeck I see the Provider/source has been update to Security-Mitigations which is what the event shows:

image

Do you think an update/change is still needed? If yes, please share some details around what should be changed. Thanks in advance!

dsbrodbeck

comment created time in a day

issue commentMicrosoftDocs/windows-itpro-docs

Be practical

@RolandLeFranc As described in the article, you can set to the policy to Classic, Guest only or Not defined under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options.

If you feel this information is not enough, please propose what should be added to it. Thanks in advance for helping!

RolandLeFranc

comment created time in a day

PR opened MicrosoftDocs/windows-itpro-docs

add info about setting for Edge > 77

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8409

+6 -6

0 comment

1 changed file

pr created time in a day

push eventVLG17/windows-itpro-docs

VLG17

commit sha 2854c31f490d6b9a4ce88579bb07ef21e0c7cc1a

add info about setting for Edge > 77 https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8409

view details

push time in a day

issue commentMicrosoftDocs/windows-itpro-docs

Which windows server versions support cloud delivered protection

@weiss-gal According to this article, Windows Server 2016 and 2019.

weiss-gal

comment created time in 2 days

PR opened MicrosoftDocs/windows-itpro-docs

update link related to device restriction policy

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8400

+1 -1

0 comment

1 changed file

pr created time in 2 days

push eventVLG17/windows-itpro-docs

VLG17

commit sha 5d62b5ed3a1b98031952acd7fc40906b7186eab8

update link related to device restriction policy https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8400

view details

push time in 2 days

issue commentMicrosoftDocs/windows-itpro-docs

Intune Link

@win2000b Good catch. I guess this is the correct link. I'll create a request to have it added.

win2000b

comment created time in 2 days

issue commentMicrosoftDocs/windows-itpro-docs

More Information

@SquirrelAssassin The article you linked talkes about a public preview feature of Defender for Endpoint.

What part of the document you linked are you reffering to with the questions you asked? Could you please share some more details?

SquirrelAssassin

comment created time in 2 days

issue commentMicrosoftDocs/windows-itpro-docs

where to apply this setting

@tecxx It is indeed old information, but i wouldn't say invalid. It's just one piece of the puzzle.

Although you can specify the supported encryption type locally on the client, in the end in order for a ticket to be granted and for communication to take place, the client and domain controller must be able to agree on a supported encryption type. That's why i say the hardenning happens on the DC side, because if the DC is not configured to support (msDS-SupportedEncryptionTypes) the encryption type that the client is relaying (KRB_AS_REQ)for then the communication will not occur.

tecxx

comment created time in 2 days

issue commentMicrosoftDocs/windows-itpro-docs

License Requirements Microsoft Defender ATP

Does the 50 minimum license requirement for the Server version includes licenses of the Sever version itself?

If we place an order for lets say 150 licenses of "Microsoft Defender Advanced Threat Protection for Servers", does this order by itself cover the requirement?

@Lumute I think the answer to your questions is no, although i am not a licencing specialist, and i would advise you to discuss and confirm this over the channel used to purchase the licences.

My understanding is that extra to the Defender ATP for Server licences you also need to have a combined minimum of 50 licences for one of the licences described in the note.

supercrisz

comment created time in 2 days

push eventVLG17/windows-itpro-docs

VLG17

commit sha fc189fc8a8f16f81d2d6ba7e07f077696d31cd52

Update windows/security/identity-protection/hello-for-business/hello-feature-remote-desktop.md Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com>

view details

push time in 2 days

issue commentMicrosoftDocs/windows-itpro-docs

where to apply this setting

@tecxx Your understanding is correct. The "hardenning" happens at the DC level, where the KDC who grants the tickets resides.

From a client perspective the only requirement is that it has a Kerberos client installed (which Windows has), and that it can communicate with the KDC to get it’s tickets.

Keep in mind that the recommendation is to have only AES encryption types allowed (disable RC4). More details here

tecxx

comment created time in 5 days

issue commentMicrosoftDocs/windows-itpro-docs

Please Add details about supported enrollment device type with Conditional access and defender ATP compliance policy

@sufuruka Could you please share some more details regarding "Azure AD registered + Intune enrollment device does not support."

You mean a device which is currently in the intunre enrollment process but not yet enrolled, or what exactly?

sufuruka

comment created time in 5 days

PR opened MicrosoftDocs/windows-itpro-docs

add info about Cloud Windows Hello for Business deployment model

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8423

+2 -2

0 comment

1 changed file

pr created time in 5 days

push eventVLG17/windows-itpro-docs

VLG17

commit sha 174e4e6952bafe0ea434c4b8014d7385e6963f60

add info about Cloud Windows Hello for Business deployment model https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8423

view details

push time in 5 days

issue commentMicrosoftDocs/windows-itpro-docs

Device Inventory

@josuvil As the note at the top of the article you referenced indicates, there is a transition ongoing at the moment from Microsoft Defender ATP to Microsoft Defender for Endpoint, during which

We'll be updating names in products and in the docs in the near future

image

What you're seeing is the old wording, which will be updated to reflect what you see in the article.

Just as a sidenote, if you look at the video taking about TVM dashboard insights you'll see another name used: Machines List

image

josuvil

comment created time in 5 days

PR opened MicrosoftDocs/windows-itpro-docs

update wording

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8437

+1 -1

0 comment

1 changed file

pr created time in 5 days

push eventVLG17/windows-itpro-docs

VLG17

commit sha 57cee8adbb657c1e8fa7763cc5ab321676f08f50

update wording https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8437

view details

push time in 5 days

PR opened MicrosoftDocs/windows-itpro-docs

remove policy

Bitlocker is enabled by default on HoloLens 2. No need to enable it via CSP policy.

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8438

+0 -1

0 comment

1 changed file

pr created time in 5 days

push eventVLG17/windows-itpro-docs

VLG17

commit sha cd1a8187a990748cd8ea2986784c710d79af8d6d

remove policy Bitlocker is enabled by default on HoloLens 2. No need to enable it via CSP policy. https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8438

view details

push time in 5 days

issue commentMicrosoftDocs/windows-itpro-docs

Security/RequireDeviceEncryption is not supported on HoloLens 2

@kagillig Good catch, because Bitlocker is always enabled on HoloLens 2. I'll create a request to have it removed from the list.

kagillig

comment created time in 5 days

issue commentMicrosoftDocs/windows-itpro-docs

The details of the description timeout in the content of this document are not clear

@goxia

@goxia Could you please share exactly what your script is doing? Installing and configuring a certai Windows app? I think @MaratMussabekov already provided the answer, meaning that it may be extended past the OOBE and procesed in the background, meaning what you saw, that it did not hit the 30 minutes provisioning process timeout.

Yes, I install applications at this stage, such as antivirus software, Windows Update patches. The actual installation time was more than 30 minutes without any timeout or abnormal interruption.

So you found yourself in the scenario identified by @MaratMussabekov, correct? In that case it's normal that you don't see the timeout.

"When the provisioning engine applies provisioning packages in the %ProgramData%\Microsoft\Provisioning folder, certain runtime setting applications, such as the setting to install and configure Windows apps, may be extended past the OOBE pass and continually be processed in the background when the device gets to the desktop."

goxia

comment created time in 13 days

issue commentMicrosoftDocs/windows-itpro-docs

The details of the description timeout in the content of this document are not clear

@goxia Could you please share exactly what your script is doing? Installing and configuring a certai Windows app?

I think @MaratMussabekov already provided the answer, meaning that it may be extended past the OOBE and procesed in the background, meaning what you saw, that it did not hit the 30 minutes provisioning process timeout.

goxia

comment created time in 14 days

issue commentMicrosoftDocs/windows-itpro-docs

Windows 10 1909

@holoholo808 Could you help with a few details so i understand this issue better?

When I change the network location from public to private, the UAC message appears.

What UAC message? Could you share a printscreen?

I have also tested it on the Windows 10 1709 build, there it worked as a domain user without policy.

What does it mean that it worked? You did not get the UAC pop-up when changing the network location from public to private?

With Windows 10 1909 it doesn't work with or without policy anymore. So this policy doesn't really make sense

What do you mean with it doesn't work? Althoug you set the network location via policy, it does not stick, or what?

Thanks in advance for providing these answers in order to narrow down the issue.

Please also keep in mind that our goal is to identify if we need to change anything with the documentation that you've linked. Although we can do a best effort, the goal of solving a technical issue falls under the responsability of support.

holoholo808

comment created time in 16 days

issue commentMicrosoftDocs/windows-itpro-docs

Wrong information

@j3atuhan The prerequisite for using the entire feature-set of attack surface reduction rules is a valid Windows 10 Enterprise license. Not E3 or E5.

E5 will give you on top of that advanced management capabilities, which you don't get with E3 (although you can still use Event Viewer to review attack surface reduction rule events).

So you being able to enable rules with an E3 licese in perfectly fine. I assume you also have Windows 10 Enterprise, which gives you this ability.

j3atuhan

comment created time in 16 days

issue commentMicrosoftDocs/windows-itpro-docs

How does this related to the user specific setting, 'this account supports AES 256 bit encryption'

@CXMelga Although not an official MS article, this blog describes the behaviour quite well.

According to Microsoft’s [MS-ADA2], “The Key Distribution Center (KDC) uses this information [msDS-SupportedEncryptionTypes] while generating a service ticket for this account.” So even if a domain supports AES encryption (i.e. domain functional 2008 and above) the value of the msDS-SupportedEncryptionTypes field on the account with the requested SPN registered is what determines the encryption level for the service ticket returned in the Kerberoasting process.

According to MS-KILE 3.1.1.5 the default value for this field is 0x1C (RC4_HMAC_MD5 | AES128_CTS_HMAC_SHA1_96 | AES256_CTS_HMAC_SHA1_96 = 28) for Windows 7+ and Server 2008R2+. This is why service tickets for machines nearly always use AES256, as the highest mutually supported encryption type will be used in a Kerberos ticket exchange

This is where the answer to your question lies:

If we select “This account supports AES [128/256] bit encryption” in Active Directory Users and Computers, then the msDS-SupportedEncryptionTypes is set to 24, specifying only AES 128/256 encryption should be supported.

If you don't specify this explicitely, although in your example you still get AES 265 encrypted Kerberos tickets, this does not exclude the posibility of getting lower encryption grade tickets. If you want to be 100% sure this does not happen, you need to select that checkmark.

CXMelga

comment created time in 16 days

issue commentMicrosoftDocs/windows-itpro-docs

Conflict of information

@pstakuu Did you get to find a suitable value for Max Cache Age?

Regarding your initial ask, i don't think we're comparing the same thing. One article refers to Microsoft CSEO (Core Services Engineering and Operations) and the other one refers to Microsoft IT. In my understanding they are not one and the same entity, hence the differences that you spotted in terms of bandwidth utilization.

pstakuu

comment created time in 22 days

PR opened MicrosoftDocs/windows-itpro-docs

add info about Microsoft To Do

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6376

+3 -0

0 comment

1 changed file

pr created time in 22 days

push eventVLG17/windows-itpro-docs

VLG17

commit sha dc0aa7b9d167b84a02613643a9b5b249dd22cb29

add info about Microsoft To Do https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6376

view details

push time in 22 days

issue commentMicrosoftDocs/windows-itpro-docs

What does "Not Used" mean?

@illfated My understanding is that the settings exist and can be used but there is no article created to describe them in detail. I think it would be best to hear the author's opinion here.

@nam31 could you help with reaching out to the author for a confirmation regarding what "not used" means in this context?

itguysocal

comment created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha 7bdffd4aa7ad7b173f1d1054e3485a4edd5d6571

Update windows/application-management/apps-in-windows-10.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

view details

push time in a month

pull request commentMicrosoftDocs/windows-itpro-docs

update apps for 2004

Copy review - Please note: The table does not render correctly. Also, there is one minor edit.

@JohanFreelancer9 Could you please let me know what i need to change to have it render correctly?

VLG17

comment created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha 4b68c4b2823c88cf302c4afdf8a715f59e20c6e1

Update windows/application-management/apps-in-windows-10.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

view details

push time in a month

issue commentMicrosoftDocs/windows-itpro-docs

Doc updates

@bledMS82 Keeping in mind the note at the top of the article, i think it's best to follow the new steps described here

image

bledMS82

comment created time in a month

issue commentMicrosoftDocs/windows-itpro-docs

How WIP works with sensitivity labels link is broken

@illfated Thank you for looking into it. It confirms my findings.

@uowdaniel No worries, i understand it's been a long time since you found this. Since we cannot find the original article that contains the incorrect link, i'll just say that it was fixed (until proven wrong) in the meantime.

If we manage to identify it again, we will fix it.

uowdaniel

comment created time in a month

PR opened MicrosoftDocs/mdop-docs

add link related to server DOP

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6785

+4 -0

0 comment

1 changed file

pr created time in a month

push eventVLG17/mdop-docs

VLG17

commit sha cc86003d298fe29768030871d13c025164aa83c3

add link related to server DOP https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6785

view details

push time in a month

issue commentMicrosoftDocs/windows-itpro-docs

What does "Not Used" mean?

@itguysocal I guess @RAJU2529 answered your question. Can we help with anything else? Do you think we need to add something to the article to make this more clear?

itguysocal

comment created time in a month

PR opened MicrosoftDocs/windows-itpro-docs

add info about synchronized identities

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6759

+1 -1

0 comment

1 changed file

pr created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha 27960348b11a645b43022b6cbddf8a2e695e8fb5

add info about synchronized identities https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6759

view details

push time in a month

issue commentMicrosoftDocs/windows-itpro-docs

Studio 2 erroneously listed as supported by New Surface Dock 2

@danchar4 I see that Studio 2 is not listed anymore, so it's fixed now.

danchar4

comment created time in a month

issue commentMicrosoftDocs/windows-itpro-docs

Wrong information about Account Operators

@alex-456 One can edit the "Members" tab of Account and Server Operators, but not the "Member of" tab.

My understanding is that the second sentence talks about the "Members" tab which can be edited.

image

image

alex-456

comment created time in a month

PR opened MicrosoftDocs/windows-itpro-docs

update naming

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6806

+1 -1

0 comment

1 changed file

pr created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha e36795e3781b1ad4080a3ac9b8ac761b2927d875

update naming https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6806

view details

push time in a month

issue commentMicrosoftDocs/windows-itpro-docs

Unclear wording

@markstan A detailed description has been added to the article:

will completely reset the Windows Update client settings. It has been tested on Windows 7, 8, 10, and Windows Server 2012 R2. It will configure the services and registry keys related to Windows Update for default settings. It will also clean up files related to Windows Update, in addition to BITS related data.

markstan

comment created time in a month

issue commentMicrosoftDocs/windows-itpro-docs

How WIP works with sensitivity labels link is broken

@uowdaniel Could you please also share the article that contains the broken link which you referenced above?

uowdaniel

comment created time in a month

PR opened MicrosoftDocs/windows-itpro-docs

add newer windows versions (client and server)

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6872

+1 -1

0 comment

1 changed file

pr created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha 532bfd31d0675ed521d0c24c37f4e2170cc179a5

add newer windows versions (client and server) https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6872

view details

push time in a month

fork VLG17/mdop-docs

Contains documentation for Microsoft Desktop Optimization Pack

fork in a month

issue commentMicrosoftDocs/windows-itpro-docs

How do I get the version of the installed software?

@Keagnn Could you please pass this feedback forward with the help of User Voice?

When it gets implemented we can add it to the response presented as an example in the docs.

Keagnn

comment created time in a month

issue commentMicrosoftDocs/windows-itpro-docs

Feedback button doesn't work

@Rippsy The recommendation is to use the official channel, meaning User Voice. It's the best way to send feedback to the product group, have it voted by other people who have the same issue and get it to the top of the list, thus giving it a better chance of being implemented faster.

Rippsy

comment created time in a month

PR opened MicrosoftDocs/windows-itpro-docs

update wording

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5406

+1 -1

0 comment

1 changed file

pr created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha db040ff924bef7830bd55c002046e974600bf7af

update wording https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5406

view details

push time in a month

PR opened MicrosoftDocs/windows-itpro-docs

updated description to match GET request

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6851

+1 -1

0 comment

1 changed file

pr created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha 06ae1d44707f2ea9352659ee863d1a9eaa4606d4

updated description to match GET request https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6851

view details

push time in a month

issue commentMicrosoftDocs/windows-itpro-docs

link 404'ing

@Conan1989 Thank you for providing this feedback. The broken link was fixed with the help of @RAJU2529

Conan1989

comment created time in a month

issue commentMicrosoftDocs/windows-itpro-docs

Send file samples configuration not present in ConfigMgr

@alexverboon I recommend using the dedicated UserVoice for Configuration Manager to submit this feedback and get the option added to CM.

As soon as it's added we can update the article to reflect the change.

alexverboon

comment created time in a month

issue commentMicrosoftDocs/windows-itpro-docs

Multiple LogonCommand example and Debug information missing.

@hasan-hasanov You can find in this article 2 examples. Hope it helps.

Regarding your question, it's stated in the article you linked that only one command can be invoked, not multiple.

Logon command: Specifies a single command that will be invoked automatically after the sandbox logs on.

I recommend involving support in order for a support engineer to look at the code you are running inside the sandbox and answer your technical questions. If the conclusion is that we need to add something to the article, we will do that.

hasan-hasanov

comment created time in a month

issue commentMicrosoftDocs/windows-itpro-docs

Document that creating outbound firewall rules for some services does not work

@carlreinke My recommendation is to use UserVoice for submitting this feedback. This is the official feedback channel monitored by engineering.

I think there is more that needs to be understood behing the desire to allow just certain services and not all services that use svchost.exe. I don't think there is a defined list of services for which you can create outbound allow rules and other for which you cannot. It sounds specific to this scenario which needs to be understood in detail.

You could also open a support ticket, so a support engineer can look at your outbound rules, how you configured them and why they are not working. If the conclusion is that indeed for certain services you cannot set outbound rules, we can gladly specify this in the article.

carlreinke

comment created time in a month

issue commentMicrosoftDocs/windows-itpro-docs

Is CHAP the only affected protocol?

@ivandretvic According to this article :

If you configure Extensible Authentication Protocol (EAP), you must use either Microsoft Challenge-Handshake Authentication Protocol (CHAPv2) or Protected Extensible Authentication Protocol (PEAP). No other EAP is supported.

ivandretvic

comment created time in a month

PR opened MicrosoftDocs/windows-itpro-docs

update apps for 2004

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8017

+45 -45

0 comment

1 changed file

pr created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha 0906102c42bac25ccf7b825e0c4d6fec55b37956

update apps for 2004 https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8017

view details

push time in a month

PullRequestReviewEvent

push eventVLG17/windows-itpro-docs

VLG17

commit sha d8dc90cb6442a7a21576ff517a783900e9b0048c

reduced whitespace at the end of the sentence as advised by illfated

view details

push time in a month

issue commentMicrosoftDocs/windows-itpro-docs

"Your administrator requires a security scan of this item." Great, how do I scan it?

@ryancampfire As the referenced article points out, this happens because of the real time protection features of Windows Defender Antivirus. As stated in the article, you don't need to do something. Everything happens in the background and if indeed a malitious file is found it will be blocked and you'll be notified.

Block at first sight provides a way to detect and block new malware within seconds. This protection is enabled by default when certain prerequisite settings are also enabled. In most cases, these prerequisite settings are also enabled by default, so the feature is running without any intervention.

If it's a corporate machine you could contact your Administrator and ask for help with setting exclusions for what you're using and know it's safe so it does not get scanned.

If it's a personal machine, you can set these exclusions on your own.

ryancampfire

comment created time in a month

issue commentMicrosoftDocs/windows-itpro-docs

List of enlightened Microsoft apps

@lightupdifire According to this thread it works but it's quite tricky to configure it right. More details here.

Looking at the WVD Roadmap and the latest announcements i don't see anything related to WIP.

lightupdifire

comment created time in a month

PullRequestReviewEvent

push eventVLG17/windows-itpro-docs

VLG17

commit sha 1a70148cfffb28d92adc9e4fe326d828fabbdf91

roles update per comment from MarzelLaning42

view details

push time in a month

issue commentMicrosoftDocs/windows-itpro-docs

KDC_ERR_KEY_EXPIRED

@cscherb Could you share such an event? It's strange that looking at the article about event 4768 it's clearly stated that

This event doesn't generate for Result Codes: 0x10, 0x17 and 0x18. Event “4771: Kerberos pre-authentication failed.” generates instead.

cscherb

comment created time in a month

PR opened MicrosoftDocs/windows-itpro-docs

add detailed info regarding permissions

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8186

info found in article https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal

+1 -1

0 comment

1 changed file

pr created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha a54cb3126ee72f988d0067c510cc18f75dbe0183

add detailed info regarding permissions https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8186 info found in article https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/add-application-portal

view details

push time in a month

issue commentMicrosoftDocs/windows-itpro-docs

use of Global Administrator role is not needed

@MarzelLaning42 According to this article the required permission to create an app in Azure Active Directory (AAD) is one of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.

I'll create a PR to include this.

MarzelLaning42

comment created time in a month

PR opened MicrosoftDocs/windows-itpro-docs

update description for 0xC000006E

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8219

+1 -1

0 comment

1 changed file

pr created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha 7da8a4741a778ed2f1379b15584e349929eb8366

update description for 0xC000006E https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8219

view details

push time in a month

issue commentMicrosoftDocs/windows-itpro-docs

"Block persistence through WMI event subscription" is not available in Intune

@alexlushsevernunival Looking at the article it's stated that the Intune and Config. Manager name of this rule is not yet available.

image

The rule only applies to Windows Server and 10 starting with build 1903 for now.

alexlushsevernunival

comment created time in a month

PR opened MicrosoftDocs/windows-itpro-docs

update name

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8049

+2 -2

0 comment

1 changed file

pr created time in a month

push eventVLG17/windows-itpro-docs

VLG17

commit sha a2a021a64fd7012ebf521930a75ba20698a18d7a

update name https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8049

view details

push time in a month

PullRequestReviewEvent

push eventVLG17/windows-itpro-docs

VLG17

commit sha 3a5c7ce0fd275c7712fe0582bf15518595d338b8

add note about Quota changed note location as requested by mapalko

view details

push time in 2 months

issue commentMicrosoftDocs/windows-itpro-docs

What is the preference key Value for the edrEarlyPreviewEnabled?

@annerajb Is this still an issue keeping in mind Windows Defender ATP for linux is already generally available?

annerajb

comment created time in 2 months

issue commentMicrosoftDocs/windows-itpro-docs

configure wdav channel with just configuration profile (not command line?)

@annerajb The only way to do that is to use Microsoft AutoUpdate (MAU) and implicitly command line / shell.

Regarding your second question, yes you can change the channel only for WDAV. More details here

To change the channel only for Microsoft Defender ATP for Mac, execute the following command after replacing [channel-name] with the desired channel:

defaults write com.microsoft.autoupdate2 Applications -dict-add "/Applications/Microsoft Defender ATP.app" " { 'Application ID' = 'WDAV00' ; 'App Domain' = 'com.microsoft.wdav' ; LCID = 1033 ; ChannelName = '[channel-name]' ; }"

annerajb

comment created time in 2 months

issue commentMicrosoftDocs/windows-itpro-docs

Azure Autiomation Examples

@Torxsmind I would go with Update Management via automation account. The steps to enable this can be found here.

Torxsmind

comment created time in 2 months

issue commentMicrosoftDocs/windows-itpro-docs

Missing "RegisterDNS" entry in the ProfileXML file

@pavelrozenberg Were you maybe looking at another article? It's still there in the article talking about Always-On VPN User tunnel

image

pavelrozenberg

comment created time in 2 months

issue commentMicrosoftDocs/windows-itpro-docs

0x801C044D might be wrong.

@sjldk Looking at the article now, this has been rectified.

sjldk

comment created time in 2 months

issue commentMicrosoftDocs/windows-itpro-docs

Please state if enviroment variables and wildcards are supported for Exclusions

@AlphaSeb if you use Powershell then it comes down to what "Add-MpPreference" supports. As @RAJU2529 already tested and confirmed environment variables (and wildcard) are supported, but with a few limitations which are described here

AlphaSeb

comment created time in 2 months

PR opened MicrosoftDocs/windows-itpro-docs

add info about creating the tester account

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/1630

+1 -1

0 comment

1 changed file

pr created time in 2 months

push eventVLG17/windows-itpro-docs

VLG17

commit sha c3b42ff5227d07de0abc677472578348631141d1

add info about creating the tester account https://github.com/MicrosoftDocs/windows-itpro-docs/issues/1630

view details

push time in 2 months

push eventVLG17/windows-itpro-docs

VLG17

commit sha 2163fcf05e49ecf4b577c31716c533a38a952b65

add info about steps to create the tester account https://github.com/MicrosoftDocs/windows-itpro-docs/issues/1630

view details

push time in 2 months

PR opened MicrosoftDocs/windows-itpro-docs

add note about unreachable machines on the network

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6771

+3 -0

0 comment

1 changed file

pr created time in 2 months

push eventVLG17/windows-itpro-docs

VLG17

commit sha 5c3c7151ab46bbb6ce2de3b1889d4a49a9b46546

add note about unreachable machines on the network https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6771

view details

push time in 2 months

push eventVLG17/windows-itpro-docs

VLG17

commit sha 9bfd9aed5c77b186eb97d06326380a4813592c44

add note about unreachable machines https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6771

view details

push time in 2 months

PR opened MicrosoftDocs/windows-itpro-docs

add note about RegBack functionality removal starting with Windows 10…

… 1803

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6798

+6 -0

0 comment

1 changed file

pr created time in 2 months

push eventVLG17/windows-itpro-docs

VLG17

commit sha 9411c4d57e159a6561a730172bbc4736fcbc8167

add note about RegBack functionality removal starting with Windows 10 1803 https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6798

view details

push time in 2 months

PR opened MicrosoftDocs/Devices-docs

add note about Surface Dock 2

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6844

+3 -0

0 comment

1 changed file

pr created time in 2 months

push eventVLG17/Devices-docs

VLG17

commit sha 82ac2acf20c5db4a67826b3eaa257460b27fdd06

add note about Surface Dock 2 https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6844

view details

push time in 2 months

fork VLG17/Devices-docs

Contains documentation for Surface and Surface Hub

fork in 2 months

issue commentMicrosoftDocs/windows-itpro-docs

Windows Sandbox automatic installation

@peetrike Indeed, the feature name is Containers-DisposableClientVM and you enable it with the help of Enable-WindowsOptionalFeature

Running Get-WindowsOptionalFeature -Online -FeatureName "Containers-DisposableClientVM gives an explicit description:

image

peetrike

comment created time in 3 months

issue commentMicrosoftDocs/windows-itpro-docs

Antivirus Exclusions for WDAG

@teojaimes could you share some more details regarding this question? In my understanding, the Application Guard functionality does not intersect that of Windows Defender Antivirus.

What are you looking to exclude?

teojaimes

comment created time in 3 months

issue commentMicrosoftDocs/windows-itpro-docs

Two hubs

@starchysock You can Miracast to multiple Hubs so it should work.

Although it's not official Microsoft, but this video shows the capability exists.

starchysock

comment created time in 3 months

more