Skip to content

Commit 4dc2719

Browse files
authored
Merge pull request #9569 from MicrosoftDocs/main
Publish main to live on 2/5 @ 3:30 pm
2 parents 48ef2b7 + 8c5245c commit 4dc2719

File tree

328 files changed

+4002
-6090
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

328 files changed

+4002
-6090
lines changed

.openpublishing.redirection.windows-configuration.json

Lines changed: 249 additions & 64 deletions
Large diffs are not rendered by default.

education/docfx.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,8 @@
3434
"education",
3535
"tier2"
3636
],
37-
"ms.prod": "windows-client",
38-
"ms.technology": "itpro-edu",
37+
"ms.subservice": "itpro-edu",
38+
"ms.service": "windows-client",
3939
"author": "paolomatarazzo",
4040
"ms.author": "paoloma",
4141
"manager": "aaroncz",
@@ -51,10 +51,10 @@
5151
}
5252
},
5353
"titleSuffix": "Windows Education",
54-
"contributors_to_exclude": [
55-
"rjagiewich",
56-
"traya1",
57-
"rmca14",
54+
"contributors_to_exclude": [
55+
"rjagiewich",
56+
"traya1",
57+
"rmca14",
5858
"claydetels19",
5959
"Kellylorenebaker",
6060
"jborsecnik",

education/windows/configure-aad-google-trust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To test federation, the following prerequisites must be met:
2626
1. A Google Workspace environment, with users already created
2727
> [!IMPORTANT]
2828
> Users require an email address defined in Google Workspace, which is used to match the users in Microsoft Entra ID.
29-
> For more information about identity matching, see [Identity matching in Microsoft Entra ID](federated-sign-in.md#identity-matching-in-azure-ad).
29+
> For more information about identity matching, see [Identity matching in Microsoft Entra ID](federated-sign-in.md#identity-matching-in-microsoft-entra-id).
3030
1. Individual Microsoft Entra accounts already created: each Google Workspace user will require a matching account defined in Microsoft Entra ID. These accounts are commonly created through automated solutions, for example:
3131
- School Data Sync (SDS)
3232
- Microsoft Entra Connect Sync for environment with on-premises AD DS

education/windows/federated-sign-in.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To enable a federated sign-in experience, the following prerequisites must be me
4646
- PowerShell scripts that call the [Microsoft Graph API][GRAPH-1]
4747
- provisioning tools offered by the IdP
4848

49-
For more information about identity matching, see [Identity matching in Microsoft Entra ID](#identity-matching-in-azure-ad).
49+
For more information about identity matching, see [Identity matching in Microsoft Entra ID](#identity-matching-in-microsoft-entra-id).
5050
1. Licenses assigned to the Microsoft Entra user accounts. It's recommended to assign licenses to a dynamic group: when new users are provisioned in Microsoft Entra ID, the licenses are automatically assigned. For more information, see [Assign licenses to users by group membership in Microsoft Entra ID][AZ-2]
5151
1. Enable Federated sign-in or Web sign-in on the Windows devices, depending if the devices are shared or assigned to a single student
5252

@@ -201,17 +201,13 @@ The following issues are known to affect student shared devices:
201201

202202
For student shared devices, it's recommended to configure the account management policies to automatically delete the user profiles after a certain period of inactivity or disk levels. For more information, see [Set up a shared or guest Windows device][WIN-3].
203203

204-
<a name='preferred-azure-ad-tenant-name'></a>
205-
206204
### Preferred Microsoft Entra tenant name
207205

208206
To improve the user experience, you can configure the *preferred Microsoft Entra tenant name* feature.\
209207
When using preferred Microsoft Entra tenant name, the users bypass the disambiguation page and are redirected to the identity provider sign-in page. This configuration can be especially useful for student shared devices, where the disambiguation page is always shown.
210208

211209
For more information about preferred tenant name, see [Authentication CSP - PreferredAadTenantDomainName][WIN-4].
212210

213-
<a name='identity-matching-in-azure-ad'></a>
214-
215211
### Identity matching in Microsoft Entra ID
216212

217213
When a Microsoft Entra user is federated, the user's identity from the IdP must match an existing user object in Microsoft Entra ID.

education/windows/index.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,6 @@ brand: windows
66

77
metadata:
88
ms.topic: hub-page
9-
ms.prod: windows-client
10-
ms.technology: itpro-edu
119
ms.collection:
1210
- education
1311
- tier1

education/windows/set-up-school-pcs-provisioning-package.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.date: 06/02/2023
55
ms.topic: reference
66
appliesto:
77
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
8-
---
8+
---
99

1010
# What's in my provisioning package?
1111

@@ -48,7 +48,7 @@ For a more detailed look at the policies, see the Windows article [Set up shared
4848

4949
This section lists only the MDM and local group policies that are configured uniquely for the Set up School PCs app.
5050

51-
For a more detailed look of each policy listed, see [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) in the Windows IT Pro Center documentation.
51+
For a more detailed look of each policy listed, see [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) in the Windows IT Pro Center documentation.
5252

5353
| Policy name | Default value | Description |
5454
|--|--|--|
@@ -81,10 +81,10 @@ For a more detailed look of each policy listed, see [Policy CSP](/windows/client
8181

8282
## Apps uninstalled from Windows devices
8383

84-
Set up School PCs app uses the Universal app uninstall policy. The policy identifies default apps that aren't relevant to the classroom experience, and uninstalls them from each device. The apps uninstalled from Windows devices are:
84+
Set up School PCs app uses the Universal app uninstall policy. The policy identifies default apps that aren't relevant to the classroom experience, and uninstalls them from each device. The apps uninstalled from Windows devices are:
8585

8686
- Mixed Reality Viewer
87-
- Weather
87+
- Weather
8888
- Desktop App Installer
8989
- Tips
9090
- Messaging
@@ -106,11 +106,11 @@ Set up School PCs uses the Universal app install policy to install school-releva
106106

107107
## Provisioning time estimates
108108

109-
The time it takes to install a package on a device depends on the:
109+
The time it takes to install a package on a device depends on the:
110110

111111
- Strength of network connection
112112
- Number of policies and apps within the package
113-
- Other configurations made to the device
113+
- Other configurations made to the device
114114

115115
Review the table below to estimate your expected provisioning time. A package that only applies Set Up School PC's default configurations will provision the fastest. A package that removes preinstalled apps, through CleanPC, will take much longer to provision.
116116

education/windows/toc.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ items:
99
- name: Deploy applications to Windows 11 SE
1010
href: tutorial-deploy-apps-winse/toc.yml
1111
- name: Concepts
12-
items:
12+
items:
1313
- name: Windows 11 SE
1414
items:
1515
- name: Overview
@@ -47,7 +47,7 @@ items:
4747
- name: Configure federation between Google Workspace and Microsoft Entra ID
4848
href: configure-aad-google-trust.md
4949
- name: Configure Shared PC
50-
href: /windows/configuration/set-up-shared-or-guest-pc?context=/education/context/context
50+
href: /windows/configuration/shared-pc/set-up-shared-or-guest-pc?context=/education/context/context
5151
- name: Get and deploy Minecraft Education
5252
href: get-minecraft-for-education.md
5353
- name: Use the Set up School PCs app
@@ -65,6 +65,6 @@ items:
6565
- name: Take a Test technical reference
6666
href: take-a-test-app-technical.md
6767
- name: Shared PC technical reference
68-
href: /windows/configuration/shared-pc-technical?context=/education/context/context
68+
href: /windows/configuration/shared-pc/shared-pc-technical?context=/education/context/context
69+
6970

70-

windows/client-management/mdm/assignedaccess-ddf.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ The following XML file contains the device description framework (DDF) for the A
5454
</AccessType>
5555
<Description>This node can accept and return json string which comprises of account name, and AUMID for Kiosk mode app.
5656

57-
Example: {"User":"domain\\user", "AUMID":"Microsoft.WindowsCalculator_8wekyb3d8bbwe!App"}.
57+
Example: {"User":"domain\\user", "AUMID":"Microsoft.WindowsCalculator_8wekyb3d8bbwe!App"}.
5858

5959
When configuring kiosk mode app, account name will be used to find the target user. Account name includes domain name and user name. Domain name can be optional if user name is unique across the system. For a local account, domain name should be machine name. When "Get" is executed on this node, domain name is always returned in the output.
6060

windows/client-management/mdm/bitlocker-ddf-file.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ The following XML file contains the device description framework (DDF) for the B
142142
If you disable or do not configure this policy setting, BitLocker will use the default encryption method of XTS-AES 128-bit or the encryption method specified by any setup script.”
143143
The format is string.
144144
Sample value for this node to enable this policy and set the encryption methods is:
145-
145+
146146

147147
EncryptionMethodWithXtsOsDropDown_Name = Select the encryption method for operating system drives.
148148
EncryptionMethodWithXtsFdvDropDown_Name = Select the encryption method for fixed data drives.
@@ -194,7 +194,7 @@ The following XML file contains the device description framework (DDF) for the B
194194
Note: If you want to require the use of a startup PIN and a USB flash drive, you must configure BitLocker settings using the command-line tool manage-bde instead of the BitLocker Drive Encryption setup wizard.
195195
The format is string.
196196
Sample value for this node to enable this policy is:
197-
197+
198198

199199
ConfigureNonTPMStartupKeyUsage_Name = Allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive)
200200
All of the below settings are for computers with a TPM.
@@ -250,7 +250,7 @@ The following XML file contains the device description framework (DDF) for the B
250250
NOTE: If minimum PIN length is set below 6 digits, Windows will attempt to update the TPM 2.0 lockout period to be greater than the default when a PIN is changed. If successful, Windows will only reset the TPM lockout period back to default if the TPM is reset.
251251
The format is string.
252252
Sample value for this node to enable this policy is:
253-
253+
254254

255255
Disabling the policy will let the system choose the default behaviors.
256256
If you want to disable this policy use the following SyncML:
@@ -291,7 +291,7 @@ The following XML file contains the device description framework (DDF) for the B
291291
Note: Not all characters and languages are supported in pre-boot. It is strongly recommended that you test that the characters you use for the custom message or URL appear correctly on the pre-boot recovery screen.
292292
The format is string.
293293
Sample value for this node to enable this policy is:
294-
294+
295295

296296
The possible values for 'xx' are:
297297
0 = Empty
@@ -344,7 +344,7 @@ The following XML file contains the device description framework (DDF) for the B
344344
If this policy setting is disabled or not configured, the default recovery options are supported for BitLocker recovery. By default a DRA is allowed, the recovery options can be specified by the user including the recovery password and recovery key, and recovery information is not backed up to AD DS.
345345
The format is string.
346346
Sample value for this node to enable this policy is:
347-
347+
348348

349349
The possible values for 'xx' are:
350350
true = Explicitly allow
@@ -402,7 +402,7 @@ The following XML file contains the device description framework (DDF) for the B
402402
If you enable this policy setting, you can control the methods available to users to recover data from BitLocker-protected fixed data drives.
403403
The format is string.
404404
Sample value for this node to enable this policy is:
405-
405+
406406

407407
The possible values for 'xx' are:
408408
true = Explicitly allow
@@ -454,7 +454,7 @@ The following XML file contains the device description framework (DDF) for the B
454454
If you disable or do not configure this policy setting, all fixed data drives on the computer will be mounted with read and write access.
455455
The format is string.
456456
Sample value for this node to enable this policy is:
457-
457+
458458

459459
Disabling the policy will let the system choose the default behaviors.
460460
If you want to disable this policy use the following SyncML:
@@ -495,7 +495,7 @@ The following XML file contains the device description framework (DDF) for the B
495495
Note: This policy setting can be overridden by the group policy settings under User Configuration\Administrative Templates\System\Removable Storage Access. If the "Removable Disks: Deny write access" group policy setting is enabled this policy setting will be ignored.
496496
The format is string.
497497
Sample value for this node to enable this policy is:
498-
498+
499499

500500
The possible values for 'xx' are:
501501
true = Explicitly allow
@@ -575,7 +575,7 @@ The following XML file contains the device description framework (DDF) for the B
575575
require reinstallation of Windows.
576576
Note: This policy takes effect only if "RequireDeviceEncryption" policy is set to 1.
577577
The format is integer.
578-
The expected values for this policy are:
578+
The expected values for this policy are:
579579

580580
1 = This is the default, when the policy is not set. Warning prompt and encryption notification is allowed.
581581
0 = Disables the warning prompt and encryption notification. Starting in Windows 10, next major update,
@@ -623,7 +623,7 @@ The following XML file contains the device description framework (DDF) for the B
623623
If "AllowWarningForOtherDiskEncryption" is not set, or is set to "1", "RequireDeviceEncryption" policy will not try to encrypt drive(s) if a standard user
624624
is the current logged on user in the system.
625625

626-
The expected values for this policy are:
626+
The expected values for this policy are:
627627

628628
1 = "RequireDeviceEncryption" policy will try to enable encryption on all fixed drives even if a current logged in user is standard user.
629629
0 = This is the default, when the policy is not set. If current logged on user is a standard user, "RequireDeviceEncryption" policy
@@ -741,7 +741,7 @@ The policy only comes into effect when Active Directory backup for a recovery pa
741741

742742
* status\RotateRecoveryPasswordsStatus
743743
* status\RotateRecoveryPasswordsRequestID
744-
744+
745745

746746

747747
Supported Values: String form of request ID. Example format of request ID is GUID. Server can choose the format as needed according to the management tools.\

windows/client-management/mdm/passportforwork-ddf.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -934,7 +934,7 @@ If you disable or do not configure this policy setting, the PIN recovery secret
934934
<Replace />
935935
</AccessType>
936936
<DefaultValue>False</DefaultValue>
937-
<Description>Windows Hello for Business can use certificates to authenticate to on-premise resources.
937+
<Description>Windows Hello for Business can use certificates to authenticate to on-premise resources.
938938

939939
If you enable this policy setting, Windows Hello for Business will wait until the device has received a certificate payload from the mobile device management server before provisioning a PIN.
940940

windows/client-management/mdm/policy-csp-controlpolicyconflict.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ If set to 1 then any MDM policy that's set that has an equivalent GP policy will
3737
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
3838

3939
> [!NOTE]
40-
> MDMWinsOverGP only applies to policies in Policy CSP. MDM policies win over Group Policies where applicable; not all Group Policies are available via MDM or CSP. It does not apply to other MDM settings with equivalent GP settings that are defined in other CSPs such as the [Defender CSP](defender-csp.md). Nor does it apply to the [Update Policy CSP](policy-csp-update.md) for managing Windows updates.
40+
> MDMWinsOverGP only applies to policies in Policy CSP. MDM policies win over Group Policies where applicable; not all Group Policies are available via MDM or CSP. It does not apply to other MDM settings with equivalent GP settings that are defined in other CSPs such as the [Defender CSP](defender-csp.md). Nor does it apply to the [Update Policy CSP](policy-csp-update.md) for managing Windows updates.
4141
4242
This policy is used to ensure that MDM policy wins over GP when policy is configured on MDM channel. The default value is 0. The MDM policies in Policy CSP will behave as described if this policy value is set 1.
4343

windows/client-management/mdm/policy-csp-enterprisecloudprint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ Resource URI for which access is being requested by the Mopria discovery client
267267
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
268268
This policy must target ./User, otherwise it fails.
269269

270-
The default value is an empty string. Otherwise, the value should contain a URL.
270+
The default value is an empty string. Otherwise, the value should contain a URL.
271271

272272
**Example**:
273273

windows/client-management/mdm/policy-csp-windowslogon.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,11 @@ ms.date: 01/18/2024
3434
<!-- Description-Source-ADMX -->
3535
This policy setting controls whether a device will automatically sign in and lock the last interactive user after the system restarts or after a shutdown and cold boot.
3636

37-
This only occurs if the last interactive user didn't sign out before the restart or shutdown.
37+
This only occurs if the last interactive user didn't sign out before the restart or shutdown.
3838

3939
If the device is joined to Active Directory or Microsoft Entra ID, this policy only applies to Windows Update restarts. Otherwise, this will apply to both Windows Update restarts and user-initiated restarts and shutdowns.
4040

41-
- If you don't configure this policy setting, it's enabled by default. When the policy is enabled, the user is automatically signed in and the session is automatically locked with all lock screen apps configured for that user after the device boots.
41+
- If you don't configure this policy setting, it's enabled by default. When the policy is enabled, the user is automatically signed in and the session is automatically locked with all lock screen apps configured for that user after the device boots.
4242

4343
After enabling this policy, you can configure its settings through the ConfigAutomaticRestartSignOn policy, which configures the mode of automatically signing in and locking the last interactive user after a restart or cold boot .
4444

0 commit comments

Comments
 (0)