Tag: Machine
Untrusted Font Blocking
This security feature provides a global setting to prevent programs from loading untrusted fonts. Untrusted fonts are any font installed outside of the %windir% -> Fonts directory. This feature can be configured to be in 3 modes: On Off and Audit. By default it is Off and no fonts are blocked. If you aren’t quite ready to deploy this feature into your organization you can run it in Audit mode to see if blocking untrusted fonts causes any usability or compatibility issues.
Use Microsoft Passport for Work
Microsoft Passport for Work is an alternative method for signing into Windows using your Active Directory or Azure Active Directory account that can replace passwords Smart Cards and Virtual Smart Cards.If you enable or do not configure this policy setting the device provisions Microsoft Passport for Work for all users.If you disable this policy setting the device does not provision Microsoft Passport for Work for any user.
Toggle user control over Insider builds
This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. These controls are located under “Get Insider builds” and enable users to make their devices available for downloading and installing Windows preview software.If you enable or do not configure this policy setting users can download and install Windows preview software on their devices.If you disable this policy setting the item “Get Insider builds” will be unavailable.Note: This policy setting applies only to devices running the Pro Enterprise or Server editions of Windows 10.
Use a hardware security device
A Trusted Platform Module (TPM) provides additional security benefits over software because data stored within it cannot be used on other devices.If you enable this policy setting only devices with a usable TPM provision Microsoft Passport for Work.If you disable this policy setting all devices provision Microsoft Passport for Work using software even if there is a usable TPM.If you do not configure this policy setting all devices provision Microsoft Passport for Work using software if the TPM is non-functional or unavailable.
Allow a Windows app to share application data between users
Manages a Windows app’s ability to share data between users who have installed the app. If you enable this policy a Windows app can share app data with other instances of that app. Data is shared through the SharedLocal folder. This folder is available through the Windows.Storage API. If you disable this policy a Windows app can’t share app data with other instances of that app. If this policy was previously enabled any previously shared app data will remain in the SharedLocal folder.
Block launching Windows Store apps with Windows Runtime API access from hosted content.
This policy setting controls whether Windows Store apps with Windows Runtime API access directly from web content can be launched. If you enable this policy setting Windows Store apps with Windows Runtime API access directly from web content cannot be launched; Windows Store apps without Windows Runtime API access from web content are not affected. If you disable or do not configure this policy setting all Windows Store apps can be launched.
Assign a default credential provider
This policy setting allows the administrator to assign a specified credential provider as the default credential provider.If you enable this policy setting the specified credential provider is selected on other user tile.If you disable or do not configure this policy setting the system picks the default credential provider on other user tile.Note: A list of registered credential providers and their GUIDs can be found in the registry at HKEY_LOCAL_MACHINE -> SOFTWARE -> Microsoft -> Windows -> CurrentVersion -> Authentication -> Credential Providers.
Allow Telemetry
This policy setting determines the amount of diagnostic and usage data reported to Microsoft. A value of 0 indicates that no telemetry data from OS components is sent to Microsoft. Setting a value of 0 is applicable to enterprise and server devices only. Setting a value of 0 for other devices is equivalent to choosing a value of 1. A value of 1 sends only a limited or basic amount of diagnostic and usage data. Note that setting values of 0 or 1 will degrade certain experiences on the device. A value of 2 sends enhanced diagnostic and usage data. A value of 3 sends the same data as a value of 2 plus additional diagnostics data such as the system state at the time of a hang or crash and the files and content that may have caused the problem.If you disable or do not configure this policy setting users can configure the Telemetry level in Settings.
Disable pre-release features or settings
This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior. A value of 1 permits Microsoft to configure device settings only. A value of 2 allows Microsoft to conduct full experimentations.If you disable this policy setting all experimentations will be turned off.If you do not configure this policy setting user can configure the “Let Microsoft try features on this build” option in Settings.
Download Mode
Set this policy to configure the use of Windows Update Delivery Optimization in downloads of Windows Apps and Updates. Available mode are: 0=disable 1=peers on same NAT only 2=Local Network / Private Peering (PCs in the same domain by default) 3= Internet Peering