En utilisant ce site, vous acceptez le politique de confidentialité.
Accepter
EntérinEntérinEntérin
  • MAISON
  • INFORMATIQUE PRO
  • TECHNOLOGIE
  • Microsoft
    • Azuré
    • Configmgr / sccm
    • DPM
    • Orchestrateur
    • Hyper-v
    • Microsoft Edge Insider
    • MSI
    • Bureau 365
    • Bureau Insider
    • Power Bi
    • Skype
    • Serveur SQL
    • Équipes
  • FENÊTRES
    • Centre d'administration Windows
    • Client Windows
    • Serveur Windows
  • Liste de collecte de requêtes SCCM
En lisant: Mise à jour de la branche d'aperçu technique SCCM 1710
Redimensionneur de policeAA
EntérinEntérin
Redimensionneur de policeAA
  • MAISON
  • INFORMATIQUE PRO
  • TECHNOLOGIE
  • Microsoft
  • FENÊTRES
  • Liste de collecte de requêtes SCCM
Recherche
  • MAISON
  • INFORMATIQUE PRO
  • TECHNOLOGIE
  • Microsoft
    • Azuré
    • Configmgr / sccm
    • DPM
    • Orchestrateur
    • Hyper-v
    • Microsoft Edge Insider
    • MSI
    • Bureau 365
    • Bureau Insider
    • Power Bi
    • Skype
    • Serveur SQL
    • Équipes
  • FENÊTRES
    • Centre d'administration Windows
    • Client Windows
    • Serveur Windows
  • Liste de collecte de requêtes SCCM
Liste de collecte de requêtes Configuration Manager
Configmgr

Mise à jour de la branche d'aperçu technique SCCM 1710

Publié: Février 11, 2024
6 Lecture minimale
PARTAGER

Mise à jour de la branche d'aperçu technique SCCM 1710.

Contenu
Supported in 1710 Aperçu techniqueNot supported for 1710 Aperçu techniqueCreating CNG certificate templatesRequired certificate template properties (Windows CA):

This month’s new preview features include:

  • Check compliance for co-managed devices from Software Center when conditional access is managed by Intune – Users can now use Software Center to check the compliance of their co-managed Windows 10 devices when conditional access is managed by Intune.
  • Limit Windows 10 enhanced telemetry to only send data relevant to Windows Analytics Device Health – You can now set the Windows 10 telemetry data collection level to Enhanced (Limited). This setting enables you to gain actionable insight about devices in your environment without devices reporting all of the data in the Enhanced telemetry level with Windows 10 version 1709 ou plus tard.
  • Configure and deploy Windows Defender Application Guard policies – You can now create and deploy Windows Defender Application Guard policies to Windows 10 clients that help protect your users by opening untrusted websites in a virtualized browser (Edge and Internet Explorer).
  • Authorize software that is trusted by the Intelligent Security Graph as part of Windows Defender Application Control – Device Guard policies in Configuration manager are now renamed to Windows Defender Application Control policies. This better reflects the scope of their functionality. On devices that run Windows 10 version 1709, software that is trusted by the Microsoft Intelligent Security Graph (ISG) can now be automatically authorized. The trustworthiness of the software is defined by reputation data from Windows Defender SmartScreen, Windows Defender Antivirus, Et plus.
  • Configure Windows Defender Exploit Guard – Windows Defender Exploit Guard provides intrusion prevention rules and policies that make vulnerabilities more difficult to exploit in Windows 10. All Exploit Guard components are now configurable with Configuration Manager.
  • Improved descriptions for pending computer restarts – The reason for a pending computer restart is posted.
  • Run Scripts – We’ve added the ability to configure security scopes for the Run Scripts feature. We’ve also integrated an additional improved monitoring experience as part of the Run Scripts wizard.

This release also includes the following improvements based on your feedback from UserVoice:

  • Allow up to 512×512 pixel icons for application in Software Center – You can now deploy apps with up to 512×512 pixels icons to display in Software Center. This was earlier capped at 250×250 pixels and anything larger showed up blurry on Software Center. We have now changed this after receiving feedback from our customers.
  • Support for Cryptography: Next Generation certificates – We’ve added limited support for Cryptography: Next Generation (CNG) certificats.

Supported in 1710 Aperçu technique

Beginning with the 1710 Technical Preview you can use certificates created using CNG certificate templates for client-specific scenarios. The following scenarios are supported:

  • Client registration and communication with an HTTPS management point
  • Software distribution and application deployment with an HTTPS distribution point
  • Operating system deployment
  • Cloud Management Gateway Configuration
  • Client messaging SDK (with a soon-to-be-released update) and ISV Proxy

Note: CNG is backward compatible with Crypto API (CAPI). CAPI certificates will continue to be supported even when CNG support is enabled on the client

Not supported for 1710 Aperçu technique

  • Application Catalog Web service, Application Catalog website, Enrollment point, and Enrollment proxy point roles will not be operational when installed in HTTPS mode with a CNG certificate bound to the website in Internet Information Services (IIS). Software Center will not display applications and packages deployed to user or user group collection as available.
  • State Migration Point will not be operational when installed in HTTPS mode with a CNG certificate bound to the website in IIS.
  • Using CNG certificates to create a Cloud Distribution Point is not supported.
  • NDES Policy Module to Certificate Registration Point (CRP) communication will fail if the NDES Policy Module is using a CNG certificate for a client authentication certificate.

Creating CNG certificate templates

You will need to create CNG certificate templates from the Certificate Authority (Californie) and the enrolling certificate on the target machines (clients or servers) depending on the purpose and scenario you are testing e.g. client authentication, server authentication, etc..

Required certificate template properties (Windows CA):

  • Under the Compatibility tab, “Certification Authority” must be at least “Windows Server 2008” (recommended “Windows Server 2012”)
  • Under the Compatibility tab, “Certificate recipient” must be at least “Windows Vista/Server 2008” (recommended “Windows 8/Windows Server 2012”)
  • Under the Cryptography tab, make sure the “Provider Category” is “Key Storage Provider”

Note: The requirements for your environment or organization may be different. Please consult with your PKI expert. The important points to consider are a certificate template must use a Key Storage Provider to be able to take advantage of CNG.

ÉTIQUETÉ:InstailleCentre systèmeGestionnaire de configuration de System CenterAperçu techniqueFenêtresFenêtres 10
Article précédent Liste de collecte de requêtes Configuration Manager Mise à jour de la branche d'aperçu technique SCCM 1712
Article suivant Télécharger le lecteur multimédia VLC 3.0.0 MSI x64
Laisser un commentaire Laisser un commentaire

Laisser une réponse Annuler la réponse

Votre adresse email ne sera pas publiée. Les champs obligatoires sont marqués *

Ce site utilise Akismet pour réduire le spam. Découvrez comment les données de vos commentaires sont traitées.

Traduction

English中文(简体)DanskNederlandsFrançaisDeutschItaliano한국어PolskiPortuguêsRomânăEspañolУкраїнська
par Transposh - translation plugin for wordpress

Articles populaires

Configuration système requise pour Windows Server 2016
Serveur Windows
Liste de collecte de requêtes Configuration Manager
Liste de collecte de requêtes Configuration Manager
Configmgr
Navigation structurée/gérée activée sur les pages modernes dans les sites d'équipe classiques
Technologie
SCCM n'a pas réussi à obtenir les emplacements DP comme version attendue de MP
Configmgr

Messages récents

Installation et configuration de Fail2ban pour la protection SSH sur Ubuntu 24.04
Linux
Activation et configuration de FirewallD sur AlmaLinux
Linux
Création d'utilisateur et configuration de la clé SSH dans AlmaLinux
Linux
Comment réinitialiser le mot de passe sur AlmaLinux
Linux

© 2023 Entérin

Aller à la version mobile
Content de te revoir!

Connectez-vous à votre compte

Nom d'utilisateur ou adresse e-mail
Mot de passe

Vous avez perdu votre mot de passe?