Skip to content

Commit 732af73

Browse files
aaronparkergithub-actions
authored andcommitted
Update POLICIES.md
1 parent 8b5e410 commit 732af73

File tree

5 files changed

+6
-9
lines changed

5 files changed

+6
-9
lines changed

windows/google-chrome/README.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,6 @@
22

33
| Name | Description |
44
| ---- | ----------- |
5-
| GoLive - GoogleChrome | |
6-
| GoLive - GoogleChrome_MODIFY | |
75
| Windows Google Chrome baseline Device | Baseline application policy settings for Google Chrome. This policy will lockdown Chrome, including preventing signing into the browser with a Google account. Apply to All Devices (optionally with filters) or Entra ID device groups. |
86
| Windows Google Chrome extensions Device | Configures extension settings in Google Chrome - prevents users from adding extensions, and configures a list of force installed extensions. Apply to All Devices (optionally with filters) or Entra ID device groups. |
97

windows/microsoft-365apps/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22

33
| Name | Description |
44
| ---- | ----------- |
5-
| GoLive - Set OneDrive client to add SharePoint Online location | Let the OneDrive client add a SharePoint Online team site library to Windows Explorer, to improve usability for users. Please set your customer's SharePoint Online Library ID by overriding the $InheritedVars.SPOLibraryID variable at the customer level. To get the required library ID, please refer to https://docs.microsoft.com/en-us/onedrive/use-group-policy#AutoMountTeamSites. |
6-
| GoLive - OneDrive_MODIFY | |
75
| Windows Microsoft 365 Apps baseline Device | Configure Microsoft 365 Apps settings - validate channel. Assumes a single Microsoft 365 Apps package has been deployed, including Project and Visio - viewer mode is enabled so that users without a license can use these applications in viewer mode. Apply to All Devices (optionally with filters) or Entra ID device groups. |
86
| Windows Microsoft 365 Apps baseline User | Configure user targeted policy settings for the Microsoft 365 Apps. Apply to All Users (optionally with filters) or Entra ID user groups. |
9-
| Windows Microsoft 365 Apps OneDrive Device | Configure OneDrive for Business including SSO and Known Folder Move. Important - Update tenant GUID from the Entra ID. Apply to All Devices (optionally with filters) or Entra ID device groups. |
7+
| Windows Microsoft 365 Apps OneDrive baseline settings Device | Configure OneDrive for Business including SSO and Known Folder Move. Important - Update tenant GUID from the Entra ID. Apply to All Devices (optionally with filters) or Entra ID device groups. |
8+
| Windows Microsoft 365 Apps OneDrive harden settings Device | Configures OneDrive hardening settings to enhance security and compliance. Important - Update tenant GUID from the Entra ID. Apply to All Devices (optionally with filters) or Entra ID device groups. |
9+
| Windows Microsoft 365 Apps OneDrive SharePoint settings Device | Let the OneDrive client add a SharePoint Online team site library to Windows Explorer, to improve usability for users. Please set your customer's SharePoint Online Library ID by overriding the $InheritedVars.SPOLibraryID variable at the customer level. To get the required library ID, please refer to https://docs.microsoft.com/en-us/onedrive/use-group-policy#AutoMountTeamSites. |
1010

windows/microsoft-edge/README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22

33
| Name | Description |
44
| ---- | ----------- |
5-
| GoLive - MicrosoftEdge - MODIFY | |
65
| Windows Microsoft Edge All Devices baseline Device | Baseline Microsoft Edge settings - enforce SmartScreen, sync, basic browser settings. Apply to All Devices (optionally with filters) or Entra ID device groups. |
76
| Windows Microsoft Edge Extensions AVD W365 Device | Configures extension settings in Microsoft Edge - prevents users from adding extensions, and configures a list of force installed extensions. Adds: Microsoft Editor, uBlock Origin, My Apps Secure Sign-in Extension, Multimedia Redirection. Also enables the Edge sidebar & Copilot default extensions. Apply to All Devices (optionally with filters) or Entra ID device groups. |
87
| Windows Microsoft Edge Extensions physical PCs Device | Configures extension settings in Microsoft Edge - prevents users from adding extensions, and configures a list of force installed extensions. Adds: Microsoft Editor, uBlock Origin, My Apps Secure Sign-in Extension. Also enables the Edge sidebar & Copilot default extensions. Apply to All Devices (optionally with filters) or Entra ID device groups. |

windows/windows-bitlocker/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,6 @@
33
| Name | Description |
44
| ---- | ----------- |
55
| Windows Enable BitLocker Fixed Drives Device | Windows BitLocker settings to enable encryption for fixed drives with the default AES 128 bit XTS encryption, enable encryption for standard users and backup of the key to Entra ID. Apply to All Devices (optionally with filters) or Entra ID device groups. |
6-
| [WIN] Bitlocker for Fixed Drives Only | This policy enables BitLocker to fully encrypt fixed OS and data disks, based on AES 128-bit XTS. Keys will be stored in Azure AD and client-driven key rotation will be enabled. There's no block for write-access to unencrypted removable drives. |
7-
| [WIN] Force Bitlocker on Fixed and Removable Drives | |
6+
| Windows Enable BitLocker Fixed and Removable drives Device | |
7+
| Windows Enable BitLocker Fixed drives Device | This policy enables BitLocker to fully encrypt fixed OS and data disks, based on AES 128-bit XTS. Keys will be stored in Azure AD and client-driven key rotation will be enabled. There's no block for write-access to unencrypted removable drives. |
88

windows/windows-firewall/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,5 +2,5 @@
22

33
| Name | Description |
44
| ---- | ----------- |
5-
| GoLive - Firewall_Rules_MODIFY | Leverage CIS (L1) Firewall - Windows 11 Intune 3.0.0 |
5+
| Windows Windows Firewall Rules harden Device | Leverage CIS (L1) Firewall - Windows 11 Intune 3.0.0. Use this rule to modify the default firewall rules to only allow necessary inbound traffic for Microsoft Teams and Wireless Display. All other inbound traffic is blocked. Outbound traffic is not modified. |
66

0 commit comments

Comments
 (0)