Skip to content

Commit ff754ad

Browse files
committed
Merge branch 'main' into alvinashcraft/main-winappsdk-background-tasks
2 parents 96562a8 + 67d11f1 commit ff754ad

File tree

5 files changed

+35
-4
lines changed

5 files changed

+35
-4
lines changed

hub/dev-environment/javascript/nodejs-beginners-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,11 @@ If you have not yet installed Visual Studio Code, return to the prerequisite sec
2525

2626
1. Open your command line and create a new directory: `mkdir HelloNode`, then enter the directory: `cd HelloNode`
2727

28-
2. Create a JavaScript file named "app.js" with a variable named "msg" inside: `echo var msg > app.js`
28+
2. Open the directory in VS Code using the command: `code .`
2929

30-
3. Open the directory and your app.js file in VS Code using the command: `code .`
30+
3. Create a file named "app.js"
3131

32-
4. Add a simple string variable ("Hello World"), then send the contents of the string to your console by entering this in your "app.js" file:
32+
4. Add a simple string "Hello World" to a variable named `msg`, then send the contents of the string to your console by entering this in your "app.js" file:
3333

3434
```js
3535
var msg = 'Hello World';

hub/package-manager/index.md

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ The WinGet client can be used in the command line to install and manage applicat
4949

5050
To maintain ongoing security updates, the WinGet client is released using the Microsoft Store and installs applications from the Microsoft Store using the [“msstore” source](./winget/source.md) and applying “certificate pinning” to ensure that the connection is secure and established with the proper endpoint.
5151

52-
The Group Policy applied by your enterprise organization may be using SSL inspection via a firewall between the WinGet client and the Microsoft Store source that causes a connection error to appear in the WinGet client.
52+
The Group Policy applied by your enterprise organization may be using SSL inspection via a firewall between the WinGet client and the Microsoft Store source that causes a connection error to appear in the WinGet client.
5353

5454
For this reason, the Windows Package Manager desktop installer supports a policy setting called: “BypassCertificatePinningForMicrosoftStore”. This policy controls whether the Windows Package Manager will validate the Microsoft Store certificate hash matches to a known Microsoft Store certificate when initiating a connection to the Microsoft Store Source. The options for this policy include:
5555

@@ -60,3 +60,34 @@ For this reason, the Windows Package Manager desktop installer supports a policy
6060
“Certificate Pinning” ensures that the package manager connection to the Microsoft Store is secure, helping to avoid risks associated with attacks such as Man-in-the-Middle (MITM) attacks involving a third party inserting themselves between a client (user) and server (application) to secretly intercept communication flows to steal sensitive data such as login credentials, etc. Disabling “Certificate Pinning” (enabling the bypass) can expose your organization to risk in this area and should be avoided.
6161

6262
To learn more about setting up Group Policy for your enterprise organization, see the [Microsoft Intune documentation](/mem/intune/).
63+
64+
## Additional Group Policy settings for Windows Package Manager
65+
66+
Windows Package Manager provides additional configuration options through Group Policy, allowing IT administrators to manage and control functionality across multiple devices. These settings are particularly beneficial for enterprise environments where compliance and consistency are critical.
67+
68+
Beginning in Windows 11, additional Group Policy templates for Windows Package Manager are included with each release. These templates are divided into several subcategories, enabling IT administrators to configure key aspects of the tool's behavior, such as:
69+
70+
- **Source Control**: Specify which sources are allowed or blocked.
71+
- **Local Development**: Control whether users are allowed to enable experimental features or local manifest installations.
72+
- **Execution Policies**: Set policies for the command line interface and proxy options.
73+
74+
To download the Group Policy templates:
75+
76+
1. Visit [Windows Package Manage GitHub releases](https://github.com/microsoft/winget-cli/releases).
77+
2. Locate the release version you wish to use.
78+
3. Download the `DesktopAppInstallerPolicies.zip` file included in the release assets.
79+
80+
The ZIP file contains the necessary `.admx` and `.adml` files for deploying the policies. Once you've downloaded the `DesktopAppInstallerPolicies.zip` file:
81+
82+
1. Extract the contents of the ZIP file on your local machine.
83+
2. Copy the `.admx` file to the `C:\Windows\PolicyDefinitions` folder on the target device.
84+
3. Copy the corresponding language-specific `.adml` file to the appropriate subdirectory, such as `C:\Windows\PolicyDefinitions\en-US`.
85+
4. Open the Group Policy Management Console (GPMC) to configure the policies.
86+
87+
> [!NOTE]
88+
> When working on a Windows Domain Controller, you can store the Group Policy templates in the Central Store. For detailed instructions, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
89+
90+
New Group Policy settings may be introduced with each release of Windows Package Manager. To ensure your environment is always up to date:
91+
92+
- Regularly check for updates on the [Windows Package Manager GitHub repository](https://github.com/microsoft/winget-cli/releases) page.
93+
- Review the release notes for changes or additions to the policy templates.
41.7 KB
Loading
2.42 KB
Loading
1.73 KB
Loading

0 commit comments

Comments
 (0)