Policy CSP - System


System policies

System/AllowBuildPreview
System/AllowCommercialDataPipeline
System/AllowDesktopAnalyticsProcessing
System/AllowDeviceNameInDiagnosticData
System/AllowEmbeddedMode
System/AllowExperimentation
System/AllowFontProviders
System/AllowLocation
System/AllowMicrosoftManagedDesktopProcessing
System/AllowStorageCard
System/AllowTelemetry
System/AllowUpdateComplianceProcessing
System/AllowUserToResetPhone
System/AllowWUfBCloudProcessing
System/BootStartDriverInitialization
System/ConfigureMicrosoft365UploadEndpoint
System/ConfigureTelemetryOptInChangeNotification
System/ConfigureTelemetryOptInSettingsUx
System/DisableDeviceDelete
System/DisableDiagnosticDataViewer
System/DisableEnterpriseAuthProxy
System/DisableOneDriveFileSync
System/DisableSystemRestore
System/FeedbackHubAlwaysSaveDiagnosticsLocally
System/LimitEnhancedDiagnosticDataWindowsAnalytics
System/TelemetryProxy
System/TurnOffFileHistory

System/AllowBuildPreview

Windows Edition Supported?
Home cross mark
Pro check mark11
Enterprise check mark
Education check mark

Scope:

  • Device

Note

 This policy setting applies only to devices running Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education.

This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. These controls are located under "Get Insider builds," and enable users to make their devices available for downloading and installing Windows preview software.

If you enable or do not configure this policy setting, users can download and install Windows preview software on their devices. If you disable this policy setting, the item "Get Insider builds" will be unavailable.

ADMX Info:

  • GP Friendly name: Toggle user control over Insider builds
  • GP name: AllowBuildPreview
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: AllowBuildPreview.admx

The following list shows the supported values:

  • 0 – Not allowed. The item "Get Insider builds" is unavailable, users are unable to make their devices available for preview software.
  • 1 – Allowed. Users can make their devices available for downloading and installing preview software.
  • 2 (default) – Not configured. Users can make their devices available for downloading and installing preview software.

System/AllowCommercialDataPipeline

Windows Edition Supported?
Home cross mark
Pro check mark6 11
Enterprise check mark6
Education check mark6

Scope:

  • Device

This policy setting configures an Azure Active Directory joined device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the Product Terms.

To enable this behavior, you must complete two steps:

  1. Enable this policy setting
  2. Join an Azure Active Directory account to the device

Windows diagnostic data is collected when the Allow Telemetry policy setting is set to 1 – Required (Basic) or above.

If you disable or do not configure this setting, Microsoft will be the controller of the Windows diagnostic data collected from the device and processed in accordance with Microsoft’s privacy statement unless you have enabled policies like Allow Update Compliance Processing or Allow Desktop Analytics Processing.

Configuring this setting does not change the Windows diagnostic data collection level set for the device or the operation of optional analytics processor services like Desktop Analytics and Update Compliance.

See the documentation at ConfigureWDD for information on this and other policies that will result in Microsoft being the processor of Windows diagnostic data.

ADMX Info:

  • GP Friendly name: Allow commercial data pipeline
  • GP name: AllowCommercialDataPipeline
  • GP element: AllowCommercialDataPipeline
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

The following list shows the supported values:

  • 0 (default) - Disabled.
  • 1 - Enabled.

System/AllowDesktopAnalyticsProcessing

This policy setting, in combination with the Allow Telemetry and Configure the Commercial ID policy settings, enables organizations to configure the device so that Microsoft is the processor for Windows diagnostic data collected from the device, subject to the Product Terms.

To enable this behavior, you must complete three steps:

  1. Enable this policy setting
  2. Set AllowTelemetry to 1 – Required (Basic) or above
  3. Set the Configure the Commercial ID setting for your Desktop Analytics workspace

This setting has no effect on devices unless they are properly enrolled in Desktop Analytics.

When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.

If you disable or do not configure this policy setting, devices will not appear in Desktop Analytics.

The following list shows the supported values:

  • 0 (default) – Disabled.
  • 2 – Allowed.

System/AllowDeviceNameInDiagnosticData

Windows Edition Supported?
Home cross mark
Pro check mark5 11
Enterprise check mark5
Education check mark5

Scope:

  • Device

This policy allows the device name to be sent to Microsoft as part of Windows diagnostic data. If you disable or do not configure this policy setting, then device name will not be sent to Microsoft as part of Windows diagnostic data.

ADMX Info:

  • GP Friendly name: Allow device name to be sent in Windows diagnostic data
  • GP name: AllowDeviceNameInDiagnosticData
  • GP element: AllowDeviceNameInDiagnosticData
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

The following list shows the supported values:

  • 0 (default) – Disabled.
  • 1 – Allowed.

System/AllowEmbeddedMode

Windows Edition Supported?
Home cross mark
Pro check mark11
Enterprise check mark
Education check mark

Scope:

  • Device

Specifies whether set general purpose device to be in embedded mode.

Most restricted value is 0.

The following list shows the supported values:

  • 0 (default) – Not allowed.
  • 1 – Allowed.

System/AllowExperimentation

Windows Edition Supported?
Home cross mark
Pro check mark11
Enterprise check mark
Education check mark

Scope:

  • Device

Note

This policy is not supported in Windows 10, version 1607.

This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior.

Most restricted value is 0.

The following list shows the supported values:

  • 0 – Disabled.
  • 1 (default) – Permits Microsoft to configure device settings only.
  • 2 – Allows Microsoft to conduct full experimentation.

System/AllowFontProviders

Windows Edition Supported?
Home cross mark
Pro check mark2 11
Enterprise check mark2
Education check mark2

Scope:

  • Device

Added in Windows 10, version 1703. Boolean policy setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. If you enable this setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. If you disable this policy setting, Windows does not connect to an online font provider and only enumerates locally installed fonts.

This MDM setting corresponds to the EnableFontProviders Group Policy setting. If both the Group Policy and the MDM settings are configured, the group policy setting takes precedence. If neither is configured, the behavior depends on a DisableFontProviders registry value. In server editions, this registry value is set to 1 by default, so the default behavior is false (disabled). In all other editions, the registry value is not set by default, so the default behavior is true (enabled).

This setting is used by lower-level components for text display and fond handling and has not direct effect on web browsers, which may download web fonts used in web content.

Note

Reboot is required after setting the policy; alternatively you can stop and restart the FontCache service.

ADMX Info:

  • GP Friendly name: Enable Font Providers
  • GP name: EnableFontProviders
  • GP path: Network/Fonts
  • GP ADMX file name: GroupPolicy.admx

The following list shows the supported values:

  • 0 - false - No traffic to fs.microsoft.com and only locally installed fonts are available.
  • 1 - true (default) - There may be network traffic to fs.microsoft.com and downloadable fonts are available to apps that support them.

To verify if System/AllowFontProviders is set to true:

  • After a client machine is rebooted, check whether there is any network traffic from client machine to fs.microsoft.com.

System/AllowLocation

Windows Edition Supported?
Home cross mark
Pro check mark11
Enterprise check mark
Education check mark

Scope:

  • Device

Specifies whether to allow app access to the Location service.

Most restricted value is 0.

While the policy is set to 0 (Force Location Off) or 2 (Force Location On), any Location service call from an app would trigger the value set by this policy.

When switching the policy back from 0 (Force Location Off) or 2 (Force Location On) to 1 (User Control), the app reverts to its original Location service setting.

For example, an app's original Location setting is Off. The administrator then sets the AllowLocation policy to 2 (Force Location On.) The Location service starts working for that app, overriding the original setting. Later, if the administrator switches the AllowLocation policy back to 1 (User Control), the app will revert to using its original setting of Off.

ADMX Info:

  • GP Friendly name: Turn off location
  • GP name: DisableLocation_2
  • GP path: Windows Components/Location and Sensors
  • GP ADMX file name: Sensors.admx

The following list shows the supported values:

  • 0 – Force Location Off. All Location Privacy settings are toggled off and grayed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search.
  • 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off.
  • 2 – Force Location On. All Location Privacy settings are toggled on and grayed out. Users cannot change the settings and all consent permissions will be automatically suppressed.

System/AllowMicrosoftManagedDesktopProcessing

This policy setting configures an Azure Active Directory joined device so that Microsoft is the processor of the Windows diagnostic data.

For customers who enroll into the Microsoft Managed Desktop service, this policy will be enabled by default to allow Microsoft to process data for operational and analytic needs. For more information, see Privacy and personal data.

This setting has no effect on devices unless they are properly enrolled in Microsoft Managed Desktop.

When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.

If you disable this policy setting, devices may not appear in Microsoft Managed Desktop.

Important

You should not disable or make changes to this policy as that will severely impact the ability of Microsoft Managed Desktop to manage the devices.


System/AllowStorageCard

Windows Edition Supported?
Home cross mark
Pro check mark11
Enterprise check mark
Education check mark

Scope:

  • Device

Controls whether the user is allowed to use the storage card for device storage. This setting prevents programmatic access to the storage card.

Most restricted value is 0.

The following list shows the supported values:

  • 0 – SD card use is not allowed and USB drives are disabled. This setting does not prevent programmatic access to the storage card.
  • 1 (default) – Allow a storage card.

System/AllowTelemetry

Windows Edition Supported?
Home cross mark
Pro check mark11
Enterprise check mark
Education check mark

Scope:

  • User
  • Device

Allows the device to send diagnostic and usage telemetry data, such as Watson.

For more information about diagnostic data, including what is and what is not collected by Windows, see Configure Windows diagnostic data in your organization.

The following list shows the supported values for Windows 8.1:

  • 0 - Not allowed.
  • 1 – Allowed, except for Secondary Data Requests.
  • 2 (default) – Allowed.

In Windows 10, you can configure this policy setting to decide what level of diagnostic data to send to Microsoft.

The following list shows the supported values for Windows 10 version 1809 and older, choose the value that is applicable to your OS version (older OS values are displayed in the brackets):

  • 0 – Off (Security) This turns Windows diagnostic data off.

    Note

    This value is only applicable to Windows 10 Enterprise, Windows 10 Education, Windows 10 IoT Core (IoT Core), HoloLens 2, and Windows Server 2016 (and later versions). Using this setting on other devices editions of Windows is equivalent to setting the value of 1.

  • 1 – Required (Basic) Sends basic device info, including quality-related data, app compatibility, and other similar data to keep the device secure and up-to-date.

  • 2 – (Enhanced) Sends the same data as a value of 1, plus additional insights, including how Windows apps are used, how they perform, and advanced reliability data, such as limited crash dumps.

    Note

    Enhanced is no longer an option for Windows Holographic, version 21H1.

  • 3 – Optional (Full) Sends the same data as a value of 2, plus additional data necessary to identify and fix problems with devices such as enhanced error logs.

Most restrictive value is 0.

ADMX Info:

  • GP Friendly name: Allow Telemetry
  • GP name: AllowTelemetry
  • GP element: AllowTelemetry
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

System/AllowUpdateComplianceProcessing

Windows Edition Supported?
Home cross mark
Pro check mark6 11
Enterprise check mark6
Education check mark6

Scope:

  • Device

This policy setting, in combination with the Allow Telemetry and Configure the Commercial ID policy settings, enables organizations to configure the device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the Product Terms.

To enable this behavior, you must complete three steps:

  1. Enable this policy setting
  2. Set AllowTelemetry to 1 – Required (Basic) or above
  3. Set the Configure the Commercial ID setting for your Update Compliance workspace

When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.

If you disable or do not configure this policy setting, devices will not appear in Update Compliance.

ADMX Info:

  • GP Friendly name: Allow Update Compliance Processing
  • GP name: AllowUpdateComplianceProcessing
  • GP element: AllowUpdateComplianceProcessing
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

The following list shows the supported values:

  • 0 - Disabled.
  • 16 - Enabled.

System/AllowUserToResetPhone

Windows Edition Supported?
Home cross mark
Pro check mark11
Enterprise check mark
Education check mark

Scope:

  • Device

Specifies whether to allow the user to factory reset the device by using control panel and hardware key combination.

Most restricted value is 0.

Tip

This policy is also applicable to Windows 10 and not exclusive to phone.

The following list shows the supported values:

  • 0 – Not allowed.
  • 1 (default) – Allowed to reset to factory default settings.

System/AllowWUfBCloudProcessing


This policy setting configures an Azure Active Directory joined device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the Product Terms.

To enable this behavior, you must complete three steps:

  1. Enable this policy setting
  2. Set AllowTelemetry to 1 – Required (Basic) or above
  3. Join an Azure Active Directory account to the device

When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.

If you disable or do not configure this policy setting, devices enrolled to the Windows Update for Business deployment service will not be able to take advantage of some deployment service features.


The following list shows the supported values:

  • 0 - Disabled.
  • 8 - Enabled.

System/BootStartDriverInitialization

Windows Edition Supported?
Home cross mark
Pro check mark11
Enterprise check mark
Education check mark

Scope:

  • Device

This policy setting allows you to specify which boot-start drivers are initialized based on a classification determined by an Early Launch Antimalware boot-start driver. The Early Launch Antimalware boot-start driver can return the following classifications for each boot-start driver:

  • Good: The driver has been signed and has not been tampered with.
  • Bad: The driver has been identified as malware. It is recommended that you do not allow known bad drivers to be initialized.
  • Bad, but required for boot: The driver has been identified as malware, but the computer cannot successfully boot without loading this driver.
  • Unknown: This driver has not been attested to by your malware detection application and has not been classified by the Early Launch Antimalware boot-start driver.

If you enable this policy setting you will be able to choose which boot-start drivers to initialize the next time the computer is started.

If you disable or do not configure this policy setting, the boot start drivers determined to be Good, Unknown or Bad but Boot Critical are initialized and the initialization of drivers determined to be Bad is skipped.

If your malware detection application does not include an Early Launch Antimalware boot-start driver or if your Early Launch Antimalware boot-start driver has been disabled, this setting has no effect and all boot-start drivers are initialized.

Tip

This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see Understanding ADMX-backed policies.

You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to Enabling a policy.

The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see CDATA Sections.

ADMX Info:

  • GP Friendly name: Boot-Start Driver Initialization Policy
  • GP name: POL_DriverLoadPolicy_Name
  • GP path: System/Early Launch Antimalware
  • GP ADMX file name: earlylauncham.admx

System/ConfigureMicrosoft365UploadEndpoint

11
Windows Edition Supported?
Home cross mark
Pro check mark5
Enterprise check mark5
Education check mark5

Scope:

  • Device

This policy sets the upload endpoint for this device’s diagnostic data as part of the Microsoft 365 Update Readiness program.

If your organization is participating in the program and has been instructed to configure a custom upload endpoint, then use this setting to define that endpoint.

The value for this setting will be provided by Microsoft as part of the onboarding process for the program.

Value type is string.

ADMX Info:

  • GP Friendly name: Configure Microsoft 365 Update Readiness upload endpoint
  • GP name: ConfigureMicrosoft365UploadEndpoint
  • GP element: ConfigureMicrosoft365UploadEndpoint
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

System/ConfigureTelemetryOptInChangeNotification

Windows Edition Supported?
Home cross mark
Pro check mark4 11
Enterprise check mark4
Education check mark4

Scope:

  • Device

This policy setting determines whether a device shows notifications about telemetry levels to people on first logon or when changes occur in Settings.  If you set this policy setting to "Disable telemetry change notifications", telemetry level notifications stop appearing. If you set this policy setting to "Enable telemetry change notifications" or don't configure this policy setting, telemetry notifications appear at first logon and when changes occur in Settings.

ADMX Info:

  • GP Friendly name: Configure telemetry opt-in change notifications.
  • GP name: ConfigureTelemetryOptInChangeNotification
  • GP element: ConfigureTelemetryOptInChangeNotification
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

The following list shows the supported values:

  • 0 (default) - Enable telemetry change notifications
  • 1 - Disable telemetry change notifications

System/ConfigureTelemetryOptInSettingsUx

11
Windows Edition Supported?
Home cross mark
Pro check mark4
Enterprise check mark4
Education check mark4

Scope:

  • Device

This policy setting determines whether people can change their own telemetry levels in Settings. This setting should be used in conjunction with the Allow Telemetry settings.

If you set this policy setting to "Disable Telemetry opt-in Settings", telemetry levels are disabled in Settings, preventing people from changing them.

If you set this policy setting to "Enable Telemetry opt-in Settings" or don't configure this policy setting, people can change their own telemetry levels in Settings.

Note

Set the Allow Telemetry policy setting to prevent people from sending diagnostic data to Microsoft beyond your organization's acceptable level of data disclosure.

ADMX Info:

  • GP Friendly name: Configure telemetry opt-in setting user interface.
  • GP name: ConfigureTelemetryOptInSettingsUx
  • GP element: ConfigureTelemetryOptInSettingsUx
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

The following list shows the supported values:

  • 0 (default) - Enable Telemetry opt-in Settings
  • 1 - Disable Telemetry opt-in Settings

System/DisableDeviceDelete

Windows Edition Supported?
Home cross mark
Pro check mark5 11
Enterprise check mark5
Education check mark5

Scope:

  • Device

This policy setting controls whether the Delete diagnostic data button is enabled in Diagnostic & Feedback Settings page. If you enable this policy setting, the Delete diagnostic data button will be disabled in Settings page, preventing the deletion of diagnostic data collected by Microsoft from the device. If you disable or don't configure this policy setting, the Delete diagnostic data button will be enabled in Settings page, which allows people to erase all diagnostic data collected by Microsoft from that device.

ADMX Info:

  • GP Friendly name: Disable deleting diagnostic data
  • GP name: DisableDeviceDelete
  • GP element: DisableDeviceDelete
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

System/DisableDiagnosticDataViewer

Windows Edition Supported?
Home cross mark
Pro check mark5 11
Enterprise check mark5
Education check mark5

Scope:

  • Device

This policy setting controls whether users can enable and launch the Diagnostic Data Viewer from the Diagnostic & Feedback Settings page. If you enable this policy setting, the Diagnostic Data Viewer will not be enabled in Settings page, and it will prevent the viewer from showing diagnostic data collected by Microsoft from the device.
If you disable or don't configure this policy setting, the Diagnostic Data Viewer will be enabled in Settings page.

ADMX Info:

  • GP Friendly name: Disable diagnostic data viewer.
  • GP name: DisableDiagnosticDataViewer
  • GP element: DisableDiagnosticDataViewer
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

System/DisableEnterpriseAuthProxy

Windows Edition Supported?
Home cross mark
Pro check mark3 11
Enterprise check mark3
Education check mark3

Scope:

  • Device

This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or do not configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy.

ADMX Info:

  • GP Friendly name: Configure Authenticated Proxy usage for the Connected User Experience and Telemetry service
  • GP name: DisableEnterpriseAuthProxy
  • GP element: DisableEnterpriseAuthProxy
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

System/DisableOneDriveFileSync

Windows Edition Supported?
Home cross mark
Pro check mark2 11
Enterprise check mark2
Education check mark2

Scope:

  • Device

Added in Windows 10, version 1703. Allows IT Admins to prevent apps and features from working with files on OneDrive. If you enable this policy setting:

  • Users cannot access OneDrive from the OneDrive app or file picker.
  • Microsoft Store apps cannot access OneDrive using the WinRT API.
  • OneDrive does not appear in the navigation pane in File Explorer.
  • OneDrive files are not kept in sync with the cloud.
  • Users cannot automatically upload photos and videos from the camera roll folder.

If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage.

ADMX Info:

  • GP Friendly name: Prevent the usage of OneDrive for file storage
  • GP name: PreventOnedriveFileSync
  • GP path: Windows Components/OneDrive
  • GP ADMX file name: SkyDrive.admx

The following list shows the supported values:

  • 0 (default) – False (sync enabled).
  • 1 – True (sync disabled).

To validate on Desktop, do the following:

  1. Enable policy.
  2. Restart machine.
  3. Verify that OneDrive.exe is not running in Task Manager.

System/DisableSystemRestore

Windows Edition Supported?
Home cross mark
Pro check mark 11
Enterprise check mark
Education check mark

Scope:

  • Device

Allows you to disable System Restore.

This policy setting allows you to turn off System Restore.

System Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. By default, System Restore is turned on for the boot volume.

If you enable this policy setting, System Restore is turned off, and the System Restore Wizard cannot be accessed. The option to configure System Restore or create a restore point through System Protection is also disabled.

If you disable or do not configure this policy setting, users can perform System Restore and configure System Restore settings through System Protection.

Also, see the "Turn off System Restore configuration" policy setting. If the "Turn off System Restore" policy setting is disabled or not configured, the "Turn off System Restore configuration" policy setting is used to determine whether the option to configure System Restore is available.

Tip

This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see Understanding ADMX-backed policies.

You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to Enabling a policy.

The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see CDATA Sections.

ADMX Info:

  • GP Friendly name: Turn off System Restore
  • GP name: SR_DisableSR
  • GP path: System/System Restore
  • GP ADMX file name: systemrestore.admx

System/FeedbackHubAlwaysSaveDiagnosticsLocally

Windows Edition Supported?
Home check mark4
Pro check mark4 11
Enterprise check mark4
Education check mark4

Scope:

  • Device

Added in Windows 10, version 1803. When filing feedback in the Feedback Hub, diagnostic logs are collected for certain types of feedback. We now offer the option for users to save it locally, in addition to sending it to Microsoft. This policy will allow enterprises to mandate that all diagnostics are saved locally for use in internal investigations.

The following list shows the supported values:

  • 0 (default) - False. The Feedback Hub will not always save a local copy of diagnostics that may be created when a feedback is submitted. The user will have the option to do so.
  • 1 - True. The Feedback Hub should always save a local copy of diagnostics that may be created when a feedback is submitted.

System/LimitEnhancedDiagnosticDataWindowsAnalytics

Windows Edition Supported?
Home cross mark
Pro check mark3 11
Enterprise check mark3
Education check mark3

Scope:

  • Device

This policy setting, in combination with the Allow Telemetry policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services.

To enable this behavior, you must complete two steps:

  1. Enable this policy setting.

  2. Set the AllowTelemetry level:

    • For Windows 10 version 1809 and older: set AllowTelemetry to Enhanced.

      Note

      Enhanced is no longer an option for Windows Holographic, version 21H1.

    • For Windows 10 version 19H1 and later: set AllowTelemetry to Optional (Full)

When you configure these policy settings, a basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented here: Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics.

Enabling enhanced diagnostic data in the Allow Telemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional enhanced level telemetry data. This setting has no effect on computers configured to send Required (Basic) or Optional (Full) diagnostic data to Microsoft.

If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy.

ADMX Info:

  • GP Friendly name: Limit Enhanced diagnostic data to the minimum required by Windows Analytics
  • GP name: LimitEnhancedDiagnosticDataWindowsAnalytics
  • GP element: LimitEnhancedDiagnosticDataWindowsAnalytics
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

System/TelemetryProxy

Windows Edition Supported?
Home cross mark
Pro check mark 11
Enterprise check mark
Education check mark

Scope:

  • Device

Allows you to specify the fully qualified domain name (FQDN) or IP address of a proxy server to forward Connected User Experiences and Telemetry requests. The format for this setting is <server>:<port>. The connection is made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if there is no proxy specified when this policy is enabled, the Connected User Experiences and Telemetry data will not be transmitted and will remain on the local device.

If you disable or do not configure this policy setting, Connected User Experiences and Telemetry will go to Microsoft using the default proxy configuration.

ADMX Info:

  • GP Friendly name: Configure Connected User Experiences and Telemetry
  • GP name: TelemetryProxy
  • GP element: TelemetryProxyName
  • GP path: Data Collection and Preview Builds
  • GP ADMX file name: DataCollection.admx

System/TurnOffFileHistory

Windows Edition Supported?
Home cross mark
Pro check mark6 11
Enterprise check mark6
Education check mark6

Scope:

  • Device

This policy setting allows you to turn off File History.

If you enable this policy setting, File History cannot be activated to create regular, automatic backups.

If you disable or do not configure this policy setting, File History can be activated to create regular, automatic backups.

ADMX Info:

  • GP Friendly name: Turn off File History
  • GP name: DisableFileHistory
  • GP path: Windows Components/File History
  • GP ADMX file name: FileHistory.admx

The following list shows the supported values:

  • false (default) - allow File History
  • true - turn off File History

Footnotes:

  • 1 - Available in Windows 10, version 1607.
  • 2 - Available in Windows 10, version 1703.
  • 3 - Available in Windows 10, version 1709.
  • 4 - Available in Windows 10, version 1803.
  • 5 - Available in Windows 10, version 1809.
  • 6 - Available in Windows 10, version 1903.
  • 7 - Available in Windows 10, version 1909.
  • 8 - Available in Windows 10, version 2004.
  • 9 - Available in Windows 10, version 20H2.
  • 10 - Available in Windows 10, version 21H1.
  • 11 - Also applies to Windows 10 Business.