From 0a82bd770c2d8dd9bca6248b7ab8c2069c5afa5e Mon Sep 17 00:00:00 2001 From: denisebmsft <18405051+denisebmsft@users.noreply.github.comgit> Date: Tue, 11 Jan 2022 12:16:44 -0800 Subject: [PATCH] Update policy-csp-update.md --- .../mdm/policy-csp-update.md | 50 +++++++++---------- 1 file changed, 25 insertions(+), 25 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 386e67e92b..3d2791a1a3 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -2012,9 +2012,9 @@ Supported value range: 2-30. If you disable or do not configure this policy, the default behaviors will be used. If any of the following policies are configured, this policy has no effect: -1. No auto-restart with logged on users for scheduled automatic updates installations +1. No autorestart with logged on users for scheduled automatic updates installations 2. Always automatically restart at scheduled time -3. Specify deadline before auto-restart for update installation +3. Specify deadline before autorestart for update installation @@ -2317,7 +2317,7 @@ The following list shows the supported values: > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use PauseDeferrals for Windows 10, version 1511 devices. -Allows IT Admins to pause updates and upgrades for up to 5 weeks. Paused deferrals will be reset after 5 weeks. +Allows IT Admins to pause updates and upgrades for up to five weeks. Paused deferrals will be reset after five weeks. If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. @@ -2680,7 +2680,7 @@ The following list shows the supported values: > If you previously used the **Update/PhoneUpdateRestrictions** policy in previous versions of Windows, it has been deprecated. Please use this policy instead. -Allows the IT admin to restrict the updates that are installed on a device to only those on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update on behalf of the end-user. EULAs are approved once an update is approved. +Allows the IT admin to restrict the updates that are installed on a device to only those on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update on behalf of the end user. EULAs are approved once an update is approved. Supported operations are Get and Replace. @@ -2722,7 +2722,7 @@ The following list shows the supported values: -Allows the IT Admin to specify the period for auto-restart imminent warning notifications. +Allows the IT Admin to specify the period for autorestart imminent warning notifications. The default value is 15 (minutes). @@ -2774,7 +2774,7 @@ Supported values are 15, 30, or 60 (minutes). > This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education -Allows the IT Admin to specify the period for auto-restart warning reminder notifications. +Allows the IT Admin to specify the period for autorestart warning reminder notifications. The default value is 4 (hours). @@ -2824,7 +2824,7 @@ Supported values are 2, 4, 8, 12, or 24 (hours). Enables the IT admin to schedule the day of the update installation. -The data type is a integer. +The data type is an integer. Supported operations are Add, Delete, Get, and Replace. @@ -2881,7 +2881,7 @@ The following list shows the supported values: -Enables the IT admin to schedule the update installation on the every week. Value type is integer. Supported values: +Enables the IT admin to schedule the update installation on every week. Value type is integer. Supported values: