From 9a5db65ae5532681ac5f3200133a98749f70cfcf Mon Sep 17 00:00:00 2001
From: Patti Short <35278231+shortpatti@users.noreply.github.com>
Date: Tue, 31 Jul 2018 13:23:52 -0700
Subject: [PATCH 1/4] Update
configure-browser-telemetry-for-m365-analytics-include.md
---
...e-browser-telemetry-for-m365-analytics-include.md | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md
index c1431ecc28..6e45dd8f33 100644
--- a/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md
+++ b/browsers/edge/includes/configure-browser-telemetry-for-m365-analytics-include.md
@@ -4,6 +4,9 @@
[!INCLUDE [configure-browser-telemetry-for-m365-analytics-shortdesc](../shortdesc/configure-browser-telemetry-for-m365-analytics-shortdesc.md)]
+>[!IMPORTANT]
+>For this policy to work, enable the Allow Telemetry policy with the _Enhanced_ option and enable the Configure the Commercial ID policy by providing the Commercial ID.
+
### Supported values
|Group Policy |MDM |Registry |Description |Most restricted |
@@ -14,13 +17,10 @@
|Enabled |3 |3 |Send both intranet and Internet history | |
---
->>You can find this setting in the following location of the Group Policy Editor:
+>>You can find this policy and the related policies in the following location of the Group Policy Editor:
>>
->> **_Computer Configuration\\Administrative Templates\\Windows Components\\Data Collection and Preview Builds\\_**
-
->[!IMPORTANT]
->For this policy to work, enable the Allow Telemetry policy with the _Enhanced_ option and enable the Configure the Commercial ID policy by providing the Commercial ID.
-
+>>**_Computer Configuration\\Administrative Templates\\Windows Components\\Data Collection and Preview Builds\\_**
+>>
- Allow Telemetry
- Configure the Commercial ID
- Configure collection of browsing data for Microsoft 365 Analytics
### ADMX info and settings
#### ADMX info
From e82582492c361b1abb4f49e5100fcc29c92bbe6f Mon Sep 17 00:00:00 2001
From: Patti Short <35278231+shortpatti@users.noreply.github.com>
Date: Tue, 31 Jul 2018 16:41:23 -0700
Subject: [PATCH 2/4] Update
how-hardware-based-containers-help-protect-windows.md
---
.../how-hardware-based-containers-help-protect-windows.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md b/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md
index 7cb2ae0095..bc28e62e7a 100644
--- a/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md
+++ b/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md
@@ -31,7 +31,7 @@ After successful verification and startup of the device’s firmware and Windows
This is where Windows Defender System Guard protection begins with its ability to ensure that only properly signed and secure Windows files and drivers, including third party, can start on the device. At the end of the Windows boot process, System Guard will start the system’s antimalware solution, which scans all third party drivers, at which point the system boot process is completed. In the end, Windows Defender System Guard helps ensure that the system securely boots with integrity and that it hasn’t been compromised before the remainder of your system defenses start.
-
+
## Maintaining integrity of the system after it’s running (run time)
@@ -47,5 +47,5 @@ While Windows Defender System Guard provides advanced protection that will help
As Windows 10 boots, a series of integrity measurements are taken by Windows Defender System Guard using the device’s Trusted Platform Module 2.0 (TPM 2.0). This process and data are hardware-isolated away from Windows to help ensure that the measurement data is not subject to the type of tampering that could happen if the platform was compromised. From here, the measurements can be used to determine the integrity of the device’s firmware, hardware configuration state, and Windows boot-related components, just to name a few. After the system boots, Windows Defender System Guard signs and seals these measurements using the TPM. Upon request, a management system like Intune or System Center Configuration Manager can acquire them for remote analysis. If Windows Defender System Guard indicates that the device lacks integrity, the management system can take a series of actions, such as denying the device access to resources.
-
+
From 9c2e2a3ce532e189e49f5551f104e2c7263007a6 Mon Sep 17 00:00:00 2001
From: Patti Short <35278231+shortpatti@users.noreply.github.com>
Date: Tue, 31 Jul 2018 16:50:24 -0700
Subject: [PATCH 3/4] Update
how-hardware-based-containers-help-protect-windows.md
---
.../how-hardware-based-containers-help-protect-windows.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md b/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md
index bc28e62e7a..a29c472d90 100644
--- a/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md
+++ b/windows/security/identity-protection/how-hardware-based-containers-help-protect-windows.md
@@ -10,6 +10,7 @@ author: justinha
ms.date: 07/31/2018
---
+
# Windows Defender System Guard: How hardware-based containers help protect Windows 10
Windows 10 uses containers to isolate sensitive system services and data, enabling them to remain secure even when the operating system has been compromised.
From e9d2a3802215460add3e2cf0c7678e81163d8d68 Mon Sep 17 00:00:00 2001
From: Adam Gross
Date: Tue, 31 Jul 2018 21:19:27 -0500
Subject: [PATCH 4/4] Update
use-upgrade-readiness-to-manage-windows-upgrades.md
Added additional Windows target versions.
---
.../use-upgrade-readiness-to-manage-windows-upgrades.md | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md
index badacb456b..97bc60f3d0 100644
--- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md
+++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
ms.prod: w10
author: jaimeo
ms.author: jaimeo
-ms.date: 08/30/2017
+ms.date: 07/31/2018
---
# Use Upgrade Readiness to manage Windows upgrades
@@ -22,7 +22,7 @@ When you are ready to begin the upgrade process, a workflow is provided to guide
Each step in the workflow is enumerated using blue tiles. Helpful data is provided on white tiles to help you get started, to monitor your progress, and to complete each step.
->**Important**: You can use the [Target version](#target-version) setting to evaluate computers that are runnign a specified version of Windows before starting the Upgrade Readiness workflow. By default, the Target version is configured to the released version of Windows 10 for the Current Branch for Business (CBB).
+>**Important**: You can use the [Target version](#target-version) setting to evaluate computers that are running a specified version of Windows before starting the Upgrade Readiness workflow. By default, the Target version is configured to the released version of Windows 10 for the Current Branch for Business (CBB).
The following information and workflow is provided:
@@ -41,11 +41,11 @@ The target version setting is used to evaluate the number of computers that are

-As mentioned previously, the default target version in Upgrade Readiness is set to the released version of the Current Branch for Business (CBB). CBB can be determined by reviewing [Windows 10 release information](https://technet.microsoft.com/windows/release-info.aspx). The target version setting is used to evaluate the number of computers that are already running this version of Windows, or a later version.
+The default target version in Upgrade Readiness is set to the released version of the Current Branch for Business (CBB). CBB can be determined by reviewing [Windows 10 release information](https://technet.microsoft.com/windows/release-info.aspx). The target version setting is used to evaluate the number of computers that are already running this version of Windows, or a later version.
The number displayed under **Computers upgraded** in the Upgrade Overview blade is the total number of computers that are already running the same or a later version of Windows compared to the target version. It also is used in the evaluation of apps and drivers: Known issues and guidance for the apps and drivers in Upgrade Readiness is based on the target operating system version.
-You now have the ability to change the Windows 10 version you wish to target. The available options currently are: Windows 10 version 1507, Windows 10 version 1511, Windows 10 version 1607, and Windows 10 version 1703.
+You now have the ability to change the Windows 10 version you wish to target. The available options currently are: Windows 10 version 1507, Windows 10 version 1511, Windows 10 version 1607, Windows 10 version 1703, Windows 10 version 1709 and Windows 10 version 1803.
To change the target version setting, click on **Solutions Settings**, which appears at the top when you open you Upgrade Readiness solution: