+ - Afghanistan
- Algeria
+ - Andorra
- Angola
+ - Anguilla
+ - Antigua and Barbuda
- Argentina
- Australia
- Austria
@@ -177,41 +181,48 @@ Microsoft Store for Business and Education is currently available in these marke
- Belgium
- Belize
- Bermuda
+ - Benin
- Bhutan
- Bolivia
+ - Bonaire
- Botswana
- Brunei Darussalam
- Bulgaria
+ - Burundi
- Cambodia
- Cameroon
- Canada
- - Republic of Cabo Verde
- Cayman Islands
- Chile
- Colombia
+ - Comoros
- Costa Rica
- Côte D'ivoire
- Croatia
- Curçao
- Cyprus
-
- |
-
-
- Czech Republic
- Denmark
- Dominican Republic
- Ecuador
+
+ |
+
+
- Egypt
- El Salvador
- Estonia
+ - Ethiopia
- Faroe Islands
- Fiji
- Finland
- France
+ - French Guiana
+ - French Polynesia
- Germany
- Ghana
- Greece
+ - Greenland
- Guadeloupe
- Guatemala
- Honduras
@@ -225,29 +236,42 @@ Microsoft Store for Business and Education is currently available in these marke
- Italy
- Jamaica
- Japan
+ - Jersey
- Jordan
- - Kenya
-
- |
-
-
+ - Kenya
- Kuwait
+ - Laos
- Latvia
- Lebanon
- Libya
- Liechtenstein
- Lithuania
- Luxembourg
+ - Macedonia
+ - Madagascar
+
+ |
+
+
+ - Malawi
- Malaysia
+ - Maldives
+ - Mali
- Malta
+ - Marshall Islands
+ - Martinique
- Mauritius
+ - Mayotte
- Mexico
- Mongolia
- Montenegro
- Morocco
- Mozambique
+ - Myanamar
- Namibia
+ - Nepal
- Netherlands
+ - New Caledonia
- New Zealand
- Nicaragua
- Nigeria
@@ -256,48 +280,60 @@ Microsoft Store for Business and Education is currently available in these marke
- Pakistan
- Palestinian Authority
- Panama
+ - Papua New Guinea
- Paraguay
- Peru
- Philippines
- - Poland
+ - Poland
+ - Portugal
+ - Puerto Rico
+ - Qatar
+ - Republic of Cabo Verde
+ - Reunion
+ - Romania
+ - Rwanda
+ - Saint Kitts and Nevis
|
- - Portugal
- - Puerto Rico
- - Qatar
- - Romania
- - Rwanda
- - Saint Kitts and Nevis
+ - Saint Lucia
+ - Saint Martin
+ - Saint Vincent and the Grenadines
+ - San marino
- Saudi Arabia
- Senegal
- Serbia
+ - Seychelles
- Singapore
+ - Sint Maarten
- Slovakia
- Slovenia
- South Africa
- Spain
+ - Sri Lanka
+ - Suriname
- Sweden
- Switzerland
- Tanzania
- Thailand
+ - Timor-Leste
+ - Togo
+ - Tonga
- Trinidad and Tobago
- Tunisia
- Turkey
+ - Turks and Caicos Islands
- Uganda
- United Arab Emirates
- United Kingdom
- - United States
-
- |
-
-
+ - United States
- Uruguay
+ - Vatican City
- Viet Nam
- Virgin Islands, U.S.
- Zambia
- - Zimbabwe
+ - Zimbabwe
|
@@ -319,6 +355,7 @@ Customers in these markets can use Microsoft Store for Business and Education to
- India
- Kazakhstan
- Korea
+- Monaco
- Republic of Moldova
- Taiwan
- Tajikistan
diff --git a/windows/application-management/TOC.md b/windows/application-management/TOC.md
index 7f815bfe0e..9ba9efbd7d 100644
--- a/windows/application-management/TOC.md
+++ b/windows/application-management/TOC.md
@@ -99,3 +99,4 @@
#### [Application Publishing and Client Interaction](app-v/appv-application-publishing-and-client-interaction.md)
#### [Viewing App-V Server Publishing Metadata](app-v/appv-viewing-appv-server-publishing-metadata.md)
#### [Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications](app-v/appv-running-locally-installed-applications-inside-a-virtual-environment.md)
+## [Service Host process refactoring](svchost-service-refactoring.md)
diff --git a/windows/application-management/media/svchost-grouped-processes.png b/windows/application-management/media/svchost-grouped-processes.png
new file mode 100644
index 0000000000..d85f8e8951
Binary files /dev/null and b/windows/application-management/media/svchost-grouped-processes.png differ
diff --git a/windows/application-management/media/svchost-grouped-utilization.png b/windows/application-management/media/svchost-grouped-utilization.png
new file mode 100644
index 0000000000..cd46b0d4b4
Binary files /dev/null and b/windows/application-management/media/svchost-grouped-utilization.png differ
diff --git a/windows/application-management/media/svchost-separated-processes.png b/windows/application-management/media/svchost-separated-processes.png
new file mode 100644
index 0000000000..83df0fe580
Binary files /dev/null and b/windows/application-management/media/svchost-separated-processes.png differ
diff --git a/windows/application-management/media/svchost-separated-utilization.png b/windows/application-management/media/svchost-separated-utilization.png
new file mode 100644
index 0000000000..5c5834cc44
Binary files /dev/null and b/windows/application-management/media/svchost-separated-utilization.png differ
diff --git a/windows/application-management/media/svchost-separation-disabled.png b/windows/application-management/media/svchost-separation-disabled.png
new file mode 100644
index 0000000000..5e0e57da92
Binary files /dev/null and b/windows/application-management/media/svchost-separation-disabled.png differ
diff --git a/windows/application-management/svchost-service-refactoring.md b/windows/application-management/svchost-service-refactoring.md
new file mode 100644
index 0000000000..e2f00263db
--- /dev/null
+++ b/windows/application-management/svchost-service-refactoring.md
@@ -0,0 +1,91 @@
+---
+title: Service Host service refactoring in Windows 10 version 1703
+description: Learn about the SvcHost Service Refactoring introduced in Windows 10 version 1703.
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: mobile
+ms.author: kaushika-ainapure
+author: kaushika-msft
+ms.date: 07/19/2017
+---
+
+# Changes to Service Host grouping in Windows 10
+
+> Applies to: Windows 10
+
+The **Service Host (svchost.exe)** is a shared-service process that serves as a shell for loading services from DLL files. Services are organized into related host groups, and each group runs inside a different instance of the Service Host process. In this way, a problem in one instance does not affect other instances. Service Host groups are determined by combining the services with matching security requirements. For example:
+
+* Local Service
+* Local Service No Network
+* Local Service Network Restricted
+* Local System
+* Local System Network Restricted
+* Network Service
+
+## Separating SvcHost services
+
+Beginning with Windows 10 Creators Update (version 1703), services that were previously grouped will instead be separated - each will run in its own SvcHost process. This change is automatic for systems with **more than 3.5 GB** of RAM running the Client Desktop SKU. On systems with 3.5 GB or less RAM, we'll continue to group services into a shared SvcHost process.
+
+Benefits of this design change include:
+
+* Increased reliability by insulating critical network services from the failure of another non-network service in the host, and adding the ability to restore networking connectivity seamlessly when networking components crash.
+* Reduced support costs by eliminating the troubleshooting overhead associated with isolating misbehaving services in the shared host.
+* Increased security by providing additional inter-service isolation
+* Increased scalability by allowing per-service settings and privileges
+* Improved resource management through per-service CPU, I/O and memory management and increase clear telemetry (report CPU, I/O and network usage per service).
+
+>**Try This**
+>
+> To see the refactoring behavior, create a Windows 10 version 1703 VM and configure the memory settings as follows:
+> 1. To see grouped processes, set the RAM to 3484 MB or less. Restart the VM and then open Task Manager.
+> 2. To see separated processes, set the RAM to 3486 MB or greater. Restart the VM and then open Task Manager.
+
+
+Refactoring also makes it easier to view running processes in Task Manager. You can look at Task Manager and know exactly which service is using what resources, without having to expand many separate host groups.
+
+For example, here are the running processes displayed in Task Manager in Windows 10 version 1607:
+
+
+
+Compare that to the same view of running processes in Windows 10 version 1703:
+
+
+
+
+
+
+## Exceptions
+Some services will continue to be grouped on PCs running with 3.5GB or higher RAM. For example, the Base Filtering Engine (BFE) and the Windows Firewall (Mpssvc) will be grouped together in a single host group, as will the RPC Endpoint Mapper and Remote Procedure Call services.
+
+If you need to identify services that will continue to be grouped, in addition to seeing them in Task Manager and using command line tools, you can look for the *SvcHostSplitDisable* value in their respective service keys under
+HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services.
+
+The default value of **1** prevents the service from being split.
+
+For example, this is the registry key configuration for BFE:
+
+
+## Memory footprint
+
+Be aware that separating services increases the total number of SvcHost instances, which increases memory utlization. (Service grouping provided a modest reduction to the overall resource footprint of the services involved.)
+
+Consider the following:
+
+
+|Grouped Services (< 3.5GB) | Split Services (3.5GB+)
+|--------------------------------------- | ------------------------------------------ |
+| | |
+
+> [!NOTE]
+> The above represents the peak observed values.
+
+The total number of service instances and the resulting memory utilization varies depending on activity. Instance counts can typically range from approximately 17-21 for grouped services, and 67-74 for separated services.
+
+> **Try This**
+>
+>To determine the impact of splitting hosted services on a Windows 10 version 1703 PC, run the following Windows PowerShell cmdlet, before and after toggling the memory settings:
+>
+> ```powershell
+> Get-Process SvcHost | Group-Object -Property ProcessName | Format-Table Name, Count, @{n='Mem (KB)';e={'{0:N0}' -f (($_.Group|Measure-Object WorkingSet -Sum).Sum / 1KB)};a='right'} -AutoSize
+>```
diff --git a/windows/client-management/mdm/understanding-admx-backed-policies.md b/windows/client-management/mdm/understanding-admx-backed-policies.md
index d905d434f9..f4b6271552 100644
--- a/windows/client-management/mdm/understanding-admx-backed-policies.md
+++ b/windows/client-management/mdm/understanding-admx-backed-policies.md
@@ -45,7 +45,7 @@ In a domain controller/Group Policy ecosystem, Group Policies are automatically
An ADMX file can either be shipped with Windows (located at `%SystemRoot%\policydefinitions`) or it can be ingested to a device through the Policy CSP URI (`./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall`). Inbox ADMX files are processed into MDM policies at OS-build time. ADMX files that are ingested are processed into MDM policies post-OS shipment through the Policy CSP. Because the Policy CSP does not rely upon any aspect of the Group Policy client stack, including the PC’s Group Policy Service (GPSvc), the policy handlers that are ingested to the device are able to react to policies that are set by the MDM.
-Windows maps the name and category path of a Group Policy to a MDM policy area and policy name by parsing the associated ADMX file, finding the specified Group Policy, and storing the definition (metadata) in the MDM Policy CSP client store. When the MDM policy is referenced by a SyncML command and the Policy CSP URI, `.\[device|user]\vendor\msft\policy\[config|result]\