mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge branch 'seo-working-branch' into 1justingilmore-seo-working-branch
This commit is contained in:
commit
2bcfff2fb2
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Add Microsoft Store for Business applications to a Windows 10 image
|
title: Add Microsoft Store for Business applications to a Windows 10 image
|
||||||
description: This topic describes how to add Microsoft Store for Business applications to a Windows 10 image.
|
description: This article describes the correct way to add Microsoft Store for Business applications to a Windows 10 image.
|
||||||
keywords: upgrade, update, windows, windows 10, deploy, store, image, wim
|
keywords: upgrade, update, windows, windows 10, deploy, store, image, wim
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -13,6 +13,7 @@ ms.author: greglin
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Add Microsoft Store for Business applications to a Windows 10 image
|
# Add Microsoft Store for Business applications to a Windows 10 image
|
||||||
|
@ -3,7 +3,7 @@ title: Deploy Windows 10 with Microsoft 365
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
description: Concepts about deploying Windows 10 for M365
|
description: This article provides an overview about deploying Windows 10 for Microsoft 365, including how to use a free 90-day trial account.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -14,6 +14,7 @@ audience: itpro
|
|||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy Windows 10 with Microsoft 365
|
# Deploy Windows 10 with Microsoft 365
|
||||||
|
@ -3,7 +3,7 @@ title: What's new in Windows 10 deployment
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
description: Changes and new features related to Windows 10 deployment
|
description: This article provides an overview of the new features and solutions related to Windows 10 deployment.
|
||||||
keywords: deployment, automate, tools, configure, news
|
keywords: deployment, automate, tools, configure, news
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
@ -13,6 +13,7 @@ ms.pagetype: deploy
|
|||||||
audience: itpro
|
audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# What's new in Windows 10 deployment
|
# What's new in Windows 10 deployment
|
||||||
@ -54,7 +55,7 @@ See [Deploy Windows 10 with Microsoft 365](deploy-m365.md) for an overview, whic
|
|||||||
- [**Windows Update for Business**](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523): There will now be a single, common start date for phased deployments (no more SAC-T designation). In addition, there will a new notification and reboot scheduling experience for end users, the ability to enforce update installation and reboot deadlines, and the ability to provide end user control over reboots for a specific time period.
|
- [**Windows Update for Business**](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-and-the-retirement-of-SAC-T/ba-p/339523): There will now be a single, common start date for phased deployments (no more SAC-T designation). In addition, there will a new notification and reboot scheduling experience for end users, the ability to enforce update installation and reboot deadlines, and the ability to provide end user control over reboots for a specific time period.
|
||||||
- **Update rollback improvements**: You can now automatically recover from startup failures by removing updates if the startup failure was introduced after the installation of recent driver or quality updates. When a device is unable to start up properly after the recent installation of Quality of driver updates, Windows will now automatically uninstall the updates to get the device back up and running normally.
|
- **Update rollback improvements**: You can now automatically recover from startup failures by removing updates if the startup failure was introduced after the installation of recent driver or quality updates. When a device is unable to start up properly after the recent installation of Quality of driver updates, Windows will now automatically uninstall the updates to get the device back up and running normally.
|
||||||
- **Pause updates**: We have extended the ability to pause updates for both feature and monthly updates. This extension ability is for all editions of Windows 10, including Home. You can pause both feature and monthly updates for up to 35 days (seven days at a time, up to five times). Once the 35-day pause period is reached, you will need to update your device before pausing again.
|
- **Pause updates**: We have extended the ability to pause updates for both feature and monthly updates. This extension ability is for all editions of Windows 10, including Home. You can pause both feature and monthly updates for up to 35 days (seven days at a time, up to five times). Once the 35-day pause period is reached, you will need to update your device before pausing again.
|
||||||
- **Improved update notifications**: When there’s an update requiring you to restart your device, you’ll see a colored dot on the Power button in the Start menu and on the Windows icon in your taskbar.
|
- **Improved update notifications**: When there's an update requiring you to restart your device, you'll see a colored dot on the Power button in the Start menu and on the Windows icon in your taskbar.
|
||||||
- **Intelligent active hours**: To further enhance active hours, users will now have the option to let Windows Update intelligently adjust active hours based on their device-specific usage patterns. You must enable the intelligent active hours feature for the system to predict device-specific usage patterns.
|
- **Intelligent active hours**: To further enhance active hours, users will now have the option to let Windows Update intelligently adjust active hours based on their device-specific usage patterns. You must enable the intelligent active hours feature for the system to predict device-specific usage patterns.
|
||||||
- **Improved update orchestration to improve system responsiveness**: This feature will improve system performance by intelligently coordinating Windows updates and Microsoft Store updates, so they occur when users are away from their devices to minimize disruptions.
|
- **Improved update orchestration to improve system responsiveness**: This feature will improve system performance by intelligently coordinating Windows updates and Microsoft Store updates, so they occur when users are away from their devices to minimize disruptions.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Finalize operating system configuration for Windows 10 deployment
|
title: Finalize operating system configuration for Windows 10 deployment
|
||||||
description: Follow this walk-through to finalize the configuration of your Windows 10 operating deployment.
|
description: This article provides a walk-through to finalize the configuration of your Windows 10 operating deployment.
|
||||||
ms.assetid: 38b55fa8-e717-4689-bd43-8348751d493e
|
ms.assetid: 38b55fa8-e717-4689-bd43-8348751d493e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -13,6 +13,7 @@ ms.sitesec: library
|
|||||||
audience: itpro
|
audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Finalize the operating system configuration for Windows 10 deployment with Configuration Manager
|
# Finalize the operating system configuration for Windows 10 deployment with Configuration Manager
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Replace a Windows 7 computer with a Windows 10 computer (Windows 10)
|
title: Replace a Windows 7 computer with a Windows 10 computer (Windows 10)
|
||||||
description: Learn how to replace a Windows 7 device with a Windows 10 device. Although the process is similar to performing a refresh, you'll need to backup data externally
|
description: In this article, you will learn how to replace a Windows 7 device with a Windows 10 device.
|
||||||
|
ms.custom: - seo-marvel-apr2020
|
||||||
ms.assetid: acf091c9-f8f4-4131-9845-625691c09a2a
|
ms.assetid: acf091c9-f8f4-4131-9845-625691c09a2a
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Deploy Windows To Go in your organization (Windows 10)
|
title: Deploy Windows To Go in your organization (Windows 10)
|
||||||
description: This topic helps you to deploy Windows To Go in your organization.
|
description: This article provides steps to deploy Windows To Go in your organization, including tips to plan and prepare for the deployment.
|
||||||
ms.assetid: cfe550be-ffbd-42d1-ab4d-80efae49b07f
|
ms.assetid: cfe550be-ffbd-42d1-ab4d-80efae49b07f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -14,6 +14,7 @@ ms.pagetype: mobility
|
|||||||
audience: itpro
|
audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy Windows To Go in your organization
|
# Deploy Windows To Go in your organization
|
||||||
@ -113,7 +114,7 @@ The following Windows PowerShell cmdlet or cmdlets perform the same function as
|
|||||||
|
|
||||||
$Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot }
|
$Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot }
|
||||||
|
|
||||||
#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with ‘New-Partition…) Validate that this is the correct disk that you want to completely erase.
|
#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with 'New-Partition…) Validate that this is the correct disk that you want to completely erase.
|
||||||
#
|
#
|
||||||
# To skip the confirmation prompt, append –confirm:$False
|
# To skip the confirmation prompt, append –confirm:$False
|
||||||
Clear-Disk –InputObject $Disk[0] -RemoveData
|
Clear-Disk –InputObject $Disk[0] -RemoveData
|
||||||
@ -161,7 +162,7 @@ W:\Windows\System32\bcdboot W:\Windows /f ALL /s S:
|
|||||||
```
|
```
|
||||||
~~~
|
~~~
|
||||||
|
|
||||||
5. Apply SAN policy—OFFLINE\_INTERNAL - “4” to prevent the operating system from automatically bringing online any internally connected disk. This is done by creating and saving a **san\_policy.xml** file on the disk. The following example illustrates this step:
|
5. Apply SAN policy—OFFLINE\_INTERNAL - "4" to prevent the operating system from automatically bringing online any internally connected disk. This is done by creating and saving a **san\_policy.xml** file on the disk. The following example illustrates this step:
|
||||||
|
|
||||||
```
|
```
|
||||||
<?xml version='1.0' encoding='utf-8' standalone='yes'?>
|
<?xml version='1.0' encoding='utf-8' standalone='yes'?>
|
||||||
@ -291,7 +292,7 @@ Making sure that Windows To Go workspaces are effective when used off premises i
|
|||||||
|
|
||||||
- A domain-joined computer running Windows 8 or later and is configured as a Windows To Go host computer
|
- A domain-joined computer running Windows 8 or later and is configured as a Windows To Go host computer
|
||||||
|
|
||||||
- A Windows To Go drive that hasn’t been booted or joined to the domain using unattend settings.
|
- A Windows To Go drive that hasn't been booted or joined to the domain using unattend settings.
|
||||||
|
|
||||||
- A domain user account with rights to add computer accounts to the domain and is a member of the Administrator group on the Windows To Go host computer
|
- A domain user account with rights to add computer accounts to the domain and is a member of the Administrator group on the Windows To Go host computer
|
||||||
|
|
||||||
@ -319,7 +320,7 @@ Making sure that Windows To Go workspaces are effective when used off premises i
|
|||||||
|
|
||||||
$Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot }
|
$Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot }
|
||||||
|
|
||||||
#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with ‘New-Partition…) Validate that this is the correct disk that you want to completely erase.
|
#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with 'New-Partition…) Validate that this is the correct disk that you want to completely erase.
|
||||||
#
|
#
|
||||||
# To skip the confirmation prompt, append –confirm:$False
|
# To skip the confirmation prompt, append –confirm:$False
|
||||||
Clear-Disk –InputObject $Disk[0] -RemoveData
|
Clear-Disk –InputObject $Disk[0] -RemoveData
|
||||||
@ -414,7 +415,7 @@ dism /apply-image /imagefile:n:\imagefolder\deploymentimages\mywtgimage.wim /ind
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Depending on your DirectAccess configuration you might be asked to insert your smart card to log on to the domain.
|
>Depending on your DirectAccess configuration you might be asked to insert your smart card to log on to the domain.
|
||||||
|
|
||||||
You should now be able to access your organization’s network resources and work from your Windows To Go workspace as you would normally work from your standard desktop computer on premises.
|
You should now be able to access your organization's network resources and work from your Windows To Go workspace as you would normally work from your standard desktop computer on premises.
|
||||||
|
|
||||||
### Enable BitLocker protection for your Windows To Go drive
|
### Enable BitLocker protection for your Windows To Go drive
|
||||||
|
|
||||||
@ -467,7 +468,7 @@ BitLocker recovery keys are the keys that can be used to unlock a BitLocker prot
|
|||||||
|
|
||||||
$Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot }
|
$Disk = Get-Disk | Where-Object {$_.Path -match "USBSTOR" -and $_.Size -gt 20Gb -and -not $_.IsBoot }
|
||||||
|
|
||||||
#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with ‘New-Partition…) Validate that this is the correct disk that you want to completely erase.
|
#Clear the disk. This will delete any data on the disk. (and will fail if the disk is not yet initialized. If that happens, simply continue with 'New-Partition…) Validate that this is the correct disk that you want to completely erase.
|
||||||
#
|
#
|
||||||
# To skip the confirmation prompt, append –confirm:$False
|
# To skip the confirmation prompt, append –confirm:$False
|
||||||
Clear-Disk –InputObject $Disk[0] -RemoveData
|
Clear-Disk –InputObject $Disk[0] -RemoveData
|
||||||
@ -576,17 +577,17 @@ The sample script creates an unattend file that streamlines the deployment proce
|
|||||||
|
|
||||||
* To run this sample script you must open a Windows PowerShell session as an administrator from a domain-joined computer using an account that has permission to create domain accounts.
|
* To run this sample script you must open a Windows PowerShell session as an administrator from a domain-joined computer using an account that has permission to create domain accounts.
|
||||||
|
|
||||||
* Using offline domain join is required by this script, since the script does not create a local administrator user account. However, domain membership will automatically put “Domain admins” into the local administrators group. Review your domain policies. If you are using DirectAccess you will need to modify the djoin.exe command to include the `policynames` and potentially the `certtemplate` parameters.
|
* Using offline domain join is required by this script, since the script does not create a local administrator user account. However, domain membership will automatically put "Domain admins" into the local administrators group. Review your domain policies. If you are using DirectAccess you will need to modify the djoin.exe command to include the `policynames` and potentially the `certtemplate` parameters.
|
||||||
|
|
||||||
* The script needs to use drive letters, so you can only provision half as many drives as you have free drive letters.
|
* The script needs to use drive letters, so you can only provision half as many drives as you have free drive letters.
|
||||||
|
|
||||||
#### To run the advanced deployment sample script
|
#### To run the advanced deployment sample script
|
||||||
|
|
||||||
1. Copy entire the code sample titled “Windows To Go multiple drive provisioning sample script” into a PowerShell script (.ps1) file.
|
1. Copy entire the code sample titled "Windows To Go multiple drive provisioning sample script" into a PowerShell script (.ps1) file.
|
||||||
|
|
||||||
2. Make the modifications necessary for it to be appropriate to your deployment and save the file.
|
2. Make the modifications necessary for it to be appropriate to your deployment and save the file.
|
||||||
|
|
||||||
3. Configure the PowerShell execution policy. By default PowerShell’s execution policy is set to Restricted; that means that scripts won’t run until you have explicitly given them permission to. To configure PowerShell’s execution policy to allow the script to run, use the following command from an elevated PowerShell prompt:
|
3. Configure the PowerShell execution policy. By default PowerShell's execution policy is set to Restricted; that means that scripts won't run until you have explicitly given them permission to. To configure PowerShell's execution policy to allow the script to run, use the following command from an elevated PowerShell prompt:
|
||||||
|
|
||||||
```
|
```
|
||||||
Set-ExecutionPolicy RemoteSigned
|
Set-ExecutionPolicy RemoteSigned
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Deploy Windows 10 (Windows 10)
|
title: Deploy Windows 10 (Windows 10)
|
||||||
description: Deploying Windows 10 for IT professionals.
|
description: This article contains information for IT professionals on how to deploy Windows 10 or upgrade from a previous version of Windows.
|
||||||
ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C
|
ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -13,6 +13,7 @@ ms.localizationpriority: medium
|
|||||||
audience: itpro
|
audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy Windows 10
|
# Deploy Windows 10
|
||||||
|
@ -5,7 +5,7 @@ title: Deploy and update Windows 10
|
|||||||
metadata:
|
metadata:
|
||||||
document_id:
|
document_id:
|
||||||
title: Deploy and update Windows 10
|
title: Deploy and update Windows 10
|
||||||
description: Deploying and updating Windows 10 for IT professionals.
|
description: This landing page provides information about deploying and updating Windows 10 for IT professionals.
|
||||||
keywords: deploy, update, Windows, service, Microsoft365, e5, e3
|
keywords: deploy, update, Windows, service, Microsoft365, e5, e3
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
@ -13,6 +13,7 @@ metadata:
|
|||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.devlang: na
|
ms.devlang: na
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
|
|
||||||
sections:
|
sections:
|
||||||
- items:
|
- items:
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: MBR2GPT
|
title: MBR2GPT
|
||||||
description: How to use the MBR2GPT tool to convert MBR partitions to GPT
|
description: How to use the MBR2GPT tool to convert Master Boot Record (MBR) partitions to the GUID Partition Table (GPT).
|
||||||
keywords: deploy, troubleshoot, windows, 10, upgrade, partition, mbr, gpt
|
keywords: deploy, troubleshoot, windows, 10, upgrade, partition, mbr, gpt
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -15,6 +15,7 @@ ms.audience: itpro
|
|||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# MBR2GPT.EXE
|
# MBR2GPT.EXE
|
||||||
|
@ -1,238 +1,240 @@
|
|||||||
---
|
---
|
||||||
title: Available Data Types and Operators in Compatibility Administrator (Windows 10)
|
title: Available Data Types and Operators in Compatibility Administrator (Windows 10)
|
||||||
description: The Compatibility Administrator tool provides a way to query your custom-compatibility databases.
|
description: In this article, learn how the Compatibility Administrator tool provides a way to query your custom-compatibility databases.
|
||||||
ms.assetid: 67d9c03e-ab9d-4fda-8a55-8c5b90266d3b
|
ms.assetid: 67d9c03e-ab9d-4fda-8a55-8c5b90266d3b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.date: 04/19/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.date: 04/19/2017
|
||||||
---
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
# Available Data Types and Operators in Compatibility Administrator
|
---
|
||||||
|
|
||||||
|
# Available Data Types and Operators in Compatibility Administrator
|
||||||
**Applies to**
|
|
||||||
|
|
||||||
- Windows 10
|
**Applies to**
|
||||||
- Windows 8.1
|
|
||||||
- Windows 8
|
- Windows 10
|
||||||
- Windows 7
|
- Windows 8.1
|
||||||
- Windows Server 2012
|
- Windows 8
|
||||||
- Windows Server 2008 R2
|
- Windows 7
|
||||||
|
- Windows Server 2012
|
||||||
The Compatibility Administrator tool provides a way to query your custom-compatibility databases.
|
- Windows Server 2008 R2
|
||||||
|
|
||||||
## Available Data Types
|
The Compatibility Administrator tool provides a way to query your custom-compatibility databases.
|
||||||
|
|
||||||
|
## Available Data Types
|
||||||
Customized-compatibility databases in Compatibility Administrator contain the following data types.
|
|
||||||
|
|
||||||
- **Integer**. A numerical value with no fractional part. All integers are unsigned because none of the attributes can have a negative value.
|
Customized-compatibility databases in Compatibility Administrator contain the following data types.
|
||||||
|
|
||||||
- **String**. A series of alphanumeric characters manipulated as a group.
|
- **Integer**. A numerical value with no fractional part. All integers are unsigned because none of the attributes can have a negative value.
|
||||||
|
|
||||||
- **Boolean**. A value of True or False.
|
- **String**. A series of alphanumeric characters manipulated as a group.
|
||||||
|
|
||||||
## Available Attributes
|
- **Boolean**. A value of True or False.
|
||||||
|
|
||||||
|
## Available Attributes
|
||||||
The following table shows the attributes you can use for querying your customized-compatibility databases in Compatibility Administrator.
|
|
||||||
|
|
||||||
<table>
|
The following table shows the attributes you can use for querying your customized-compatibility databases in Compatibility Administrator.
|
||||||
<colgroup>
|
|
||||||
<col width="33%" />
|
<table>
|
||||||
<col width="33%" />
|
<colgroup>
|
||||||
<col width="33%" />
|
<col width="33%" />
|
||||||
</colgroup>
|
<col width="33%" />
|
||||||
<thead>
|
<col width="33%" />
|
||||||
<tr class="header">
|
</colgroup>
|
||||||
<th align="left">Attribute</th>
|
<thead>
|
||||||
<th align="left">Description</th>
|
<tr class="header">
|
||||||
<th align="left">Data type</th>
|
<th align="left">Attribute</th>
|
||||||
</tr>
|
<th align="left">Description</th>
|
||||||
</thead>
|
<th align="left">Data type</th>
|
||||||
<tbody>
|
</tr>
|
||||||
<tr class="odd">
|
</thead>
|
||||||
<td align="left"><p>APP_NAME</p></td>
|
<tbody>
|
||||||
<td align="left"><p>Name of the application.</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>String</p></td>
|
<td align="left"><p>APP_NAME</p></td>
|
||||||
</tr>
|
<td align="left"><p>Name of the application.</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>String</p></td>
|
||||||
<td align="left"><p>DATABASE_GUID</p></td>
|
</tr>
|
||||||
<td align="left"><p>Unique ID for your compatibility database.</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>String</p></td>
|
<td align="left"><p>DATABASE_GUID</p></td>
|
||||||
</tr>
|
<td align="left"><p>Unique ID for your compatibility database.</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>String</p></td>
|
||||||
<td align="left"><p>DATABASE_INSTALLED</p></td>
|
</tr>
|
||||||
<td align="left"><p>Specifies if you have installed the database.</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>Boolean</p></td>
|
<td align="left"><p>DATABASE_INSTALLED</p></td>
|
||||||
</tr>
|
<td align="left"><p>Specifies if you have installed the database.</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>Boolean</p></td>
|
||||||
<td align="left"><p>DATABASE_NAME</p></td>
|
</tr>
|
||||||
<td align="left"><p>Descriptive name of your database.</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>String</p></td>
|
<td align="left"><p>DATABASE_NAME</p></td>
|
||||||
</tr>
|
<td align="left"><p>Descriptive name of your database.</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>String</p></td>
|
||||||
<td align="left"><p>DATABASE_PATH</p></td>
|
</tr>
|
||||||
<td align="left"><p>Location of the database on your computer.</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>String</p></td>
|
<td align="left"><p>DATABASE_PATH</p></td>
|
||||||
</tr>
|
<td align="left"><p>Location of the database on your computer.</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>String</p></td>
|
||||||
<td align="left"><p>FIX_COUNT</p></td>
|
</tr>
|
||||||
<td align="left"><p>Number of compatibility fixes applied to a specific application.</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Integer</p></td>
|
<td align="left"><p>FIX_COUNT</p></td>
|
||||||
</tr>
|
<td align="left"><p>Number of compatibility fixes applied to a specific application.</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>Integer</p></td>
|
||||||
<td align="left"><p>FIX_NAME</p></td>
|
</tr>
|
||||||
<td align="left"><p>Name of your compatibility fix.</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>String</p></td>
|
<td align="left"><p>FIX_NAME</p></td>
|
||||||
</tr>
|
<td align="left"><p>Name of your compatibility fix.</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>String</p></td>
|
||||||
<td align="left"><p>MATCH_COUNT</p></td>
|
</tr>
|
||||||
<td align="left"><p>Number of matching files for a specific, fixed application.</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Integer</p></td>
|
<td align="left"><p>MATCH_COUNT</p></td>
|
||||||
</tr>
|
<td align="left"><p>Number of matching files for a specific, fixed application.</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>Integer</p></td>
|
||||||
<td align="left"><p>MATCHFILE_NAME</p></td>
|
</tr>
|
||||||
<td align="left"><p>Name of a matching file used to identify a specific, fixed application.</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>String</p></td>
|
<td align="left"><p>MATCHFILE_NAME</p></td>
|
||||||
</tr>
|
<td align="left"><p>Name of a matching file used to identify a specific, fixed application.</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>String</p></td>
|
||||||
<td align="left"><p>MODE_COUNT</p></td>
|
</tr>
|
||||||
<td align="left"><p>Number of compatibility modes applied to a specific, fixed application.</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Integer</p></td>
|
<td align="left"><p>MODE_COUNT</p></td>
|
||||||
</tr>
|
<td align="left"><p>Number of compatibility modes applied to a specific, fixed application.</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>Integer</p></td>
|
||||||
<td align="left"><p>MODE_NAME</p></td>
|
</tr>
|
||||||
<td align="left"><p>Name of your compatibility mode.</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>String</p></td>
|
<td align="left"><p>MODE_NAME</p></td>
|
||||||
</tr>
|
<td align="left"><p>Name of your compatibility mode.</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>String</p></td>
|
||||||
<td align="left"><p>PROGRAM_APPHELPTYPE</p></td>
|
</tr>
|
||||||
<td align="left"><p>Type of AppHelp message applied to an entry. The value can be 1 or 2, where 1 enables the program to run and 2 blocks the program.</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Integer</p></td>
|
<td align="left"><p>PROGRAM_APPHELPTYPE</p></td>
|
||||||
</tr>
|
<td align="left"><p>Type of AppHelp message applied to an entry. The value can be 1 or 2, where 1 enables the program to run and 2 blocks the program.</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>Integer</p></td>
|
||||||
<td align="left"><p>PROGRAM_DISABLED</p></td>
|
</tr>
|
||||||
<td align="left"><p>Specifies if you disabled the compatibility fix for an application. If True, Compatibility Administrator does not apply the fixes to the application.</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>Boolean</p></td>
|
<td align="left"><p>PROGRAM_DISABLED</p></td>
|
||||||
</tr>
|
<td align="left"><p>Specifies if you disabled the compatibility fix for an application. If True, Compatibility Administrator does not apply the fixes to the application.</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>Boolean</p></td>
|
||||||
<td align="left"><p>PROGRAM_GUID</p></td>
|
</tr>
|
||||||
<td align="left"><p>Unique ID for an application.</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>String</p></td>
|
<td align="left"><p>PROGRAM_GUID</p></td>
|
||||||
</tr>
|
<td align="left"><p>Unique ID for an application.</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>String</p></td>
|
||||||
<td align="left"><p>PROGRAM_NAME</p></td>
|
</tr>
|
||||||
<td align="left"><p>Name of the application that you are fixing.</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>String</p></td>
|
<td align="left"><p>PROGRAM_NAME</p></td>
|
||||||
</tr>
|
<td align="left"><p>Name of the application that you are fixing.</p></td>
|
||||||
</tbody>
|
<td align="left"><p>String</p></td>
|
||||||
</table>
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
## Available Operators
|
|
||||||
|
|
||||||
|
## Available Operators
|
||||||
The following table shows the operators that you can use for querying your customized-compatibility databases in the Compatibility Administrator.
|
|
||||||
|
|
||||||
<table>
|
The following table shows the operators that you can use for querying your customized-compatibility databases in the Compatibility Administrator.
|
||||||
<colgroup>
|
|
||||||
<col width="25%" />
|
<table>
|
||||||
<col width="25%" />
|
<colgroup>
|
||||||
<col width="25%" />
|
<col width="25%" />
|
||||||
<col width="25%" />
|
<col width="25%" />
|
||||||
</colgroup>
|
<col width="25%" />
|
||||||
<thead>
|
<col width="25%" />
|
||||||
<tr class="header">
|
</colgroup>
|
||||||
<th align="left">Symbol</th>
|
<thead>
|
||||||
<th align="left">Description</th>
|
<tr class="header">
|
||||||
<th align="left">Data type</th>
|
<th align="left">Symbol</th>
|
||||||
<th align="left">Precedence</th>
|
<th align="left">Description</th>
|
||||||
</tr>
|
<th align="left">Data type</th>
|
||||||
</thead>
|
<th align="left">Precedence</th>
|
||||||
<tbody>
|
</tr>
|
||||||
<tr class="odd">
|
</thead>
|
||||||
<td align="left"><p>></p></td>
|
<tbody>
|
||||||
<td align="left"><p>Greater than</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>Integer or string</p></td>
|
<td align="left"><p>></p></td>
|
||||||
<td align="left"><p>1</p></td>
|
<td align="left"><p>Greater than</p></td>
|
||||||
</tr>
|
<td align="left"><p>Integer or string</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>1</p></td>
|
||||||
<td align="left"><p>>=</p></td>
|
</tr>
|
||||||
<td align="left"><p>Greater than or equal to</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Integer or string</p></td>
|
<td align="left"><p>>=</p></td>
|
||||||
<td align="left"><p>1</p></td>
|
<td align="left"><p>Greater than or equal to</p></td>
|
||||||
</tr>
|
<td align="left"><p>Integer or string</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>1</p></td>
|
||||||
<td align="left"><p><</p></td>
|
</tr>
|
||||||
<td align="left"><p>Less than</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>Integer or string</p></td>
|
<td align="left"><p><</p></td>
|
||||||
<td align="left"><p>1</p></td>
|
<td align="left"><p>Less than</p></td>
|
||||||
</tr>
|
<td align="left"><p>Integer or string</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>1</p></td>
|
||||||
<td align="left"><p><=</p></td>
|
</tr>
|
||||||
<td align="left"><p>Less than or equal to</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Integer or string</p></td>
|
<td align="left"><p><=</p></td>
|
||||||
<td align="left"><p>1</p></td>
|
<td align="left"><p>Less than or equal to</p></td>
|
||||||
</tr>
|
<td align="left"><p>Integer or string</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>1</p></td>
|
||||||
<td align="left"><p><></p></td>
|
</tr>
|
||||||
<td align="left"><p>Not equal to</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>Integer or string</p></td>
|
<td align="left"><p><></p></td>
|
||||||
<td align="left"><p>1</p></td>
|
<td align="left"><p>Not equal to</p></td>
|
||||||
</tr>
|
<td align="left"><p>Integer or string</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>1</p></td>
|
||||||
<td align="left"><p>=</p></td>
|
</tr>
|
||||||
<td align="left"><p>Equal to</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Integer, string, or Boolean</p></td>
|
<td align="left"><p>=</p></td>
|
||||||
<td align="left"><p>1</p></td>
|
<td align="left"><p>Equal to</p></td>
|
||||||
</tr>
|
<td align="left"><p>Integer, string, or Boolean</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>1</p></td>
|
||||||
<td align="left"><p>HAS</p></td>
|
</tr>
|
||||||
<td align="left"><p>A special SQL operator used to check if the left-hand operand contains a substring specified by the right-hand operand.</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p><strong>Left-hand operand</strong>. MATCHFILE_NAME, MODE_NAME, FIX_NAME</p>
|
<td align="left"><p>HAS</p></td>
|
||||||
<div class="alert">
|
<td align="left"><p>A special SQL operator used to check if the left-hand operand contains a substring specified by the right-hand operand.</p></td>
|
||||||
<strong>Note</strong><br/><p>Only the HAS operator can be applied to the MATCHFILE_NAME, MODE_NAME, and FIX_NAME attributes.</p>
|
<td align="left"><p><strong>Left-hand operand</strong>. MATCHFILE_NAME, MODE_NAME, FIX_NAME</p>
|
||||||
</div>
|
<div class="alert">
|
||||||
<div>
|
<strong>Note</strong><br/><p>Only the HAS operator can be applied to the MATCHFILE_NAME, MODE_NAME, and FIX_NAME attributes.</p>
|
||||||
|
</div>
|
||||||
</div>
|
<div>
|
||||||
<p><strong>Right-hand operand</strong>. String</p></td>
|
|
||||||
<td align="left"><p>1</p></td>
|
</div>
|
||||||
</tr>
|
<p><strong>Right-hand operand</strong>. String</p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>1</p></td>
|
||||||
<td align="left"><p>OR</p></td>
|
</tr>
|
||||||
<td align="left"><p>Logical OR operator</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Boolean</p></td>
|
<td align="left"><p>OR</p></td>
|
||||||
<td align="left"><p>2</p></td>
|
<td align="left"><p>Logical OR operator</p></td>
|
||||||
</tr>
|
<td align="left"><p>Boolean</p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>2</p></td>
|
||||||
<td align="left"><p>AND</p></td>
|
</tr>
|
||||||
<td align="left"><p>Logical AND operator</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>Boolean</p></td>
|
<td align="left"><p>AND</p></td>
|
||||||
<td align="left"><p>2</p></td>
|
<td align="left"><p>Logical AND operator</p></td>
|
||||||
</tr>
|
<td align="left"><p>Boolean</p></td>
|
||||||
</tbody>
|
<td align="left"><p>2</p></td>
|
||||||
</table>
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
## Related topics
|
|
||||||
[Using the Compatibility Administrator Tool](using-the-compatibility-administrator-tool.md)
|
|
||||||
|
## Related topics
|
||||||
|
[Using the Compatibility Administrator Tool](using-the-compatibility-administrator-tool.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,54 +1,56 @@
|
|||||||
---
|
---
|
||||||
title: Best practice recommendations for Windows To Go (Windows 10)
|
title: Best practice recommendations for Windows To Go (Windows 10)
|
||||||
description: Best practice recommendations for Windows To Go
|
description: This article contains best practice recommendations for Windows To Go, such as using a USB 3.0 port.
|
||||||
ms.assetid: 05e6e0ab-94ed-4c0c-a195-0abd006f0a86
|
ms.assetid: 05e6e0ab-94ed-4c0c-a195-0abd006f0a86
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
keywords: best practices, USB, device, boot
|
keywords: best practices, USB, device, boot
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.pagetype: mobility
|
ms.pagetype: mobility
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
# Best practice recommendations for Windows To Go
|
---
|
||||||
|
|
||||||
|
# Best practice recommendations for Windows To Go
|
||||||
**Applies to**
|
|
||||||
|
|
||||||
- Windows 10
|
**Applies to**
|
||||||
|
|
||||||
>[!IMPORTANT]
|
- Windows 10
|
||||||
>Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs.
|
|
||||||
|
>[!IMPORTANT]
|
||||||
The following are the best practice recommendations for using Windows To Go:
|
>Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs.
|
||||||
|
|
||||||
- Always shut down Windows and wait for shutdown to complete before removing the Windows To Go drive.
|
The following are the best practice recommendations for using Windows To Go:
|
||||||
- Do not insert the Windows To Go drive into a running computer.
|
|
||||||
- Do not boot the Windows To Go drive from a USB hub. Always insert the Windows To Go drive directly into a port on the computer.
|
- Always shut down Windows and wait for shutdown to complete before removing the Windows To Go drive.
|
||||||
- If available, use a USB 3.0 port with Windows To Go.
|
- Do not insert the Windows To Go drive into a running computer.
|
||||||
- Do not install non-Microsoft core USB drivers on Windows To Go.
|
- Do not boot the Windows To Go drive from a USB hub. Always insert the Windows To Go drive directly into a port on the computer.
|
||||||
- Suspend BitLocker on Windows host computers before changing the BIOS settings to boot from USB and then resume BitLocker protection.
|
- If available, use a USB 3.0 port with Windows To Go.
|
||||||
|
- Do not install non-Microsoft core USB drivers on Windows To Go.
|
||||||
Additionally, we recommend that when you plan your deployment you should also plan a standard operating procedure for answering questions about which USB drives can be used for Windows To Go and how to enable booting from USB to assist your IT department or help desk in supporting users and work groups that want to use Windows To Go. It may be very helpful for your organization to work with your hardware vendors to create an IT standard for USB drives for use with Windows To Go, so that if groups within your organization want to purchase drives they can quickly determine which ones they should obtain.
|
- Suspend BitLocker on Windows host computers before changing the BIOS settings to boot from USB and then resume BitLocker protection.
|
||||||
|
|
||||||
## More information
|
Additionally, we recommend that when you plan your deployment you should also plan a standard operating procedure for answering questions about which USB drives can be used for Windows To Go and how to enable booting from USB to assist your IT department or help desk in supporting users and work groups that want to use Windows To Go. It may be very helpful for your organization to work with your hardware vendors to create an IT standard for USB drives for use with Windows To Go, so that if groups within your organization want to purchase drives they can quickly determine which ones they should obtain.
|
||||||
|
|
||||||
|
## More information
|
||||||
[Windows To Go: feature overview](windows-to-go-overview.md)<br>
|
|
||||||
[Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md)<br>
|
|
||||||
[Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md)<br>
|
[Windows To Go: feature overview](windows-to-go-overview.md)<br>
|
||||||
[Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md)<br>
|
[Prepare your organization for Windows To Go](prepare-your-organization-for-windows-to-go.md)<br>
|
||||||
[Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md)<br>
|
[Deployment considerations for Windows To Go](deployment-considerations-for-windows-to-go.md)<br>
|
||||||
|
[Security and data protection considerations for Windows To Go](security-and-data-protection-considerations-for-windows-to-go.md)<br>
|
||||||
|
[Windows To Go: frequently asked questions](windows-to-go-frequently-asked-questions.md)<br>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Deployment considerations for Windows To Go (Windows 10)
|
title: Deployment considerations for Windows To Go (Windows 10)
|
||||||
description: Deployment considerations for Windows To Go
|
description: This article provides information about deployment considerations for Windows To Go, such as boot experience, deployment methods, and tools.
|
||||||
ms.assetid: dcfc5d96-b96b-44cd-ab65-416b5611c65e
|
ms.assetid: dcfc5d96-b96b-44cd-ab65-416b5611c65e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -13,6 +13,7 @@ ms.sitesec: library
|
|||||||
audience: itpro
|
audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deployment considerations for Windows To Go
|
# Deployment considerations for Windows To Go
|
||||||
@ -51,7 +52,7 @@ When a Windows To Go workspace is first used at the workplace, the Windows To Go
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
When the Windows To Go workspace is going to be used first on an off-premises computer, such as one at the employee’s home, then the IT professional preparing the Windows To Go drives should configure the drive to be able to connect to organizational resources and to maintain the security of the workspace. In this situation, the Windows To Go workspace needs to be configured for offline domain join and BitLocker needs to be enabled before the workspace has been initialized.
|
When the Windows To Go workspace is going to be used first on an off-premises computer, such as one at the employee's home, then the IT professional preparing the Windows To Go drives should configure the drive to be able to connect to organizational resources and to maintain the security of the workspace. In this situation, the Windows To Go workspace needs to be configured for offline domain join and BitLocker needs to be enabled before the workspace has been initialized.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> Applying BitLocker Drive Encryption to the drives before provisioning is a much faster process than encrypting the drives after data has already been stored on them due to a new feature called used-disk space only encryption. For more information, see [What's New in BitLocker](https://go.microsoft.com/fwlink/p/?LinkId=619076).
|
> Applying BitLocker Drive Encryption to the drives before provisioning is a much faster process than encrypting the drives after data has already been stored on them due to a new feature called used-disk space only encryption. For more information, see [What's New in BitLocker](https://go.microsoft.com/fwlink/p/?LinkId=619076).
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 features lifecycle
|
title: Windows 10 features lifecycle
|
||||||
description: Learn about the lifecycle of Windows 10 features
|
description: In this article, learn about the lifecycle of Windows 10 features, such as what's new and what's been removed.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
@ -10,6 +10,7 @@ author: greg-lindsay
|
|||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
# Windows 10 features lifecycle
|
# Windows 10 features lifecycle
|
||||||
|
|
||||||
@ -21,7 +22,7 @@ Each release of Windows 10 contains many new and improved features. Occasionally
|
|||||||
|
|
||||||
The following topic lists features that are no longer being developed. These features might be removed in a future release.
|
The following topic lists features that are no longer being developed. These features might be removed in a future release.
|
||||||
|
|
||||||
[Windows 10 features we’re no longer developing](windows-10-deprecated-features.md)
|
[Windows 10 features we're no longer developing](windows-10-deprecated-features.md)
|
||||||
|
|
||||||
## Features removed
|
## Features removed
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Prepare your organization for Windows To Go (Windows 10)
|
title: Prepare your organization for Windows To Go (Windows 10)
|
||||||
description: Prepare your organization for Windows To Go
|
description: This article provides information to help you plan and design a new deployment of Windows To Go in your production environment.
|
||||||
ms.assetid: f3f3c160-90ad-40a8-aeba-2aedee18f7ff
|
ms.assetid: f3f3c160-90ad-40a8-aeba-2aedee18f7ff
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -13,6 +13,7 @@ ms.sitesec: library
|
|||||||
audience: itpro
|
audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Prepare your organization for Windows To Go
|
# Prepare your organization for Windows To Go
|
||||||
@ -25,7 +26,7 @@ ms.topic: article
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs.
|
>Windows To Go is no longer being developed. The feature does not support feature updates and therefore does not enable you to stay current. It also requires a specific type of USB that is no longer supported by many OEMs.
|
||||||
|
|
||||||
The following information is provided to help you plan and design a new deployment of a Windows To Go in your production environment. It provides answers to the “what”, “why”, and “when” questions an IT professional might have when planning to deploy Windows To Go.
|
The following information is provided to help you plan and design a new deployment of a Windows To Go in your production environment. It provides answers to the "what", "why", and "when" questions an IT professional might have when planning to deploy Windows To Go.
|
||||||
|
|
||||||
## What is Windows To Go?
|
## What is Windows To Go?
|
||||||
|
|
||||||
@ -51,16 +52,16 @@ The following scenarios are examples of situations in which Windows To Go worksp
|
|||||||
|
|
||||||
- **Continuance of operations (COO).** In this scenario, selected employees receive a USB drive with a Windows To Go workspace, which includes all of the applications that the employees use at work. The employees can keep the device at home, in a briefcase, or wherever they want to store it until needed. When the users boot their home computer from the USB drive, it will create a corporate desktop experience so that they can quickly start working. On the very first boot, the employee sees that Windows is installing devices; after that one time, the Windows To Go drive boots like a normal computer. If they have enterprise network access, employees can use a virtual private network (VPN) connection or DirectAccess to access corporate resources. If the enterprise network is available, the Windows To Go workspace will automatically be updated using your standard client management processes.
|
- **Continuance of operations (COO).** In this scenario, selected employees receive a USB drive with a Windows To Go workspace, which includes all of the applications that the employees use at work. The employees can keep the device at home, in a briefcase, or wherever they want to store it until needed. When the users boot their home computer from the USB drive, it will create a corporate desktop experience so that they can quickly start working. On the very first boot, the employee sees that Windows is installing devices; after that one time, the Windows To Go drive boots like a normal computer. If they have enterprise network access, employees can use a virtual private network (VPN) connection or DirectAccess to access corporate resources. If the enterprise network is available, the Windows To Go workspace will automatically be updated using your standard client management processes.
|
||||||
|
|
||||||
- **Contractors and temporary workers.** In this situation, an enterprise IT pro or manager would distribute the Windows To Go drive directly to the worker where they can be assisted with any necessary additional user education needs or address any possible compatibility issues. While the worker is on assignment, they can boot their computer exclusively from the Windows To Go drive and run all applications in that environment until the end of the assignment when the device is returned. No installation of software is required on the worker’s personal computer.
|
- **Contractors and temporary workers.** In this situation, an enterprise IT pro or manager would distribute the Windows To Go drive directly to the worker where they can be assisted with any necessary additional user education needs or address any possible compatibility issues. While the worker is on assignment, they can boot their computer exclusively from the Windows To Go drive and run all applications in that environment until the end of the assignment when the device is returned. No installation of software is required on the worker's personal computer.
|
||||||
|
|
||||||
- **Managed free seating.** The employee is issued a Windows To Go drive that is then used with the host computer assigned to that employee for a given session (this could be a vehicle, workspace, or standalone laptop). When the employee leaves the session, the next time they return they use the same USB flash drive but use a different host computer.
|
- **Managed free seating.** The employee is issued a Windows To Go drive that is then used with the host computer assigned to that employee for a given session (this could be a vehicle, workspace, or standalone laptop). When the employee leaves the session, the next time they return they use the same USB flash drive but use a different host computer.
|
||||||
|
|
||||||
- **Work from home.** In this situation, the Windows To Go drive can be provisioned for employees using various methods including Microsoft Endpoint Configuration Manager or other deployment tools and then distributed to employees. The employee is instructed to boot the Windows To Go drive initially at work, which caches the employee’s credentials on the Windows To Go workspace and allows the initial data synchronization between the enterprise network and the Windows To Go workspace. The user can then bring the Windows To Go drive home where it can be used with their home computer, with or without enterprise network connectivity.
|
- **Work from home.** In this situation, the Windows To Go drive can be provisioned for employees using various methods including Microsoft Endpoint Configuration Manager or other deployment tools and then distributed to employees. The employee is instructed to boot the Windows To Go drive initially at work, which caches the employee's credentials on the Windows To Go workspace and allows the initial data synchronization between the enterprise network and the Windows To Go workspace. The user can then bring the Windows To Go drive home where it can be used with their home computer, with or without enterprise network connectivity.
|
||||||
|
|
||||||
- **Travel lightly.** In this situation you have employees who are moving from site to site, but who always will have access to a compatible host computer on site. Using Windows To Go workspaces allows them to travel without the need to pack their PC.
|
- **Travel lightly.** In this situation you have employees who are moving from site to site, but who always will have access to a compatible host computer on site. Using Windows To Go workspaces allows them to travel without the need to pack their PC.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If the employee wants to work offline for the majority of the time, but still maintain the ability to use the drive on the enterprise network, they should be informed of how often the Windows To Go workspace needs to be connected to the enterprise network. Doing so will ensure that the drive retains its access privileges and the workspace’s computer object is not potentially deleted from Active Directory Domain Services (AD DS).
|
> If the employee wants to work offline for the majority of the time, but still maintain the ability to use the drive on the enterprise network, they should be informed of how often the Windows To Go workspace needs to be connected to the enterprise network. Doing so will ensure that the drive retains its access privileges and the workspace's computer object is not potentially deleted from Active Directory Domain Services (AD DS).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -76,7 +77,7 @@ Windows To Go uses volume activation. You can use either Active Directory-based
|
|||||||
|
|
||||||
Microsoft software, such as Microsoft Office, distributed to a Windows To Go workspace must also be activated. Office deployment is fully supported on Windows To Go. Please note, due to the retail subscription activation method associated with Office 365 ProPlus, Office 365 ProPlus subscribers are provided volume licensing activation rights for Office Professional Plus 2013 MSI for local installation on the Windows To Go drive. This is available to organizations who purchase Office 365 ProPlus or Office 365 Enterprise SKUs containing Office 365 ProPlus via volume licensing channels. For more information about activating Microsoft Office, see [Volume activation methods in Office 2013](https://go.microsoft.com/fwlink/p/?LinkId=618922).
|
Microsoft software, such as Microsoft Office, distributed to a Windows To Go workspace must also be activated. Office deployment is fully supported on Windows To Go. Please note, due to the retail subscription activation method associated with Office 365 ProPlus, Office 365 ProPlus subscribers are provided volume licensing activation rights for Office Professional Plus 2013 MSI for local installation on the Windows To Go drive. This is available to organizations who purchase Office 365 ProPlus or Office 365 Enterprise SKUs containing Office 365 ProPlus via volume licensing channels. For more information about activating Microsoft Office, see [Volume activation methods in Office 2013](https://go.microsoft.com/fwlink/p/?LinkId=618922).
|
||||||
|
|
||||||
You should investigate other software manufacturer’s licensing requirements to ensure they are compatible with roaming usage before deploying them to a Windows To Go workspace.
|
You should investigate other software manufacturer's licensing requirements to ensure they are compatible with roaming usage before deploying them to a Windows To Go workspace.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Using Multiple Activation Key (MAK) activation is not a supported activation method for Windows To Go as each different PC-host would require separate activation. MAK activation should not be used for activating Windows, Office, or any other application on a Windows To Go drive.
|
> Using Multiple Activation Key (MAK) activation is not a supported activation method for Windows To Go as each different PC-host would require separate activation. MAK activation should not be used for activating Windows, Office, or any other application on a Windows To Go drive.
|
||||||
@ -102,7 +103,7 @@ If you configure Windows To Go drives for scenarios where drives may remain unus
|
|||||||
## User account and data management
|
## User account and data management
|
||||||
|
|
||||||
|
|
||||||
People use computers to work with data and consume content - that is their core function. The data must be stored and retrievable for it to be useful. When users are working in a Windows To Go workspace, they need to have the ability to get to the data that they work with and to keep it accessible when the workspace is not being used. For this reason we recommend that you use folder redirection and offline files to redirect the path of local folders (such as the Documents folder) to a network location, while caching the contents locally for increased speed and availability. We also recommend that you use roaming user profiles to synchronize user specific settings so that users receive the same operating system and application settings when using their Windows To Go workspace and their desktop computer. When a user signs in using a domain account that is set up with a file share as the profile path, the user’s profile is downloaded to the local computer and merged with the local profile (if present). When the user logs off the computer, the local copy of their profile, including any changes, is merged with the server copy of the profile. For more information, see [Folder Redirection, Offline Files, and Roaming User Profiles overview](https://go.microsoft.com/fwlink/p/?LinkId=618924).
|
People use computers to work with data and consume content - that is their core function. The data must be stored and retrievable for it to be useful. When users are working in a Windows To Go workspace, they need to have the ability to get to the data that they work with and to keep it accessible when the workspace is not being used. For this reason we recommend that you use folder redirection and offline files to redirect the path of local folders (such as the Documents folder) to a network location, while caching the contents locally for increased speed and availability. We also recommend that you use roaming user profiles to synchronize user specific settings so that users receive the same operating system and application settings when using their Windows To Go workspace and their desktop computer. When a user signs in using a domain account that is set up with a file share as the profile path, the user's profile is downloaded to the local computer and merged with the local profile (if present). When the user logs off the computer, the local copy of their profile, including any changes, is merged with the server copy of the profile. For more information, see [Folder Redirection, Offline Files, and Roaming User Profiles overview](https://go.microsoft.com/fwlink/p/?LinkId=618924).
|
||||||
|
|
||||||
Windows To Go is fully integrated with your Microsoft account. Setting synchronization is accomplished by connecting a Microsoft account to a user account. Windows To Go devices fully support this feature and can be managed by Group Policy so that the customization and configurations you prefer will be applied to your Windows To Go workspace.
|
Windows To Go is fully integrated with your Microsoft account. Setting synchronization is accomplished by connecting a Microsoft account to a user account. Windows To Go devices fully support this feature and can be managed by Group Policy so that the customization and configurations you prefer will be applied to your Windows To Go workspace.
|
||||||
|
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: SUA User's Guide (Windows 10)
|
title: SUA User's Guide (Windows 10)
|
||||||
description: Standard User Analyzer (SUA) can test your apps and monitor API calls to detect compatibility issues related to Windows' User Account Control (UAC) feature.
|
description: Learn how to use Standard User Analyzer (SUA). SUA can test your apps and monitor API calls to detect compatibility issues related to the Windows User Account Control (UAC) feature.
|
||||||
|
ms.custom: - seo-marvel-apr2020
|
||||||
ms.assetid: ea525c25-b557-4ed4-b042-3e4d0e543e10
|
ms.assetid: ea525c25-b557-4ed4-b042-3e4d0e543e10
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -67,4 +68,3 @@ You can use SUA in either of the following ways:
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,94 +1,96 @@
|
|||||||
---
|
---
|
||||||
title: Using the Compatibility Administrator Tool (Windows 10)
|
title: Using the Compatibility Administrator Tool (Windows 10)
|
||||||
description: This section provides information about using the Compatibility Administrator tool.
|
description: This article provides information about using the Compatibility Administrator tool, which provides functions like querying your custom-compatibility databases.
|
||||||
ms.assetid: 57271e47-b9b9-4018-a0b5-7115a533166d
|
ms.assetid: 57271e47-b9b9-4018-a0b5-7115a533166d
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.date: 04/19/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.date: 04/19/2017
|
||||||
---
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
# Using the Compatibility Administrator Tool
|
---
|
||||||
|
|
||||||
|
# Using the Compatibility Administrator Tool
|
||||||
**Applies to**
|
|
||||||
|
|
||||||
- Windows 10
|
**Applies to**
|
||||||
- Windows 8.1
|
|
||||||
- Windows 8
|
- Windows 10
|
||||||
- Windows 7
|
- Windows 8.1
|
||||||
- Windows Server 2012
|
- Windows 8
|
||||||
- Windows Server 2008 R2
|
- Windows 7
|
||||||
|
- Windows Server 2012
|
||||||
This section provides information about using the Compatibility Administrator tool.
|
- Windows Server 2008 R2
|
||||||
|
|
||||||
## In this section
|
This section provides information about using the Compatibility Administrator tool.
|
||||||
|
|
||||||
|
## In this section
|
||||||
<table>
|
|
||||||
<colgroup>
|
|
||||||
<col width="50%" />
|
<table>
|
||||||
<col width="50%" />
|
<colgroup>
|
||||||
</colgroup>
|
<col width="50%" />
|
||||||
<thead>
|
<col width="50%" />
|
||||||
<tr class="header">
|
</colgroup>
|
||||||
<th align="left">Topic</th>
|
<thead>
|
||||||
<th align="left">Description</th>
|
<tr class="header">
|
||||||
</tr>
|
<th align="left">Topic</th>
|
||||||
</thead>
|
<th align="left">Description</th>
|
||||||
<tbody>
|
</tr>
|
||||||
<tr class="odd">
|
</thead>
|
||||||
<td align="left"><p><a href="available-data-types-and-operators-in-compatibility-administrator.md" data-raw-source="[Available Data Types and Operators in Compatibility Administrator](available-data-types-and-operators-in-compatibility-administrator.md)">Available Data Types and Operators in Compatibility Administrator</a></p></td>
|
<tbody>
|
||||||
<td align="left"><p>The Compatibility Administrator tool provides a way to query your custom-compatibility databases.</p></td>
|
<tr class="odd">
|
||||||
</tr>
|
<td align="left"><p><a href="available-data-types-and-operators-in-compatibility-administrator.md" data-raw-source="[Available Data Types and Operators in Compatibility Administrator](available-data-types-and-operators-in-compatibility-administrator.md)">Available Data Types and Operators in Compatibility Administrator</a></p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>The Compatibility Administrator tool provides a way to query your custom-compatibility databases.</p></td>
|
||||||
<td align="left"><p><a href="searching-for-fixed-applications-in-compatibility-administrator.md" data-raw-source="[Searching for Fixed Applications in Compatibility Administrator](searching-for-fixed-applications-in-compatibility-administrator.md)">Searching for Fixed Applications in Compatibility Administrator</a></p></td>
|
</tr>
|
||||||
<td align="left"><p>With the search functionality in Compatibility Administrator, you can locate specific executable (.exe) files with previously applied compatibility fixes, compatibility modes, or AppHelp messages. This is particularly useful if you are trying to identify applications with a specific compatibility fix or identifying which fixes are applied to a specific application.</p></td>
|
<tr class="even">
|
||||||
</tr>
|
<td align="left"><p><a href="searching-for-fixed-applications-in-compatibility-administrator.md" data-raw-source="[Searching for Fixed Applications in Compatibility Administrator](searching-for-fixed-applications-in-compatibility-administrator.md)">Searching for Fixed Applications in Compatibility Administrator</a></p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>With the search functionality in Compatibility Administrator, you can locate specific executable (.exe) files with previously applied compatibility fixes, compatibility modes, or AppHelp messages. This is particularly useful if you are trying to identify applications with a specific compatibility fix or identifying which fixes are applied to a specific application.</p></td>
|
||||||
<td align="left"><p><a href="searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md" data-raw-source="[Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator](searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md)">Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator</a></p></td>
|
</tr>
|
||||||
<td align="left"><p>You can access the Query tool from within Compatibility Administrator. The Query tool provides the same functionality as using the Search feature.</p></td>
|
<tr class="odd">
|
||||||
</tr>
|
<td align="left"><p><a href="searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md" data-raw-source="[Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator](searching-for-installed-compatibility-fixes-with-the-query-tool-in-compatibility-administrator.md)">Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator</a></p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>You can access the Query tool from within Compatibility Administrator. The Query tool provides the same functionality as using the Search feature.</p></td>
|
||||||
<td align="left"><p><a href="creating-a-custom-compatibility-fix-in-compatibility-administrator.md" data-raw-source="[Creating a Custom Compatibility Fix in Compatibility Administrator](creating-a-custom-compatibility-fix-in-compatibility-administrator.md)">Creating a Custom Compatibility Fix in Compatibility Administrator</a></p></td>
|
</tr>
|
||||||
<td align="left"><p>The Compatibility Administrator tool uses the term <em>fix</em> to describe the combination of compatibility information added to a customized database for a specific application. This combination can include single application fixes, groups of fixes that work together as a compatibility mode, and blocking and non-blocking AppHelp messages.</p></td>
|
<tr class="even">
|
||||||
</tr>
|
<td align="left"><p><a href="creating-a-custom-compatibility-fix-in-compatibility-administrator.md" data-raw-source="[Creating a Custom Compatibility Fix in Compatibility Administrator](creating-a-custom-compatibility-fix-in-compatibility-administrator.md)">Creating a Custom Compatibility Fix in Compatibility Administrator</a></p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>The Compatibility Administrator tool uses the term <em>fix</em> to describe the combination of compatibility information added to a customized database for a specific application. This combination can include single application fixes, groups of fixes that work together as a compatibility mode, and blocking and non-blocking AppHelp messages.</p></td>
|
||||||
<td align="left"><p><a href="creating-a-custom-compatibility-mode-in-compatibility-administrator.md" data-raw-source="[Creating a Custom Compatibility Mode in Compatibility Administrator](creating-a-custom-compatibility-mode-in-compatibility-administrator.md)">Creating a Custom Compatibility Mode in Compatibility Administrator</a></p></td>
|
</tr>
|
||||||
<td align="left"><p>Windows® provides several <em>compatibility modes</em>, groups of compatibility fixes found to resolve many common application-compatibility issues. While working with Compatibility Administrator, you might decide to group some of your individual compatibility fixes into a custom-compatibility mode, which you can then deploy and use on any of your compatibility databases.</p></td>
|
<tr class="odd">
|
||||||
</tr>
|
<td align="left"><p><a href="creating-a-custom-compatibility-mode-in-compatibility-administrator.md" data-raw-source="[Creating a Custom Compatibility Mode in Compatibility Administrator](creating-a-custom-compatibility-mode-in-compatibility-administrator.md)">Creating a Custom Compatibility Mode in Compatibility Administrator</a></p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>Windows® provides several <em>compatibility modes</em>, groups of compatibility fixes found to resolve many common application-compatibility issues. While working with Compatibility Administrator, you might decide to group some of your individual compatibility fixes into a custom-compatibility mode, which you can then deploy and use on any of your compatibility databases.</p></td>
|
||||||
<td align="left"><p><a href="creating-an-apphelp-message-in-compatibility-administrator.md" data-raw-source="[Creating an AppHelp Message in Compatibility Administrator](creating-an-apphelp-message-in-compatibility-administrator.md)">Creating an AppHelp Message in Compatibility Administrator</a></p></td>
|
</tr>
|
||||||
<td align="left"><p>The Compatibility Administrator tool enables you to create an AppHelp text message. This is a blocking or non-blocking message that appears when a user starts an application that you know has major functionality issues on the Windows® operating system.</p></td>
|
<tr class="even">
|
||||||
</tr>
|
<td align="left"><p><a href="creating-an-apphelp-message-in-compatibility-administrator.md" data-raw-source="[Creating an AppHelp Message in Compatibility Administrator](creating-an-apphelp-message-in-compatibility-administrator.md)">Creating an AppHelp Message in Compatibility Administrator</a></p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>The Compatibility Administrator tool enables you to create an AppHelp text message. This is a blocking or non-blocking message that appears when a user starts an application that you know has major functionality issues on the Windows® operating system.</p></td>
|
||||||
<td align="left"><p><a href="viewing-the-events-screen-in-compatibility-administrator.md" data-raw-source="[Viewing the Events Screen in Compatibility Administrator](viewing-the-events-screen-in-compatibility-administrator.md)">Viewing the Events Screen in Compatibility Administrator</a></p></td>
|
</tr>
|
||||||
<td align="left"><p>The <strong>Events</strong> screen enables you to record and to view your activities in the Compatibility Administrator tool, provided that the screen is open while you perform the activities.</p></td>
|
<tr class="odd">
|
||||||
</tr>
|
<td align="left"><p><a href="viewing-the-events-screen-in-compatibility-administrator.md" data-raw-source="[Viewing the Events Screen in Compatibility Administrator](viewing-the-events-screen-in-compatibility-administrator.md)">Viewing the Events Screen in Compatibility Administrator</a></p></td>
|
||||||
<tr class="even">
|
<td align="left"><p>The <strong>Events</strong> screen enables you to record and to view your activities in the Compatibility Administrator tool, provided that the screen is open while you perform the activities.</p></td>
|
||||||
<td align="left"><p><a href="enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md" data-raw-source="[Enabling and Disabling Compatibility Fixes in Compatibility Administrator](enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md)">Enabling and Disabling Compatibility Fixes in Compatibility Administrator</a></p></td>
|
</tr>
|
||||||
<td align="left"><p>You can disable and enable individual compatibility fixes in your customized databases for testing and troubleshooting purposes.</p></td>
|
<tr class="even">
|
||||||
</tr>
|
<td align="left"><p><a href="enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md" data-raw-source="[Enabling and Disabling Compatibility Fixes in Compatibility Administrator](enabling-and-disabling-compatibility-fixes-in-compatibility-administrator.md)">Enabling and Disabling Compatibility Fixes in Compatibility Administrator</a></p></td>
|
||||||
<tr class="odd">
|
<td align="left"><p>You can disable and enable individual compatibility fixes in your customized databases for testing and troubleshooting purposes.</p></td>
|
||||||
<td align="left"><p><a href="installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md" data-raw-source="[Installing and Uninstalling Custom Compatibility Databases in Compatibility Administrator](installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md)">Installing and Uninstalling Custom Compatibility Databases in Compatibility Administrator</a></p></td>
|
</tr>
|
||||||
<td align="left"><p>The Compatibility Administrator tool enables the creation and the use of custom-compatibility and standard-compatibility databases. Both the custom databases and the standard databases store the known compatibility fixes, compatibility modes, and AppHelp messages. They also store the required application-matching information for installation on your local computers.</p></td>
|
<tr class="odd">
|
||||||
</tr>
|
<td align="left"><p><a href="installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md" data-raw-source="[Installing and Uninstalling Custom Compatibility Databases in Compatibility Administrator](installing-and-uninstalling-custom-compatibility-databases-in-compatibility-administrator.md)">Installing and Uninstalling Custom Compatibility Databases in Compatibility Administrator</a></p></td>
|
||||||
</tbody>
|
<td align="left"><p>The Compatibility Administrator tool enables the creation and the use of custom-compatibility and standard-compatibility databases. Both the custom databases and the standard databases store the known compatibility fixes, compatibility modes, and AppHelp messages. They also store the required application-matching information for installation on your local computers.</p></td>
|
||||||
</table>
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 - Features that have been removed
|
title: Windows 10 - Features that have been removed
|
||||||
description: Learn about features and functionality that has been removed or replaced in Windows 10
|
description: In this article, learn about features and functionality that has been removed or replaced in Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
@ -10,6 +10,7 @@ author: greg-lindsay
|
|||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Features and functionality removed in Windows 10
|
# Features and functionality removed in Windows 10
|
||||||
@ -18,7 +19,7 @@ ms.topic: article
|
|||||||
|
|
||||||
Each version of Windows 10 adds new features and functionality; occasionally we also remove features and functionality, often because we've added a better option. Below are the details about the features and functionalities that we removed in Windows 10. **The list below is subject to change and might not include every affected feature or functionality.**
|
Each version of Windows 10 adds new features and functionality; occasionally we also remove features and functionality, often because we've added a better option. Below are the details about the features and functionalities that we removed in Windows 10. **The list below is subject to change and might not include every affected feature or functionality.**
|
||||||
|
|
||||||
For information about features that might be removed in a future release, see [Windows 10 features we’re no longer developing](windows-10-deprecated-features.md)
|
For information about features that might be removed in a future release, see [Windows 10 features we're no longer developing](windows-10-deprecated-features.md)
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Join the [Windows Insider program](https://insider.windows.com) to get early access to new Windows 10 builds and test these changes yourself.
|
> Join the [Windows Insider program](https://insider.windows.com) to get early access to new Windows 10 builds and test these changes yourself.
|
||||||
@ -35,10 +36,10 @@ The following features and functionalities have been removed from the installed
|
|||||||
|Hologram app|We've replaced the Hologram app with the [Mixed Reality Viewer](https://support.microsoft.com/help/4041156/windows-10-mixed-reality-help). If you would like to create 3D word art, you can still do that in Paint 3D and view your art in VR or Hololens with the Mixed Reality Viewer.| 1809 |
|
|Hologram app|We've replaced the Hologram app with the [Mixed Reality Viewer](https://support.microsoft.com/help/4041156/windows-10-mixed-reality-help). If you would like to create 3D word art, you can still do that in Paint 3D and view your art in VR or Hololens with the Mixed Reality Viewer.| 1809 |
|
||||||
|limpet.exe|We're releasing the limpet.exe tool, used to access TPM for Azure connectivity, as open source.| 1809 |
|
|limpet.exe|We're releasing the limpet.exe tool, used to access TPM for Azure connectivity, as open source.| 1809 |
|
||||||
|Phone Companion|When you update to Windows 10, version 1809, the Phone Companion app will be removed from your PC. Use the **Phone** page in the Settings app to sync your mobile phone with your PC. It includes all the Phone Companion features.| 1809 |
|
|Phone Companion|When you update to Windows 10, version 1809, the Phone Companion app will be removed from your PC. Use the **Phone** page in the Settings app to sync your mobile phone with your PC. It includes all the Phone Companion features.| 1809 |
|
||||||
|Future updates through [Windows Embedded Developer Update](https://docs.microsoft.com/previous-versions/windows/embedded/ff770079\(v=winembedded.60\)) for Windows Embedded Standard 7-SP1 (WES7-SP1) and Windows Embedded Standard 8 (WES8)|We’re no longer publishing new updates to the WEDU server. Instead, you may secure any new updates from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx). [Learn how](https://techcommunity.microsoft.com/t5/Windows-Embedded/Change-to-the-Windows-Embedded-Developer-Update/ba-p/285704) to get updates from the catalog.| 1809 |
|
|Future updates through [Windows Embedded Developer Update](https://docs.microsoft.com/previous-versions/windows/embedded/ff770079\(v=winembedded.60\)) for Windows Embedded Standard 7-SP1 (WES7-SP1) and Windows Embedded Standard 8 (WES8)|We're no longer publishing new updates to the WEDU server. Instead, you may secure any new updates from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx). [Learn how](https://techcommunity.microsoft.com/t5/Windows-Embedded/Change-to-the-Windows-Embedded-Developer-Update/ba-p/285704) to get updates from the catalog.| 1809 |
|
||||||
|Groove Music Pass|[We ended the Groove streaming music service and music track sales through the Microsoft Store in 2017](https://support.microsoft.com/help/4046109/groove-music-and-spotify-faq). The Groove app is being updated to reflect this change. You can still use Groove Music to play the music on your PC or to stream music from OneDrive. You can use Spotify or other music services to stream music on Windows 10, or to buy music to own.| 1803 |
|
|Groove Music Pass|[We ended the Groove streaming music service and music track sales through the Microsoft Store in 2017](https://support.microsoft.com/help/4046109/groove-music-and-spotify-faq). The Groove app is being updated to reflect this change. You can still use Groove Music to play the music on your PC or to stream music from OneDrive. You can use Spotify or other music services to stream music on Windows 10, or to buy music to own.| 1803 |
|
||||||
|People - Suggestions will no longer include unsaved contacts for non-Microsoft accounts|Manually save the contact details for people you send mail to or get mail from.| 1803 |
|
|People - Suggestions will no longer include unsaved contacts for non-Microsoft accounts|Manually save the contact details for people you send mail to or get mail from.| 1803 |
|
||||||
|Language control in the Control Panel| Use the Settings app to change your language settings.| 1803 |
|
|Language control in the Control Panel| Use the Settings app to change your language settings.| 1803 |
|
||||||
|HomeGroup|We are removing [HomeGroup](https://support.microsoft.com/help/17145) but not your ability to share printers, files, and folders.<br><br>When you update to Windows 10, version 1803, you won't see HomeGroup in File Explorer, the Control Panel, or Troubleshoot (**Settings > Update & Security > Troubleshoot**). Any printers, files, and folders that you shared using HomeGroup **will continue to be shared**.<br><br>Instead of using HomeGroup, you can now share printers, files and folders by using features that are built into Windows 10: <br>- [Share your network printer](https://www.bing.com/search?q=share+printer+windows+10) <br>- [Share files in File Explorer](https://support.microsoft.com/help/4027674/windows-10-share-files-in-file-explorer) | 1803 |
|
|HomeGroup|We are removing [HomeGroup](https://support.microsoft.com/help/17145) but not your ability to share printers, files, and folders.<br><br>When you update to Windows 10, version 1803, you won't see HomeGroup in File Explorer, the Control Panel, or Troubleshoot (**Settings > Update & Security > Troubleshoot**). Any printers, files, and folders that you shared using HomeGroup **will continue to be shared**.<br><br>Instead of using HomeGroup, you can now share printers, files and folders by using features that are built into Windows 10: <br>- [Share your network printer](https://www.bing.com/search?q=share+printer+windows+10) <br>- [Share files in File Explorer](https://support.microsoft.com/help/4027674/windows-10-share-files-in-file-explorer) | 1803 |
|
||||||
|**Connect to suggested open hotspots** option in Wi-Fi settings |We previously [disabled the **Connect to suggested open hotspots** option](https://privacy.microsoft.com/windows-10-open-wi-fi-hotspots) and are now removing it from the Wi-Fi settings page. You can manually connect to free wireless hotspots with **Network & Internet** settings, from the taskbar or Control Panel, or by using Wi-Fi Settings (for mobile devices).| 1803 |
|
|**Connect to suggested open hotspots** option in Wi-Fi settings |We previously [disabled the **Connect to suggested open hotspots** option](https://privacy.microsoft.com/windows-10-open-wi-fi-hotspots) and are now removing it from the Wi-Fi settings page. You can manually connect to free wireless hotspots with **Network & Internet** settings, from the taskbar or Control Panel, or by using Wi-Fi Settings (for mobile devices).| 1803 |
|
||||||
|XPS Viewer|We're changing the way you get XPS Viewer. In Windows 10, version 1709 and earlier versions, the app is included in the installation image. If you have XPS Viewer and you update to Windows 10, version 1803, there's no action required. You'll still have XPS Viewer. <br><br>However, if you install Windows 10, version 1803, on a new device (or as a clean installation), you may need to [install XPS Viewer from **Apps and Features** in the Settings app](https://docs.microsoft.com/windows/application-management/add-apps-and-features) or through [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). If you had XPS Viewer in Windows 10, version 1709, but manually removed it before updating, you'll need to manually reinstall it.| 1803 |
|
|XPS Viewer|We're changing the way you get XPS Viewer. In Windows 10, version 1709 and earlier versions, the app is included in the installation image. If you have XPS Viewer and you update to Windows 10, version 1803, there's no action required. You'll still have XPS Viewer. <br><br>However, if you install Windows 10, version 1803, on a new device (or as a clean installation), you may need to [install XPS Viewer from **Apps and Features** in the Settings app](https://docs.microsoft.com/windows/application-management/add-apps-and-features) or through [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). If you had XPS Viewer in Windows 10, version 1709, but manually removed it before updating, you'll need to manually reinstall it.| 1803 |
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows To Go frequently asked questions (Windows 10)
|
title: Windows To Go frequently asked questions (Windows 10)
|
||||||
description: Windows To Go frequently asked questions
|
description: In this article, you can find answers to frequently asked questions (FAQs) about Windows To Go, such as hardware requirements and supported features.
|
||||||
ms.assetid: bfdfb824-4a19-4401-b369-22c5e6ca9d6e
|
ms.assetid: bfdfb824-4a19-4401-b369-22c5e6ca9d6e
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -49,13 +49,13 @@ The following list identifies some commonly asked questions about Windows To Go.
|
|||||||
|
|
||||||
- [How do I make my computer boot from USB?](#wtf-faq-startup)
|
- [How do I make my computer boot from USB?](#wtf-faq-startup)
|
||||||
|
|
||||||
- [Why isn’t my computer booting from USB?](#wtg-faq-noboot)
|
- [Why isn't my computer booting from USB?](#wtg-faq-noboot)
|
||||||
|
|
||||||
- [What happens if I remove my Windows To Go drive while it is running?](#wtg-faq-surprise)
|
- [What happens if I remove my Windows To Go drive while it is running?](#wtg-faq-surprise)
|
||||||
|
|
||||||
- [Can I use BitLocker to protect my Windows To Go drive?](#wtg-faq-bitlocker)
|
- [Can I use BitLocker to protect my Windows To Go drive?](#wtg-faq-bitlocker)
|
||||||
|
|
||||||
- [Why can’t I enable BitLocker from Windows To Go Creator?](#wtg-faq-blfail)
|
- [Why can't I enable BitLocker from Windows To Go Creator?](#wtg-faq-blfail)
|
||||||
|
|
||||||
- [What power states does Windows To Go support?](#wtg-faq-power)
|
- [What power states does Windows To Go support?](#wtg-faq-power)
|
||||||
|
|
||||||
@ -63,11 +63,11 @@ The following list identifies some commonly asked questions about Windows To Go.
|
|||||||
|
|
||||||
- [Does Windows To Go support crash dump analysis?](#wtg-faq-crashdump)
|
- [Does Windows To Go support crash dump analysis?](#wtg-faq-crashdump)
|
||||||
|
|
||||||
- [Do “Windows To Go Startup Options” work with dual boot computers?](#wtg-faq-dualboot)
|
- [Do "Windows To Go Startup Options" work with dual boot computers?](#wtg-faq-dualboot)
|
||||||
|
|
||||||
- [I plugged my Windows To Go drive into a running computer and I can’t see the partitions on the drive. Why not?](#wtg-faq-diskpart)
|
- [I plugged my Windows To Go drive into a running computer and I can't see the partitions on the drive. Why not?](#wtg-faq-diskpart)
|
||||||
|
|
||||||
- [I’m booted into Windows To Go, but I can’t browse to the internal hard drive of the host computer. Why not?](#wtg-faq-san4)
|
- [I'm booted into Windows To Go, but I can't browse to the internal hard drive of the host computer. Why not?](#wtg-faq-san4)
|
||||||
|
|
||||||
- [Why does my Windows To Go drive have an MBR disk format with a FAT32 system partition?](#wtg-faq-fatmbr)
|
- [Why does my Windows To Go drive have an MBR disk format with a FAT32 system partition?](#wtg-faq-fatmbr)
|
||||||
|
|
||||||
@ -95,17 +95,17 @@ The following list identifies some commonly asked questions about Windows To Go.
|
|||||||
|
|
||||||
- [How is Windows To Go licensed?](#wtg-faq-lic)
|
- [How is Windows To Go licensed?](#wtg-faq-lic)
|
||||||
|
|
||||||
- [Does Windows Recovery Environment work with Windows To Go? What’s the guidance for recovering a Windows To Go drive?](#wtg-faq-recovery)
|
- [Does Windows Recovery Environment work with Windows To Go? What's the guidance for recovering a Windows To Go drive?](#wtg-faq-recovery)
|
||||||
|
|
||||||
- [Why won’t Windows To Go work on a computer running Windows XP or Windows Vista?](#wtg-faq-oldos)
|
- [Why won't Windows To Go work on a computer running Windows XP or Windows Vista?](#wtg-faq-oldos)
|
||||||
|
|
||||||
- [Why does the operating system on the host computer matter?](#wtg-faq-oldos2)
|
- [Why does the operating system on the host computer matter?](#wtg-faq-oldos2)
|
||||||
|
|
||||||
- [My host computer running Windows 7 is protected by BitLocker Drive Encryption. Why did I need to use the recovery key to unlock and reboot my host computer after using Windows To Go?](#wtg-faq-blreckey)
|
- [My host computer running Windows 7 is protected by BitLocker Drive Encryption. Why did I need to use the recovery key to unlock and reboot my host computer after using Windows To Go?](#wtg-faq-blreckey)
|
||||||
|
|
||||||
- [I decided to stop using a drive for Windows To Go and reformatted it – why doesn’t it have a drive letter assigned and how can I fix it?](#wtg-faq-reformat)
|
- [I decided to stop using a drive for Windows To Go and reformatted it – why doesn't it have a drive letter assigned and how can I fix it?](#wtg-faq-reformat)
|
||||||
|
|
||||||
- [Why do I keep on getting the message “Installing devices…” when I boot Windows To Go?](#bkmk-roamconflict)
|
- [Why do I keep on getting the message "Installing devices…" when I boot Windows To Go?](#bkmk-roamconflict)
|
||||||
|
|
||||||
- [How do I upgrade the operating system on my Windows To Go drive?](#bkmk-upgradewtg)
|
- [How do I upgrade the operating system on my Windows To Go drive?](#bkmk-upgradewtg)
|
||||||
|
|
||||||
@ -188,7 +188,7 @@ In the **Windows To Go Startup Options** dialog box select **Yes** and then clic
|
|||||||
|
|
||||||
If the host computer is running an earlier version of the Windows operating system need to configure the computer to boot from USB manually.
|
If the host computer is running an earlier version of the Windows operating system need to configure the computer to boot from USB manually.
|
||||||
|
|
||||||
To do this, early during boot time (usually when you see the manufacturer’s logo), enter your firmware/BIOS setup. (This method to enter firmware/BIOS setup differs with different computer manufacturers, but is usually entered by pressing one of the function keys, such as F12, F2, F1, Esc, and so forth. You should check the manufacturer’s site to be sure if you do not know which key to use to enter firmware setup.)
|
To do this, early during boot time (usually when you see the manufacturer's logo), enter your firmware/BIOS setup. (This method to enter firmware/BIOS setup differs with different computer manufacturers, but is usually entered by pressing one of the function keys, such as F12, F2, F1, Esc, and so forth. You should check the manufacturer's site to be sure if you do not know which key to use to enter firmware setup.)
|
||||||
|
|
||||||
After you have entered firmware setup, make sure that boot from USB is enabled. Then change the boot order to boot from USB drives first.
|
After you have entered firmware setup, make sure that boot from USB is enabled. Then change the boot order to boot from USB drives first.
|
||||||
|
|
||||||
@ -201,14 +201,14 @@ Configuring a computer to boot from USB will cause your computer to attempt to b
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-noboot"></a>Why isn’t my computer booting from USB?
|
## <a href="" id="wtg-faq-noboot"></a>Why isn't my computer booting from USB?
|
||||||
|
|
||||||
|
|
||||||
Computers certified for Windows 7 and later are required to have support for USB boot. Check to see if any of the following items apply to your situation:
|
Computers certified for Windows 7 and later are required to have support for USB boot. Check to see if any of the following items apply to your situation:
|
||||||
|
|
||||||
1. Ensure that your computer has the latest BIOS installed and the BIOS is configured to boot from a USB device.
|
1. Ensure that your computer has the latest BIOS installed and the BIOS is configured to boot from a USB device.
|
||||||
|
|
||||||
2. Ensure that the Windows To Go drive is connected directly to a USB port on the computer. Many computers don’t support booting from a device connected to a USB 3 PCI add-on card or external USB hubs.
|
2. Ensure that the Windows To Go drive is connected directly to a USB port on the computer. Many computers don't support booting from a device connected to a USB 3 PCI add-on card or external USB hubs.
|
||||||
|
|
||||||
3. If the computer is not booting from a USB 3.0 port, try to boot from a USB 2.0 port.
|
3. If the computer is not booting from a USB 3.0 port, try to boot from a USB 2.0 port.
|
||||||
|
|
||||||
@ -229,7 +229,7 @@ You should never remove your Windows To Go drive when your workspace is running.
|
|||||||
|
|
||||||
Yes. In Windows 8 and later, BitLocker has added support for using a password to protect operating system drives. This means that you can use a password to secure your Windows To Go workspace and you will be prompted to enter this password every time you use the Windows To Go workspace.
|
Yes. In Windows 8 and later, BitLocker has added support for using a password to protect operating system drives. This means that you can use a password to secure your Windows To Go workspace and you will be prompted to enter this password every time you use the Windows To Go workspace.
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-blfail"></a>Why can’t I enable BitLocker from Windows To Go Creator?
|
## <a href="" id="wtg-faq-blfail"></a>Why can't I enable BitLocker from Windows To Go Creator?
|
||||||
|
|
||||||
|
|
||||||
Several different Group Policies control the use of BitLocker on your organizations computers. These policies are located in the **Computer Configuration\\Policies\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption** folder of the local Group Policy editor. The folder contains three sub-folders for fixed, operating system and removable data drive types.
|
Several different Group Policies control the use of BitLocker on your organizations computers. These policies are located in the **Computer Configuration\\Policies\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption** folder of the local Group Policy editor. The folder contains three sub-folders for fixed, operating system and removable data drive types.
|
||||||
@ -265,27 +265,27 @@ When a Windows To Go workspace is hibernated, it will only successfully resume o
|
|||||||
|
|
||||||
Yes. Windows 8 and later support crash dump stack analysis for both USB 2.0 and 3.0.
|
Yes. Windows 8 and later support crash dump stack analysis for both USB 2.0 and 3.0.
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-dualboot"></a>Do “Windows To Go Startup Options” work with dual boot computers?
|
## <a href="" id="wtg-faq-dualboot"></a>Do "Windows To Go Startup Options" work with dual boot computers?
|
||||||
|
|
||||||
|
|
||||||
Yes, if both operating systems are running the Windows 8 operating system. Enabling “Windows To Go Startup Options” should cause the computer to boot from the Windows To Go workspace when the drive is plugged in before the computer is turned on.
|
Yes, if both operating systems are running the Windows 8 operating system. Enabling "Windows To Go Startup Options" should cause the computer to boot from the Windows To Go workspace when the drive is plugged in before the computer is turned on.
|
||||||
|
|
||||||
If you have configured a dual boot computer with a Windows operating system and another operating system it might work occasionally and fail occasionally. Using this configuration is unsupported.
|
If you have configured a dual boot computer with a Windows operating system and another operating system it might work occasionally and fail occasionally. Using this configuration is unsupported.
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-diskpart"></a>I plugged my Windows To Go drive into a running computer and I can’t see the partitions on the drive. Why not?
|
## <a href="" id="wtg-faq-diskpart"></a>I plugged my Windows To Go drive into a running computer and I can't see the partitions on the drive. Why not?
|
||||||
|
|
||||||
|
|
||||||
Windows To Go Creator and the recommended deployment steps for Windows To Go set the NO\_DEFAULT\_DRIVE\_LETTER flag on the Windows To Go drive. This flag prevents Windows from automatically assigning drive letters to the partitions on the Windows To Go drive. That’s why you can’t see the partitions on the drive when you plug your Windows To Go drive into a running computer. This helps prevent accidental data leakage between the Windows To Go drive and the host computer. If you really need to access the files on the Windows To Go drive from a running computer, you can use diskmgmt.msc or diskpart to assign a drive letter.
|
Windows To Go Creator and the recommended deployment steps for Windows To Go set the NO\_DEFAULT\_DRIVE\_LETTER flag on the Windows To Go drive. This flag prevents Windows from automatically assigning drive letters to the partitions on the Windows To Go drive. That's why you can't see the partitions on the drive when you plug your Windows To Go drive into a running computer. This helps prevent accidental data leakage between the Windows To Go drive and the host computer. If you really need to access the files on the Windows To Go drive from a running computer, you can use diskmgmt.msc or diskpart to assign a drive letter.
|
||||||
|
|
||||||
**Warning**
|
**Warning**
|
||||||
It is strongly recommended that you do not plug your Windows To Go drive into a running computer. If the computer is compromised, your Windows To Go workspace can also be compromised.
|
It is strongly recommended that you do not plug your Windows To Go drive into a running computer. If the computer is compromised, your Windows To Go workspace can also be compromised.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-san4"></a>I’m booted into Windows To Go, but I can’t browse to the internal hard drive of the host computer. Why not?
|
## <a href="" id="wtg-faq-san4"></a>I'm booted into Windows To Go, but I can't browse to the internal hard drive of the host computer. Why not?
|
||||||
|
|
||||||
|
|
||||||
Windows To Go Creator and the recommended deployment steps for Windows To Go set SAN Policy 4 on Windows To Go drive. This policy prevents Windows from automatically mounting internal disk drives. That’s why you can’t see the internal hard drives of the host computer when you are booted into Windows To Go. This is done to prevent accidental data leakage between Windows To Go and the host system. This policy also prevents potential corruption on the host drives or data loss if the host operating system is in a hibernation state. If you really need to access the files on the internal hard drive, you can use diskmgmt.msc to mount the internal drive.
|
Windows To Go Creator and the recommended deployment steps for Windows To Go set SAN Policy 4 on Windows To Go drive. This policy prevents Windows from automatically mounting internal disk drives. That's why you can't see the internal hard drives of the host computer when you are booted into Windows To Go. This is done to prevent accidental data leakage between Windows To Go and the host system. This policy also prevents potential corruption on the host drives or data loss if the host operating system is in a hibernation state. If you really need to access the files on the internal hard drive, you can use diskmgmt.msc to mount the internal drive.
|
||||||
|
|
||||||
**Warning**
|
**Warning**
|
||||||
It is strongly recommended that you do not mount internal hard drives when booted into the Windows To Go workspace. If the internal drive contains a hibernated Windows 8 or later operating system, mounting the drive will lead to loss of hibernation state and therefor user state or any unsaved user data when the host operating system is booted. If the internal drive contains a hibernated Windows 7 or earlier operating system, mounting the drive will lead to corruption when the host operating system is booted.
|
It is strongly recommended that you do not mount internal hard drives when booted into the Windows To Go workspace. If the internal drive contains a hibernated Windows 8 or later operating system, mounting the drive will lead to loss of hibernation state and therefor user state or any unsaved user data when the host operating system is booted. If the internal drive contains a hibernated Windows 7 or earlier operating system, mounting the drive will lead to corruption when the host operating system is booted.
|
||||||
@ -340,7 +340,7 @@ If you are using a USB 3.0 port and a Windows To Go certified device, there shou
|
|||||||
## <a href="" id="wtg-faq-safeloss"></a>If I lose my Windows To Go drive, will my data be safe?
|
## <a href="" id="wtg-faq-safeloss"></a>If I lose my Windows To Go drive, will my data be safe?
|
||||||
|
|
||||||
|
|
||||||
Yes! If you enable BitLocker on your Windows To Go drive, all your data will be encrypted and protected and a malicious user will not be able to access your data without your password. If you don’t enable BitLocker, your data will be vulnerable if you lose your Windows To Go drive.
|
Yes! If you enable BitLocker on your Windows To Go drive, all your data will be encrypted and protected and a malicious user will not be able to access your data without your password. If you don't enable BitLocker, your data will be vulnerable if you lose your Windows To Go drive.
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-mac"></a>Can I boot Windows To Go on a Mac?
|
## <a href="" id="wtg-faq-mac"></a>Can I boot Windows To Go on a Mac?
|
||||||
|
|
||||||
@ -361,12 +361,12 @@ For more information, see the MSDN article on the [Win32\_OperatingSystem class]
|
|||||||
|
|
||||||
Windows To Go allows organization to support the use of privately owned PCs at the home or office with more secure access to their organizational resources. With Windows To Go use rights under [Software Assurance](https://go.microsoft.com/fwlink/p/?LinkId=619062), an employee will be able to use Windows To Go on any company PC licensed with Software Assurance as well as from their home PC.
|
Windows To Go allows organization to support the use of privately owned PCs at the home or office with more secure access to their organizational resources. With Windows To Go use rights under [Software Assurance](https://go.microsoft.com/fwlink/p/?LinkId=619062), an employee will be able to use Windows To Go on any company PC licensed with Software Assurance as well as from their home PC.
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-recovery"></a>Does Windows Recovery Environment work with Windows To Go? What’s the guidance for recovering a Windows To Go drive?
|
## <a href="" id="wtg-faq-recovery"></a>Does Windows Recovery Environment work with Windows To Go? What's the guidance for recovering a Windows To Go drive?
|
||||||
|
|
||||||
|
|
||||||
No, use of Windows Recovery Environment is not supported on Windows To Go. It is recommended that you implement user state virtualization technologies like Folder Redirection to centralize and back up user data in the data center. If any corruption occurs on a Windows To Go drive, you should re-provision the workspace.
|
No, use of Windows Recovery Environment is not supported on Windows To Go. It is recommended that you implement user state virtualization technologies like Folder Redirection to centralize and back up user data in the data center. If any corruption occurs on a Windows To Go drive, you should re-provision the workspace.
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-oldos"></a>Why won’t Windows To Go work on a computer running Windows XP or Windows Vista?
|
## <a href="" id="wtg-faq-oldos"></a>Why won't Windows To Go work on a computer running Windows XP or Windows Vista?
|
||||||
|
|
||||||
|
|
||||||
Actually it might. If you have purchased a computer certified for Windows 7 or later and then installed an older operating system, Windows To Go will boot and run as expected as long as you have configured the firmware to boot from USB. However, if the computer was certified for Windows XP or Windows Vista, it might not meet the hardware requirements for Windows To Go to run. Typically computers certified for Windows Vista and earlier operating systems have less memory, less processing power, reduced video rendering, and slower USB ports.
|
Actually it might. If you have purchased a computer certified for Windows 7 or later and then installed an older operating system, Windows To Go will boot and run as expected as long as you have configured the firmware to boot from USB. However, if the computer was certified for Windows XP or Windows Vista, it might not meet the hardware requirements for Windows To Go to run. Typically computers certified for Windows Vista and earlier operating systems have less memory, less processing power, reduced video rendering, and slower USB ports.
|
||||||
@ -374,7 +374,7 @@ Actually it might. If you have purchased a computer certified for Windows 7 or
|
|||||||
## <a href="" id="wtg-faq-oldos2"></a>Why does the operating system on the host computer matter?
|
## <a href="" id="wtg-faq-oldos2"></a>Why does the operating system on the host computer matter?
|
||||||
|
|
||||||
|
|
||||||
It doesn’t other than to help visually identify if the PC has compatible hardware. For a PC to be certified for Windows 7 or later it had to support booting from USB. If a computer cannot boot from USB there is no way that it can be used with Windows To Go. The Windows To Go workspace is a full Windows 10 environment, so all of the hardware requirements of Windows 10 with respect to processing speed, memory usage, and graphics rendering need to be supported to be assured that it will work as expected.
|
It doesn't other than to help visually identify if the PC has compatible hardware. For a PC to be certified for Windows 7 or later it had to support booting from USB. If a computer cannot boot from USB there is no way that it can be used with Windows To Go. The Windows To Go workspace is a full Windows 10 environment, so all of the hardware requirements of Windows 10 with respect to processing speed, memory usage, and graphics rendering need to be supported to be assured that it will work as expected.
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-blreckey"></a>My host computer running Windows 7 is protected by BitLocker Drive Encryption. Why did I need to use the recovery key to unlock and reboot my host computer after using Windows To Go?
|
## <a href="" id="wtg-faq-blreckey"></a>My host computer running Windows 7 is protected by BitLocker Drive Encryption. Why did I need to use the recovery key to unlock and reboot my host computer after using Windows To Go?
|
||||||
|
|
||||||
@ -406,10 +406,10 @@ The host computer will now be able to be booted from a USB drive without trigger
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="wtg-faq-reformat"></a>I decided to stop using a drive for Windows To Go and reformatted it – why doesn’t it have a drive letter assigned and how can I fix it?
|
## <a href="" id="wtg-faq-reformat"></a>I decided to stop using a drive for Windows To Go and reformatted it – why doesn't it have a drive letter assigned and how can I fix it?
|
||||||
|
|
||||||
|
|
||||||
Reformatting the drive erases the data on the drive, but doesn’t reconfigure the volume attributes. When a drive is provisioned for use as a Windows To Go drive the NODEFAULTDRIVELETTER attribute is set on the volume. To remove this attribute, use the following steps:
|
Reformatting the drive erases the data on the drive, but doesn't reconfigure the volume attributes. When a drive is provisioned for use as a Windows To Go drive the NODEFAULTDRIVELETTER attribute is set on the volume. To remove this attribute, use the following steps:
|
||||||
|
|
||||||
1. Open a command prompt with full administrator permissions.
|
1. Open a command prompt with full administrator permissions.
|
||||||
|
|
||||||
@ -424,14 +424,14 @@ Reformatting the drive erases the data on the drive, but doesn’t reconfigure t
|
|||||||
|
|
||||||
4. After selecting the disk, run the `clean` command to remove all data, formatting, and initialization information from the drive.
|
4. After selecting the disk, run the `clean` command to remove all data, formatting, and initialization information from the drive.
|
||||||
|
|
||||||
## <a href="" id="bkmk-roamconflict"></a>Why do I keep on getting the message “Installing devices…” when I boot Windows To Go?
|
## <a href="" id="bkmk-roamconflict"></a>Why do I keep on getting the message "Installing devices…" when I boot Windows To Go?
|
||||||
|
|
||||||
|
|
||||||
One of the challenges involved in moving the Windows To Go drive between PCs while seamlessly booting Windows with access to all of their applications and data is that for Windows to be fully functional, specific drivers need to be installed for the hardware in each machine that runs Windows. Windows 8 or later has a process called respecialize which will identify new drivers that need to be loaded for the new PC and disable drivers which are not present on the new configuration. In general this feature is reliable and efficient when roaming between PCs of widely varying hardware configurations.
|
One of the challenges involved in moving the Windows To Go drive between PCs while seamlessly booting Windows with access to all of their applications and data is that for Windows to be fully functional, specific drivers need to be installed for the hardware in each machine that runs Windows. Windows 8 or later has a process called respecialize which will identify new drivers that need to be loaded for the new PC and disable drivers which are not present on the new configuration. In general this feature is reliable and efficient when roaming between PCs of widely varying hardware configurations.
|
||||||
|
|
||||||
In certain cases, third party drivers for different hardware models or versions can reuse device ID’s, driver file names, registry keys (or any other operating system constructs which do not support side-by-side storage) for similar hardware. For example, Touchpad drivers on different laptops often reuse the same device ID’s, and video cards from the same manufacturer may often reuse service names. Windows handles these situations by marking the non-present device node with a flag that indicates the existing driver needs to be reinstalled before continuing to install the new driver.
|
In certain cases, third party drivers for different hardware models or versions can reuse device ID's, driver file names, registry keys (or any other operating system constructs which do not support side-by-side storage) for similar hardware. For example, Touchpad drivers on different laptops often reuse the same device ID's, and video cards from the same manufacturer may often reuse service names. Windows handles these situations by marking the non-present device node with a flag that indicates the existing driver needs to be reinstalled before continuing to install the new driver.
|
||||||
|
|
||||||
This process will occur on any boot that a new driver is found and a driver conflict is detected. In some cases that will result in a respecialize progress message “Installing devices…” displaying every time that a Windows to Go drive is roamed between two PCs which require conflicting drivers.
|
This process will occur on any boot that a new driver is found and a driver conflict is detected. In some cases that will result in a respecialize progress message "Installing devices…" displaying every time that a Windows to Go drive is roamed between two PCs which require conflicting drivers.
|
||||||
|
|
||||||
## <a href="" id="bkmk-upgradewtg"></a>How do I upgrade the operating system on my Windows To Go drive?
|
## <a href="" id="bkmk-upgradewtg"></a>How do I upgrade the operating system on my Windows To Go drive?
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 Pro in S mode
|
title: Windows 10 Pro in S mode
|
||||||
description: Overview of Windows 10 Pro/Enterprise in S mode. What is S mode for Enterprise customers?
|
description: This article provides an overview of Windows 10 Pro/Enterprise in S mode, including information about configuration and features.
|
||||||
keywords: Windows 10 S, S mode, Windows S mode, Windows 10 S mode, S-mode, system requirements, Overview, Windows 10 Pro in S mode, Windows 10 Enterprise in S mode, Windows 10 Pro/Enterprise in S mode
|
keywords: Windows 10 S, S mode, Windows S mode, Windows 10 S mode, S-mode, system requirements, Overview, Windows 10 Pro in S mode, Windows 10 Enterprise in S mode, Windows 10 Pro/Enterprise in S mode
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
@ -15,6 +15,7 @@ author: greg-lindsay
|
|||||||
audience: itpro
|
audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows 10 in S mode - What is it?
|
# Windows 10 in S mode - What is it?
|
||||||
@ -25,15 +26,15 @@ S mode is an evolution of the S SKU introduced with Windows 10 April 2018 Update
|
|||||||
## S mode key features
|
## S mode key features
|
||||||
**Microsoft-verified security**
|
**Microsoft-verified security**
|
||||||
|
|
||||||
With Windows 10 in S mode, you’ll find your favorite applications, such as Office, Evernote, and Spotify in the Microsoft Store where they’re Microsoft-verified for security. You can also feel secure when you’re online. Microsoft Edge, your default browser, gives you protection against phishing and socially engineered malware.
|
With Windows 10 in S mode, you'll find your favorite applications, such as Office, Evernote, and Spotify in the Microsoft Store where they're Microsoft-verified for security. You can also feel secure when you're online. Microsoft Edge, your default browser, gives you protection against phishing and socially engineered malware.
|
||||||
|
|
||||||
**Performance that lasts**
|
**Performance that lasts**
|
||||||
|
|
||||||
Start-ups are quick, and S mode is built to keep them that way. With Microsoft Edge as your browser, your online experience is fast and secure. Plus, you’ll enjoy a smooth, responsive experience, whether you’re streaming HD video, opening apps, or being productive on the go.
|
Start-ups are quick, and S mode is built to keep them that way. With Microsoft Edge as your browser, your online experience is fast and secure. Plus, you'll enjoy a smooth, responsive experience, whether you're streaming HD video, opening apps, or being productive on the go.
|
||||||
|
|
||||||
**Choice and flexibility**
|
**Choice and flexibility**
|
||||||
|
|
||||||
Save your files to your favorite cloud, like OneDrive or Dropbox, and access them from any device you choose. Browse the Microsoft Store for thousands of apps, and if you don’t find exactly what you want, you can easily [switch out of S mode](https://docs.microsoft.com/windows/deployment/windows-10-pro-in-s-mode) to Windows 10 Home, Pro, or Enterprise editions at any time and search the web for more choices, as shown below.
|
Save your files to your favorite cloud, like OneDrive or Dropbox, and access them from any device you choose. Browse the Microsoft Store for thousands of apps, and if you don't find exactly what you want, you can easily [switch out of S mode](https://docs.microsoft.com/windows/deployment/windows-10-pro-in-s-mode) to Windows 10 Home, Pro, or Enterprise editions at any time and search the web for more choices, as shown below.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Best practices for feature updates - conclusion
|
title: Best practices for feature updates - conclusion
|
||||||
description: Final thoughts about how to deploy feature updates
|
description: This article contains final thoughts about best practices when deploying feature updates for Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -12,6 +12,7 @@ ms.reviewer:
|
|||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Conclusion
|
# Conclusion
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Best practices - deploy feature updates during maintenance windows
|
title: Best practices - deploy feature updates during maintenance windows
|
||||||
description: Learn how to deploy feature updates during a maintenance window
|
description: In this article, learn how to get ready and then deploy feature updates for Windows 10 during a maintenance window.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -12,6 +12,7 @@ ms.reviewer:
|
|||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy feature updates during maintenance windows
|
# Deploy feature updates during maintenance windows
|
||||||
@ -34,7 +35,7 @@ Use the following information to deploy feature updates during a maintenance win
|
|||||||
|
|
||||||
### Step 2: Review computer restart device settings
|
### Step 2: Review computer restart device settings
|
||||||
|
|
||||||
If you’re not suppressing computer restarts and the feature update will be installed when no users are present, consider deploying a custom client settings policy to your feature update target collection to shorten the settings below or consider the total duration of these settings when defining your maintenance window duration.
|
If you're not suppressing computer restarts and the feature update will be installed when no users are present, consider deploying a custom client settings policy to your feature update target collection to shorten the settings below or consider the total duration of these settings when defining your maintenance window duration.
|
||||||
|
|
||||||
For example, by default, 90 minutes will be honored before the system is rebooted after the feature update install. If users will not be impacted by the user logoff or restart, there is no need to wait a full 90 minutes before rebooting the computer. If a delay and notification is needed, ensure that the maintenance window takes this into account along with the total time needed to install the feature update.
|
For example, by default, 90 minutes will be honored before the system is rebooted after the feature update install. If users will not be impacted by the user logoff or restart, there is no need to wait a full 90 minutes before rebooting the computer. If a delay and notification is needed, ensure that the maintenance window takes this into account along with the total time needed to install the feature update.
|
||||||
|
|
||||||
@ -51,7 +52,7 @@ Use **Peer Cache** to help manage deployment of content to clients in remote loc
|
|||||||
|
|
||||||
### Step 4: Override the default Windows setup priority (Windows 10, version 1709 and later)
|
### Step 4: Override the default Windows setup priority (Windows 10, version 1709 and later)
|
||||||
|
|
||||||
If you’re deploying **Feature update to Windows 10, version 1709** or later, by default, portions of setup are configured to run at a lower priority. This can result in a longer total install time for the feature update. When deploying within a maintenance window, we recommend that you override this default behavior to benefit from faster total install times. To override the default priority, create a file called SetupConfig.ini on each machine to be upgraded in the below location containing the single section noted.
|
If you're deploying **Feature update to Windows 10, version 1709** or later, by default, portions of setup are configured to run at a lower priority. This can result in a longer total install time for the feature update. When deploying within a maintenance window, we recommend that you override this default behavior to benefit from faster total install times. To override the default priority, create a file called SetupConfig.ini on each machine to be upgraded in the below location containing the single section noted.
|
||||||
|
|
||||||
%systemdrive%\Users\Default\AppData\Local\Microsoft\Windows\WSUS\SetupConfig.ini
|
%systemdrive%\Users\Default\AppData\Local\Microsoft\Windows\WSUS\SetupConfig.ini
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Best practices for deploying Windows 10 Feature updates to mission critical devices
|
title: Best practices and recommendations for deploying Windows 10 Feature updates to mission-critical devices
|
||||||
description: Learn how to deploy feature updates to your mission-critical devices
|
description: In this article, learn about best practices to follow when deploying Windows 10 feature updates to your mission-critical devices.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
audience: itpro
|
audience: itpro
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Best practices - deploy feature updates for user-initiated installations
|
title: Best practices - deploy feature updates for user-initiated installations
|
||||||
description: Learn how to manually deploy feature updates
|
description: In this article, learn how to prepare and then manually deploy feature updates for user-initiated installations.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -12,6 +12,7 @@ ms.reviewer:
|
|||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy feature updates for user-initiated installations (during a fixed service window)
|
# Deploy feature updates for user-initiated installations (during a fixed service window)
|
||||||
@ -29,7 +30,7 @@ Use **Peer Cache** to help manage deployment of content to clients in remote loc
|
|||||||
|
|
||||||
### Step 2: Override the default Windows setup priority (Windows 10, version 1709 and later)
|
### Step 2: Override the default Windows setup priority (Windows 10, version 1709 and later)
|
||||||
|
|
||||||
If you’re deploying **Feature update to Windows 10, version 1709** or later, by default, portions of setup are configured to run at a lower priority. This can result in a longer total install time for the feature update. When deploying within a maintenance window, we recommend that you override this default behavior to benefit from faster total install times. To override the default priority, create a file called SetupConfig.ini on each machine to be upgraded in the below location containing the single section noted.
|
If you're deploying **Feature update to Windows 10, version 1709** or later, by default, portions of setup are configured to run at a lower priority. This can result in a longer total install time for the feature update. When deploying within a maintenance window, we recommend that you override this default behavior to benefit from faster total install times. To override the default priority, create a file called SetupConfig.ini on each machine to be upgraded in the below location containing the single section noted.
|
||||||
|
|
||||||
%systemdrive%\Users\Default\AppData\Local\Microsoft\Windows\WSUS\SetupConfig.ini
|
%systemdrive%\Users\Default\AppData\Local\Microsoft\Windows\WSUS\SetupConfig.ini
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Make FoD and language packs available for WSUS/SCCM (Windows 10)
|
title: Make FoD and language packs available for WSUS/SCCM (Windows 10)
|
||||||
description: Learn how to make FoD and language packs available when you're using WSUS/SCCM
|
description: Learn how to make FoD and language packs available when you're using WSUS/SCCM.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.pagetype: article
|
ms.pagetype: article
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How Windows Update works
|
title: How Windows Update works
|
||||||
description: Learn how Windows Update works, including architecture and troubleshooting.
|
description: In this article, learn about the process Windows Update uses to download and install updates on a Windows 10 PC.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl:
|
ms.mktglfcycl:
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -12,6 +12,7 @@ ms.reviewer:
|
|||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# How does Windows Update work?
|
# How does Windows Update work?
|
||||||
@ -45,7 +46,7 @@ The Windows Update workflow has four core areas of functionality:
|
|||||||
|
|
||||||
|
|
||||||
## How updating works
|
## How updating works
|
||||||
During the updating process, the Windows Update Orchestrator operates in the background to scan, download, and install updates. It does this automatically, according to your settings, and in a silent manner that doesn’t disrupt your computer usage.
|
During the updating process, the Windows Update Orchestrator operates in the background to scan, download, and install updates. It does this automatically, according to your settings, and in a silent manner that doesn't disrupt your computer usage.
|
||||||
|
|
||||||
## Scanning updates
|
## Scanning updates
|
||||||

|

|
||||||
@ -80,7 +81,7 @@ Windows Update takes the following sets of actions when it runs a scan.
|
|||||||
#### Starts the scan for updates
|
#### Starts the scan for updates
|
||||||
When users start scanning in Windows Update through the Settings panel, the following occurs:
|
When users start scanning in Windows Update through the Settings panel, the following occurs:
|
||||||
|
|
||||||
- The scan first generates a “ComApi” message. The caller (Windows Defender Antivirus) tells the WU engine to scan for updates.
|
- The scan first generates a "ComApi" message. The caller (Windows Defender Antivirus) tells the WU engine to scan for updates.
|
||||||
- "Agent" messages: queueing the scan, then actually starting the work:
|
- "Agent" messages: queueing the scan, then actually starting the work:
|
||||||
- Updates are identified by the different IDs ("Id = 10", "Id = 11") and from the different thread ID numbers.
|
- Updates are identified by the different IDs ("Id = 10", "Id = 11") and from the different thread ID numbers.
|
||||||
- Windows Update uses the thread ID filtering to concentrate on one particular task.
|
- Windows Update uses the thread ID filtering to concentrate on one particular task.
|
||||||
@ -119,7 +120,7 @@ Common update failure is caused due to network issues. To find the root of the i
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Warning messages for SLS can be ignored if the search is against WSUS/SCCM.
|
> Warning messages for SLS can be ignored if the search is against WSUS/SCCM.
|
||||||
|
|
||||||
- On sites that only use WSUS/SCCM, the SLS may be blocked at the firewall. In this case the SLS request will fail, and can’t scan against Windows Update or Microsoft Update but can still scan against WSUS/SCCM, since it’s locally configured.
|
- On sites that only use WSUS/SCCM, the SLS may be blocked at the firewall. In this case the SLS request will fail, and can't scan against Windows Update or Microsoft Update but can still scan against WSUS/SCCM, since it's locally configured.
|
||||||

|

|
||||||
|
|
||||||
## Downloading updates
|
## Downloading updates
|
||||||
@ -127,7 +128,7 @@ Common update failure is caused due to network issues. To find the root of the i
|
|||||||
|
|
||||||
Once the Windows Update Orchestrator determines which updates apply to your computer, it will begin downloading the updates, if you have selected the option to automatically download updates. It does this in the background without interrupting your normal use of the computer.
|
Once the Windows Update Orchestrator determines which updates apply to your computer, it will begin downloading the updates, if you have selected the option to automatically download updates. It does this in the background without interrupting your normal use of the computer.
|
||||||
|
|
||||||
To ensure that your other downloads aren’t affected or slowed down because updates are downloading, Windows Update uses the Delivery Optimization (DO) technology which downloads updates and reduces bandwidth consumption.
|
To ensure that your other downloads aren't affected or slowed down because updates are downloading, Windows Update uses the Delivery Optimization (DO) technology which downloads updates and reduces bandwidth consumption.
|
||||||
|
|
||||||
For more information see [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md).
|
For more information see [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md).
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Olympia Corp enrollment guidelines
|
title: Olympia Corp enrollment guidelines
|
||||||
description: Olympia Corp enrollment guidelines
|
description: Learn about the enrollment guidelines for Olympia Corp, a virtual corporation created as part of the Windows Insider Lab for Enterprise.
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -11,6 +11,7 @@ author: jaimeo
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
keywords: insider, trial, enterprise, lab, corporation, test
|
keywords: insider, trial, enterprise, lab, corporation, test
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Olympia Corp
|
# Olympia Corp
|
||||||
@ -96,7 +97,7 @@ This is the Bring Your Own Device (BYOD) method--your device will receive Olympi
|
|||||||

|

|
||||||
|
|
||||||
2. If you are already connected to a domain, click the existing account and then click **Disconnect**. Click **Restart Later**.
|
2. If you are already connected to a domain, click the existing account and then click **Disconnect**. Click **Restart Later**.
|
||||||
|
|
||||||
3. Click **Connect**, then click **Join this device to Azure Active Directory**.
|
3. Click **Connect**, then click **Join this device to Azure Active Directory**.
|
||||||
|
|
||||||

|

|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Servicing stack updates (Windows 10)
|
title: Servicing stack updates (Windows 10)
|
||||||
description: Servicing stack updates improve the code that installs the other updates.
|
description: In this article, learn how servicing stack updates improve the code that installs the other updates.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -12,6 +12,7 @@ ms.reviewer:
|
|||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Servicing stack updates
|
# Servicing stack updates
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Delivery Optimization in Update Compliance (Windows 10)
|
title: Delivery Optimization in Update Compliance (Windows 10)
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: new Delivery Optimization data displayed in Update Compliance
|
description: Learn how new Delivery Optimization data displays in Update Compliance, including observed bandwidth savings across devices using peer-to-peer distribution.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
@ -13,6 +13,7 @@ keywords: oms, operations management suite, optimization, downloads, updates, lo
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.collection: M365-analytics
|
ms.collection: M365-analytics
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Delivery Optimization in Update Compliance
|
# Delivery Optimization in Update Compliance
|
||||||
@ -41,5 +42,5 @@ The table breaks down the number of bytes from each download source into specifi
|
|||||||
|
|
||||||
The download sources that could be included are:
|
The download sources that could be included are:
|
||||||
- LAN Bytes: Bytes downloaded from LAN Peers which are other devices on the same local network
|
- LAN Bytes: Bytes downloaded from LAN Peers which are other devices on the same local network
|
||||||
- Group Bytes: Bytes downloaded from Group Peers which are other devices that belong to the same Group (available when the “Group” download mode is used)
|
- Group Bytes: Bytes downloaded from Group Peers which are other devices that belong to the same Group (available when the "Group" download mode is used)
|
||||||
- HTTP Bytes: Non-peer bytes. The HTTP download source can be Microsoft Servers, Windows Update Servers, a WSUS server or an SCCM Distribution Point for Express Updates.
|
- HTTP Bytes: Non-peer bytes. The HTTP download source can be Microsoft Servers, Windows Update Servers, a WSUS server or an SCCM Distribution Point for Express Updates.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Update Compliance - Feature Update Status report
|
title: Update Compliance - Feature Update Status report
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: an overview of the Feature Update Status report
|
description: This article contains an overview of the Feature Update Status report, which provides information about the status of feature updates across all devices.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
@ -12,6 +12,7 @@ author: jaimeo
|
|||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.collection: M365-analytics
|
ms.collection: M365-analytics
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Feature Update Status
|
# Feature Update Status
|
||||||
@ -37,7 +38,7 @@ Refer to the following list for what each state means:
|
|||||||
|
|
||||||
## Compatibility holds
|
## Compatibility holds
|
||||||
|
|
||||||
Microsoft uses diagnostic data to determine whether devices that use Windows Update are ready for a feature update in order to ensure a smooth experience. When Microsoft determines a device is not ready to update due to a known issue, a *compatibility hold* is generated to delay the device’s upgrade and safeguard the end-user experience. Holds are released over time as diagnostic data is analyzed and fixes are addressed. Details are provided on some, but not all compatibility holds on the Windows 10 release information page for any given release.
|
Microsoft uses diagnostic data to determine whether devices that use Windows Update are ready for a feature update in order to ensure a smooth experience. When Microsoft determines a device is not ready to update due to a known issue, a *compatibility hold* is generated to delay the device's upgrade and safeguard the end-user experience. Holds are released over time as diagnostic data is analyzed and fixes are addressed. Details are provided on some, but not all compatibility holds on the Windows 10 release information page for any given release.
|
||||||
|
|
||||||
To learn how compatibility holds are reflected in the experience, see [Update compliance perspectives](update-compliance-perspectives.md#deployment-status).
|
To learn how compatibility holds are reflected in the experience, see [Update compliance perspectives](update-compliance-perspectives.md#deployment-status).
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Update Compliance - Need Attention! report
|
title: Update Compliance - Need Attention! report
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: an overview of the Update Compliance Need Attention! report
|
description: This article contains an overview of the Update Compliance Needs Attention! report, which provides information like the number of devices that have issues.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
@ -12,6 +12,7 @@ author: jaimeo
|
|||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.collection: M365-analytics
|
ms.collection: M365-analytics
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Needs attention!
|
# Needs attention!
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Update Compliance - Perspectives
|
title: Update Compliance - Perspectives
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: an overview of Update Compliance Perspectives
|
description: This article contains an overview of Update Compliance Perspectives, which provide elaborations on specific queries.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
@ -12,6 +12,7 @@ author: jaimeo
|
|||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.collection: M365-analytics
|
ms.collection: M365-analytics
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Perspectives
|
# Perspectives
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Update Compliance - Security Update Status report
|
title: Update Compliance - Security Update Status report
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: an overview of the Security Update Status report
|
description: This article is an overview of the Security Update Status report, providing information about security updates across all devices.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
@ -10,6 +10,7 @@ author: jaimeo
|
|||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.collection: M365-analytics
|
ms.collection: M365-analytics
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Security Update Status
|
# Security Update Status
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Using Update Compliance (Windows 10)
|
title: Using Update Compliance (Windows 10)
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Explains how to begin using Update Compliance.
|
description: Learn how to begin using Update Compliance to monitor your device's Windows updates and Windows Defender Antivirus status.
|
||||||
keywords: oms, operations management suite, wdav, updates, upgrades, antivirus, antimalware, signature, log analytics
|
keywords: oms, operations management suite, wdav, updates, upgrades, antivirus, antimalware, signature, log analytics
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -13,6 +13,7 @@ ms.author: jaimeo
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.collection: M365-analytics
|
ms.collection: M365-analytics
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Use Update Compliance
|
# Use Update Compliance
|
||||||
@ -28,7 +29,7 @@ Update Compliance:
|
|||||||
- Provides all of the above data in [Log Analytics](#using-log-analytics), which affords additional querying and export capabilities.
|
- Provides all of the above data in [Log Analytics](#using-log-analytics), which affords additional querying and export capabilities.
|
||||||
|
|
||||||
## The Update Compliance tile
|
## The Update Compliance tile
|
||||||
After Update Compliance has successfully been [added to your Azure subscription](update-compliance-get-started.md#add-update-compliance-to-your-azure-subscription), you’ll see this tile:
|
After Update Compliance has successfully been [added to your Azure subscription](update-compliance-get-started.md#add-update-compliance-to-your-azure-subscription), you'll see this tile:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -48,7 +49,7 @@ When you select this tile, you will be redirected to the Update Compliance works
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Update Compliance’s overview blade summarizes all the data Update Compliance provides. It functions as a hub from which you can navigate to different sections. The total number of devices detected by Update Compliance is reported in the title of this blade. What follows is a distribution for all devices as to whether they are up to date on the following items:
|
Update Compliance's overview blade summarizes all the data Update Compliance provides. It functions as a hub from which you can navigate to different sections. The total number of devices detected by Update Compliance is reported in the title of this blade. What follows is a distribution for all devices as to whether they are up to date on the following items:
|
||||||
* Security updates: A device is up to date on quality updates whenever it has the latest applicable quality update installed. Quality updates are monthly cumulative updates that are specific to a version of Windows 10.
|
* Security updates: A device is up to date on quality updates whenever it has the latest applicable quality update installed. Quality updates are monthly cumulative updates that are specific to a version of Windows 10.
|
||||||
* Feature updates: A device is up to date on feature updates whenever it has the latest applicable feature update installed. Update Compliance considers [Servicing Channel](waas-overview.md#servicing-channels) when determining update applicability.
|
* Feature updates: A device is up to date on feature updates whenever it has the latest applicable feature update installed. Update Compliance considers [Servicing Channel](waas-overview.md#servicing-channels) when determining update applicability.
|
||||||
* AV Signature: A device is up to date on Antivirus Signature when the latest Windows Defender Signatures have been downloaded. This distribution only considers devices that are running Windows Defender Antivirus.
|
* AV Signature: A device is up to date on Antivirus Signature when the latest Windows Defender Signatures have been downloaded. This distribution only considers devices that are running Windows Defender Antivirus.
|
||||||
@ -84,9 +85,9 @@ This means you should generally expect to see new data device data every 24 hour
|
|||||||
Update Compliance is built on the Log Analytics platform that is integrated into Operations Management Suite. All data in the workspace is the direct result of a query. Understanding the tools and features at your disposal, all integrated within Azure Portal, can deeply enhance your experience and complement Update Compliance.
|
Update Compliance is built on the Log Analytics platform that is integrated into Operations Management Suite. All data in the workspace is the direct result of a query. Understanding the tools and features at your disposal, all integrated within Azure Portal, can deeply enhance your experience and complement Update Compliance.
|
||||||
|
|
||||||
See below for a few topics related to Log Analytics:
|
See below for a few topics related to Log Analytics:
|
||||||
* Learn how to effectively execute custom Log Searches by referring to Microsoft Azure’s excellent documentation on [querying data in Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-log-searches).
|
* Learn how to effectively execute custom Log Searches by referring to Microsoft Azure's excellent documentation on [querying data in Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-log-searches).
|
||||||
* To develop your own custom data views in Operations Management Suite or [Power BI](https://powerbi.microsoft.com/); check out documentation on [analyzing data for use in Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-dashboards).
|
* To develop your own custom data views in Operations Management Suite or [Power BI](https://powerbi.microsoft.com/); check out documentation on [analyzing data for use in Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-dashboards).
|
||||||
* [Gain an overview of Log Analytics’ alerts](https://docs.microsoft.com/azure/log-analytics/log-analytics-alerts) and learn how to use it to always stay informed about the most critical issues you care about.
|
* [Gain an overview of Log Analytics' alerts](https://docs.microsoft.com/azure/log-analytics/log-analytics-alerts) and learn how to use it to always stay informed about the most critical issues you care about.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Update Compliance - Windows Defender AV Status report
|
title: Update Compliance - Windows Defender AV Status report
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: an overview of the Windows Defender AV Status report
|
description: This article is an overview of the Windows Defender AV Status report, which shows data about signature and threat status.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
@ -12,6 +12,7 @@ author: jaimeo
|
|||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.collection: M365-analytics
|
ms.collection: M365-analytics
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender AV Status
|
# Windows Defender AV Status
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure BranchCache for Windows 10 updates (Windows 10)
|
title: Configure BranchCache for Windows 10 updates (Windows 10)
|
||||||
description: Use BranchCache to optimize network bandwidth during update deployment.
|
description: In this article, learn how to use BranchCache to optimize network bandwidth during update deployment.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
@ -9,6 +9,7 @@ ms.author: jaimeo
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure BranchCache for Windows 10 updates
|
# Configure BranchCache for Windows 10 updates
|
||||||
@ -20,7 +21,7 @@ ms.topic: article
|
|||||||
|
|
||||||
> **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/help/12373/windows-update-faq)
|
> **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/help/12373/windows-update-faq)
|
||||||
|
|
||||||
BranchCache is a bandwidth-optimization feature that has been available since the Windows Server 2008 R2 and Windows 7 operating systems. Each client has a cache and acts as an alternate source for content that devices on its own network request. Windows Server Update Services (WSUS) and Microsoft Endpoint Configuration Manager can use BranchCache to optimize network bandwidth during update deployment, and it’s easy to configure for either of them. BranchCache has two operating modes: Distributed Cache mode and Hosted Cache mode.
|
BranchCache is a bandwidth-optimization feature that has been available since the Windows Server 2008 R2 and Windows 7 operating systems. Each client has a cache and acts as an alternate source for content that devices on its own network request. Windows Server Update Services (WSUS) and Microsoft Endpoint Configuration Manager can use BranchCache to optimize network bandwidth during update deployment, and it's easy to configure for either of them. BranchCache has two operating modes: Distributed Cache mode and Hosted Cache mode.
|
||||||
|
|
||||||
- Distributed Cache mode operates like the [Delivery Optimization](waas-delivery-optimization.md) feature in Windows 10: each client contains a cached version of the BranchCache-enabled files it requests and acts as a distributed cache for other clients requesting that same file.
|
- Distributed Cache mode operates like the [Delivery Optimization](waas-delivery-optimization.md) feature in Windows 10: each client contains a cached version of the BranchCache-enabled files it requests and acts as a distributed cache for other clients requesting that same file.
|
||||||
|
|
||||||
@ -33,7 +34,7 @@ For detailed information about how Distributed Cache mode and Hosted Cache mode
|
|||||||
|
|
||||||
## Configure clients for BranchCache
|
## Configure clients for BranchCache
|
||||||
|
|
||||||
Whether you use BranchCache with Configuration Manager or WSUS, each client that uses BranchCache must be configured to do so. You typically make your configurations through Group Policy. For step-by-step instructions on how to use Group Policy to configure BranchCache for Windows clients, see [Client Configuration](https://technet.microsoft.com/library/dd637820%28v=ws.10%29.aspx) in the [BranchCache Early Adopter’s Guide](https://technet.microsoft.com/library/dd637762(v=ws.10).aspx).
|
Whether you use BranchCache with Configuration Manager or WSUS, each client that uses BranchCache must be configured to do so. You typically make your configurations through Group Policy. For step-by-step instructions on how to use Group Policy to configure BranchCache for Windows clients, see [Client Configuration](https://technet.microsoft.com/library/dd637820%28v=ws.10%29.aspx) in the [BranchCache Early Adopter's Guide](https://technet.microsoft.com/library/dd637762(v=ws.10).aspx).
|
||||||
|
|
||||||
In Windows 10, version 1607, the Windows Update Agent uses Delivery Optimization by default, even when the updates are retrieved from WSUS. When using BranchCache with Windows 10, simply set the Delivery Optimization mode to Bypass to allow clients to use the Background Intelligent Transfer Service (BITS) protocol with BranchCache instead. For instructions on how to use BranchCache in Distributed Cache mode with WSUS, see the section WSUS and Configuration Manager with BranchCache in Distributed Cache mode.
|
In Windows 10, version 1607, the Windows Update Agent uses Delivery Optimization by default, even when the updates are retrieved from WSUS. When using BranchCache with Windows 10, simply set the Delivery Optimization mode to Bypass to allow clients to use the Background Intelligent Transfer Service (BITS) protocol with BranchCache instead. For instructions on how to use BranchCache in Distributed Cache mode with WSUS, see the section WSUS and Configuration Manager with BranchCache in Distributed Cache mode.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Delivery Optimization reference
|
title: Delivery Optimization reference
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Reference of all Delivery Optimization settings and descriptions of same
|
description: This article provides a summary of references and descriptions for all of the Delivery Optimization settings.
|
||||||
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -13,6 +13,7 @@ ms.localizationpriority: medium
|
|||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Delivery Optimization reference
|
# Delivery Optimization reference
|
||||||
@ -107,10 +108,10 @@ Download mode dictates which download sources clients are allowed to use when do
|
|||||||
| --- | --- |
|
| --- | --- |
|
||||||
| HTTP Only (0) | This setting disables peer-to-peer caching but still allows Delivery Optimization to download content over HTTP from the download's original source. This mode uses additional metadata provided by the Delivery Optimization cloud services for a peerless reliable and efficient download experience. |
|
| HTTP Only (0) | This setting disables peer-to-peer caching but still allows Delivery Optimization to download content over HTTP from the download's original source. This mode uses additional metadata provided by the Delivery Optimization cloud services for a peerless reliable and efficient download experience. |
|
||||||
| LAN (1 – Default) | This default operating mode for Delivery Optimization enables peer sharing on the same network. The Delivery Optimization cloud service finds other clients that connect to the Internet using the same public IP as the target client. These clients then attempts to connect to other peers on the same network by using their private subnet IP.|
|
| LAN (1 – Default) | This default operating mode for Delivery Optimization enables peer sharing on the same network. The Delivery Optimization cloud service finds other clients that connect to the Internet using the same public IP as the target client. These clients then attempts to connect to other peers on the same network by using their private subnet IP.|
|
||||||
| Group (2) | When group mode is set, the group is automatically selected based on the device’s Active Directory Domain Services (AD DS) site (Windows 10, version 1607) or the domain the device is authenticated to (Windows 10, version 1511). In group mode, peering occurs across internal subnets, between devices that belong to the same group, including devices in remote offices. You can use GroupID option to create your own custom group independently of domains and AD DS sites. Starting with Windows 10, version 1803, you can use the GroupIDSource parameter to take advantage of other method to create groups dynamically. Group download mode is the recommended option for most organizations looking to achieve the best bandwidth optimization with Delivery Optimization. |
|
| Group (2) | When group mode is set, the group is automatically selected based on the device's Active Directory Domain Services (AD DS) site (Windows 10, version 1607) or the domain the device is authenticated to (Windows 10, version 1511). In group mode, peering occurs across internal subnets, between devices that belong to the same group, including devices in remote offices. You can use GroupID option to create your own custom group independently of domains and AD DS sites. Starting with Windows 10, version 1803, you can use the GroupIDSource parameter to take advantage of other method to create groups dynamically. Group download mode is the recommended option for most organizations looking to achieve the best bandwidth optimization with Delivery Optimization. |
|
||||||
| Internet (3) | Enable Internet peer sources for Delivery Optimization. |
|
| Internet (3) | Enable Internet peer sources for Delivery Optimization. |
|
||||||
| Simple (99) | Simple mode disables the use of Delivery Optimization cloud services completely (for offline environments). Delivery Optimization switches to this mode automatically when the Delivery Optimization cloud services are unavailable, unreachable or when the content file size is less than 10 MB. In this mode, Delivery Optimization provides a reliable download experience, with no peer-to-peer caching. |
|
| Simple (99) | Simple mode disables the use of Delivery Optimization cloud services completely (for offline environments). Delivery Optimization switches to this mode automatically when the Delivery Optimization cloud services are unavailable, unreachable or when the content file size is less than 10 MB. In this mode, Delivery Optimization provides a reliable download experience, with no peer-to-peer caching. |
|
||||||
|Bypass (100) | Bypass Delivery Optimization and use BITS, instead. You should only select this mode if you use WSUS and prefer to use BranchCache. You do not need to set this option if you are using SCCM. If you want to disable peer-to-peer functionality, it's best to set **DownloadMode** to **0** or **99**. |
|
|Bypass (100) | Bypass Delivery Optimization and use BITS, instead. You should only select this mode if you use WSUS and prefer to use BranchCache. You do not need to set this option if you are using SCCM. If you want to disable peer-to-peer functionality, it's best to set **DownloadMode** to **0** or **99**. |
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Group mode is a best-effort optimization and should not be relied on for an authentication of identity of devices participating in the group.
|
>Group mode is a best-effort optimization and should not be relied on for an authentication of identity of devices participating in the group.
|
||||||
@ -152,7 +153,7 @@ This setting specifies the required minimum disk size (capacity in GB) for the d
|
|||||||
|
|
||||||
### Max Cache Age
|
### Max Cache Age
|
||||||
|
|
||||||
In environments configured for Delivery Optimization, you might want to set an expiration on cached updates and Windows application installation files. If so, this setting defines the maximum number of seconds each file can be held in the Delivery Optimization cache on each Windows 10 client device. The default Max Cache Age value is 259,200 seconds (3 days). Alternatively, organizations might choose to set this value to “0” which means “unlimited” to avoid peers re-downloading content. When “Unlimited” value is set, Delivery Optimization will hold the files in the cache longer and will clean up the cache as needed (for example when the cache size exceeded the maximum space allowed).
|
In environments configured for Delivery Optimization, you might want to set an expiration on cached updates and Windows application installation files. If so, this setting defines the maximum number of seconds each file can be held in the Delivery Optimization cache on each Windows 10 client device. The default Max Cache Age value is 259,200 seconds (3 days). Alternatively, organizations might choose to set this value to "0" which means "unlimited" to avoid peers re-downloading content. When "Unlimited" value is set, Delivery Optimization will hold the files in the cache longer and will clean up the cache as needed (for example when the cache size exceeded the maximum space allowed).
|
||||||
|
|
||||||
### Max Cache Size
|
### Max Cache Size
|
||||||
|
|
||||||
@ -184,7 +185,7 @@ This setting specifies the maximum download bandwidth that Delivery Optimization
|
|||||||
|
|
||||||
### Max Upload Bandwidth
|
### Max Upload Bandwidth
|
||||||
|
|
||||||
This setting allows you to limit the amount of upload bandwidth individual clients can use for Delivery Optimization. Consider this setting when clients are providing content to requesting peers on the network. This option is set in kilobytes per second (KB/s). The default setting is 0, or “unlimited” which means Delivery Optimization dynamically optimizes for minimal usage of upload bandwidth; however it does not cap the upload bandwidth rate at a set rate.
|
This setting allows you to limit the amount of upload bandwidth individual clients can use for Delivery Optimization. Consider this setting when clients are providing content to requesting peers on the network. This option is set in kilobytes per second (KB/s). The default setting is 0, or "unlimited" which means Delivery Optimization dynamically optimizes for minimal usage of upload bandwidth; however it does not cap the upload bandwidth rate at a set rate.
|
||||||
|
|
||||||
### Set Business Hours to Limit Background Download Bandwidth
|
### Set Business Hours to Limit Background Download Bandwidth
|
||||||
Starting in Windows 10, version 1803, specifies the maximum background download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth.
|
Starting in Windows 10, version 1803, specifies the maximum background download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Set up Delivery Optimization
|
title: Set up Delivery Optimization
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Delivery Optimization is a new peer-to-peer distribution method in Windows 10
|
description: In this article, learn how to set up Delivery Optimization, a new peer-to-peer distribution method in Windows 10.
|
||||||
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -12,6 +12,7 @@ ms.localizationpriority: medium
|
|||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Set up Delivery Optimization for Windows 10 updates
|
# Set up Delivery Optimization for Windows 10 updates
|
||||||
@ -47,7 +48,7 @@ Quick-reference table:
|
|||||||
|
|
||||||
### Hybrid WAN scenario
|
### Hybrid WAN scenario
|
||||||
|
|
||||||
For this scenario, grouping devices by domain allows devices to be included in peer downloads and uploads across VLANs. **Set Download Mode to 2 - Group**. The default group is the authenticated domain or Active Directory site. If your domain-based group is too wide, or your Active Directory sites aren’t aligned with your site network topology, then you should consider additional options for dynamically creating groups, for example by using the GroupIDSrc parameter.
|
For this scenario, grouping devices by domain allows devices to be included in peer downloads and uploads across VLANs. **Set Download Mode to 2 - Group**. The default group is the authenticated domain or Active Directory site. If your domain-based group is too wide, or your Active Directory sites aren't aligned with your site network topology, then you should consider additional options for dynamically creating groups, for example by using the GroupIDSrc parameter.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -97,7 +98,7 @@ To do this with MDM, go to **.Vendor/MSFT/Policy/Config/DeliveryOptimization/**
|
|||||||
|
|
||||||
|
|
||||||
## Monitor Delivery Optimization
|
## Monitor Delivery Optimization
|
||||||
[//]: # (How to tell if it’s working? What values are reasonable; which are not? If not, which way to adjust and how? -- check PercentPeerCaching for files > minimum >= 50%)
|
[//]: # (How to tell if it's working? What values are reasonable; which are not? If not, which way to adjust and how? -- check PercentPeerCaching for files > minimum >= 50%)
|
||||||
|
|
||||||
### Windows PowerShell cmdlets
|
### Windows PowerShell cmdlets
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Configure Delivery Optimization for Windows 10 updates (Windows 10)
|
title: Configure Delivery Optimization for Windows 10 updates (Windows 10)
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Delivery Optimization is a peer-to-peer distribution method in Windows 10
|
description: This article provides information about Delivery Optimization, a peer-to-peer distribution method in Windows 10.
|
||||||
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -13,6 +13,7 @@ ms.localizationpriority: medium
|
|||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Delivery Optimization for Windows 10 updates
|
# Delivery Optimization for Windows 10 updates
|
||||||
@ -87,7 +88,7 @@ For complete list of every possible Delivery Optimization setting, see [Delivery
|
|||||||
|
|
||||||
|
|
||||||
## How Microsoft uses Delivery Optimization
|
## How Microsoft uses Delivery Optimization
|
||||||
At Microsoft, to help ensure that ongoing deployments weren’t affecting our network and taking away bandwidth for other services, Microsoft IT used a couple of different bandwidth management strategies. Delivery Optimization, peer-to-peer caching enabled through Group Policy, was piloted and then deployed to all managed devices using Group Policy. Based on recommendations from the Delivery Optimization team, we used the "group" configuration to limit sharing of content to only the devices that are members of the same Active Directory domain. The content is cached for 24 hours. More than 76 percent of content came from peer devices versus the Internet.
|
At Microsoft, to help ensure that ongoing deployments weren't affecting our network and taking away bandwidth for other services, Microsoft IT used a couple of different bandwidth management strategies. Delivery Optimization, peer-to-peer caching enabled through Group Policy, was piloted and then deployed to all managed devices using Group Policy. Based on recommendations from the Delivery Optimization team, we used the "group" configuration to limit sharing of content to only the devices that are members of the same Active Directory domain. The content is cached for 24 hours. More than 76 percent of content came from peer devices versus the Internet.
|
||||||
|
|
||||||
For more details, check out the [Adopting Windows as a Service at Microsoft](https://www.microsoft.com/itshowcase/Article/Content/851/Adopting-Windows-as-a-service-at-Microsoft) technical case study.
|
For more details, check out the [Adopting Windows as a Service at Microsoft](https://www.microsoft.com/itshowcase/Article/Content/851/Adopting-Windows-as-a-service-at-Microsoft) technical case study.
|
||||||
|
|
||||||
@ -131,11 +132,11 @@ This section summarizes common problems and some solutions to try.
|
|||||||
|
|
||||||
### If you don't see any bytes from peers
|
### If you don't see any bytes from peers
|
||||||
|
|
||||||
If you don’t see any bytes coming from peers the cause might be one of the following issues:
|
If you don't see any bytes coming from peers the cause might be one of the following issues:
|
||||||
|
|
||||||
- Clients aren’t able to reach the Delivery Optimization cloud services.
|
- Clients aren't able to reach the Delivery Optimization cloud services.
|
||||||
- The cloud service doesn’t see other peers on the network.
|
- The cloud service doesn't see other peers on the network.
|
||||||
- Clients aren’t able to connect to peers that are offered back from the cloud service.
|
- Clients aren't able to connect to peers that are offered back from the cloud service.
|
||||||
|
|
||||||
|
|
||||||
### Clients aren't able to reach the Delivery Optimization cloud services.
|
### Clients aren't able to reach the Delivery Optimization cloud services.
|
||||||
@ -155,7 +156,7 @@ If you suspect this is the problem, try these steps:
|
|||||||
1. Download the same app on two different devices on the same network, waiting 10 – 15 minutes between downloads.
|
1. Download the same app on two different devices on the same network, waiting 10 – 15 minutes between downloads.
|
||||||
2. Run `Get-DeliveryOptimizationStatus` from an elevated Powershell window and ensure that **DownloadMode** is 1 or 2 on both devices.
|
2. Run `Get-DeliveryOptimizationStatus` from an elevated Powershell window and ensure that **DownloadMode** is 1 or 2 on both devices.
|
||||||
3. Run `Get-DeliveryOptimizationPerfSnap` from an elevated Powershell window on the second device. The **NumberOfPeers** field should be non-zero.
|
3. Run `Get-DeliveryOptimizationPerfSnap` from an elevated Powershell window on the second device. The **NumberOfPeers** field should be non-zero.
|
||||||
4. If the number of peers is zero and you have **DownloadMode** = 1, ensure that both devices are using the same public IP address to reach the internet. To do this, open a browser Windows and search for “what is my IP”. You can **DownloadMode 2** (Group) and a custom GroupID (Guid) to fix this if the devices aren’t reporting the same public IP address.
|
4. If the number of peers is zero and you have **DownloadMode** = 1, ensure that both devices are using the same public IP address to reach the internet. To do this, open a browser Windows and search for "what is my IP". You can **DownloadMode 2** (Group) and a custom GroupID (Guid) to fix this if the devices aren't reporting the same public IP address.
|
||||||
|
|
||||||
|
|
||||||
### Clients aren't able to connect to peers offered by the cloud service
|
### Clients aren't able to connect to peers offered by the cloud service
|
||||||
|
@ -2,13 +2,14 @@
|
|||||||
title: Deploy updates using Windows Update for Business (Windows 10)
|
title: Deploy updates using Windows Update for Business (Windows 10)
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Windows Update for Business lets you manage when devices received updates from Windows Update.
|
description: Learn how Windows Update for Business lets you manage when devices received updates from Windows Update.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy updates using Windows Update for Business
|
# Deploy updates using Windows Update for Business
|
||||||
@ -88,16 +89,16 @@ The branch readiness level enables administrators to specify which channel of fe
|
|||||||
- Windows Insider Release Preview
|
- Windows Insider Release Preview
|
||||||
- Semi-annual Channel for released updates
|
- Semi-annual Channel for released updates
|
||||||
|
|
||||||
Prior to Windows 10, version 1903, there are two channels for released updates: Semi-annual Channel and Semi-annual Channel (Targeted). Deferral days are calculated against the release date of the chosen channel. Starting with Windows 10, version 1903 there is only the one release channel: Semi-annual Channel. All deferral days will be calculated against a release’s Semi-annual Channel release date. To see release dates, visit [Windows Release Information](https://docs.microsoft.com/windows/release-information/). You can set the branch readiness level by using the **Select when Preview Builds and Feature Updates are Received** policy. In order to use this to manage pre-release builds, first enable preview builds by using the **Manage preview Builds** policy.
|
Prior to Windows 10, version 1903, there are two channels for released updates: Semi-annual Channel and Semi-annual Channel (Targeted). Deferral days are calculated against the release date of the chosen channel. Starting with Windows 10, version 1903 there is only the one release channel: Semi-annual Channel. All deferral days will be calculated against a release's Semi-annual Channel release date. To see release dates, visit [Windows Release Information](https://docs.microsoft.com/windows/release-information/). You can set the branch readiness level by using the **Select when Preview Builds and Feature Updates are Received** policy. In order to use this to manage pre-release builds, first enable preview builds by using the **Manage preview Builds** policy.
|
||||||
|
|
||||||
### Recommendations
|
### Recommendations
|
||||||
|
|
||||||
For the best experience with Windows Update, follow these guidelines:
|
For the best experience with Windows Update, follow these guidelines:
|
||||||
|
|
||||||
- Use devices for at least 6 hours per month, including at least 2 hours of continuous use.
|
- Use devices for at least 6 hours per month, including at least 2 hours of continuous use.
|
||||||
- Keep devices regularly charged. Plugging in devices overnight enables them to automatically update outside of active hours.
|
- Keep devices regularly charged. Plugging in devices overnight enables them to automatically update outside of active hours.
|
||||||
- Make sure that devices have at least 10 GB of free space.
|
- Make sure that devices have at least 10 GB of free space.
|
||||||
- Give devices unobstructed access to the Windows Update service.
|
- Give devices unobstructed access to the Windows Update service.
|
||||||
|
|
||||||
|
|
||||||
## Monitor Windows Updates by using Update Compliance
|
## Monitor Windows Updates by using Update Compliance
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Servicing differences between Windows 10 and older operating systems
|
title: Servicing differences between Windows 10 and older operating systems
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Learn the differences between servicing Windows 10 and servicing older operating systems.
|
description: In this article, learn the differences between servicing Windows 10 and servicing older operating systems.
|
||||||
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
@ -13,6 +13,7 @@ ms.audience: itpro
|
|||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
# Understanding the differences between servicing Windows 10-era and legacy Windows operating systems
|
# Understanding the differences between servicing Windows 10-era and legacy Windows operating systems
|
||||||
|
|
||||||
@ -32,7 +33,7 @@ Prior to Windows 10, all updates to operating system (OS) components were publis
|
|||||||
|
|
||||||
As a result, each environment within the global Windows ecosystem that had only a subset of security and non-security fixes installed had a different set of binaries and behaviors than those that consistently installed every available update as tested by Microsoft.
|
As a result, each environment within the global Windows ecosystem that had only a subset of security and non-security fixes installed had a different set of binaries and behaviors than those that consistently installed every available update as tested by Microsoft.
|
||||||
|
|
||||||
This resulted in a fragmented ecosystem that created diverse challenges in predictively testing interoperability, resulting in high update failure rates - which were subsequently mitigated by customers removing individual updates that were causing issues. Each customer that selectively removed individual updates amplified this fragmentation by creating more diverse environment permutations across the ecosystem. As an IT Administrator once quipped, "If you’ve seen one Windows 7 PC, you have seen one Windows 7 PC," suggesting no consistency or predictability across more than 250M commercial devices at the time.
|
This resulted in a fragmented ecosystem that created diverse challenges in predictively testing interoperability, resulting in high update failure rates - which were subsequently mitigated by customers removing individual updates that were causing issues. Each customer that selectively removed individual updates amplified this fragmentation by creating more diverse environment permutations across the ecosystem. As an IT Administrator once quipped, "If you've seen one Windows 7 PC, you have seen one Windows 7 PC," suggesting no consistency or predictability across more than 250M commercial devices at the time.
|
||||||
|
|
||||||
## Windows 10 – Next generation
|
## Windows 10 – Next generation
|
||||||
Windows 10 provided an opportunity to end the era of infinite fragmentation. With Windows 10 and the Windows as a service model, updates came rolled together in the "latest cumulative update" (LCU) packages for both client and server. Every new update published includes all changes from previous updates, as well as new fixes. Since Windows client and server share the same code base, these LCUs allow the same update to be installed on the same client and server OS family, further reducing fragmentation.
|
Windows 10 provided an opportunity to end the era of infinite fragmentation. With Windows 10 and the Windows as a service model, updates came rolled together in the "latest cumulative update" (LCU) packages for both client and server. Every new update published includes all changes from previous updates, as well as new fixes. Since Windows client and server share the same code base, these LCUs allow the same update to be installed on the same client and server OS family, further reducing fragmentation.
|
||||||
@ -65,12 +66,12 @@ While Windows 10 updates could have been controlled as cumulative from "Day 1,"
|
|||||||
|
|
||||||
Customers saw the LCU model used for Windows 10 as having packages that were too large and represented too much of a change for legacy operating systems, so a different model was implemented. Windows instead offered one cumulative package (Monthly Rollup) and one individual package (Security Only) for all legacy operating systems.
|
Customers saw the LCU model used for Windows 10 as having packages that were too large and represented too much of a change for legacy operating systems, so a different model was implemented. Windows instead offered one cumulative package (Monthly Rollup) and one individual package (Security Only) for all legacy operating systems.
|
||||||
|
|
||||||
The Monthly Rollup includes new non-security (if appropriate), security updates, Internet Explorer (IE) updates, and all updates from the previous month similar to the Windows 10 model. The Security-only package includes only new security updates for the month. This means that any security updates from any previous month are not included in current month’s Security-Only Package. If a Security-Only update is missed, it is missed. Those updates will not appear in a future Security-Only update. Additionally, a cumulative package is offered for IE, which can be tested and installed separately, reducing the total update package size. The IE cumulative update includes both security and non-security fixes following the same model as Windows 10.
|
The Monthly Rollup includes new non-security (if appropriate), security updates, Internet Explorer (IE) updates, and all updates from the previous month similar to the Windows 10 model. The Security-only package includes only new security updates for the month. This means that any security updates from any previous month are not included in current month's Security-Only Package. If a Security-Only update is missed, it is missed. Those updates will not appear in a future Security-Only update. Additionally, a cumulative package is offered for IE, which can be tested and installed separately, reducing the total update package size. The IE cumulative update includes both security and non-security fixes following the same model as Windows 10.
|
||||||
|
|
||||||

|

|
||||||
*Figure 2.0 - Legacy OS security-only update model*
|
*Figure 2.0 - Legacy OS security-only update model*
|
||||||
|
|
||||||
Moving to the cumulative model for legacy OS versions continues to improve predictability of update quality. The Windows legacy environments which have fully updated machines with Monthly Rollups are running the same baseline against which all legacy OS version updates are tested. These include all of the updates (security and non-security) prior to and after October 2016. Many customer environments do not have all updates prior to this change installed, which leaves some continued fragmentation in the ecosystem. Further, customers who are installing Security-Only Updates and potentially doing so inconsistently are also more fragmented than Microsoft’s test environments for legacy OS version. This remaining fragmentation results in issues like those seen when the September 2016 Servicing Stack Update (SSU) was needed for smooth installation of the August 2018 security update. These environments did not have the SSU applied previously.
|
Moving to the cumulative model for legacy OS versions continues to improve predictability of update quality. The Windows legacy environments which have fully updated machines with Monthly Rollups are running the same baseline against which all legacy OS version updates are tested. These include all of the updates (security and non-security) prior to and after October 2016. Many customer environments do not have all updates prior to this change installed, which leaves some continued fragmentation in the ecosystem. Further, customers who are installing Security-Only Updates and potentially doing so inconsistently are also more fragmented than Microsoft's test environments for legacy OS version. This remaining fragmentation results in issues like those seen when the September 2016 Servicing Stack Update (SSU) was needed for smooth installation of the August 2018 security update. These environments did not have the SSU applied previously.
|
||||||
|
|
||||||
### Points to consider
|
### Points to consider
|
||||||
- Windows 7 and Windows 8 legacy operating system updates [moved from individual to cumulative in October 2016](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/More-on-Windows-7-and-Windows-8-1-servicing-changes/ba-p/166783). Devices with updates missing prior to that point are still missing those updates, as they were not included in the subsequent cumulative packages.
|
- Windows 7 and Windows 8 legacy operating system updates [moved from individual to cumulative in October 2016](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/More-on-Windows-7-and-Windows-8-1-servicing-changes/ba-p/166783). Devices with updates missing prior to that point are still missing those updates, as they were not included in the subsequent cumulative packages.
|
||||||
@ -84,7 +85,7 @@ Moving to the cumulative model for legacy OS versions continues to improve predi
|
|||||||
- For [Windows Server 2008 SP2](https://cloudblogs.microsoft.com/windowsserver/2018/06/12/windows-server-2008-sp2-servicing-changes/), cumulative updates began in October 2018, and follow the same model as Windows 7. Updates for IE9 are included in those packages, as the last supported version of Internet Explorer for that Legacy OS version.
|
- For [Windows Server 2008 SP2](https://cloudblogs.microsoft.com/windowsserver/2018/06/12/windows-server-2008-sp2-servicing-changes/), cumulative updates began in October 2018, and follow the same model as Windows 7. Updates for IE9 are included in those packages, as the last supported version of Internet Explorer for that Legacy OS version.
|
||||||
|
|
||||||
## Public preview releases
|
## Public preview releases
|
||||||
Lastly, the cumulative update model directly impacts the public Preview releases offered in the 3rd and/or 4th weeks of the month. Update Tuesday, also referred to as the "B" week release occurs on the second Tuesday of the month. It is always a required security update across all operating systems. In addition to this monthly release, Windows also releases non-security update "previews" targeting the 3rd (C) and the 4th (D) weeks of the month. These preview releases include that month’s B-release plus a set of non-security updates for testing and validation as a cumulative package. We recommend IT Administrators uses the C/D previews to test the update in their environments. Any issues identified with the updates in the C/D releases are identified and then fixed or removed, prior to being rolled up in to the next month’s B release package together with new security updates. Security-only Packages are not part of the C/D preview program.
|
Lastly, the cumulative update model directly impacts the public Preview releases offered in the 3rd and/or 4th weeks of the month. Update Tuesday, also referred to as the "B" week release occurs on the second Tuesday of the month. It is always a required security update across all operating systems. In addition to this monthly release, Windows also releases non-security update "previews" targeting the 3rd (C) and the 4th (D) weeks of the month. These preview releases include that month's B-release plus a set of non-security updates for testing and validation as a cumulative package. We recommend IT Administrators uses the C/D previews to test the update in their environments. Any issues identified with the updates in the C/D releases are identified and then fixed or removed, prior to being rolled up in to the next month's B release package together with new security updates. Security-only Packages are not part of the C/D preview program.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel, and products such as Microsoft Endpoint Configuration Manager that rely on it, will not see preview updates for older versions of Windows 10.
|
> Only preview updates for the most recent release of Windows 10 are published to Windows Server Update Services (WSUS). For customers using the WSUS channel, and products such as Microsoft Endpoint Configuration Manager that rely on it, will not see preview updates for older versions of Windows 10.
|
||||||
@ -103,9 +104,9 @@ All of these updates are cumulative and build on each other for Windows 10. This
|
|||||||
*Figure 3.0 - Preview releases within the Windows 10 LCU model*
|
*Figure 3.0 - Preview releases within the Windows 10 LCU model*
|
||||||
|
|
||||||
## Previews vs. on-demand releases
|
## Previews vs. on-demand releases
|
||||||
In 2018, we experienced incidents which required urgent remediation that didn’t map to the monthly update release cadence. These incidents were situations that required an immediate fix to an Update Tuesday release. While Windows engineering worked aggressively to respond within a week of the B-release, these "on-demand" releases created confusion with the C Preview releases.
|
In 2018, we experienced incidents which required urgent remediation that didn't map to the monthly update release cadence. These incidents were situations that required an immediate fix to an Update Tuesday release. While Windows engineering worked aggressively to respond within a week of the B-release, these "on-demand" releases created confusion with the C Preview releases.
|
||||||
|
|
||||||
As a general policy, if a Security-Only package has a regression, which is defined as an unintentional error in the code of an update, then the fix for that regression will be added to the next month’s Security-Only Update. The fix for that regression may also be offered as part an On-Demand release and will be rolled into the next Monthly Update. (Note: Exceptions do exist to this policy, based on timing.)
|
As a general policy, if a Security-Only package has a regression, which is defined as an unintentional error in the code of an update, then the fix for that regression will be added to the next month's Security-Only Update. The fix for that regression may also be offered as part an On-Demand release and will be rolled into the next Monthly Update. (Note: Exceptions do exist to this policy, based on timing.)
|
||||||
|
|
||||||
### Point to consider
|
### Point to consider
|
||||||
- When Windows identifies an issue with a Update Tuesday release, engineering teams work to remediate or fix the issue as quickly as possible. The outcome is often a new update which may be released at any time, including during the 3rd or 4th week of the month. Such updates are independent of the regularly scheduled "C" and "D" update previews. These updates are created on-demand to remediate a customer impacting issue. In most cases they are qualified as a "non-security" update, and do not require a system reboot.
|
- When Windows identifies an issue with a Update Tuesday release, engineering teams work to remediate or fix the issue as quickly as possible. The outcome is often a new update which may be released at any time, including during the 3rd or 4th week of the month. Such updates are independent of the regularly scheduled "C" and "D" update previews. These updates are created on-demand to remediate a customer impacting issue. In most cases they are qualified as a "non-security" update, and do not require a system reboot.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Manage additional Windows Update settings (Windows 10)
|
title: Manage additional Windows Update settings (Windows 10)
|
||||||
description: Additional settings to control the behavior of Windows Update (WU) in Windows 10
|
description: In this article, learn about additional settings to control the behavior of Windows Update (WU) in Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
|
||||||
@ -12,6 +12,7 @@ author: jaimeo
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage additional Windows Update settings
|
# Manage additional Windows Update settings
|
||||||
@ -66,7 +67,7 @@ This setting lets you specify a server on your network to function as an interna
|
|||||||
|
|
||||||
To use this setting in Group Policy, go to **Computer Configuration\Administrative Templates\Windows Components\Windows Update\Specify Intranet Microsoft update service location**. You must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update Agent to download updates from an alternate download server instead of the intranet update service.
|
To use this setting in Group Policy, go to **Computer Configuration\Administrative Templates\Windows Components\Windows Update\Specify Intranet Microsoft update service location**. You must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update Agent to download updates from an alternate download server instead of the intranet update service.
|
||||||
|
|
||||||
If the setting is set to **Enabled**, the Automatic Updates client connects to the specified intranet Microsoft update service (or alternate download server), instead of Windows Update, to search for and download updates. Enabling this setting means that end users in your organization don’t have to go through a firewall to get updates, and it gives you the opportunity to test updates after deploying them.
|
If the setting is set to **Enabled**, the Automatic Updates client connects to the specified intranet Microsoft update service (or alternate download server), instead of Windows Update, to search for and download updates. Enabling this setting means that end users in your organization don't have to go through a firewall to get updates, and it gives you the opportunity to test updates after deploying them.
|
||||||
If the setting is set to **Disabled** or **Not Configured**, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet.
|
If the setting is set to **Disabled** or **Not Configured**, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet.
|
||||||
|
|
||||||
The alternate download server configures the Windows Update Agent to download files from an alternative download server instead of the intranet update service.
|
The alternate download server configures the Windows Update Agent to download files from an alternative download server instead of the intranet update service.
|
||||||
@ -91,9 +92,9 @@ If the setting is set to **Enabled**, Windows will check for available updates a
|
|||||||
If the setting is set to **Disabled** or **Not Configured**, Windows will check for available updates at the default interval of 22 hours.
|
If the setting is set to **Disabled** or **Not Configured**, Windows will check for available updates at the default interval of 22 hours.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The “Specify intranet Microsoft update service location” setting must be enabled for this policy to have effect.
|
>The "Specify intranet Microsoft update service location" setting must be enabled for this policy to have effect.
|
||||||
>
|
>
|
||||||
>If the “Configure Automatic Updates” policy is disabled, this policy has no effect.
|
>If the "Configure Automatic Updates" policy is disabled, this policy has no effect.
|
||||||
|
|
||||||
To configure this policy with MDM, use [DetectionFrequency](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-detectionfrequency).
|
To configure this policy with MDM, use [DetectionFrequency](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-detectionfrequency).
|
||||||
|
|
||||||
@ -121,7 +122,7 @@ If the setting is set to **Disabled** or **Not Configured**, no target group inf
|
|||||||
If the intranet Microsoft update service supports multiple target groups, this policy can specify multiple group names separated by semicolons. Otherwise, a single group must be specified.
|
If the intranet Microsoft update service supports multiple target groups, this policy can specify multiple group names separated by semicolons. Otherwise, a single group must be specified.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>This policy applies only when the intranet Microsoft update service the device is directed to is configured to support client-side targeting. If the “Specify intranet Microsoft update service location” policy is disabled or not configured, this policy has no effect.
|
>This policy applies only when the intranet Microsoft update service the device is directed to is configured to support client-side targeting. If the "Specify intranet Microsoft update service location" policy is disabled or not configured, this policy has no effect.
|
||||||
|
|
||||||
### Allow signed updates from an intranet Microsoft update service location
|
### Allow signed updates from an intranet Microsoft update service location
|
||||||
|
|
||||||
@ -129,7 +130,7 @@ This policy setting allows you to manage whether Automatic Updates accepts updat
|
|||||||
|
|
||||||
To configure this setting in Group Policy, go to **Computer Configuration\Administrative Templates\Windows Components\Windows update\Allow signed updates from an intranet Microsoft update service location**.
|
To configure this setting in Group Policy, go to **Computer Configuration\Administrative Templates\Windows Components\Windows update\Allow signed updates from an intranet Microsoft update service location**.
|
||||||
|
|
||||||
If you enable this policy setting, Automatic Updates accepts updates received through an intranet Microsoft update service location, as specified by [Specify Intranet Microsoft update service location](#specify-intranet-microsoft-update-service-location), if they are signed by a certificate found in the “Trusted Publishers” certificate store of the local computer.
|
If you enable this policy setting, Automatic Updates accepts updates received through an intranet Microsoft update service location, as specified by [Specify Intranet Microsoft update service location](#specify-intranet-microsoft-update-service-location), if they are signed by a certificate found in the "Trusted Publishers" certificate store of the local computer.
|
||||||
If you disable or do not configure this policy setting, updates from an intranet Microsoft update service location must be signed by Microsoft.
|
If you disable or do not configure this policy setting, updates from an intranet Microsoft update service location must be signed by Microsoft.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Walkthrough use Intune to configure Windows Update for Business (Windows 10)
|
title: Walkthrough use Intune to configure Windows Update for Business (Windows 10)
|
||||||
description: Configure Windows Update for Business settings using Microsoft Intune.
|
description: In this article, learn how to configure Windows Update for Business settings using Microsoft Intune.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -12,6 +12,7 @@ ms.date: 07/27/2017
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Walkthrough: use Microsoft Intune to configure Windows Update for Business
|
# Walkthrough: use Microsoft Intune to configure Windows Update for Business
|
||||||
@ -29,7 +30,7 @@ ms.topic: article
|
|||||||
>
|
>
|
||||||
>In the following settings CB refers to Semi-Annual Channel (Targeted), while CBB refers to Semi-Annual Channel.
|
>In the following settings CB refers to Semi-Annual Channel (Targeted), while CBB refers to Semi-Annual Channel.
|
||||||
|
|
||||||
You can use Intune to configure Windows Update for Business even if you don’t have on-premises infrastructure when you use Intune in conjunction with Azure AD. Before configuring Windows Update for Business, consider a [deployment strategy](waas-servicing-strategy-windows-10-updates.md) for updates and feature updates in your environment.
|
You can use Intune to configure Windows Update for Business even if you don't have on-premises infrastructure when you use Intune in conjunction with Azure AD. Before configuring Windows Update for Business, consider a [deployment strategy](waas-servicing-strategy-windows-10-updates.md) for updates and feature updates in your environment.
|
||||||
|
|
||||||
Windows Update for Business in Windows 10 version 1511 allows you to delay quality updates up to 4 weeks and feature updates up to an additional 8 months after Microsoft releases builds to the Current Branch for Business (CBB) servicing branch. In Windows 10 version 1607 and later, you can delay quality updates for up to 30 days and feature updates up to an additional 180 days after the release of either a Current Branch (CB) or CBB build.
|
Windows Update for Business in Windows 10 version 1511 allows you to delay quality updates up to 4 weeks and feature updates up to an additional 8 months after Microsoft releases builds to the Current Branch for Business (CBB) servicing branch. In Windows 10 version 1607 and later, you can delay quality updates for up to 30 days and feature updates up to an additional 180 days after the release of either a Current Branch (CB) or CBB build.
|
||||||
|
|
||||||
@ -42,7 +43,7 @@ To use Intune to manage quality and feature updates in your environment, you mus
|
|||||||
|
|
||||||
In this example, you use two security groups to manage your updates: **Ring 4 Broad business users** and **Ring 5 Broad business users #2** from Table 1 in [Build deployment rings for Windows 10 updates](waas-deployment-rings-windows-10-updates.md).
|
In this example, you use two security groups to manage your updates: **Ring 4 Broad business users** and **Ring 5 Broad business users #2** from Table 1 in [Build deployment rings for Windows 10 updates](waas-deployment-rings-windows-10-updates.md).
|
||||||
|
|
||||||
- The **Ring 4 Broad business users** group contains PCs of IT members who test the updates as soon as they’re released for Windows clients in the Current Branch for Business (CBB) servicing branch. This phase typically occurs after testing on Current Branch (CB) devices.
|
- The **Ring 4 Broad business users** group contains PCs of IT members who test the updates as soon as they're released for Windows clients in the Current Branch for Business (CBB) servicing branch. This phase typically occurs after testing on Current Branch (CB) devices.
|
||||||
- The **Ring 5 Broad business users #2** group consists of the first line-of-business (LOB) users, who consume quality updates after 1 week and feature updates 1 month after the CBB release.
|
- The **Ring 5 Broad business users #2** group consists of the first line-of-business (LOB) users, who consume quality updates after 1 week and feature updates 1 month after the CBB release.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
@ -71,7 +72,7 @@ In this example, you use two security groups to manage your updates: **Ring 4 Br
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
8. For this deployment ring, you’re required to enable only CBB, so click **Save Policy**.
|
8. For this deployment ring, you're required to enable only CBB, so click **Save Policy**.
|
||||||
|
|
||||||
9. In the **Deploy Policy: Windows Update for Business – CBB1** dialog box, click **Yes**.
|
9. In the **Deploy Policy: Windows Update for Business – CBB1** dialog box, click **Yes**.
|
||||||
|
|
||||||
@ -175,7 +176,7 @@ In this example, you use three security groups from Table 1 in [Build deployment
|
|||||||
|
|
||||||
10. In the **Manage Deployment: Windows Update for Business – CB2** dialog box, select the **Ring 2 Pilot Business Users** group, click **Add**, and then click **OK**.
|
10. In the **Manage Deployment: Windows Update for Business – CB2** dialog box, select the **Ring 2 Pilot Business Users** group, click **Add**, and then click **OK**.
|
||||||
|
|
||||||
You have now configured the **Ring 2 Pilot Business Users** deployment ring to enable CB feature update deferment for 14 days. Now, you must configure **Ring 4 Broad business users** to receive CBB features updates as soon as they’re available.
|
You have now configured the **Ring 2 Pilot Business Users** deployment ring to enable CB feature update deferment for 14 days. Now, you must configure **Ring 4 Broad business users** to receive CBB features updates as soon as they're available.
|
||||||
|
|
||||||
### Configure Ring 4 Broad business users policy
|
### Configure Ring 4 Broad business users policy
|
||||||
|
|
||||||
@ -216,7 +217,7 @@ You have now configured the **Ring 2 Pilot Business Users** deployment ring to e
|
|||||||
|
|
||||||
14. In the **Manage Deployment: Windows Update for Business – CBB1** dialog box, select the **Ring 4 Broad business users** group, click **Add**, and then click **OK**.
|
14. In the **Manage Deployment: Windows Update for Business – CBB1** dialog box, select the **Ring 4 Broad business users** group, click **Add**, and then click **OK**.
|
||||||
|
|
||||||
You have now configured the **Ring 4 Broad business users** deployment ring to receive CBB feature updates as soon as they’re available. Finally, configure **Ring 5 Broad business users #2** to accommodate a 7-day delay for quality updates and a 14-day delay for feature updates.
|
You have now configured the **Ring 4 Broad business users** deployment ring to receive CBB feature updates as soon as they're available. Finally, configure **Ring 5 Broad business users #2** to accommodate a 7-day delay for quality updates and a 14-day delay for feature updates.
|
||||||
|
|
||||||
|
|
||||||
### Configure Ring 5 Broad business users \#2 policy
|
### Configure Ring 5 Broad business users \#2 policy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Update error code list by component
|
title: Windows Update error code list by component
|
||||||
description: Reference information for Windows Update error codes
|
description: In this article, you can find reference information for Windows Update error codes, such as Automatic Update and UI errors.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl:
|
ms.mktglfcycl:
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -13,6 +13,7 @@ ms.date: 09/18/2018
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Update error codes by component
|
# Windows Update error codes by component
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Update common errors and mitigation
|
title: Windows Update common errors and mitigation
|
||||||
description: Learn about some common issues you might experience with Windows Update
|
description: In this article, learn about some common issues you might experience with Windows Update, as well as steps to resolve them.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl:
|
ms.mktglfcycl:
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -13,6 +13,7 @@ ms.date: 09/18/2018
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Update common errors and mitigation
|
# Windows Update common errors and mitigation
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Update log files
|
title: Windows Update log files
|
||||||
description: Learn about the Windows Update log files
|
description: In this article, learn about the Windows Update log files, including file generation, components, and structure.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl:
|
ms.mktglfcycl:
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -13,6 +13,7 @@ ms.date: 09/18/2018
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Update log files
|
# Windows Update log files
|
||||||
@ -66,7 +67,7 @@ The WU engine has different component names. The following are some of the most
|
|||||||
- IdleTimer - Tracking active calls, stopping a service
|
- IdleTimer - Tracking active calls, stopping a service
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Many component log messages are invaluable if you are looking for problems in that specific area. However, they can be useless if you don't filter to exclude irrelevant components so that you can focus on what’s important.
|
>Many component log messages are invaluable if you are looking for problems in that specific area. However, they can be useless if you don't filter to exclude irrelevant components so that you can focus on what's important.
|
||||||
|
|
||||||
### Windows Update log structure
|
### Windows Update log structure
|
||||||
The Windows update log structure is separated into four main identities:
|
The Windows update log structure is separated into four main identities:
|
||||||
@ -114,7 +115,7 @@ Search for and identify the components that are associated with the IDs. Differe
|
|||||||
#### Update identifiers
|
#### Update identifiers
|
||||||
|
|
||||||
##### Update ID and revision number
|
##### Update ID and revision number
|
||||||
There are different identifiers for the same update in different contexts. It’s important to know the identifier schemes.
|
There are different identifiers for the same update in different contexts. It's important to know the identifier schemes.
|
||||||
- Update ID: A GUID (indicated in the previous screen shot) that's assigned to a given update at publication time
|
- Update ID: A GUID (indicated in the previous screen shot) that's assigned to a given update at publication time
|
||||||
- Revision number: A number incremented every time that a given update (that has a given update ID) is modified and republished on a service
|
- Revision number: A number incremented every time that a given update (that has a given update ID) is modified and republished on a service
|
||||||
- Revision numbers are reused from one update to another (not a unique identifier).
|
- Revision numbers are reused from one update to another (not a unique identifier).
|
||||||
@ -123,8 +124,8 @@ There are different identifiers for the same update in different contexts. It’
|
|||||||
|
|
||||||
|
|
||||||
##### Revision ID
|
##### Revision ID
|
||||||
- A Revision ID (do no confuse this with “revision number”) is a serial number that's issued when an update is initially published or revised on a given service.
|
- A Revision ID (do no confuse this with "revision number") is a serial number that's issued when an update is initially published or revised on a given service.
|
||||||
- An existing update that’s revised keeps the same update ID (GUID), has its revision number incremented (for example, from 100 to 101), but gets a completely new revision ID that is not related to the previous ID.
|
- An existing update that's revised keeps the same update ID (GUID), has its revision number incremented (for example, from 100 to 101), but gets a completely new revision ID that is not related to the previous ID.
|
||||||
- Revision IDs are unique on a given update source, but not across multiple sources.
|
- Revision IDs are unique on a given update source, but not across multiple sources.
|
||||||
- The same update revision may have completely different revision IDs on WU and WSUS.
|
- The same update revision may have completely different revision IDs on WU and WSUS.
|
||||||
- The same revision ID may represent different updates on WU and WSUS.
|
- The same revision ID may represent different updates on WU and WSUS.
|
||||||
@ -133,7 +134,7 @@ There are different identifiers for the same update in different contexts. It’
|
|||||||
- Local ID is a serial number issued when an update is received from a service by a given WU client
|
- Local ID is a serial number issued when an update is received from a service by a given WU client
|
||||||
- Usually seen in debug logs, especially involving the local cache for update info (Datastore)
|
- Usually seen in debug logs, especially involving the local cache for update info (Datastore)
|
||||||
- Different client PCs will assign different Local IDs to the same update
|
- Different client PCs will assign different Local IDs to the same update
|
||||||
- You can find the local IDs that a client is using by getting the client’s %WINDIR%\SoftwareDistribution\Datastore\Datastore.edb file
|
- You can find the local IDs that a client is using by getting the client's %WINDIR%\SoftwareDistribution\Datastore\Datastore.edb file
|
||||||
|
|
||||||
##### Inconsistent terminology
|
##### Inconsistent terminology
|
||||||
- Sometimes the logs use terms inconsistently. For example, the InstalledNonLeafUpdateIDs list actually contains revision IDs, not update IDs.
|
- Sometimes the logs use terms inconsistently. For example, the InstalledNonLeafUpdateIDs list actually contains revision IDs, not update IDs.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Update - Additional resources
|
title: Windows Update - Additional resources
|
||||||
description: Additional resources for Windows Update
|
description: In this article, you can find additional resources for Windows Update, such as WSUS troubleshooting.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl:
|
ms.mktglfcycl:
|
||||||
|
|
||||||
@ -13,6 +13,7 @@ ms.date: 09/18/2018
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Update - additional resources
|
# Windows Update - additional resources
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Update troubleshooting
|
title: Windows Update troubleshooting
|
||||||
description: Learn how to troubleshoot Windows Update
|
description: In this article, learn how to troubleshoot issues with Windows Update, such as why a device is frozen at scan.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl:
|
ms.mktglfcycl:
|
||||||
audience: itpro
|
audience: itpro
|
||||||
@ -12,6 +12,7 @@ author: jaimeo
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Update troubleshooting
|
# Windows Update troubleshooting
|
||||||
@ -204,7 +205,7 @@ From the WU logs:
|
|||||||
|
|
||||||
In the above log snippet, we see that the Criteria = "IsHidden = 0 AND DeploymentAction=*". "*" means there is nothing specified from the server. So, the scan happens but there is no direction to download or install to the agent. So it just scans the update and provides the results.
|
In the above log snippet, we see that the Criteria = "IsHidden = 0 AND DeploymentAction=*". "*" means there is nothing specified from the server. So, the scan happens but there is no direction to download or install to the agent. So it just scans the update and provides the results.
|
||||||
|
|
||||||
Now if you look at the below logs, the Automatic update runs the scan and finds no update approved for it. So it reports there are 0 updates to install or download. This is due to bad setup or configuration in the environment. The WSUS side should approve the patches for WU so that it fetches the updates and installs it on the specified time according to the policy. Since this scenario doesn't include SCCM, there's no way to install unapproved updates. And that is the problem you are facing. You expect that the scan should be done by the operational insight agent and automatically trigger download and install but that won’t happen here.
|
Now if you look at the below logs, the Automatic update runs the scan and finds no update approved for it. So it reports there are 0 updates to install or download. This is due to bad setup or configuration in the environment. The WSUS side should approve the patches for WU so that it fetches the updates and installs it on the specified time according to the policy. Since this scenario doesn't include SCCM, there's no way to install unapproved updates. And that is the problem you are facing. You expect that the scan should be done by the operational insight agent and automatically trigger download and install but that won't happen here.
|
||||||
|
|
||||||
```console
|
```console
|
||||||
2018-08-06 10:58:45:992 480 5d8 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates Id = 57]
|
2018-08-06 10:58:45:992 480 5d8 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates Id = 57]
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: User State Migration Tool (USMT) - Getting Started (Windows 10)
|
title: User State Migration Tool (USMT) - Getting Started (Windows 10)
|
||||||
description: This article will guide you through the general process that you should follow to migrate files and settings. in Windows.
|
description: This article will guide you through the general process that you should follow to migrate files and settings in Windows.
|
||||||
ms.custom: seo-marvel-apr2020
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: 506ff1d2-94b8-4460-8672-56aad963504b
|
ms.assetid: 506ff1d2-94b8-4460-8672-56aad963504b
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: USMT Resources (Windows 10)
|
title: USMT Resources (Windows 10)
|
||||||
description: USMT Resources
|
description: In this article, you will find resources for the User State Migration Tool (USMT).
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: a0b266c7-4bcb-49f1-b63c-48c6ace86b43
|
ms.assetid: a0b266c7-4bcb-49f1-b63c-48c6ace86b43
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: XML File Requirements (Windows 10)
|
title: XML File Requirements (Windows 10)
|
||||||
description: XML File Requirements
|
description: In this article, you will learn about the requirements for creating the custom .xml files for migration.
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: 4b567b50-c50a-4a4f-8684-151fe3f8275f
|
ms.assetid: 4b567b50-c50a-4a4f-8684-151fe3f8275f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -4,8 +4,9 @@ ms.reviewer:
|
|||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.audience: itpro
|
ms.audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
description: How to enable Windows 10 Enterprise E3 and E5 subscriptions for VDA
|
description: In this article, you will learn how to enable Windows 10 Enterprise E3 and E5 subscriptions for VDA.
|
||||||
keywords: upgrade, update, task sequence, deploy
|
keywords: upgrade, update, task sequence, deploy
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Activate by Proxy an Active Directory Forest (Windows 10)
|
title: Activate by Proxy an Active Directory Forest (Windows 10)
|
||||||
description: Activate by Proxy an Active Directory Forest
|
description: Learn how to use the active directory-based activation function of the volume activation management tool to activate an active directory (AD) forest by proxy.
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: 6475fc87-a6f7-4fa8-b0aa-de19f2dea7e5
|
ms.assetid: 6475fc87-a6f7-4fa8-b0aa-de19f2dea7e5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,50 +1,52 @@
|
|||||||
---
|
---
|
||||||
title: Activate an Active Directory Forest Online (Windows 10)
|
title: Activate an Active Directory Forest Online (Windows 10)
|
||||||
description: Activate an Active Directory Forest Online
|
description: Learn how to use the active directory-based activation function of the volume activation management tool to activate an active directory (AD) forest online.
|
||||||
ms.assetid: 9b5bc193-799b-4aa5-9d3e-0e495f7195d3
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 9b5bc193-799b-4aa5-9d3e-0e495f7195d3
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Activate an Active Directory Forest Online
|
---
|
||||||
|
|
||||||
You can use the Volume Activation Management Tool (VAMT) Active Directory-Based Activation (ADBA) function to activate an Active Directory (AD) forest over the Internet. ADBA enables certain products to inherit activation from the domain.
|
# Activate an Active Directory Forest Online
|
||||||
|
|
||||||
**Important**
|
You can use the Volume Activation Management Tool (VAMT) Active Directory-Based Activation (ADBA) function to activate an Active Directory (AD) forest over the Internet. ADBA enables certain products to inherit activation from the domain.
|
||||||
ADBA is only applicable to Generic Volume License Keys (GVLKs) and KMS Host keys (CSVLKs). To use ADBA, one or more KMS Host keys (CSVLKs) must be installed on the AD forest, and client keys (GVLKs) must be installed on the client products.
|
|
||||||
|
**Important**
|
||||||
## Requirements
|
ADBA is only applicable to Generic Volume License Keys (GVLKs) and KMS Host keys (CSVLKs). To use ADBA, one or more KMS Host keys (CSVLKs) must be installed on the AD forest, and client keys (GVLKs) must be installed on the client products.
|
||||||
|
|
||||||
Before performing online activation, ensure that the network and the VAMT installation meet the following requirements:
|
## Requirements
|
||||||
- VAMT is installed on a host computer that has Internet access.
|
|
||||||
- VAMT has administrative permissions to the Active Directory domain.
|
Before performing online activation, ensure that the network and the VAMT installation meet the following requirements:
|
||||||
- The KMS Host key (CSVLK) you intend to use is added to VAMT in the **Product Keys** node.
|
- VAMT is installed on a host computer that has Internet access.
|
||||||
|
- VAMT has administrative permissions to the Active Directory domain.
|
||||||
**To perform an online Active Directory forest activation**
|
- The KMS Host key (CSVLK) you intend to use is added to VAMT in the **Product Keys** node.
|
||||||
|
|
||||||
1. Open VAMT.
|
**To perform an online Active Directory forest activation**
|
||||||
2. In the left-side pane, click the **Active Directory-Based Activation** node.
|
|
||||||
3. In the right-side **Actions** pane, click **Online activate forest** to open the **Install Product Key** dialog box.
|
1. Open VAMT.
|
||||||
4. In the **Install Product Key** dialog box, select the KMS Host key (CSVLK) that you want to apply to the AD forest.
|
2. In the left-side pane, click the **Active Directory-Based Activation** node.
|
||||||
5. If required, enter a new Active Directory-Based Activation Object name
|
3. In the right-side **Actions** pane, click **Online activate forest** to open the **Install Product Key** dialog box.
|
||||||
|
4. In the **Install Product Key** dialog box, select the KMS Host key (CSVLK) that you want to apply to the AD forest.
|
||||||
**Important**
|
5. If required, enter a new Active Directory-Based Activation Object name
|
||||||
If you want to rename the ADBA object, you must do it now. After you click **Install Key**, the name cannot be changed.
|
|
||||||
|
**Important**
|
||||||
6. Click **Install Key**.
|
If you want to rename the ADBA object, you must do it now. After you click **Install Key**, the name cannot be changed.
|
||||||
7. VAMT displays the **Activating Active Directory** dialog box until it completes the requested action.
|
|
||||||
|
6. Click **Install Key**.
|
||||||
The activated object and the date that is was created appear in the **Active Directory-Based Activation** node in the center pane.
|
7. VAMT displays the **Activating Active Directory** dialog box until it completes the requested action.
|
||||||
|
|
||||||
## Related topics
|
The activated object and the date that is was created appear in the **Active Directory-Based Activation** node in the center pane.
|
||||||
|
|
||||||
- [Scenario 1: Online Activation](scenario-online-activation-vamt.md)
|
## Related topics
|
||||||
- [Add and Remove Computers](add-remove-computers-vamt.md)
|
|
||||||
|
- [Scenario 1: Online Activation](scenario-online-activation-vamt.md)
|
||||||
|
- [Add and Remove Computers](add-remove-computers-vamt.md)
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Activate using Active Directory-based activation (Windows 10)
|
title: Activate using Active Directory-based activation (Windows 10)
|
||||||
description: Active Directory-based activation is implemented as a role service that relies on AD DS to store activation objects.
|
description: Learn how active directory-based activation is implemented as a role service that relies on AD DS to store activation objects.
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: 08cce6b7-7b5b-42cf-b100-66c363a846af
|
ms.assetid: 08cce6b7-7b5b-42cf-b100-66c363a846af
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,30 +1,32 @@
|
|||||||
---
|
---
|
||||||
title: Add and Manage Products (Windows 10)
|
title: Add and Manage Products (Windows 10)
|
||||||
description: Add and Manage Products
|
description: This article contains a list of topics to help you learn how to manage client computers and products in the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: a48fbc23-917d-40f7-985c-e49702c05e51
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: a48fbc23-917d-40f7-985c-e49702c05e51
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Add and Manage Products
|
---
|
||||||
|
|
||||||
This section describes how to add client computers into the Volume Activation Management Tool (VAMT). After the computers are added, you can manage the products that are installed on your network.
|
# Add and Manage Products
|
||||||
|
|
||||||
## In this Section
|
This section describes how to add client computers into the Volume Activation Management Tool (VAMT). After the computers are added, you can manage the products that are installed on your network.
|
||||||
|
|
||||||
|Topic |Description |
|
## In this Section
|
||||||
|------|------------|
|
|
||||||
|[Add and Remove Computers](add-remove-computers-vamt.md) |Describes how to add client computers to VAMT. |
|
|Topic |Description |
|
||||||
|[Update Product Status](update-product-status-vamt.md) |Describes how to update the status of product license. |
|
|------|------------|
|
||||||
|[Remove Products](remove-products-vamt.md) |Describes how to remove a product from the product list. |
|
|[Add and Remove Computers](add-remove-computers-vamt.md) |Describes how to add client computers to VAMT. |
|
||||||
|
|[Update Product Status](update-product-status-vamt.md) |Describes how to update the status of product license. |
|
||||||
|
|[Remove Products](remove-products-vamt.md) |Describes how to remove a product from the product list. |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,63 +1,65 @@
|
|||||||
---
|
---
|
||||||
title: Add and Remove Computers (Windows 10)
|
title: Add and Remove Computers (Windows 10)
|
||||||
description: Add and Remove Computers
|
description: In this article, you will learn about how to manage computers in the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: cb6f3a78-ece0-4dc7-b086-cb003d82cd52
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: cb6f3a78-ece0-4dc7-b086-cb003d82cd52
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
audience: itpro
author: greg-lindsay
|
ms.sitesec: library
|
||||||
ms.pagetype: activation
|
audience: itpro
|
||||||
ms.date: 04/25/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.pagetype: activation
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Add and Remove Computers
|
---
|
||||||
|
|
||||||
You can add computers that have any of the supported Windows or Office products installed to a Volume Activation Management Tool (VAMT) database by using the **Discover products** function. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query. You can remove computers from a VAMT database by using the **Delete** function. After you add the computers, you can add the products that are installed on the computers by running the **Update license status** function.
|
# Add and Remove Computers
|
||||||
|
|
||||||
Before adding computers, ensure that the Windows Management Instrumentation (WMI) firewall exception required by VAMT has been enabled on all target computers. For more information see [Configure Client Computers](configure-client-computers-vamt.md).
|
You can add computers that have any of the supported Windows or Office products installed to a Volume Activation Management Tool (VAMT) database by using the **Discover products** function. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query. You can remove computers from a VAMT database by using the **Delete** function. After you add the computers, you can add the products that are installed on the computers by running the **Update license status** function.
|
||||||
|
|
||||||
## To add computers to a VAMT database
|
Before adding computers, ensure that the Windows Management Instrumentation (WMI) firewall exception required by VAMT has been enabled on all target computers. For more information see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||||
|
|
||||||
1. Open VAMT.
|
## To add computers to a VAMT database
|
||||||
2. Click **Discover products** in the **Actions** menu in the right-side pane to open the **Discover Products** dialog box.
|
|
||||||
3. In the **Discover products** dialog box, click **Search for computers in the Active Directory** to display the search options, then click the search option you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query.
|
1. Open VAMT.
|
||||||
- To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**, then under **Domain Filter Criteria**, in the list of domain names click the name of the domain you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer within the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
2. Click **Discover products** in the **Actions** menu in the right-side pane to open the **Discover Products** dialog box.
|
||||||
- To search by individual computer name or IP address, click **Manually enter name or IP address**, then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that VAMT supports both IPv4 and IPV6 addressing.
|
3. In the **Discover products** dialog box, click **Search for computers in the Active Directory** to display the search options, then click the search option you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general LDAP query.
|
||||||
- To search for computers in a workgroup, click **Search for computers in the workgroup**, then under **Workgroup Filter Criteria**, in the list of workgroup names click the name of the workgroup you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer within the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
- To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**, then under **Domain Filter Criteria**, in the list of domain names click the name of the domain you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer within the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
||||||
- To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box provided. VAMT will validate only the LDAP query syntax, but will otherwise run the query without further checks.
|
- To search by individual computer name or IP address, click **Manually enter name or IP address**, then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that VAMT supports both IPv4 and IPV6 addressing.
|
||||||
4. Click **Search**.
|
- To search for computers in a workgroup, click **Search for computers in the workgroup**, then under **Workgroup Filter Criteria**, in the list of workgroup names click the name of the workgroup you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer within the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
||||||
5. VAMT searches for the specified computers and adds them to the VAMT database. During the search, VAMT displays the **Finding computers** message shown below.
|
- To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box provided. VAMT will validate only the LDAP query syntax, but will otherwise run the query without further checks.
|
||||||
To cancel the search, click **Cancel**. When the search is complete the names of the newly-discovered computers appear in the product list view in the center pane.
|
4. Click **Search**.
|
||||||
|
5. VAMT searches for the specified computers and adds them to the VAMT database. During the search, VAMT displays the **Finding computers** message shown below.
|
||||||

|
To cancel the search, click **Cancel**. When the search is complete the names of the newly-discovered computers appear in the product list view in the center pane.
|
||||||
|
|
||||||
**Important**
|

|
||||||
This step adds only the computers to the VAMT database, and not the products that are installed on the computers. To add the products, you need to run the **Update license status** function.
|
|
||||||
|
**Important**
|
||||||
## To add products to VAMT
|
This step adds only the computers to the VAMT database, and not the products that are installed on the computers. To add the products, you need to run the **Update license status** function.
|
||||||
|
|
||||||
1. In the **Products** list, select the computers that need to have their product information added to the VAMT database.
|
## To add products to VAMT
|
||||||
2. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
|
||||||
3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
1. In the **Products** list, select the computers that need to have their product information added to the VAMT database.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
2. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
4. Click **Filter**. VAMT displays the filtered list in the center pane.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
5. In the right-side **Actions** pane, click **Update license status** and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials different from the ones you used to log into the computer. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**.
|
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
6. VAMT displays the **Collecting product information** dialog box while it collects the licensing status of all supported products on the selected computers. When the process is finished, the updated licensing status of each product will appear in the product list view in the center pane.
|
4. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||||
|
5. In the right-side **Actions** pane, click **Update license status** and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials different from the ones you used to log into the computer. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**.
|
||||||
**Note**
|
6. VAMT displays the **Collecting product information** dialog box while it collects the licensing status of all supported products on the selected computers. When the process is finished, the updated licensing status of each product will appear in the product list view in the center pane.
|
||||||
If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading.
|
|
||||||
|
**Note**
|
||||||
## To remove computers from a VAMT database
|
If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading.
|
||||||
|
|
||||||
You can delete a computer by clicking on it in the product list view, and then clicking **Delete** in the **Selected Item** menu in the right-hand pane. In the **Confirm Delete Selected Products** dialog box that appears, click **Yes** to delete the computer. If a computer has multiple products listed, you must delete each product to completely remove the computer from the VAMT database.
|
## To remove computers from a VAMT database
|
||||||
|
|
||||||
## Related topics
|
You can delete a computer by clicking on it in the product list view, and then clicking **Delete** in the **Selected Item** menu in the right-hand pane. In the **Confirm Delete Selected Products** dialog box that appears, click **Yes** to delete the computer. If a computer has multiple products listed, you must delete each product to completely remove the computer from the VAMT database.
|
||||||
|
|
||||||
- [Add and Manage Products](add-manage-products-vamt.md)
|
## Related topics
|
||||||
|
|
||||||
|
- [Add and Manage Products](add-manage-products-vamt.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,39 +1,41 @@
|
|||||||
---
|
---
|
||||||
title: Add and Remove a Product Key (Windows 10)
|
title: Add and Remove a Product Key (Windows 10)
|
||||||
description: Add and Remove a Product Key
|
description: In this article, you will learn about how to manage a product key in the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: feac32bb-fb96-4802-81b8-c69220dcfcce
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: feac32bb-fb96-4802-81b8-c69220dcfcce
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Add and Remove a Product Key
|
---
|
||||||
|
|
||||||
Before you can use a Multiple Activation Key (MAK), retail, or KMS Host key (CSVLK) product key, you must first add it to the Volume Activation Management Tool (VAMT) database.
|
# Add and Remove a Product Key
|
||||||
|
|
||||||
## To Add a Product Key
|
Before you can use a Multiple Activation Key (MAK), retail, or KMS Host key (CSVLK) product key, you must first add it to the Volume Activation Management Tool (VAMT) database.
|
||||||
|
|
||||||
1. Open VAMT.
|
## To Add a Product Key
|
||||||
2. In the left-side pane, right-click the **Product Keys** node to open the **Actions** menu.
|
|
||||||
3. Click **Add product keys** to open the **Add Product Keys** dialog box.
|
1. Open VAMT.
|
||||||
4. In the **Add Product Keys** dialog box, select from one of the following methods to add product keys:
|
2. In the left-side pane, right-click the **Product Keys** node to open the **Actions** menu.
|
||||||
- To add product keys manually, click **Enter product key(s) separated by line breaks**, enter one or more product keys separated by line breaks, and click **Add Key(s)**.
|
3. Click **Add product keys** to open the **Add Product Keys** dialog box.
|
||||||
- To import a Comma Separated Values (CSV) file containing a list of product keys, click **Select a product key file to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**.
|
4. In the **Add Product Keys** dialog box, select from one of the following methods to add product keys:
|
||||||
|
- To add product keys manually, click **Enter product key(s) separated by line breaks**, enter one or more product keys separated by line breaks, and click **Add Key(s)**.
|
||||||
**Note**
|
- To import a Comma Separated Values (CSV) file containing a list of product keys, click **Select a product key file to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**.
|
||||||
If you are activating a large number of products with a MAK, you should refresh the activation count of the MAK, to ensure that the MAK can support the required number of activations. In the product key list in the center pane, select the MAK and click **Refresh product key data online** in the right-side pane to contact Microsoft and retrieve the number of remaining activations for the MAK. This step requires Internet access. You can only retrieve the remaining activation count for MAKs.
|
|
||||||
|
**Note**
|
||||||
## Remove a Product Key
|
If you are activating a large number of products with a MAK, you should refresh the activation count of the MAK, to ensure that the MAK can support the required number of activations. In the product key list in the center pane, select the MAK and click **Refresh product key data online** in the right-side pane to contact Microsoft and retrieve the number of remaining activations for the MAK. This step requires Internet access. You can only retrieve the remaining activation count for MAKs.
|
||||||
|
|
||||||
- To remove a product key from the list, simply select the key in the list and click **Delete** on the **Selected Items** menu in the right-side pane. Click **Yes** to confirm deletion of the product key. Removing a product key from the VAMT database will not affect the activation state of any products or computers on the network.
|
## Remove a Product Key
|
||||||
|
|
||||||
## Related topics
|
- To remove a product key from the list, simply select the key in the list and click **Delete** on the **Selected Items** menu in the right-side pane. Click **Yes** to confirm deletion of the product key. Removing a product key from the VAMT database will not affect the activation state of any products or computers on the network.
|
||||||
|
|
||||||
- [Manage Product Keys](manage-product-keys-vamt.md)
|
## Related topics
|
||||||
|
|
||||||
|
- [Manage Product Keys](manage-product-keys-vamt.md)
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Configure Client Computers (Windows 10)
|
title: Configure Client Computers (Windows 10)
|
||||||
description: Configure Client Computers
|
description: In this article, you will learn how to configure client computers to enable Volume Activation Management Tool (VAMT) to function correctly.
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: a48176c9-b05c-4dd5-a9ef-83073e2370fc
|
ms.assetid: a48176c9-b05c-4dd5-a9ef-83073e2370fc
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,51 +1,53 @@
|
|||||||
---
|
---
|
||||||
title: Import and Export VAMT Data (Windows 10)
|
title: Import and Export VAMT Data (Windows 10)
|
||||||
description: Import and Export VAMT Data
|
description: In this article, you'll learn how to import and export data using the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: 09a2c595-1a61-4da6-bd46-4ba8763cfd4f
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 09a2c595-1a61-4da6-bd46-4ba8763cfd4f
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Import and Export VAMT Data
|
---
|
||||||
|
|
||||||
You can use the Volume Activation Management Tool (VAMT) to import product-activation data from a Computer Information List (.cilx or .cil) file into SQL Server, and to export product-activation data into a .cilx file. A .cilx file is an XML file that stores computer and product-activation data.
|
# Import and Export VAMT Data
|
||||||
You can import data or export data during the following scenarios:
|
|
||||||
- Import and merge data from previous versions of VAMT.
|
You can use the Volume Activation Management Tool (VAMT) to import product-activation data from a Computer Information List (.cilx or .cil) file into SQL Server, and to export product-activation data into a .cilx file. A .cilx file is an XML file that stores computer and product-activation data.
|
||||||
- Export data to use to perform proxy activations.
|
You can import data or export data during the following scenarios:
|
||||||
|
- Import and merge data from previous versions of VAMT.
|
||||||
**Warning**
|
- Export data to use to perform proxy activations.
|
||||||
Editing a .cilx file using an application other than VAMT can corrupt the .cilx file and is not supported.
|
|
||||||
|
**Warning**
|
||||||
## Import VAMT Data
|
Editing a .cilx file using an application other than VAMT can corrupt the .cilx file and is not supported.
|
||||||
|
|
||||||
**To import data into VAMT**
|
## Import VAMT Data
|
||||||
1. Open VAMT.
|
|
||||||
2. In the right-side **Actions** pane, click **Import list** to open the **Import List** dialog box.
|
**To import data into VAMT**
|
||||||
3. In the **Import List** dialog box, navigate to the .cilx file location, select the file, and click **Open**.
|
1. Open VAMT.
|
||||||
4. In the **Volume Activation Management Tool** dialog box, click **OK** to begin the import. VAMT displays a progress message while the file is being imported. Click **OK** when a message appears and confirms that the import has completed successfully.
|
2. In the right-side **Actions** pane, click **Import list** to open the **Import List** dialog box.
|
||||||
|
3. In the **Import List** dialog box, navigate to the .cilx file location, select the file, and click **Open**.
|
||||||
## Export VAMT Data
|
4. In the **Volume Activation Management Tool** dialog box, click **OK** to begin the import. VAMT displays a progress message while the file is being imported. Click **OK** when a message appears and confirms that the import has completed successfully.
|
||||||
|
|
||||||
Exporting VAMT data from a non-Internet-connected VAMT host computer is the first step of proxy activation using multiple VAMT hosts. To export product-activation data to a .cilx file:
|
## Export VAMT Data
|
||||||
1. In the left-side pane, you can click a product you want to export data for, or click **Products** if the list contains data for all products.
|
|
||||||
2. If you want to export only part of the data in a product list, in the product list view in the center pane select the products you want to export.
|
Exporting VAMT data from a non-Internet-connected VAMT host computer is the first step of proxy activation using multiple VAMT hosts. To export product-activation data to a .cilx file:
|
||||||
3. In the right-side **Actions** pane on, click **Export list** to open the **Export List** dialog box.
|
1. In the left-side pane, you can click a product you want to export data for, or click **Products** if the list contains data for all products.
|
||||||
4. In the **Export List** dialog box, click **Browse** to navigate to the .cilx file.
|
2. If you want to export only part of the data in a product list, in the product list view in the center pane select the products you want to export.
|
||||||
5. Under **Export options**, select one of the following data-type options:
|
3. In the right-side **Actions** pane on, click **Export list** to open the **Export List** dialog box.
|
||||||
- Export products and product keys
|
4. In the **Export List** dialog box, click **Browse** to navigate to the .cilx file.
|
||||||
- Export products only
|
5. Under **Export options**, select one of the following data-type options:
|
||||||
- Export proxy activation data only. Selecting this option ensures that the export contains only the licensing information required for the proxy web service to obtain CIDs from Microsoft. No Personally Identifiable Information (PII) is contained in the exported .cilx file when this selection is checked.
|
- Export products and product keys
|
||||||
6. If you have selected products to export, select the **Export selected product rows only** check box.
|
- Export products only
|
||||||
7. Click **Save**. VAMT displays a progress message while the data is being exported. Click **OK** when a message appears and confirms that the export has completed successfully.
|
- Export proxy activation data only. Selecting this option ensures that the export contains only the licensing information required for the proxy web service to obtain CIDs from Microsoft. No Personally Identifiable Information (PII) is contained in the exported .cilx file when this selection is checked.
|
||||||
|
6. If you have selected products to export, select the **Export selected product rows only** check box.
|
||||||
## Related topics
|
7. Click **Save**. VAMT displays a progress message while the data is being exported. Click **OK** when a message appears and confirms that the export has completed successfully.
|
||||||
|
|
||||||
- [Perform Proxy Activation](proxy-activation-vamt.md)
|
## Related topics
|
||||||
|
|
||||||
|
- [Perform Proxy Activation](proxy-activation-vamt.md)
|
||||||
|
@ -1,34 +1,36 @@
|
|||||||
---
|
---
|
||||||
title: Install and Configure VAMT (Windows 10)
|
title: Install and Configure VAMT (Windows 10)
|
||||||
description: Install and Configure VAMT
|
description: In this article, you'll learn how to install and configure the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: 5c7ae9b9-0dbc-4277-bc4f-8b3e4ab0bf50
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 5c7ae9b9-0dbc-4277-bc4f-8b3e4ab0bf50
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.localizationpriority: medium
|
audience: itpro
|
||||||
ms.date: 07/27/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.localizationpriority: medium
|
||||||
---
|
ms.date: 07/27/2017
|
||||||
|
ms.topic: article
|
||||||
# Install and Configure VAMT
|
---
|
||||||
|
|
||||||
This section describes how to install and configure the Volume Activation Management Tool (VAMT).
|
# Install and Configure VAMT
|
||||||
|
|
||||||
## In this Section
|
This section describes how to install and configure the Volume Activation Management Tool (VAMT).
|
||||||
|
|
||||||
|Topic |Description |
|
## In this Section
|
||||||
|------|------------|
|
|
||||||
|[VAMT Requirements](vamt-requirements.md) |Provides system requirements for installing VAMT on a host computer. |
|
|Topic |Description |
|
||||||
|[Install VAMT](install-vamt.md) |Describes how to get and install VAMT. |
|
|------|------------|
|
||||||
|[Configure Client Computers](configure-client-computers-vamt.md) |Describes how to configure client computers on your network to work with VAMT. |
|
|[VAMT Requirements](vamt-requirements.md) |Provides system requirements for installing VAMT on a host computer. |
|
||||||
|
|[Install VAMT](install-vamt.md) |Describes how to get and install VAMT. |
|
||||||
## Related topics
|
|[Configure Client Computers](configure-client-computers-vamt.md) |Describes how to configure client computers on your network to work with VAMT. |
|
||||||
|
|
||||||
- [Introduction to VAMT](introduction-vamt.md)
|
## Related topics
|
||||||
|
|
||||||
|
- [Introduction to VAMT](introduction-vamt.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,43 +1,45 @@
|
|||||||
---
|
---
|
||||||
title: Install a KMS Client Key (Windows 10)
|
title: Install a KMS Client Key (Windows 10)
|
||||||
description: Install a KMS Client Key
|
description: Learn how to use the Volume Activation Management Tool (VAMT) to install Generic Volume License Key (GVLK), or KMS client, product keys.
|
||||||
ms.assetid: d234468e-7917-4cf5-b0a8-4968454f7759
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: d234468e-7917-4cf5-b0a8-4968454f7759
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.localizationpriority: medium
|
audience: itpro
|
||||||
ms.date: 07/27/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.localizationpriority: medium
|
||||||
---
|
ms.date: 07/27/2017
|
||||||
|
ms.topic: article
|
||||||
# Install a KMS Client Key
|
---
|
||||||
|
|
||||||
You can use the Volume Activation Management Tool (VAMT) to install Generic Volume License Key (GVLK), or KMS client, product keys. For example, if you are converting a MAK-activated product to KMS activation.
|
# Install a KMS Client Key
|
||||||
|
|
||||||
**Note**
|
You can use the Volume Activation Management Tool (VAMT) to install Generic Volume License Key (GVLK), or KMS client, product keys. For example, if you are converting a MAK-activated product to KMS activation.
|
||||||
By default, volume license editions of Windows Vista, Windows® 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. GVLKs are already installed in volume license editions of these products.
|
|
||||||
|
**Note**
|
||||||
**To install a KMS Client key**
|
By default, volume license editions of Windows Vista, Windows® 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. GVLKs are already installed in volume license editions of these products.
|
||||||
1. Open VAMT.
|
|
||||||
2. In the left-side pane click **Products** to open the product list view in the center pane.
|
**To install a KMS Client key**
|
||||||
3. In the products list view in the center pane, select the products that need to have GVLKs installed. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
1. Open VAMT.
|
||||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
2. In the left-side pane click **Products** to open the product list view in the center pane.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
3. In the products list view in the center pane, select the products that need to have GVLKs installed. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
5. Click **Filter**. VAMT displays the filtered list in the center pane.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
6. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
7. The **Install Product Key** dialog box displays the keys that are available to be installed.
|
5. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||||
8. Select the **Automatically select an AD or KMS client key** option and then click **Install Key**.
|
6. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
||||||
|
7. The **Install Product Key** dialog box displays the keys that are available to be installed.
|
||||||
VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
8. Select the **Automatically select an AD or KMS client key** option and then click **Install Key**.
|
||||||
|
|
||||||
The same status is shown under the **Status of Last Action** column in the product list view in the center pane.
|
VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||||
|
|
||||||
## Related topics
|
The same status is shown under the **Status of Last Action** column in the product list view in the center pane.
|
||||||
|
|
||||||
- [Perform KMS Activation](kms-activation-vamt.md)
|
## Related topics
|
||||||
|
|
||||||
|
- [Perform KMS Activation](kms-activation-vamt.md)
|
||||||
|
@ -1,45 +1,47 @@
|
|||||||
---
|
---
|
||||||
title: Install a Product Key (Windows 10)
|
title: Install a Product Key (Windows 10)
|
||||||
description: Install a Product Key
|
description: Learn how to use the Volume Activation Management Tool (VAMT) to install retail, Multiple Activation Key (MAK), and KMS Host key (CSVLK).
|
||||||
ms.assetid: 78812c87-2208-4f8b-9c2c-5a8a18b2d648
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 78812c87-2208-4f8b-9c2c-5a8a18b2d648
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.localizationpriority: medium
|
audience: itpro
|
||||||
ms.date: 07/27/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.localizationpriority: medium
|
||||||
---
|
ms.date: 07/27/2017
|
||||||
|
ms.topic: article
|
||||||
# Install a Product Key
|
---
|
||||||
|
|
||||||
You can use the Volume Activation Management Tool (VAMT) to install retail, Multiple Activation Key (MAK), and KMS Host key (CSVLK).
|
# Install a Product Key
|
||||||
|
|
||||||
**To install a Product key**
|
You can use the Volume Activation Management Tool (VAMT) to install retail, Multiple Activation Key (MAK), and KMS Host key (CSVLK).
|
||||||
1. Open VAMT.
|
|
||||||
2. In the left-side pane, click the product that you want to install keys onto.
|
**To install a Product key**
|
||||||
3. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
1. Open VAMT.
|
||||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
2. In the left-side pane, click the product that you want to install keys onto.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
3. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
5. Click **Filter**.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
6. In the products list view in the center pane, sort the list if needed and then select the products that need to have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
7. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
5. Click **Filter**.
|
||||||
8. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAK based on the selected products. You can select a recommended product key or a product key from the **All Product Keys** list. Use the scroll bar if you need to view the **Description** for each key. When you have selected the product key you want to install, click **Install Key**. Note that only one key can be installed at a time.
|
6. In the products list view in the center pane, sort the list if needed and then select the products that need to have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
||||||
9. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
7. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
||||||
|
8. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAK based on the selected products. You can select a recommended product key or a product key from the **All Product Keys** list. Use the scroll bar if you need to view the **Description** for each key. When you have selected the product key you want to install, click **Install Key**. Note that only one key can be installed at a time.
|
||||||
The same status is shown under the **Status of Last Action** column in the product list view in the center pane.
|
9. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||||
|
|
||||||
**Note**
|
The same status is shown under the **Status of Last Action** column in the product list view in the center pane.
|
||||||
Product key installation will fail if VAMT finds mismatched key types or editions. VAMT will display the failure status and will continue the installation for the next product in the list. For more information on choosing the correct MAK or KMS Host key (CSVLK), see [How to Choose the Right
|
|
||||||
Volume License Key for Windows](https://go.microsoft.com/fwlink/p/?linkid=238382).
|
**Note**
|
||||||
|
Product key installation will fail if VAMT finds mismatched key types or editions. VAMT will display the failure status and will continue the installation for the next product in the list. For more information on choosing the correct MAK or KMS Host key (CSVLK), see [How to Choose the Right
|
||||||
## Related topics
|
Volume License Key for Windows](https://go.microsoft.com/fwlink/p/?linkid=238382).
|
||||||
|
|
||||||
- [Manage Product Keys](manage-product-keys-vamt.md)
|
## Related topics
|
||||||
|
|
||||||
|
- [Manage Product Keys](manage-product-keys-vamt.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Install VAMT (Windows 10)
|
title: Install VAMT (Windows 10)
|
||||||
description: Install VAMT
|
description: This article is a guide to help you learn how to install the Volume Activation Management Tool (VAMT).
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: 2eabd3e2-0a68-43a5-8189-2947e46482fc
|
ms.assetid: 2eabd3e2-0a68-43a5-8189-2947e46482fc
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,66 +1,68 @@
|
|||||||
---
|
---
|
||||||
title: Introduction to VAMT (Windows 10)
|
title: Introduction to VAMT (Windows 10)
|
||||||
description: Introduction to VAMT
|
description: Learn about VAMT that enables network administrators & other IT professionals to automate and manage the volume & retail activation process for windows & other Microsoft products.
|
||||||
ms.assetid: 0439685e-0bae-4967-b0d4-dd84ca6d7fa7
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 0439685e-0bae-4967-b0d4-dd84ca6d7fa7
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Introduction to VAMT
|
---
|
||||||
|
|
||||||
The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office®, and select other Microsoft products volume and retail activation process. VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in and can be installed on any computer that has one of the following Windows operating systems: Windows® 7, Windows 8, Windows 8.1, Windows 10,Windows Server 2008 R2, or Windows Server 2012.
|
# Introduction to VAMT
|
||||||
|
|
||||||
**Note**
|
The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office®, and select other Microsoft products volume and retail activation process. VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in and can be installed on any computer that has one of the following Windows operating systems: Windows® 7, Windows 8, Windows 8.1, Windows 10,Windows Server 2008 R2, or Windows Server 2012.
|
||||||
VAMT can be installed on, and can manage, physical or virtual instances. VAMT cannot detect whether or not the remote products are virtual. As long as the products can respond to Windows Management Instrumentation (WMI) calls, they will be discovered and activated.
|
|
||||||
|
**Note**
|
||||||
## In this Topic
|
VAMT can be installed on, and can manage, physical or virtual instances. VAMT cannot detect whether or not the remote products are virtual. As long as the products can respond to Windows Management Instrumentation (WMI) calls, they will be discovered and activated.
|
||||||
- [Managing Multiple Activation Key (MAK) and Retail Activation](#bkmk-managingmak)
|
|
||||||
- [Managing Key Management Service (KMS) Activation](#bkmk-managingkms)
|
## In this Topic
|
||||||
- [Enterprise Environment](#bkmk-enterpriseenvironment)
|
- [Managing Multiple Activation Key (MAK) and Retail Activation](#bkmk-managingmak)
|
||||||
- [VAMT User Interface](#bkmk-userinterface)
|
- [Managing Key Management Service (KMS) Activation](#bkmk-managingkms)
|
||||||
|
- [Enterprise Environment](#bkmk-enterpriseenvironment)
|
||||||
## <a href="" id="bkmk-managingmak"></a>Managing Multiple Activation Key (MAK) and Retail Activation
|
- [VAMT User Interface](#bkmk-userinterface)
|
||||||
|
|
||||||
You can use a MAK or a retail product key to activate Windows, Windows Server, or Office on an individual computer or a group of computers. VAMT enables two different activation scenarios:
|
## <a href="" id="bkmk-managingmak"></a>Managing Multiple Activation Key (MAK) and Retail Activation
|
||||||
- **Online activation.** Many enterprises maintain a single Windows system image or Office installation package for deployment across the enterprise. Occasionally there is also a need to use retail product keys in special situations. Online activation enables you to activate over the Internet any products installed with MAK, KMS host, or retail product keys on one or more connected computers within a network. This process requires that each product communicate activation information directly to Microsoft.
|
|
||||||
- **Proxy activation.** This activation method enables you to perform volume activation for products installed on client computers that do not have Internet access. The VAMT host computer distributes a MAK, KMS Host key (CSVLK), or retail product key to one or more client products and collects the installation ID (IID) from each client product. The VAMT host sends the IIDs to Microsoft on behalf of the client products and obtains the corresponding Confirmation IDs (CIDs). The VAMT host then installs the CIDs on the client products to complete the activation. Using this method, only the VAMT host computer needs Internet access. You can also activate products installed on computers in a workgroup that is completely isolated from any larger network, by installing a second instance of VAMT on a computer within the workgroup. Then, use removable media to transfer activation data between this new instance of VAMT and the Internet-connected VAMT host.
|
You can use a MAK or a retail product key to activate Windows, Windows Server, or Office on an individual computer or a group of computers. VAMT enables two different activation scenarios:
|
||||||
|
- **Online activation.** Many enterprises maintain a single Windows system image or Office installation package for deployment across the enterprise. Occasionally there is also a need to use retail product keys in special situations. Online activation enables you to activate over the Internet any products installed with MAK, KMS host, or retail product keys on one or more connected computers within a network. This process requires that each product communicate activation information directly to Microsoft.
|
||||||
## <a href="" id="bkmk-managingkms"></a>Managing Key Management Service (KMS) Activation
|
- **Proxy activation.** This activation method enables you to perform volume activation for products installed on client computers that do not have Internet access. The VAMT host computer distributes a MAK, KMS Host key (CSVLK), or retail product key to one or more client products and collects the installation ID (IID) from each client product. The VAMT host sends the IIDs to Microsoft on behalf of the client products and obtains the corresponding Confirmation IDs (CIDs). The VAMT host then installs the CIDs on the client products to complete the activation. Using this method, only the VAMT host computer needs Internet access. You can also activate products installed on computers in a workgroup that is completely isolated from any larger network, by installing a second instance of VAMT on a computer within the workgroup. Then, use removable media to transfer activation data between this new instance of VAMT and the Internet-connected VAMT host.
|
||||||
|
|
||||||
In addition to MAK or retail activation, you can use VAMT to perform volume activation using the Key Management Service (KMS). VAMT can install and activate GVLK (KMS client) keys on client products. GVLKs are the default product keys used by Volume License editions of Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 as well as Microsoft Office 2010.
|
## <a href="" id="bkmk-managingkms"></a>Managing Key Management Service (KMS) Activation
|
||||||
VAMT treats a KMS Host key (CSVLK) product key identically to a retail-type product key; therefore, the experience for product key entry and activation management are identical for both these product key types.
|
|
||||||
|
In addition to MAK or retail activation, you can use VAMT to perform volume activation using the Key Management Service (KMS). VAMT can install and activate GVLK (KMS client) keys on client products. GVLKs are the default product keys used by Volume License editions of Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 as well as Microsoft Office 2010.
|
||||||
## <a href="" id="bkmk-enterpriseenvironment"></a>Enterprise Environment
|
VAMT treats a KMS Host key (CSVLK) product key identically to a retail-type product key; therefore, the experience for product key entry and activation management are identical for both these product key types.
|
||||||
|
|
||||||
VAMT is commonly implemented in enterprise environments. The following illustrates three common environments—Core Network, Secure Zone, and Isolated Lab.
|
## <a href="" id="bkmk-enterpriseenvironment"></a>Enterprise Environment
|
||||||
|
|
||||||

|
VAMT is commonly implemented in enterprise environments. The following illustrates three common environments—Core Network, Secure Zone, and Isolated Lab.
|
||||||
|
|
||||||
In the Core Network environment, all computers are within a common network managed by Active Directory® Domain Services (AD DS). The Secure Zone represents higher-security Core Network computers that have additional firewall protection.
|

|
||||||
The Isolated Lab environment is a workgroup that is physically separate from the Core Network, and its computers do not have Internet access. The network security policy states that no information that could identify a specific computer or user may be transferred out of the Isolated Lab.
|
|
||||||
|
In the Core Network environment, all computers are within a common network managed by Active Directory® Domain Services (AD DS). The Secure Zone represents higher-security Core Network computers that have additional firewall protection.
|
||||||
## <a href="" id="bkmk-userinterface"></a>VAMT User Interface
|
The Isolated Lab environment is a workgroup that is physically separate from the Core Network, and its computers do not have Internet access. The network security policy states that no information that could identify a specific computer or user may be transferred out of the Isolated Lab.
|
||||||
|
|
||||||
The following screenshot shows the VAMT graphical user interface.
|
## <a href="" id="bkmk-userinterface"></a>VAMT User Interface
|
||||||
|
|
||||||

|
The following screenshot shows the VAMT graphical user interface.
|
||||||
|
|
||||||
VAMT provides a single, graphical user interface for managing activations, and for performing other activation-related tasks such as:
|

|
||||||
- **Adding and removing computers.** You can use VAMT to discover computers in the local environment. VAMT can discover computers by querying AD DS, workgroups, by individual computer name or IP address, or via a general LDAP query.
|
|
||||||
- **Discovering products.** You can use VAMT to discover Windows, Windows Server, Office, and select other products installed on the client computers.
|
VAMT provides a single, graphical user interface for managing activations, and for performing other activation-related tasks such as:
|
||||||
- **Monitoring activation status.** You can collect activation information about each product, including the last 5 characters of the product key being used, the current license state (such as Licensed, Grace, Unlicensed), and the product edition information.
|
- **Adding and removing computers.** You can use VAMT to discover computers in the local environment. VAMT can discover computers by querying AD DS, workgroups, by individual computer name or IP address, or via a general LDAP query.
|
||||||
- **Managing product keys.** You can store multiple product keys and use VAMT to install these keys to remote client products. You can also determine the number of activations remaining for MAKs.
|
- **Discovering products.** You can use VAMT to discover Windows, Windows Server, Office, and select other products installed on the client computers.
|
||||||
- **Managing activation data.** VAMT stores activation data in a SQL database. VAMT can export this data to other VAMT hosts or to an archive in XML format.
|
- **Monitoring activation status.** You can collect activation information about each product, including the last 5 characters of the product key being used, the current license state (such as Licensed, Grace, Unlicensed), and the product edition information.
|
||||||
|
- **Managing product keys.** You can store multiple product keys and use VAMT to install these keys to remote client products. You can also determine the number of activations remaining for MAKs.
|
||||||
## Related topics
|
- **Managing activation data.** VAMT stores activation data in a SQL database. VAMT can export this data to other VAMT hosts or to an archive in XML format.
|
||||||
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
|
||||||
|
## Related topics
|
||||||
|
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,49 +1,51 @@
|
|||||||
---
|
---
|
||||||
title: Perform KMS Activation (Windows 10)
|
title: Perform KMS Activation (Windows 10)
|
||||||
description: Perform KMS Activation
|
description: In this article, you will learn how to configure devices to perform volume activation using the Key Management Service (KMS).
|
||||||
ms.assetid: 5a3ae8e6-083e-4153-837e-ab0a225c1d10
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 5a3ae8e6-083e-4153-837e-ab0a225c1d10
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Perform KMS Activation
|
---
|
||||||
|
|
||||||
The Volume Activation Management Tool (VAMT) can be used to perform volume activation using the Key Management Service (KMS). You can use VAMT to activate Generic Volume Licensing Keys, or KMS client keys, on products accessible to VAMT. GVLKs are the default product keys used by the volume-license editions of Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft Office 2010. GVLKs are already installed in volume-license editions of these products.
|
# Perform KMS Activation
|
||||||
|
|
||||||
## Requirements
|
The Volume Activation Management Tool (VAMT) can be used to perform volume activation using the Key Management Service (KMS). You can use VAMT to activate Generic Volume Licensing Keys, or KMS client keys, on products accessible to VAMT. GVLKs are the default product keys used by the volume-license editions of Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft Office 2010. GVLKs are already installed in volume-license editions of these products.
|
||||||
|
|
||||||
Before configuring KMS activation, ensure that your network and VAMT installation meet the following requirements:
|
## Requirements
|
||||||
- KMS host is set up and enabled.
|
|
||||||
- KMS clients can access the KMS host.
|
Before configuring KMS activation, ensure that your network and VAMT installation meet the following requirements:
|
||||||
- VAMT is installed on a central computer with network access to all client computers.
|
- KMS host is set up and enabled.
|
||||||
- The products to be activated have been added to VAMT. For more information on adding product keys, see [Install a KMS Client Key](install-kms-client-key-vamt.md).
|
- KMS clients can access the KMS host.
|
||||||
- VAMT has administrative permissions on all computers to be activated, and Windows Management Instrumentation (WMI) is accessible through the Windows Firewall. For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
- VAMT is installed on a central computer with network access to all client computers.
|
||||||
|
- The products to be activated have been added to VAMT. For more information on adding product keys, see [Install a KMS Client Key](install-kms-client-key-vamt.md).
|
||||||
## To configure devices for KMS activation
|
- VAMT has administrative permissions on all computers to be activated, and Windows Management Instrumentation (WMI) is accessible through the Windows Firewall. For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||||
|
|
||||||
**To configure devices for KMS activation**
|
## To configure devices for KMS activation
|
||||||
1. Open VAMT.
|
|
||||||
2. If necessary, set up the KMS activation preferences. If you don’t need to set up the preferences, skip to step 6 in this procedure. Otherwise, continue to step 2.
|
**To configure devices for KMS activation**
|
||||||
3. To set up the preferences, on the menu bar click **View**, then click **Preferences** to open the **Volume Activation Management Tool Preferences** dialog box.
|
1. Open VAMT.
|
||||||
4. Under **Key Management Services host selection**, select one of the following options:
|
2. If necessary, set up the KMS activation preferences. If you don’t need to set up the preferences, skip to step 6 in this procedure. Otherwise, continue to step 2.
|
||||||
- **Find a KMS host automatically using DNS (default)**. If you choose this option, VAMT first clears any previously configured KMS host on the target computer and instructs the computer to query the Domain Name Service (DNS) to locate a KMS host and attempt activation.
|
3. To set up the preferences, on the menu bar click **View**, then click **Preferences** to open the **Volume Activation Management Tool Preferences** dialog box.
|
||||||
- **Find a KMS host using DNS in this domain for supported products**. Enter the domain name. If you choose this option, VAMT first clears any previously configured KMS host on the target computer and instructs the computer to query the DNS in the specified domain to locate a KMS host and attempt activation.
|
4. Under **Key Management Services host selection**, select one of the following options:
|
||||||
- **Use specific KMS host**. Enter the KMS host name and KMS host port. For environments which do not use DNS for KMS host identification, VAMT sets the specified KMS host name and KMS host port on the target computer, and then instructs the computer to attempt activation with the specific KMS host.
|
- **Find a KMS host automatically using DNS (default)**. If you choose this option, VAMT first clears any previously configured KMS host on the target computer and instructs the computer to query the Domain Name Service (DNS) to locate a KMS host and attempt activation.
|
||||||
5. Click **Apply**, and then click **OK** to close the **Volume Activation Management Tool Preferences** dialog box.
|
- **Find a KMS host using DNS in this domain for supported products**. Enter the domain name. If you choose this option, VAMT first clears any previously configured KMS host on the target computer and instructs the computer to query the DNS in the specified domain to locate a KMS host and attempt activation.
|
||||||
6. Select the products to be activated by selecting individual products in the product list view in the center pane. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
- **Use specific KMS host**. Enter the KMS host name and KMS host port. For environments which do not use DNS for KMS host identification, VAMT sets the specified KMS host name and KMS host port on the target computer, and then instructs the computer to attempt activation with the specific KMS host.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
5. Click **Apply**, and then click **OK** to close the **Volume Activation Management Tool Preferences** dialog box.
|
||||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
6. Select the products to be activated by selecting individual products in the product list view in the center pane. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
7. Click **Filter**. VAMT displays the filtered list in the center pane.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
8. In the right-side pane, click **Activate** in the **Selected Items** menu, and then click **Volume activate**.
|
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
9. Click a credential option. Choose **Alternate credentials** only if you are activating products that require administrator credentials different from the ones you are currently using.
|
7. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||||
10. If you are supplying alternate credentials, at the prompt, type the appropriate user name and password and click **OK**.
|
8. In the right-side pane, click **Activate** in the **Selected Items** menu, and then click **Volume activate**.
|
||||||
VAMT displays the **Volume Activation** dialog box until it completes the requested action. When the process is finished, the updated activation status of each product appears in the product list view in the center pane.
|
9. Click a credential option. Choose **Alternate credentials** only if you are activating products that require administrator credentials different from the ones you are currently using.
|
||||||
|
10. If you are supplying alternate credentials, at the prompt, type the appropriate user name and password and click **OK**.
|
||||||
|
VAMT displays the **Volume Activation** dialog box until it completes the requested action. When the process is finished, the updated activation status of each product appears in the product list view in the center pane.
|
||||||
|
|
||||||
|
@ -1,47 +1,49 @@
|
|||||||
---
|
---
|
||||||
title: Perform Local Reactivation (Windows 10)
|
title: Perform Local Reactivation (Windows 10)
|
||||||
description: Perform Local Reactivation
|
description: In this article, you will learn how to perform local reactivation using the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: aacd5ded-da11-4d27-a866-3f57332f5dec
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: aacd5ded-da11-4d27-a866-3f57332f5dec
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Perform Local Reactivation
|
---
|
||||||
|
|
||||||
If you reinstall Windows® or Microsoft® Office 2010 on a computer that was initially activated using proxy activation (MAK, retail, or CSLVK (KMS host)), and have not made significant changes to the hardware, use this local reactivation procedure to reactivate the program on that computer.
|
# Perform Local Reactivation
|
||||||
Local reactivation relies upon data that was created during the initial proxy activation and stored in the Volume Activation Management Tool (VAMT) database. The database contains the installation ID (IID) and confirmation ID (Pending CID). Local reactivation uses this data to reapply the CID and reactivate those products. Reapplying the same CID conserves the remaining activations on the key.
|
|
||||||
|
If you reinstall Windows® or Microsoft® Office 2010 on a computer that was initially activated using proxy activation (MAK, retail, or CSLVK (KMS host)), and have not made significant changes to the hardware, use this local reactivation procedure to reactivate the program on that computer.
|
||||||
**Note**
|
Local reactivation relies upon data that was created during the initial proxy activation and stored in the Volume Activation Management Tool (VAMT) database. The database contains the installation ID (IID) and confirmation ID (Pending CID). Local reactivation uses this data to reapply the CID and reactivate those products. Reapplying the same CID conserves the remaining activations on the key.
|
||||||
During the initial proxy activation, the CID is bound to a digital “fingerprint”, which is calculated from values assigned to several different hardware components in the computer. If the computer has had significant hardware changes, this fingerprint will no longer match the CID. In this case, you must obtain a new CID for the computer from Microsoft.
|
|
||||||
|
**Note**
|
||||||
## To Perform a Local Reactivation
|
During the initial proxy activation, the CID is bound to a digital “fingerprint”, which is calculated from values assigned to several different hardware components in the computer. If the computer has had significant hardware changes, this fingerprint will no longer match the CID. In this case, you must obtain a new CID for the computer from Microsoft.
|
||||||
|
|
||||||
**To perform a local reactivation**
|
## To Perform a Local Reactivation
|
||||||
1. Open VAMT. Make sure that you are connected to the desired database.
|
|
||||||
2. In the left-side pane, click the product you want to reactivate to display the products list.
|
**To perform a local reactivation**
|
||||||
3. In the product list view in the center pane, select the desired products to be reactivated. You can sort the list by computer name by clicking on the **Computer Name** heading. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
1. Open VAMT. Make sure that you are connected to the desired database.
|
||||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
2. In the left-side pane, click the product you want to reactivate to display the products list.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
3. In the product list view in the center pane, select the desired products to be reactivated. You can sort the list by computer name by clicking on the **Computer Name** heading. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
5. Click **Filter**. VAMT displays the filtered list in the center pane.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
6. In the right-side pane, click **Activate**, and then click **Apply Confirmation ID**.
|
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
7. Click a credential option. Choose **Alternate credentials** only if you are reactivating products that require administrator credentials different from the ones you are currently using.
|
5. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||||
8. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**.
|
6. In the right-side pane, click **Activate**, and then click **Apply Confirmation ID**.
|
||||||
|
7. Click a credential option. Choose **Alternate credentials** only if you are reactivating products that require administrator credentials different from the ones you are currently using.
|
||||||
VAMT displays the **Apply Confirmation ID** dialog box.
|
8. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**.
|
||||||
|
|
||||||
10. If you are using a different product key than the product key used for initial activation, you must complete a new activation to obtain a new CID.
|
VAMT displays the **Apply Confirmation ID** dialog box.
|
||||||
11. If you are activating a product that requires administrator credentials different from the ones you are currently using, select the **Use Alternate Credentials** check box.
|
|
||||||
12. Click **OK**.
|
10. If you are using a different product key than the product key used for initial activation, you must complete a new activation to obtain a new CID.
|
||||||
|
11. If you are activating a product that requires administrator credentials different from the ones you are currently using, select the **Use Alternate Credentials** check box.
|
||||||
## Related topics
|
12. Click **OK**.
|
||||||
|
|
||||||
- [Manage Activations](manage-activations-vamt.md)
|
## Related topics
|
||||||
|
|
||||||
|
- [Manage Activations](manage-activations-vamt.md)
|
||||||
|
@ -1,33 +1,35 @@
|
|||||||
---
|
---
|
||||||
title: Manage Activations (Windows 10)
|
title: Manage Activations (Windows 10)
|
||||||
description: Manage Activations
|
description: This article contains a list of topics that can help you with activating a client computer, by using a variety of activation methods.
|
||||||
ms.assetid: 53bad9ed-9430-4f64-a8de-80613870862c
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 53bad9ed-9430-4f64-a8de-80613870862c
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Manage Activations
|
---
|
||||||
|
|
||||||
This section describes how to activate a client computer, by using a variety of activation methods.
|
# Manage Activations
|
||||||
|
|
||||||
## In this Section
|
This section describes how to activate a client computer, by using a variety of activation methods.
|
||||||
|
|
||||||
|Topic |Description |
|
## In this Section
|
||||||
|------|------------|
|
|
||||||
|[Perform Online Activation](online-activation-vamt.md) |Describes how to activate a client computer over the Internet. |
|
|Topic |Description |
|
||||||
|[Perform Proxy Activation](proxy-activation-vamt.md) |Describes how to perform volume activation for client products that do not have Internet access. |
|
|------|------------|
|
||||||
|[Perform KMS Activation](kms-activation-vamt.md) |Describes how perform volume activation using the Key Management Service (KMS). |
|
|[Perform Online Activation](online-activation-vamt.md) |Describes how to activate a client computer over the Internet. |
|
||||||
|[Perform Local Reactivation](local-reactivation-vamt.md) |Describes how to reactivate an operating system or Office program that was reinstalled. |
|
|[Perform Proxy Activation](proxy-activation-vamt.md) |Describes how to perform volume activation for client products that do not have Internet access. |
|
||||||
|[Activate an Active Directory Forest Online](activate-forest-vamt.md) |Describes how to use Active Directory-Based Activation to online activate an Active Directory forest. |
|
|[Perform KMS Activation](kms-activation-vamt.md) |Describes how perform volume activation using the Key Management Service (KMS). |
|
||||||
|[Activate by Proxy an Active Directory Forest](activate-forest-by-proxy-vamt.md) |Describes how to use Active Directory-Based Activation to proxy activate an Active Directory forest that is not connected to the Internet. |
|
|[Perform Local Reactivation](local-reactivation-vamt.md) |Describes how to reactivate an operating system or Office program that was reinstalled. |
|
||||||
|
|[Activate an Active Directory Forest Online](activate-forest-vamt.md) |Describes how to use Active Directory-Based Activation to online activate an Active Directory forest. |
|
||||||
|
|[Activate by Proxy an Active Directory Forest](activate-forest-by-proxy-vamt.md) |Describes how to use Active Directory-Based Activation to proxy activate an Active Directory forest that is not connected to the Internet. |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,29 +1,31 @@
|
|||||||
---
|
---
|
||||||
title: Manage Product Keys (Windows 10)
|
title: Manage Product Keys (Windows 10)
|
||||||
description: Manage Product Keys
|
description: In this article, you will learn how to manage product keys from the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: 4c6c4216-b4b7-437c-904e-4cb257f913cd
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 4c6c4216-b4b7-437c-904e-4cb257f913cd
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Manage Product Keys
|
---
|
||||||
|
|
||||||
This section describes how to add and remove a product key from the Volume Activation Management Tool (VAMT). After you add a product key to VAMT, you can install that product key on a product or products you select in the VAMT database.
|
# Manage Product Keys
|
||||||
## In this Section
|
|
||||||
|
This section describes how to add and remove a product key from the Volume Activation Management Tool (VAMT). After you add a product key to VAMT, you can install that product key on a product or products you select in the VAMT database.
|
||||||
|Topic |Description |
|
## In this Section
|
||||||
|------|------------|
|
|
||||||
|[Add and Remove a Product Key](add-remove-product-key-vamt.md) |Describes how to add a product key to the VAMT database. |
|
|Topic |Description |
|
||||||
|[Install a Product Key](install-product-key-vamt.md) |Describes how to install a product key for specific product. |
|
|------|------------|
|
||||||
|[Install a KMS Client Key](install-kms-client-key-vamt.md) |Describes how to install a GVLK (KMS client) key. |
|
|[Add and Remove a Product Key](add-remove-product-key-vamt.md) |Describes how to add a product key to the VAMT database. |
|
||||||
|
|[Install a Product Key](install-product-key-vamt.md) |Describes how to install a product key for specific product. |
|
||||||
|
|[Install a KMS Client Key](install-kms-client-key-vamt.md) |Describes how to install a GVLK (KMS client) key. |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,25 +1,27 @@
|
|||||||
---
|
---
|
||||||
title: Manage VAMT Data (Windows 10)
|
title: Manage VAMT Data (Windows 10)
|
||||||
description: Manage VAMT Data
|
description: This article contains a list of topics that can help you with managing data in the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: 233eefa4-3125-4965-a12d-297a67079dc4
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 233eefa4-3125-4965-a12d-297a67079dc4
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Manage VAMT Data
|
---
|
||||||
|
|
||||||
This section describes how to save, import, export, and merge a Computer Information List (CILX) file using the Volume Activation Management Tool (VAMT).
|
# Manage VAMT Data
|
||||||
|
|
||||||
## In this Section
|
This section describes how to save, import, export, and merge a Computer Information List (CILX) file using the Volume Activation Management Tool (VAMT).
|
||||||
|Topic |Description |
|
|
||||||
|------|------------|
|
## In this Section
|
||||||
|[Import and Export VAMT Data](import-export-vamt-data.md) |Describes how to import and export VAMT data. |
|
|Topic |Description |
|
||||||
|[Use VAMT in Windows PowerShell](use-vamt-in-windows-powershell.md) |Describes how to access Windows PowerShell and how to import the VAMT PowerShell module. |
|
|------|------------|
|
||||||
|
|[Import and Export VAMT Data](import-export-vamt-data.md) |Describes how to import and export VAMT data. |
|
||||||
|
|[Use VAMT in Windows PowerShell](use-vamt-in-windows-powershell.md) |Describes how to access Windows PowerShell and how to import the VAMT PowerShell module. |
|
||||||
|
@ -1,55 +1,57 @@
|
|||||||
---
|
---
|
||||||
title: Perform Online Activation (Windows 10)
|
title: Perform Online Activation (Windows 10)
|
||||||
description: Perform Online Activation
|
description: In this article, you will learn how to perform online activation of the client products using the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: 8381792b-a454-4e66-9b4c-e6e4c9303823
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 8381792b-a454-4e66-9b4c-e6e4c9303823
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Perform Online Activation
|
---
|
||||||
|
|
||||||
You can use the Volume Activation Management Tool (VAMT) to enable client products to be activated over the Internet. You can install the client products with any kind of product key that is eligible for online activation—Multiple Activation Key (MAK), retail, and Windows Key Management Services (KMS) host key.
|
# Perform Online Activation
|
||||||
|
|
||||||
## Requirements
|
You can use the Volume Activation Management Tool (VAMT) to enable client products to be activated over the Internet. You can install the client products with any kind of product key that is eligible for online activation—Multiple Activation Key (MAK), retail, and Windows Key Management Services (KMS) host key.
|
||||||
|
|
||||||
Before performing online activation, ensure that the network and the VAMT installation meet the following requirements:
|
## Requirements
|
||||||
- VAMT is installed on a central computer that has network access to all client computers.
|
|
||||||
- Both the VAMT host and client computers have Internet access.
|
Before performing online activation, ensure that the network and the VAMT installation meet the following requirements:
|
||||||
- The products that you want to activate are added to VAMT.
|
- VAMT is installed on a central computer that has network access to all client computers.
|
||||||
- VAMT has administrative permissions on all computers that you intend to activate, and that Windows Management Instrumentation (WMI) can be accessed through the Windows firewall. For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
- Both the VAMT host and client computers have Internet access.
|
||||||
|
- The products that you want to activate are added to VAMT.
|
||||||
The product keys that are installed on the client products must have a sufficient number of remaining activations. If you are activating a MAK key, you can retrieve the remaining number of activations for that key by selecting the MAK in the product key list in the center pane and then clicking
|
- VAMT has administrative permissions on all computers that you intend to activate, and that Windows Management Instrumentation (WMI) can be accessed through the Windows firewall. For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||||
**Refresh product key data online** in the right-side pane. This retrieves the number of remaining activations for the MAK from Microsoft. Note that this step requires Internet access and that the remaining activation count can only be retrieved for MAKs.
|
|
||||||
|
The product keys that are installed on the client products must have a sufficient number of remaining activations. If you are activating a MAK key, you can retrieve the remaining number of activations for that key by selecting the MAK in the product key list in the center pane and then clicking
|
||||||
## To Perform an Online Activation
|
**Refresh product key data online** in the right-side pane. This retrieves the number of remaining activations for the MAK from Microsoft. Note that this step requires Internet access and that the remaining activation count can only be retrieved for MAKs.
|
||||||
|
|
||||||
**To perform an online activation**
|
## To Perform an Online Activation
|
||||||
1. Open VAMT.
|
|
||||||
2. In the products list view in the center pane, sort the list if necessary. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
**To perform an online activation**
|
||||||
3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
1. Open VAMT.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
2. In the products list view in the center pane, sort the list if necessary. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
4. Click **Filter**. VAMT displays the filtered list in the center pane.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
5. Select the products that you want to activate. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
6. Click **Activate** in the **Selected Items** menu in the right-side **Actions** pane and then point to **Activate**. If the **Actions** pane is not displayed, click the Show/Hide Action Pane button, which is located on the toolbar to the right of the Help button.
|
4. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||||
7. Point to **Online activate**, and then select the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password.
|
5. Select the products that you want to activate. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
||||||
8. VAMT displays the **Activating products** dialog box until it completes the requested action. When activation is complete, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
6. Click **Activate** in the **Selected Items** menu in the right-side **Actions** pane and then point to **Activate**. If the **Actions** pane is not displayed, click the Show/Hide Action Pane button, which is located on the toolbar to the right of the Help button.
|
||||||
|
7. Point to **Online activate**, and then select the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password.
|
||||||
The same status is shown under the **Status of Last Action** column in the products list view in the center pane.
|
8. VAMT displays the **Activating products** dialog box until it completes the requested action. When activation is complete, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||||
|
|
||||||
**Note**
|
The same status is shown under the **Status of Last Action** column in the products list view in the center pane.
|
||||||
Online activation does not enable you to save the Confirmation IDs (CIDs). As a result, you cannot perform local reactivation.
|
|
||||||
|
**Note**
|
||||||
**Note**
|
Online activation does not enable you to save the Confirmation IDs (CIDs). As a result, you cannot perform local reactivation.
|
||||||
You can use online activation to select products that have different key types and activate the products at the same time.
|
|
||||||
|
**Note**
|
||||||
## Related topics
|
You can use online activation to select products that have different key types and activate the products at the same time.
|
||||||
- [Manage Activations](manage-activations-vamt.md)
|
|
||||||
|
## Related topics
|
||||||
|
- [Manage Activations](manage-activations-vamt.md)
|
||||||
|
@ -1,58 +1,60 @@
|
|||||||
---
|
---
|
||||||
title: Perform Proxy Activation (Windows 10)
|
title: Perform Proxy Activation (Windows 10)
|
||||||
description: Perform Proxy Activation
|
description: In this article, you will learn how to use VAMT to perform proxy activation of the client products that do not have internet access.
|
||||||
ms.assetid: 35a919ed-f1cc-4d10-9c88-9bd634549dc3
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 35a919ed-f1cc-4d10-9c88-9bd634549dc3
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Perform Proxy Activation
|
---
|
||||||
|
|
||||||
You can use the Volume Activation Management Tool (VAMT) to perform activation for client computers that do not have Internet access. The client products can be installed with any type of product key that is eligible for proxy activation: Multiple activation Key (MAK), KMS Host key (CSVLK), or retail key.
|
# Perform Proxy Activation
|
||||||
|
|
||||||
In a typical proxy-activation scenario, the VAMT host computer distributes a MAK to one or more client computers and collects the installation ID (IID) from each computer. The VAMT host computer sends the IIDs to Microsoft on behalf of the client computers and obtains the corresponding Confirmation IDs (CIDs). The VAMT host computer then installs the CIDs on the client computer to complete the activation. Using this activation method, only the VAMT host computer needs Internet access.
|
You can use the Volume Activation Management Tool (VAMT) to perform activation for client computers that do not have Internet access. The client products can be installed with any type of product key that is eligible for proxy activation: Multiple activation Key (MAK), KMS Host key (CSVLK), or retail key.
|
||||||
|
|
||||||
**Note**
|
In a typical proxy-activation scenario, the VAMT host computer distributes a MAK to one or more client computers and collects the installation ID (IID) from each computer. The VAMT host computer sends the IIDs to Microsoft on behalf of the client computers and obtains the corresponding Confirmation IDs (CIDs). The VAMT host computer then installs the CIDs on the client computer to complete the activation. Using this activation method, only the VAMT host computer needs Internet access.
|
||||||
For workgroups that are completely isolated from any larger network, you can still perform MAK, KMS Host key (CSVLK), or retail proxy activation. This requires installing a second instance of VAMT on a computer within the isolated group and using removable media to transfer activation data between that computer and another VAMT host computer that has Internet access. For more information about this scenario, see [Scenario 2: Proxy Activation](scenario-proxy-activation-vamt.md). Similarly, you can proxy activate a KMS Host key (CSVLK) located in an isolated network. You can also proxy activate a KMS Host key (CSVLK) in the core network if you do not want the KMS host computer to connect to Microsoft over the Internet.
|
|
||||||
|
**Note**
|
||||||
## Requirements
|
For workgroups that are completely isolated from any larger network, you can still perform MAK, KMS Host key (CSVLK), or retail proxy activation. This requires installing a second instance of VAMT on a computer within the isolated group and using removable media to transfer activation data between that computer and another VAMT host computer that has Internet access. For more information about this scenario, see [Scenario 2: Proxy Activation](scenario-proxy-activation-vamt.md). Similarly, you can proxy activate a KMS Host key (CSVLK) located in an isolated network. You can also proxy activate a KMS Host key (CSVLK) in the core network if you do not want the KMS host computer to connect to Microsoft over the Internet.
|
||||||
|
|
||||||
Before performing proxy activation, ensure that your network and the VAMT installation meet the following requirements:
|
## Requirements
|
||||||
- There is an instance of VAMT that is installed on a computer that has Internet access. If you are performing proxy activation for an isolated workgroup, you also need to have VAMT installed on one of the computers in the workgroup.
|
|
||||||
- The products to be activated have been added to VAMT and are installed with a retail product key, a KMS Host key (CSVLK) or a MAK. If the products have not been installed with a proper product key, refer to the steps in the [Add and Remove a Product Key](add-remove-product-key-vamt.md) section for instructions on how to install a product key.
|
Before performing proxy activation, ensure that your network and the VAMT installation meet the following requirements:
|
||||||
- VAMT has administrative permissions on all products to be activated and Windows Management Instrumentation (WMI) is accessible through the Windows firewall.
|
- There is an instance of VAMT that is installed on a computer that has Internet access. If you are performing proxy activation for an isolated workgroup, you also need to have VAMT installed on one of the computers in the workgroup.
|
||||||
- For workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
- The products to be activated have been added to VAMT and are installed with a retail product key, a KMS Host key (CSVLK) or a MAK. If the products have not been installed with a proper product key, refer to the steps in the [Add and Remove a Product Key](add-remove-product-key-vamt.md) section for instructions on how to install a product key.
|
||||||
The product keys that are installed on the client products must have a sufficient number of remaining activations. If you are activating a MAK key, you can retrieve the remaining number of activations for that key by selecting the MAK in the product key list in the center pane and then clicking **Refresh product key data online** in the right-side pane. This retrieves the number of remaining activations for the MAK from Microsoft. Note that this step requires Internet access and that the remaining activation count can only be retrieved for MAKs.
|
- VAMT has administrative permissions on all products to be activated and Windows Management Instrumentation (WMI) is accessible through the Windows firewall.
|
||||||
|
- For workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||||
## To Perform Proxy Activation
|
The product keys that are installed on the client products must have a sufficient number of remaining activations. If you are activating a MAK key, you can retrieve the remaining number of activations for that key by selecting the MAK in the product key list in the center pane and then clicking **Refresh product key data online** in the right-side pane. This retrieves the number of remaining activations for the MAK from Microsoft. Note that this step requires Internet access and that the remaining activation count can only be retrieved for MAKs.
|
||||||
|
|
||||||
**To perform proxy activation**
|
## To Perform Proxy Activation
|
||||||
|
|
||||||
1. Open VAMT.
|
**To perform proxy activation**
|
||||||
2. If necessary, install product keys. For more information see:
|
|
||||||
- [Install a Product Key](install-product-key-vamt.md) to install retail, MAK, or KMS Host key (CSVLK).
|
1. Open VAMT.
|
||||||
- [Install a KMS Client Key](install-kms-client-key-vamt.md) to install GVLK (KMS client) keys.
|
2. If necessary, install product keys. For more information see:
|
||||||
3. In the **Products** list in the center pane, select the individual products to be activated. You can use the **Filter** function to narrow your search for products by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
- [Install a Product Key](install-product-key-vamt.md) to install retail, MAK, or KMS Host key (CSVLK).
|
||||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
- [Install a KMS Client Key](install-kms-client-key-vamt.md) to install GVLK (KMS client) keys.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
3. In the **Products** list in the center pane, select the individual products to be activated. You can use the **Filter** function to narrow your search for products by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
5. Click **Filter**. VAMT displays the filtered list in the center pane.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
6. In the right-side pane, click **Activate** and then click **Proxy activate** to open the **Proxy Activate** dialog box.
|
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
7. In the **Proxy Activate** dialog box click **Apply Confirmation ID, apply to selected machine(s) and activate**.
|
5. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||||
8. If you are activating products that require administrator credentials different from the ones you are currently using, select the **Use Alternate Credentials** checkbox.
|
6. In the right-side pane, click **Activate** and then click **Proxy activate** to open the **Proxy Activate** dialog box.
|
||||||
9. Click **OK**.
|
7. In the **Proxy Activate** dialog box click **Apply Confirmation ID, apply to selected machine(s) and activate**.
|
||||||
10. VAMT displays the **Activating products** dialog box until it completes the requested action. If you selected the **Alternate Credentials** option, you will be prompted to enter the credentials.
|
8. If you are activating products that require administrator credentials different from the ones you are currently using, select the **Use Alternate Credentials** checkbox.
|
||||||
|
9. Click **OK**.
|
||||||
**Note**
|
10. VAMT displays the **Activating products** dialog box until it completes the requested action. If you selected the **Alternate Credentials** option, you will be prompted to enter the credentials.
|
||||||
You can use proxy activation to select products that have different key types and activate the products at the same time.
|
|
||||||
|
**Note**
|
||||||
|
You can use proxy activation to select products that have different key types and activate the products at the same time.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,35 +1,37 @@
|
|||||||
---
|
---
|
||||||
title: Remove Products (Windows 10)
|
title: Remove Products (Windows 10)
|
||||||
description: Remove Products
|
description: In this article, you will learn how to remove products from the Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: 4d44379e-dda1-4a8f-8ebf-395b6c0dad8e
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 4d44379e-dda1-4a8f-8ebf-395b6c0dad8e
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Remove Products
|
---
|
||||||
|
|
||||||
To remove one or more products from the Volume Activation Management Tool (VAMT), you can delete them from the product list view in the center pane.
|
# Remove Products
|
||||||
|
|
||||||
**To delete one or more products**
|
To remove one or more products from the Volume Activation Management Tool (VAMT), you can delete them from the product list view in the center pane.
|
||||||
1. Click a product node in the left-side pane.
|
|
||||||
2. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
**To delete one or more products**
|
||||||
3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
1. Click a product node in the left-side pane.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
2. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
3. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
4. Click **Filter**. VAMT displays the filtered list in the center pane.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
5. Select the products you want to delete.
|
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
6. Click **Delete** in the **Selected Items** menu in the right-side pane.
|
4. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||||
7. On the **Confirm Delete Selected Products** dialog box, click **OK**.
|
5. Select the products you want to delete.
|
||||||
|
6. Click **Delete** in the **Selected Items** menu in the right-side pane.
|
||||||
## Related topics
|
7. On the **Confirm Delete Selected Products** dialog box, click **OK**.
|
||||||
- [Add and Manage Products](add-manage-products-vamt.md)
|
|
||||||
|
## Related topics
|
||||||
|
- [Add and Manage Products](add-manage-products-vamt.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,48 +1,50 @@
|
|||||||
---
|
---
|
||||||
title: Scenario 3 KMS Client Activation (Windows 10)
|
title: Scenario 3 KMS Client Activation (Windows 10)
|
||||||
description: Scenario 3 KMS Client Activation
|
description: Learn how to use the Volume Activation Management Tool (VAMT) to activate Key Management Service (KMS) client keys or Generic Volume License Keys (GVLKs).
|
||||||
ms.assetid: 72b04e8f-cd35-490c-91ab-27ea799b05d0
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 72b04e8f-cd35-490c-91ab-27ea799b05d0
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Scenario 3: KMS Client Activation
|
---
|
||||||
|
|
||||||
In this scenario, you use the Volume Activation Management Tool (VAMT) to activate Key Management Service (KMS) client keys or Generic Volume License Keys (GVLKs). This can be performed on either Core Network or Isolated Lab computers. By default, volume license editions of Windows Vista, Windows® 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. GVLKs are already installed in volume license editions of these products. You do not have to enter a key to activate a product as a GVLK, unless you are converting a MAK-activated product to a KMS activation. For more information, see [Install a KMS Client Key](install-kms-client-key-vamt.md).
|
# Scenario 3: KMS Client Activation
|
||||||
|
|
||||||
The procedure that is described below assumes the following:
|
In this scenario, you use the Volume Activation Management Tool (VAMT) to activate Key Management Service (KMS) client keys or Generic Volume License Keys (GVLKs). This can be performed on either Core Network or Isolated Lab computers. By default, volume license editions of Windows Vista, Windows® 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. GVLKs are already installed in volume license editions of these products. You do not have to enter a key to activate a product as a GVLK, unless you are converting a MAK-activated product to a KMS activation. For more information, see [Install a KMS Client Key](install-kms-client-key-vamt.md).
|
||||||
- The KMS Service is enabled and available to all KMS clients.
|
|
||||||
- VAMT has been installed and computers have been added to the VAMT database. See Parts 1 through 4 in either [Scenario 1: Online Activation](scenario-online-activation-vamt.md) or [Scenario 2: Proxy Activation](scenario-proxy-activation-vamt.md) for more information.
|
The procedure that is described below assumes the following:
|
||||||
|
- The KMS Service is enabled and available to all KMS clients.
|
||||||
## Activate KMS Clients
|
- VAMT has been installed and computers have been added to the VAMT database. See Parts 1 through 4 in either [Scenario 1: Online Activation](scenario-online-activation-vamt.md) or [Scenario 2: Proxy Activation](scenario-proxy-activation-vamt.md) for more information.
|
||||||
|
|
||||||
1. Open VAMT.
|
## Activate KMS Clients
|
||||||
2. To set the KMS activation options, on the menu bar click **View**. Then click **Preferences** to open the **Volume Activation Management Tool Preferences** dialog box.
|
|
||||||
3. In the **Volume Activation Management Tool Preferences** dialog box, under **KMS Management Services host selection** select from the following options:
|
1. Open VAMT.
|
||||||
- **Find a KMS host automatically using DNS**. This is the default setting. VAMT will instruct the computer to query the Domain Name Service (DNS) to locate a KMS host and perform activation. If the client contains a registry key with a valid KMS host, that value will be used instead.
|
2. To set the KMS activation options, on the menu bar click **View**. Then click **Preferences** to open the **Volume Activation Management Tool Preferences** dialog box.
|
||||||
- **Find a KMS host using DNS in this domain for supported products**. Select this option if you use a specific domain, and enter the name of the domain.
|
3. In the **Volume Activation Management Tool Preferences** dialog box, under **KMS Management Services host selection** select from the following options:
|
||||||
- **Use specific KMS host**. Select this option for environments which do not use DNS for KMS host identification, and manually enter the KMS host name and select the KMS host port. VAMT will set the specified KMS host name and KMS host port on the target computer, and then instruct the computer to perform activation with the specific KMS host.
|
- **Find a KMS host automatically using DNS**. This is the default setting. VAMT will instruct the computer to query the Domain Name Service (DNS) to locate a KMS host and perform activation. If the client contains a registry key with a valid KMS host, that value will be used instead.
|
||||||
4. In the left-side pane, in the **Products** node, click the product that you want to activate.
|
- **Find a KMS host using DNS in this domain for supported products**. Select this option if you use a specific domain, and enter the name of the domain.
|
||||||
5. In the products list view in the center pane, sort the list if necessary. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
- **Use specific KMS host**. Select this option for environments which do not use DNS for KMS host identification, and manually enter the KMS host name and select the KMS host port. VAMT will set the specified KMS host name and KMS host port on the target computer, and then instruct the computer to perform activation with the specific KMS host.
|
||||||
6. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
4. In the left-side pane, in the **Products** node, click the product that you want to activate.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
5. In the products list view in the center pane, sort the list if necessary. You can use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||||
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
6. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
7. Click **Filter**. VAMT displays the filtered list in the center pane.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
8. Select the products that you want to activate.
|
- To filter the list by Product Name, Product Key Type, or License Status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
9. Click **Activate** in the **Selected Items** menu in the right-side **Actions** pane, click **Activate**, point to **Volume activate**, and then click the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password.
|
7. Click **Filter**. VAMT displays the filtered list in the center pane.
|
||||||
10. VAMT displays the **Activating products** dialog box until it completes the requested action. When activation is complete, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
8. Select the products that you want to activate.
|
||||||
|
9. Click **Activate** in the **Selected Items** menu in the right-side **Actions** pane, click **Activate**, point to **Volume activate**, and then click the appropriate credential option. If you click the **Alternate Credentials** option, you will be prompted to enter an alternate user name and password.
|
||||||
The same status is shown under the **Status of Last Action** column in the products list view in the center pane.
|
10. VAMT displays the **Activating products** dialog box until it completes the requested action. When activation is complete, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||||
|
|
||||||
## Related topics
|
The same status is shown under the **Status of Last Action** column in the products list view in the center pane.
|
||||||
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
|
||||||
|
## Related topics
|
||||||
|
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,136 +1,138 @@
|
|||||||
---
|
---
|
||||||
title: Scenario 1 Online Activation (Windows 10)
|
title: Scenario 1 Online Activation (Windows 10)
|
||||||
description: Scenario 1 Online Activation
|
description: This article presents a scenario on how to use Volume Activation Management Tool (VAMT) to perform online activation for multiple activation keys.
|
||||||
ms.assetid: 94dba40e-383a-41e4-b74b-9e884facdfd3
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 94dba40e-383a-41e4-b74b-9e884facdfd3
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Scenario 1: Online Activation
|
---
|
||||||
|
|
||||||
In this scenario, the Volume Activation Management Tool (VAMT) is deployed in the Core Network environment. VAMT is installed on a central computer that has network access to all of the client computers. Both the VAMT host and the client computers have Internet access. The following illustration shows a diagram of an online activation scenario for Multiple Activation Keys (MAKs). You can use this scenario for online activation of the following key types:
|
# Scenario 1: Online Activation
|
||||||
- Multiple Activation Key (MAK)
|
|
||||||
- Windows Key Management Service (KMS) keys:
|
In this scenario, the Volume Activation Management Tool (VAMT) is deployed in the Core Network environment. VAMT is installed on a central computer that has network access to all of the client computers. Both the VAMT host and the client computers have Internet access. The following illustration shows a diagram of an online activation scenario for Multiple Activation Keys (MAKs). You can use this scenario for online activation of the following key types:
|
||||||
- KMS Host key (CSVLK)
|
- Multiple Activation Key (MAK)
|
||||||
- Generic Volume License Key (GVLK), or KMS client key
|
- Windows Key Management Service (KMS) keys:
|
||||||
- Retail
|
- KMS Host key (CSVLK)
|
||||||
The Secure Zone represents higher-security Core Network computers that have additional firewall protection.
|
- Generic Volume License Key (GVLK), or KMS client key
|
||||||
|
- Retail
|
||||||

|
The Secure Zone represents higher-security Core Network computers that have additional firewall protection.
|
||||||
|
|
||||||
## In This Topic
|

|
||||||
- [Install and start VAMT on a networked host computer](#bkmk-partone)
|
|
||||||
- [Configure the Windows Management Instrumentation firewall exception on target computers](#bkmk-parttwo)
|
## In This Topic
|
||||||
- [Connect to VAMT database](#bkmk-partthree)
|
- [Install and start VAMT on a networked host computer](#bkmk-partone)
|
||||||
- [Discover products](#bkmk-partfour)
|
- [Configure the Windows Management Instrumentation firewall exception on target computers](#bkmk-parttwo)
|
||||||
- [Sort and filter the list of computers](#bkmk-partfive)
|
- [Connect to VAMT database](#bkmk-partthree)
|
||||||
- [Collect status information from the computers in the list](#bkmk-partsix)
|
- [Discover products](#bkmk-partfour)
|
||||||
- [Add product keys and determine the remaining activation count](#bkmk-partseven)
|
- [Sort and filter the list of computers](#bkmk-partfive)
|
||||||
- [Install the product keys](#bkmk-parteight)
|
- [Collect status information from the computers in the list](#bkmk-partsix)
|
||||||
- [Activate the client products](#bkmk-partnine)
|
- [Add product keys and determine the remaining activation count](#bkmk-partseven)
|
||||||
|
- [Install the product keys](#bkmk-parteight)
|
||||||
## <a href="" id="bkmk-partone"></a>Step 1: Install and start VAMT on a networked host computer
|
- [Activate the client products](#bkmk-partnine)
|
||||||
|
|
||||||
1. Install VAMT on the host computer.
|
## <a href="" id="bkmk-partone"></a>Step 1: Install and start VAMT on a networked host computer
|
||||||
2. Click the VAMT icon in the **Start** menu to open VAMT.
|
|
||||||
|
1. Install VAMT on the host computer.
|
||||||
## <a href="" id="bkmk-parttwo"></a>Step 2: Configure the Windows Management Instrumentation firewall exception on target computers
|
2. Click the VAMT icon in the **Start** menu to open VAMT.
|
||||||
|
|
||||||
- Ensure that the Windows Management Instrumentation (WMI) firewall exception has been enabled for all target computers. For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
## <a href="" id="bkmk-parttwo"></a>Step 2: Configure the Windows Management Instrumentation firewall exception on target computers
|
||||||
|
|
||||||
**Note**
|
- Ensure that the Windows Management Instrumentation (WMI) firewall exception has been enabled for all target computers. For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||||
To retrieve product license status, VAMT must have administrative permissions on the remote computers and WMI must be available through the Windows Firewall. In addition, for workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
|
||||||
|
**Note**
|
||||||
## <a href="" id="bkmk-partthree"></a>Step 3: Connect to a VAMT database
|
To retrieve product license status, VAMT must have administrative permissions on the remote computers and WMI must be available through the Windows Firewall. In addition, for workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||||
|
|
||||||
1. If you are not already connected to a database, the **Database Connection Settings** dialog box appears when you open VAMT. Select the server and database where the keys that must be activated are located.
|
## <a href="" id="bkmk-partthree"></a>Step 3: Connect to a VAMT database
|
||||||
2. Click **Connect**.
|
|
||||||
3. If you are already connected to a database, VAMT displays an inventory of the products and product keys in the center pane, and a license overview of the computers in the database. If you need to connect to a different database, click **Successfully connected to Server** to open **the Database Connection Settings** dialog box. For more information about how to create VAMT databases and adding VAMT data, see [Manage VAMT Data](manage-vamt-data.md)
|
1. If you are not already connected to a database, the **Database Connection Settings** dialog box appears when you open VAMT. Select the server and database where the keys that must be activated are located.
|
||||||
|
2. Click **Connect**.
|
||||||
## <a href="" id="bkmk-partfour"></a>Step 4: Discover products
|
3. If you are already connected to a database, VAMT displays an inventory of the products and product keys in the center pane, and a license overview of the computers in the database. If you need to connect to a different database, click **Successfully connected to Server** to open **the Database Connection Settings** dialog box. For more information about how to create VAMT databases and adding VAMT data, see [Manage VAMT Data](manage-vamt-data.md)
|
||||||
|
|
||||||
1. In the left-side pane, in the **Products** node Products, click the product that you want to activate.
|
## <a href="" id="bkmk-partfour"></a>Step 4: Discover products
|
||||||
2. To open the **Discover Products** dialog box, click **Discover products** in the **Actions** menu in the right-side pane.
|
|
||||||
3. In the **Discover Products** dialog box, click **Search for computers in the Active Directory** to display the search options, and then click the search options that you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general Lightweight Directory Access Protocol (LDAP) query:
|
1. In the left-side pane, in the **Products** node Products, click the product that you want to activate.
|
||||||
- To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**. Then under **Domain Filter Criteria**, in the list of domain names click the name of the domain that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for specific computers in the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only those computer names that start with the letter "a".
|
2. To open the **Discover Products** dialog box, click **Discover products** in the **Actions** menu in the right-side pane.
|
||||||
- To search by individual computer name or IP address, click **Manually enter name or IP address**. Then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that VAMT supports both IPv4 and IPV6 addressing.
|
3. In the **Discover Products** dialog box, click **Search for computers in the Active Directory** to display the search options, and then click the search options that you want to use. You can search for computers in an Active Directory domain, by individual computer name or IP address, in a workgroup, or by a general Lightweight Directory Access Protocol (LDAP) query:
|
||||||
- To search for computers in a workgroup, click **Search for computers in the workgroup**. Then under **Workgroup Filter Criteria**, in the list of workgroup names, click the name of the workgroup that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer in the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
- To search for computers in an Active Directory domain, click **Search for computers in the Active Directory**. Then under **Domain Filter Criteria**, in the list of domain names click the name of the domain that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for specific computers in the domain. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only those computer names that start with the letter "a".
|
||||||
- To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box that appears. VAMT will validate the LDAP query syntax, but will otherwise run the query without additional checks.
|
- To search by individual computer name or IP address, click **Manually enter name or IP address**. Then enter the full name or IP address in the **One or more computer names or IP addresses separated by commas** text box. Separate multiple entries with a comma. Note that VAMT supports both IPv4 and IPV6 addressing.
|
||||||
4. Click **Search**.
|
- To search for computers in a workgroup, click **Search for computers in the workgroup**. Then under **Workgroup Filter Criteria**, in the list of workgroup names, click the name of the workgroup that you want to search. You can narrow the search further by typing a name in the **Filter by computer name** field to search for a specific computer in the workgroup. This filter supports the asterisk (\*) wildcard. For example, typing "a\*" will display only computer names that start with the letter "a".
|
||||||
|
- To search for computers by using a general LDAP query, click **Search with LDAP query** and enter your query in the text box that appears. VAMT will validate the LDAP query syntax, but will otherwise run the query without additional checks.
|
||||||
When the search is complete, the products that VAMT discovers appear in the product list view in the center pane.
|
4. Click **Search**.
|
||||||
|
|
||||||
## <a href="" id="bkmk-partfive"></a>Step 5: Sort and filter the list of computers
|
When the search is complete, the products that VAMT discovers appear in the product list view in the center pane.
|
||||||
|
|
||||||
You can sort the list of products so that it is easier to find the computers that require product keys to be activated:
|
## <a href="" id="bkmk-partfive"></a>Step 5: Sort and filter the list of computers
|
||||||
1. On the menu bar at the top of the center pane, click **Group by**, and then click **Product**, **Product Key Type**, or **License Status**.
|
|
||||||
2. To sort the list further, you can click one of the column headings to sort by that column.
|
You can sort the list of products so that it is easier to find the computers that require product keys to be activated:
|
||||||
3. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
1. On the menu bar at the top of the center pane, click **Group by**, and then click **Product**, **Product Key Type**, or **License Status**.
|
||||||
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
2. To sort the list further, you can click one of the column headings to sort by that column.
|
||||||
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
3. You can also use the **Filter** function to narrow your search for computers by clicking **Filter** in the right-side pane to open the **Filter Products** dialog box.
|
||||||
- To filter the list by product name, product key type, or license status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
4. In the **Filter Products** dialog box, you can filter the list by computer name, product name, product key type, license status, or by any combination of these options.
|
||||||
5. Click **Filter**. VAMT displays the filtered list in the product list view in the center pane.
|
- To filter the list by computer name, enter a name in the **Computer Name** box.
|
||||||
|
- To filter the list by product name, product key type, or license status, click the list you want to use for the filter and select an option. If necessary, click **clear all filters** to create a new filter.
|
||||||
## <a href="" id="bkmk-partsix"></a>Step 6: Collect status information from the computers in the list
|
5. Click **Filter**. VAMT displays the filtered list in the product list view in the center pane.
|
||||||
|
|
||||||
To collect the status from select computers in the database, you can select computers in the product list view by using one of the following methods:
|
## <a href="" id="bkmk-partsix"></a>Step 6: Collect status information from the computers in the list
|
||||||
- To select a block of consecutively listed computers, click the first computer that you want to select, and then click the last computer while pressing the **Shift** key.
|
|
||||||
- To select computers which are not listed consecutively, hold down the **Ctrl** key and select each computer for which you want to collect the status information.
|
To collect the status from select computers in the database, you can select computers in the product list view by using one of the following methods:
|
||||||
**To collect status information from the selected computers**
|
- To select a block of consecutively listed computers, click the first computer that you want to select, and then click the last computer while pressing the **Shift** key.
|
||||||
- In the right-side **Actions** pane, click **Update license status** in the **Selected Items** menu and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials that are different from the ones that you used to log on to the computer. Otherwise, click **Current Credentials** and continue to step 2.If you are supplying alternate credentials, in the **Windows Security** dialog box, type the appropriate user name and password and then click **OK**.
|
- To select computers which are not listed consecutively, hold down the **Ctrl** key and select each computer for which you want to collect the status information.
|
||||||
- VAMT displays the **Collecting product information** dialog box while it collects the license status of all supported products on the selected computers. When the process is finished, the updated license status of each product will appear in the product list view in the center pane.
|
**To collect status information from the selected computers**
|
||||||
|
- In the right-side **Actions** pane, click **Update license status** in the **Selected Items** menu and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials that are different from the ones that you used to log on to the computer. Otherwise, click **Current Credentials** and continue to step 2.If you are supplying alternate credentials, in the **Windows Security** dialog box, type the appropriate user name and password and then click **OK**.
|
||||||
**Note**
|
- VAMT displays the **Collecting product information** dialog box while it collects the license status of all supported products on the selected computers. When the process is finished, the updated license status of each product will appear in the product list view in the center pane.
|
||||||
If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading.
|
|
||||||
|
**Note**
|
||||||
## <a href="" id="bkmk-partseven"></a>Step 7: Add product keys and determine the remaining activation count
|
If a computer has more than one supported product installed, VAMT adds an entry for each product. The entry appears under the appropriate product heading.
|
||||||
|
|
||||||
1. Click the **Product Keys** node in the left-side pane, and then click **Add Product Keys** in the right-side pane to open the **Add Product Keys** dialog box.
|
## <a href="" id="bkmk-partseven"></a>Step 7: Add product keys and determine the remaining activation count
|
||||||
2. In the **Add Product Key** dialog box, you can select from one of the following methods to add product keys:
|
|
||||||
- To add product keys manually, click **Enter product key(s) separated by line breaks**, enter one or more product keys, and then click **Add Key(s)**.
|
1. Click the **Product Keys** node in the left-side pane, and then click **Add Product Keys** in the right-side pane to open the **Add Product Keys** dialog box.
|
||||||
- To import a Comma Separated Values File (CSV) that contains a list of product keys, click **Select a product key file to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**.
|
2. In the **Add Product Key** dialog box, you can select from one of the following methods to add product keys:
|
||||||
|
- To add product keys manually, click **Enter product key(s) separated by line breaks**, enter one or more product keys, and then click **Add Key(s)**.
|
||||||
The keys that you have added appear in the **Product Keys** list view in the center pane.
|
- To import a Comma Separated Values File (CSV) that contains a list of product keys, click **Select a product key file to import**, browse to the file location, click **Open** to import the file, and then click **Add Key(s)**.
|
||||||
|
|
||||||
**Important**
|
The keys that you have added appear in the **Product Keys** list view in the center pane.
|
||||||
If you are activating many products with a MAK, refresh the activation count of the MAK to ensure that the MAK can support the required number of activations. In the product key list in the center pane, select the MAK and then click **Refresh product key data online** in the right-side pane to contact Microsoft and retrieve the number of remaining activations for the MAK. This step requires Internet access. You can only retrieve the remaining activation count for MAKs.
|
|
||||||
|
**Important**
|
||||||
## <a href="" id="bkmk-parteight"></a>Step 8: Install the product keys
|
If you are activating many products with a MAK, refresh the activation count of the MAK to ensure that the MAK can support the required number of activations. In the product key list in the center pane, select the MAK and then click **Refresh product key data online** in the right-side pane to contact Microsoft and retrieve the number of remaining activations for the MAK. This step requires Internet access. You can only retrieve the remaining activation count for MAKs.
|
||||||
|
|
||||||
1. In the left-side pane, click the product that you want to install keys on to.
|
## <a href="" id="bkmk-parteight"></a>Step 8: Install the product keys
|
||||||
2. If necessary, sort and filter the list of products so that it is easier to find the computers that must have a product key installed. See [Step 5: Sort and filter the list of computers](#bkmk-partfive).
|
|
||||||
3. In the **Products** list view pane, select the individual products which must have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
1. In the left-side pane, click the product that you want to install keys on to.
|
||||||
4. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
2. If necessary, sort and filter the list of products so that it is easier to find the computers that must have a product key installed. See [Step 5: Sort and filter the list of computers](#bkmk-partfive).
|
||||||
5. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAKs based on the selected products. If you are installing a MAK you can select a recommended product key or any other MAK from the **All Product Keys List**. If you are not installing a MAK, select a product key from the **All Product Keys** list. Use the scroll bar if you want to view the **Description** for each key. When you have selected the product key that you want to install, click **Install Key**. Note that only one key can be installed at a time.
|
3. In the **Products** list view pane, select the individual products which must have keys installed. You can use the **CTRL** key or the **SHIFT** key to select more than one product.
|
||||||
6. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
4. Click **Install product key** in the **Selected Items** menu in the right-side pane to display the **Install Product Key** dialog box.
|
||||||
|
5. The **Select Product Key** dialog box displays the keys that are available to be installed. Under **Recommended MAKs**, VAMT might display one or more recommended MAKs based on the selected products. If you are installing a MAK you can select a recommended product key or any other MAK from the **All Product Keys List**. If you are not installing a MAK, select a product key from the **All Product Keys** list. Use the scroll bar if you want to view the **Description** for each key. When you have selected the product key that you want to install, click **Install Key**. Note that only one key can be installed at a time.
|
||||||
The same status appears under the **Status of Last Action** column in the product list view in the center pane.
|
6. VAMT displays the **Installing product key** dialog box while it attempts to install the product key for the selected products. When the process is finished, the status appears in the **Action Status** column of the dialog box. Click **Close** to close the dialog box. You can also click the **Automatically close when done** check box when the dialog box appears.
|
||||||
**Note**
|
|
||||||
|
The same status appears under the **Status of Last Action** column in the product list view in the center pane.
|
||||||
Product key installation will fail if VAMT finds mismatched key types or editions. VAMT will display the failure status and will continue the installation for the next product in the list. For more information on choosing the correct product key, see [How to Choose the Right Volume License Key for Windows.](https://go.microsoft.com/fwlink/p/?linkid=238382)
|
**Note**
|
||||||
|
|
||||||
## <a href="" id="bkmk-partnine"></a>Step 9: Activate the client products
|
Product key installation will fail if VAMT finds mismatched key types or editions. VAMT will display the failure status and will continue the installation for the next product in the list. For more information on choosing the correct product key, see [How to Choose the Right Volume License Key for Windows.](https://go.microsoft.com/fwlink/p/?linkid=238382)
|
||||||
|
|
||||||
1. Select the individual products that you want to activate in the list-view pane.
|
## <a href="" id="bkmk-partnine"></a>Step 9: Activate the client products
|
||||||
2. On the menu bar, click **Action**, point to **Activate** and point to **Online activate**. You can also right-click the selected computers(s) to display the **Action** menu, point to **Activate** and point to **Online activate**. You can also click **Activate** in the **Selected Items** menu in the right-hand pane to access the **Activate** option.
|
|
||||||
3. If you are activating product keys using your current credential, click **Current credential** and continue to step 5. If you are activating products that require an administrator credential that is different from the one you are currently using, click the **Alternate credential** option.
|
1. Select the individual products that you want to activate in the list-view pane.
|
||||||
4. Enter your alternate user name and password and click **OK**.
|
2. On the menu bar, click **Action**, point to **Activate** and point to **Online activate**. You can also right-click the selected computers(s) to display the **Action** menu, point to **Activate** and point to **Online activate**. You can also click **Activate** in the **Selected Items** menu in the right-hand pane to access the **Activate** option.
|
||||||
5. The **Activate** option contacts the Microsoft product-activation server over the Internet and requests activation for the selected products. VAMT displays the **Activating products** dialog box until the requested actions are completed.
|
3. If you are activating product keys using your current credential, click **Current credential** and continue to step 5. If you are activating products that require an administrator credential that is different from the one you are currently using, click the **Alternate credential** option.
|
||||||
|
4. Enter your alternate user name and password and click **OK**.
|
||||||
**Note**
|
5. The **Activate** option contacts the Microsoft product-activation server over the Internet and requests activation for the selected products. VAMT displays the **Activating products** dialog box until the requested actions are completed.
|
||||||
Installing a MAK and overwriting the GVLK on client products must be done with care. If the RTM version of Windows Vista has been installed on the computer for more than 30 days, then its initial grace period has expired. As a result, it will enter Reduced Functionality Mode (RFM) if online activation is not completed successfully before the next logon attempt. However, you can use online activation to recover properly configured computers from RFM, as long as the computers are available on the network.
|
|
||||||
|
**Note**
|
||||||
RFM only applies to the RTM version of Windows Vista or the retail editions of Microsoft Office 2010. Windows Vista with SP1 or later, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and volume editions of Office 2010 will not enter RFM.
|
Installing a MAK and overwriting the GVLK on client products must be done with care. If the RTM version of Windows Vista has been installed on the computer for more than 30 days, then its initial grace period has expired. As a result, it will enter Reduced Functionality Mode (RFM) if online activation is not completed successfully before the next logon attempt. However, you can use online activation to recover properly configured computers from RFM, as long as the computers are available on the network.
|
||||||
|
|
||||||
## Related topics
|
RFM only applies to the RTM version of Windows Vista or the retail editions of Microsoft Office 2010. Windows Vista with SP1 or later, Windows 7, Windows 8, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and volume editions of Office 2010 will not enter RFM.
|
||||||
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
|
||||||
|
## Related topics
|
||||||
|
- [VAMT Step-by-Step Scenarios](vamt-step-by-step.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Scenario 2 Proxy Activation (Windows 10)
|
title: Scenario 2 Proxy Activation (Windows 10)
|
||||||
description: Scenario 2 Proxy Activation
|
description: This article presents a scenario on how to use VAMT to activate products that are installed on workgroup computers in an isolated lab environment.
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: ed5a8a56-d9aa-4895-918f-dd1898cb2c1a
|
ms.assetid: ed5a8a56-d9aa-4895-918f-dd1898cb2c1a
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,38 +1,40 @@
|
|||||||
---
|
---
|
||||||
title: Update Product Status (Windows 10)
|
title: Update Product Status (Windows 10)
|
||||||
description: Update Product Status
|
description: "In this article, you will learn how to use Volume Activation Management Tool (VAMT) to update product status for products installed on computers."
|
||||||
ms.assetid: 39d4abd4-801a-4e8f-9b8c-425a24a96764
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 39d4abd4-801a-4e8f-9b8c-425a24a96764
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# Update Product Status
|
---
|
||||||
|
|
||||||
After you add computers to the VAMT database, you need to use the **Update license status** function to add the products that are installed on the computers. You can also use the **Update license status** at any time to retrieve the most current license status for any products in the VAMT database.
|
# Update Product Status
|
||||||
To retrieve license status, VAMT must have administrative permissions on all selected computers and Windows Management Instrumentation (WMI) must be accessible through the Windows Firewall. In addition, for workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
|
||||||
|
After you add computers to the VAMT database, you need to use the **Update license status** function to add the products that are installed on the computers. You can also use the **Update license status** at any time to retrieve the most current license status for any products in the VAMT database.
|
||||||
**Note**
|
To retrieve license status, VAMT must have administrative permissions on all selected computers and Windows Management Instrumentation (WMI) must be accessible through the Windows Firewall. In addition, for workgroup computers, a registry key must be created to enable remote administrative actions under User Account Control (UAC). For more information, see [Configure Client Computers](configure-client-computers-vamt.md).
|
||||||
The license-status query requires a valid computer name for each system queried. If the VAMT database contains computers that were added without Personally Identifiable Information, computer names will not be available for those computers, and the status for these computers will not be updated.
|
|
||||||
|
**Note**
|
||||||
## Update the license status of a product
|
The license-status query requires a valid computer name for each system queried. If the VAMT database contains computers that were added without Personally Identifiable Information, computer names will not be available for those computers, and the status for these computers will not be updated.
|
||||||
|
|
||||||
1. Open VAMT.
|
## Update the license status of a product
|
||||||
2. In the **Products** list, select one or more products that need to have their status updated.
|
|
||||||
3. In the right-side **Actions** pane, click **Update license status** and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials different from the ones you used to log into the computer.
|
1. Open VAMT.
|
||||||
4. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**.
|
2. In the **Products** list, select one or more products that need to have their status updated.
|
||||||
|
3. In the right-side **Actions** pane, click **Update license status** and then click a credential option. Choose **Alternate Credentials** only if you are updating products that require administrator credentials different from the ones you used to log into the computer.
|
||||||
VAMT displays the **Collecting product information** dialog box while it collects the status of all selected products. When the process is finished, the updated licensing status of each product will appear in the product list view in the center pane.
|
4. If you are supplying alternate credentials, in the **Windows Security** dialog box type the appropriate user name and password and click **OK**.
|
||||||
|
|
||||||
**Note**
|
VAMT displays the **Collecting product information** dialog box while it collects the status of all selected products. When the process is finished, the updated licensing status of each product will appear in the product list view in the center pane.
|
||||||
If a previously discovered Microsoft Office 2010 product has been uninstalled from the remote computer, updating its licensing status will cause the entry to be deleted from the **Office** product list view, and, consequently, the total number of discovered products will be smaller. However, the Windows installation of the same computer will not be deleted and will always be shown in the **Windows** products list view.
|
|
||||||
|
**Note**
|
||||||
## Related topics
|
If a previously discovered Microsoft Office 2010 product has been uninstalled from the remote computer, updating its licensing status will cause the entry to be deleted from the **Office** product list view, and, consequently, the total number of discovered products will be smaller. However, the Windows installation of the same computer will not be deleted and will always be shown in the **Windows** products list view.
|
||||||
- [Add and Manage Products](add-manage-products-vamt.md)
|
|
||||||
|
## Related topics
|
||||||
|
- [Add and Manage Products](add-manage-products-vamt.md)
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Use VAMT in Windows PowerShell (Windows 10)
|
title: Use VAMT in Windows PowerShell (Windows 10)
|
||||||
description: Use VAMT in Windows PowerShell
|
description: In this article, you will learn how to use Volume Activation Management Tool (VAMT) in Windows PowerShell.
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: 13e0ceec-d827-4681-a5c3-8704349e3ba9
|
ms.assetid: 13e0ceec-d827-4681-a5c3-8704349e3ba9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: VAMT known issues (Windows 10)
|
title: VAMT known issues (Windows 10)
|
||||||
description: Volume Activation Management Tool (VAMT) known issues
|
description: In this article, you will learn about the known issues with the Volume Activation Management Tool (VAMT).
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: 8992f1f3-830a-4ce7-a248-f3a6377ab77f
|
ms.assetid: 8992f1f3-830a-4ce7-a248-f3a6377ab77f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,46 +1,48 @@
|
|||||||
---
|
---
|
||||||
title: VAMT Requirements (Windows 10)
|
title: VAMT Requirements (Windows 10)
|
||||||
description: VAMT Requirements
|
description: This article includes information about the product key and system requirements for Volume Activation Management Tool (VAMT).
|
||||||
ms.assetid: d14d152b-ab8a-43cb-a8fd-2279364007b9
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: d14d152b-ab8a-43cb-a8fd-2279364007b9
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# VAMT Requirements
|
---
|
||||||
|
|
||||||
This topic includes info about the product key and system requirements for VAMT.
|
# VAMT Requirements
|
||||||
|
|
||||||
## Product Key Requirements
|
This topic includes info about the product key and system requirements for VAMT.
|
||||||
|
|
||||||
The Volume Activation Management Tool (VAMT) can be used to perform activations using any of the following types of product keys.
|
## Product Key Requirements
|
||||||
|
|
||||||
|Product key type |Where to obtain |
|
The Volume Activation Management Tool (VAMT) can be used to perform activations using any of the following types of product keys.
|
||||||
|-----------------|----------------|
|
|
||||||
|<ul><li>Multiple Activation Key (MAK)</li><li>Key Management Service (KMS) host key (CSVLK)</li><li>KMS client setup keys (GVLK)</li></ul> |Volume licensing keys can only be obtained with a signed contract from Microsoft. For more info, see the [Microsoft Volume Licensing portal](https://go.microsoft.com/fwlink/p/?LinkId=227282). |
|
|Product key type |Where to obtain |
|
||||||
|Retail product keys |Obtained at time of product purchase. |
|
|-----------------|----------------|
|
||||||
|
|<ul><li>Multiple Activation Key (MAK)</li><li>Key Management Service (KMS) host key (CSVLK)</li><li>KMS client setup keys (GVLK)</li></ul> |Volume licensing keys can only be obtained with a signed contract from Microsoft. For more info, see the [Microsoft Volume Licensing portal](https://go.microsoft.com/fwlink/p/?LinkId=227282). |
|
||||||
## System Requirements
|
|Retail product keys |Obtained at time of product purchase. |
|
||||||
|
|
||||||
The following table lists the system requirements for the VAMT host computer.
|
## System Requirements
|
||||||
|
|
||||||
| Item | Minimum system requirement |
|
The following table lists the system requirements for the VAMT host computer.
|
||||||
| ---- | ---------------------------|
|
|
||||||
| Computer and Processor | 1 GHz x86 or x64 processor |
|
| Item | Minimum system requirement |
|
||||||
| Memory | 1 GB RAM for x86 or 2 GB RAM for x64 |
|
| ---- | ---------------------------|
|
||||||
| Hard Disk | 16 GB available hard disk space for x86 or 20 GB for x64 |
|
| Computer and Processor | 1 GHz x86 or x64 processor |
|
||||||
| External Drive | Removable media (Optional) |
|
| Memory | 1 GB RAM for x86 or 2 GB RAM for x64 |
|
||||||
| Display | 1024x768 or higher resolution monitor |
|
| Hard Disk | 16 GB available hard disk space for x86 or 20 GB for x64 |
|
||||||
| Network | Connectivity to remote computers via Windows Management Instrumentation (TCP/IP) and Microsoft Activation Web Service on the Internet via HTTPS |
|
| External Drive | Removable media (Optional) |
|
||||||
| Operating System | Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008 R2, Windows Server 2012, or later. |
|
| Display | 1024x768 or higher resolution monitor |
|
||||||
| Additional Requirements | <ul><li>Connection to a SQL Server database. For more info, see [Install VAMT](install-vamt.md).</li><li>PowerShell 3.0: For Windows 8, Windows 8.1, Windows 10, and Windows Server 2012, PowerShell is included in the installation. For previous versions of Windows and Windows Server, you must download PowerShell 3.0. To download PowerShell, go to [Download Windows PowerShell 3.0](https://go.microsoft.com/fwlink/p/?LinkId=218356).</li><li>If installing on Windows Server 2008 R2, you must also install .NET Framework 3.51.</li></ul> |
|
| Network | Connectivity to remote computers via Windows Management Instrumentation (TCP/IP) and Microsoft Activation Web Service on the Internet via HTTPS |
|
||||||
|
| Operating System | Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008 R2, Windows Server 2012, or later. |
|
||||||
## Related topics
|
| Additional Requirements | <ul><li>Connection to a SQL Server database. For more info, see [Install VAMT](install-vamt.md).</li><li>PowerShell 3.0: For Windows 8, Windows 8.1, Windows 10, and Windows Server 2012, PowerShell is included in the installation. For previous versions of Windows and Windows Server, you must download PowerShell 3.0. To download PowerShell, go to [Download Windows PowerShell 3.0](https://go.microsoft.com/fwlink/p/?LinkId=218356).</li><li>If installing on Windows Server 2008 R2, you must also install .NET Framework 3.51.</li></ul> |
|
||||||
- [Install and Configure VAMT](install-configure-vamt.md)
|
|
||||||
|
## Related topics
|
||||||
|
- [Install and Configure VAMT](install-configure-vamt.md)
|
||||||
|
@ -1,32 +1,34 @@
|
|||||||
---
|
---
|
||||||
title: VAMT Step-by-Step Scenarios (Windows 10)
|
title: VAMT Step-by-Step Scenarios (Windows 10)
|
||||||
description: VAMT Step-by-Step Scenarios
|
description: This article contains a list of topics that provide you with step-by-step instructions on implementing VAMT in typical environments.
|
||||||
ms.assetid: 455c542c-4860-4b57-a1f0-7e2d28e11a10
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.assetid: 455c542c-4860-4b57-a1f0-7e2d28e11a10
|
||||||
manager: laurawi
|
ms.reviewer:
|
||||||
ms.author: greglin
|
manager: laurawi
|
||||||
ms.prod: w10
|
ms.author: greglin
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: deploy
|
||||||
ms.pagetype: activation
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.pagetype: activation
|
||||||
ms.date: 04/25/2017
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.date: 04/25/2017
|
||||||
|
ms.topic: article
|
||||||
# VAMT Step-by-Step Scenarios
|
---
|
||||||
|
|
||||||
This section provides step-by-step instructions on implementing the Volume Activation Management Tool (VAMT) in typical environments. VAMT supports many common scenarios; the scenarios in this section describe some of the most common to get you started.
|
# VAMT Step-by-Step Scenarios
|
||||||
|
|
||||||
## In this Section
|
This section provides step-by-step instructions on implementing the Volume Activation Management Tool (VAMT) in typical environments. VAMT supports many common scenarios; the scenarios in this section describe some of the most common to get you started.
|
||||||
|
|
||||||
|Topic |Description |
|
## In this Section
|
||||||
|------|------------|
|
|
||||||
|[Scenario 1: Online Activation](scenario-online-activation-vamt.md) |Describes how to distribute Multiple Activation Keys (MAKs) to products installed on one or more connected computers within a network, and how to instruct these products to contact Microsoft over the Internet for activation. |
|
|Topic |Description |
|
||||||
|[Scenario 2: Proxy Activation](scenario-proxy-activation-vamt.md) |Describes how to use two VAMT host computers — the first one with Internet access and a second computer within an isolated workgroup — as proxies to perform MAK volume activation for workgroup computers that do not have Internet access. |
|
|------|------------|
|
||||||
|[Scenario 3: KMS Client Activation](scenario-kms-activation-vamt.md) |Describes how to use VAMT to configure client products for Key Management Service (KMS) activation. By default, volume license editions of Windows 10, Windows Vista, Windows® 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, or Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. |
|
|[Scenario 1: Online Activation](scenario-online-activation-vamt.md) |Describes how to distribute Multiple Activation Keys (MAKs) to products installed on one or more connected computers within a network, and how to instruct these products to contact Microsoft over the Internet for activation. |
|
||||||
|
|[Scenario 2: Proxy Activation](scenario-proxy-activation-vamt.md) |Describes how to use two VAMT host computers — the first one with Internet access and a second computer within an isolated workgroup — as proxies to perform MAK volume activation for workgroup computers that do not have Internet access. |
|
||||||
## Related topics
|
|[Scenario 3: KMS Client Activation](scenario-kms-activation-vamt.md) |Describes how to use VAMT to configure client products for Key Management Service (KMS) activation. By default, volume license editions of Windows 10, Windows Vista, Windows® 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, or Windows Server® 2012, and Microsoft® Office 2010 use KMS for activation. |
|
||||||
- [Introduction to VAMT](introduction-vamt.md)
|
|
||||||
|
## Related topics
|
||||||
|
- [Introduction to VAMT](introduction-vamt.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 deployment tools
|
title: Windows 10 deployment tools
|
||||||
description: Learn about the tools available to deploy Windows 10.
|
description: This article contains a list of topics that can help you learn about the tools available to deploy Windows 10.
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.assetid: 5C4B0AE3-B2D0-4628-9E73-606F3FAA17BB
|
ms.assetid: 5C4B0AE3-B2D0-4628-9E73-606F3FAA17BB
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,103 +1,106 @@
|
|||||||
---
|
---
|
||||||
title: How to install fonts missing after upgrading to Windows 10
|
title: How to install fonts missing after upgrading to Windows 10
|
||||||
description: Some of the fonts are missing from the system after you upgrade to Windows 10.
|
description: In this article, you'll learn how to install fonts that are missing after you upgrade to Windows 10.
|
||||||
keywords: deploy, upgrade, FoD, optional feature
|
keywords: deploy, upgrade, FoD, optional feature
|
||||||
ms.prod: w10
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.mktglfcycl: plan
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.mktglfcycl: plan
|
||||||
ms.localizationpriority: medium
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.localizationpriority: medium
|
||||||
ms.audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.date: 10/31/2017
|
author: greg-lindsay
|
||||||
ms.reviewer:
|
ms.audience: itpro
|
||||||
manager: laurawi
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.date: 10/31/2017
|
||||||
---
|
ms.reviewer:
|
||||||
# How to install fonts that are missing after upgrading to Windows 10
|
manager: laurawi
|
||||||
|
ms.topic: article
|
||||||
> Applies to: Windows 10
|
---
|
||||||
|
# How to install fonts that are missing after upgrading to Windows 10
|
||||||
When you upgrade from the Windows 7, Windows 8, or Windows 8.1 operating system to Windows 10, certain fonts are no longer available by default post-upgrade. To reduce the operating system footprint, improve performance, and optimize disk space usage, we moved many of the fonts that were previously shipped with prior versions of Windows to the optional features of Windows 10. If you install a fresh instance of Windows 10, or upgrade an older version of Windows to Windows 10, these optional features are not enabled by default. As a result, these fonts appear to be missing from the system.
|
|
||||||
|
> Applies to: Windows 10
|
||||||
If you have documents created using the missing fonts, these documents might display differently on Windows 10.
|
|
||||||
|
When you upgrade from the Windows 7, Windows 8, or Windows 8.1 operating system to Windows 10, certain fonts are no longer available by default post-upgrade. To reduce the operating system footprint, improve performance, and optimize disk space usage, we moved many of the fonts that were previously shipped with prior versions of Windows to the optional features of Windows 10. If you install a fresh instance of Windows 10, or upgrade an older version of Windows to Windows 10, these optional features are not enabled by default. As a result, these fonts appear to be missing from the system.
|
||||||
For example, if you have an English (or French, German, or Spanish) version of Windows 10 installed, you might notice that fonts such as the following are appear to be missing:
|
|
||||||
|
If you have documents created using the missing fonts, these documents might display differently on Windows 10.
|
||||||
- Gautami
|
|
||||||
- Meiryo
|
For example, if you have an English (or French, German, or Spanish) version of Windows 10 installed, you might notice that fonts such as the following are appear to be missing:
|
||||||
- Narkism/Batang
|
|
||||||
- BatangChe
|
- Gautami
|
||||||
- Dotum
|
- Meiryo
|
||||||
- DotumChe
|
- Narkism/Batang
|
||||||
- Gulim
|
- BatangChe
|
||||||
- GulimChe
|
- Dotum
|
||||||
- Gungsuh
|
- DotumChe
|
||||||
- GungsuhChe
|
- Gulim
|
||||||
|
- GulimChe
|
||||||
If you want to use these fonts, you can enable the optional feature to add these back to your system. Be aware that this is a permanent change in behavior for Windows 10, and it will remain this way in future releases.
|
- Gungsuh
|
||||||
|
- GungsuhChe
|
||||||
## Installing language-associated features via language settings:
|
|
||||||
|
If you want to use these fonts, you can enable the optional feature to add these back to your system. Be aware that this is a permanent change in behavior for Windows 10, and it will remain this way in future releases.
|
||||||
If you want to use the fonts from the optional feature and you know that you will want to view Web pages, edit documents, or use apps in the language associated with that feature, add that language into your user profile. You do this the Settings app.
|
|
||||||
|
## Installing language-associated features via language settings:
|
||||||
For example, here are the steps to install the fonts associated with the Hebrew language:
|
|
||||||
|
If you want to use the fonts from the optional feature and you know that you will want to view Web pages, edit documents, or use apps in the language associated with that feature, add that language into your user profile. You do this the Settings app.
|
||||||
1. Click **Start > Settings**.
|
|
||||||
2. In Settings, click **Time & language**, and then click **Region & language**.
|
For example, here are the steps to install the fonts associated with the Hebrew language:
|
||||||
3. If Hebrew is not included in the list of languages, click the plus sign (**+**) to add a language.
|
|
||||||
4. Find Hebrew, and then click it to add it to your language list.
|
1. Click **Start > Settings**.
|
||||||
|
2. In Settings, click **Time & language**, and then click **Region & language**.
|
||||||
Once you have added Hebrew to your language list, then the optional Hebrew font feature and other optional features for Hebrew language support are installed. This should only take a few minutes.
|
3. If Hebrew is not included in the list of languages, click the plus sign (**+**) to add a language.
|
||||||
|
4. Find Hebrew, and then click it to add it to your language list.
|
||||||
> Note: The optional features are installed by Windows Update. This means you need to be online for the Windows Update service to work.
|
|
||||||
|
Once you have added Hebrew to your language list, then the optional Hebrew font feature and other optional features for Hebrew language support are installed. This should only take a few minutes.
|
||||||
## Install optional fonts manually without changing language settings:
|
|
||||||
|
> Note: The optional features are installed by Windows Update. This means you need to be online for the Windows Update service to work.
|
||||||
If you want to use fonts in an optional feature but don't need to search web pages, edit documents, or use apps in the associated language, you can install the optional font features manually without changing your language settings.
|
|
||||||
|
## Install optional fonts manually without changing language settings:
|
||||||
For example, here are the steps to install the fonts associated with the Hebrew language without adding the Hebrew language itself to your language preferences:
|
|
||||||
|
If you want to use fonts in an optional feature but don't need to search web pages, edit documents, or use apps in the associated language, you can install the optional font features manually without changing your language settings.
|
||||||
1. Click **Start > Settings**.
|
|
||||||
2. In Settings, click **Apps**, click **Apps & features**, and then click **Manage optional features**.
|
For example, here are the steps to install the fonts associated with the Hebrew language without adding the Hebrew language itself to your language preferences:
|
||||||
|
|
||||||
3. If you don't see **Hebrew Supplemental Fonts** in the list of installed features, click the plus sign (**+**) to add a feature.
|
1. Click **Start > Settings**.
|
||||||
4. Select **Hebrew Supplemental Fonts** in the list, and then click **Install**.
|
2. In Settings, click **Apps**, click **Apps & features**, and then click **Manage optional features**.
|
||||||
|
|
||||||
> Note: The optional features are installed by Windows Update. You need to be online for the Windows Update service to work.
|
3. If you don't see **Hebrew Supplemental Fonts** in the list of installed features, click the plus sign (**+**) to add a feature.
|
||||||
|
4. Select **Hebrew Supplemental Fonts** in the list, and then click **Install**.
|
||||||
## Fonts included in optional font features
|
|
||||||
|
> Note: The optional features are installed by Windows Update. You need to be online for the Windows Update service to work.
|
||||||
Here is a comprehensive list of the font families in each of the optional features. Some font families might include multiple fonts for different weights and styles.
|
|
||||||
|
## Fonts included in optional font features
|
||||||
- Arabic Script Supplemental Fonts: Aldhabi, Andalus, Arabic Typesetting, Microsoft Uighur, Sakkal Majalla, Simplified Arabic, Traditional Arabic, Urdu Typesetting
|
|
||||||
- Bangla Script Supplemental Fonts: Shonar Bangla, Vrinda
|
Here is a comprehensive list of the font families in each of the optional features. Some font families might include multiple fonts for different weights and styles.
|
||||||
- Canadian Aboriginal Syllabics Supplemental Fonts: Euphemia
|
|
||||||
- Cherokee Supplemental Fonts: Plantagenet Cherokee
|
- Arabic Script Supplemental Fonts: Aldhabi, Andalus, Arabic Typesetting, Microsoft Uighur, Sakkal Majalla, Simplified Arabic, Traditional Arabic, Urdu Typesetting
|
||||||
- Chinese (Simplified) Supplemental Fonts: DengXian, FangSong, KaiTi, SimHei
|
- Bangla Script Supplemental Fonts: Shonar Bangla, Vrinda
|
||||||
- Chinese (Traditional) Supplemental Fonts: DFKai-SB, MingLiU, MingLiU_HKSCS, PMingLiU
|
- Canadian Aboriginal Syllabics Supplemental Fonts: Euphemia
|
||||||
- Devanagari Supplemental Fonts: Aparajita, Kokila, Mangal, Sanskrit Text, Utsaah
|
- Cherokee Supplemental Fonts: Plantagenet Cherokee
|
||||||
- Ethiopic Supplemental Fonts: Nyala
|
- Chinese (Simplified) Supplemental Fonts: DengXian, FangSong, KaiTi, SimHei
|
||||||
- Gujarati Supplemental Fonts: Shruti
|
- Chinese (Traditional) Supplemental Fonts: DFKai-SB, MingLiU, MingLiU_HKSCS, PMingLiU
|
||||||
- Gurmukhi Supplemental Fonts: Raavi
|
- Devanagari Supplemental Fonts: Aparajita, Kokila, Mangal, Sanskrit Text, Utsaah
|
||||||
- Hebrew Supplemental Fonts: Aharoni Bold, David, FrankRuehl, Gisha, Levanim MT, Miriam, Miriam Fixed, Narkism, Rod
|
- Ethiopic Supplemental Fonts: Nyala
|
||||||
- Japanese Supplemental Fonts: Meiryo, Meiryo UI, MS Gothic, MS PGothic, MS UI Gothic, MS Mincho, MS PMincho, Yu Mincho
|
- Gujarati Supplemental Fonts: Shruti
|
||||||
- Kannada Supplemental Fonts: Tunga
|
- Gurmukhi Supplemental Fonts: Raavi
|
||||||
- Khmer Supplemental Fonts: DaunPenh, Khmer UI, MoolBoran
|
- Hebrew Supplemental Fonts: Aharoni Bold, David, FrankRuehl, Gisha, Levanim MT, Miriam, Miriam Fixed, Narkism, Rod
|
||||||
- Korean Supplemental Fonts: Batang, BatangChe, Dotum, DotumChe, Gulim, GulimChe, Gungsuh, GungsuhChe
|
- Japanese Supplemental Fonts: Meiryo, Meiryo UI, MS Gothic, MS PGothic, MS UI Gothic, MS Mincho, MS PMincho, Yu Mincho
|
||||||
- Lao Supplemental Fonts: DokChampa, Lao UI
|
- Kannada Supplemental Fonts: Tunga
|
||||||
- Malayalam Supplemental Fonts: Karthika
|
- Khmer Supplemental Fonts: DaunPenh, Khmer UI, MoolBoran
|
||||||
- Odia Supplemental Fonts: Kalinga
|
- Korean Supplemental Fonts: Batang, BatangChe, Dotum, DotumChe, Gulim, GulimChe, Gungsuh, GungsuhChe
|
||||||
- Pan-European Supplemental Fonts: Arial Nova, Georgia Pro, Gill Sans Nova, Neue Haas Grotesk, Rockwell Nova, Verdana Pro
|
- Lao Supplemental Fonts: DokChampa, Lao UI
|
||||||
- Sinhala Supplemental Fonts: Iskoola Pota
|
- Malayalam Supplemental Fonts: Karthika
|
||||||
- Syriac Supplemental Fonts: Estrangelo Edessa
|
- Odia Supplemental Fonts: Kalinga
|
||||||
- Tamil Supplemental Fonts: Latha, Vijaya
|
- Pan-European Supplemental Fonts: Arial Nova, Georgia Pro, Gill Sans Nova, Neue Haas Grotesk, Rockwell Nova, Verdana Pro
|
||||||
- Telugu Supplemental Fonts: Gautami, Vani
|
- Sinhala Supplemental Fonts: Iskoola Pota
|
||||||
- Thai Supplemental Fonts: Angsana New, AngsanaUPC, Browallia New, BrowalliaUPC, Cordia New, CordiaUPC, DilleniaUPC, EucrosiaUPC, FreesiaUPC, IrisUPC, JasmineUPC, KodchiangUPC, Leelawadee, LilyUPC
|
- Syriac Supplemental Fonts: Estrangelo Edessa
|
||||||
|
- Tamil Supplemental Fonts: Latha, Vijaya
|
||||||
## Related Topics
|
- Telugu Supplemental Fonts: Gautami, Vani
|
||||||
|
- Thai Supplemental Fonts: Angsana New, AngsanaUPC, Browallia New, BrowalliaUPC, Cordia New, CordiaUPC, DilleniaUPC, EucrosiaUPC, FreesiaUPC, IrisUPC, JasmineUPC, KodchiangUPC, Leelawadee, LilyUPC
|
||||||
[Download the list of all available language FODs](https://download.microsoft.com/download/0/A/A/0AA4342D-3933-4216-A90D-3BA8392FB1D1/Windows%2010%201703%20FOD%20to%20LP%20Mapping%20Table.xlsx)
|
|
||||||
|
## Related Topics
|
||||||
[Features On Demand V2 (Capabilities)](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities#span-idrelatedtopicsspanrelated-topics)
|
|
||||||
|
[Download the list of all available language FODs](https://download.microsoft.com/download/0/A/A/0AA4342D-3933-4216-A90D-3BA8392FB1D1/Windows%2010%201703%20FOD%20to%20LP%20Mapping%20Table.xlsx)
|
||||||
[Add Language Packs to Windows](/windows-hardware/manufacture/desktop/add-language-packs-to-windows)
|
|
||||||
|
[Features On Demand V2 (Capabilities)](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities#span-idrelatedtopicsspanrelated-topics)
|
||||||
|
|
||||||
|
[Add Language Packs to Windows](/windows-hardware/manufacture/desktop/add-language-packs-to-windows)
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Step by step - Deploy Windows 10 in a test lab using MDT
|
title: Step by step - Deploy Windows 10 in a test lab using MDT
|
||||||
description: Deploy Windows 10 in a test lab using Microsoft Deployment Toolkit (MDT)
|
description: In this article, you'll learn how to deploy Windows 10 in a test lab using Microsoft Deployment Toolkit (MDT).
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Steps to deploy Windows 10 with Microsoft Endpoint Configuration Manager
|
title: Steps to deploy Windows 10 with Microsoft Endpoint Configuration Manager
|
||||||
description: Deploy Windows 10 in a test lab using Microsoft Endpoint Configuration Manager
|
description: In this article, you'll learn how to deploy Windows 10 in a test lab using Microsoft endpoint configuration manager.
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,10 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Configure a test lab to deploy Windows 10
|
title: Configure a test lab to deploy Windows 10
|
||||||
|
description: In this article, you will learn about concepts and procedures for deploying Windows 10 in a proof of concept lab environment.
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.audience: itpro
|
ms.audience: itpro
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
description: Concepts and procedures for deploying Windows 10 in a proof of concept lab environment.
|
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 Subscription Activation
|
title: Windows 10 Subscription Activation
|
||||||
description: How to dynamically enable Windows 10 Enterprise or Education subscriptions
|
description: In this article, you will learn how to dynamically enable Windows 10 Enterprise or Education subscriptions.
|
||||||
keywords: upgrade, update, task sequence, deploy
|
keywords: upgrade, update, task sequence, deploy
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
@ -2,8 +2,9 @@
|
|||||||
title: Adding devices
|
title: Adding devices
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: How to add devices to Windows Autopilot
|
description: In this article, you will learn about how to register a device to the Windows Autopilot deployment service before deploying it using the Windows Autopilot.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
@ -1,9 +1,10 @@
|
|||||||
---
|
---
|
||||||
title: Windows Autopilot device guidelines
|
title: Windows Autopilot device guidelines
|
||||||
|
description: In this article, you will learn about hardware, firmware, and software best practices for Windows Autopilot deployment.
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Learn all about hardware, firmware, and software best practices for Windows Autopilot deployment.
|
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
@ -1,9 +1,10 @@
|
|||||||
---
|
---
|
||||||
title: Windows Autopilot FAQ
|
title: Windows Autopilot FAQ
|
||||||
|
description: This topic provides OEMs, partners, administrators, & end users with answers to some FAQs about deploying Windows 10 with Windows Autopilot.
|
||||||
ms.reviewer: This topic provides OEMs, partners, administrators, and end users with answers to some frequently asked questions about deploying Windows 10 with Windows Autopilot.
|
ms.reviewer: This topic provides OEMs, partners, administrators, and end users with answers to some frequently asked questions about deploying Windows 10 with Windows Autopilot.
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Support information for Windows Autopilot
|
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: low
|
ms.localizationpriority: low
|
||||||
|
@ -1,420 +1,422 @@
|
|||||||
---
|
---
|
||||||
title: Windows Autopilot motherboard replacement
|
title: Windows Autopilot motherboard replacement
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Windows Autopilot deployment MBR scenarios
|
description: Find guidance for Windows Autopilot device repairs that Microsoft partners can use for servicing scenarios like Motherboard Replacement (MBR).
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.author: greglin
|
author: greg-lindsay
|
||||||
ms.collection: M365-modern-desktop
|
ms.author: greglin
|
||||||
ms.topic: article
|
ms.collection: M365-modern-desktop
|
||||||
---
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
|
---
|
||||||
# Windows Autopilot motherboard replacement scenario guidance
|
|
||||||
|
|
||||||
**Applies to**
|
# Windows Autopilot motherboard replacement scenario guidance
|
||||||
|
|
||||||
- Windows 10
|
**Applies to**
|
||||||
|
|
||||||
This document offers guidance for Windows Autopilot device repair scenarios that Microsoft partners can use in Motherboard Replacement (MBR) situations, and other servicing scenarios.
|
- Windows 10
|
||||||
|
|
||||||
Repairing Autopilot enrolled devices is complex, as it tries to balance OEM requirements with Windows Autopilot requirements. Specifically, OEM’s require strict uniqueness across motherboards, MAC addresses, etc., while Windows Autopilot requires strict uniqueness at the Hardware ID level for each device to enable successful registration. The Hardware ID does not always accommodate all the OEM hardware component requirements, thus these requirements are sometimes at odds, causing issues with some repair scenarios.
|
This document offers guidance for Windows Autopilot device repair scenarios that Microsoft partners can use in Motherboard Replacement (MBR) situations, and other servicing scenarios.
|
||||||
|
|
||||||
**Motherboard Replacement (MBR)**
|
Repairing Autopilot enrolled devices is complex, as it tries to balance OEM requirements with Windows Autopilot requirements. Specifically, OEM's require strict uniqueness across motherboards, MAC addresses, etc., while Windows Autopilot requires strict uniqueness at the Hardware ID level for each device to enable successful registration. The Hardware ID does not always accommodate all the OEM hardware component requirements, thus these requirements are sometimes at odds, causing issues with some repair scenarios.
|
||||||
|
|
||||||
If a motherboard replacement is needed on a Windows Autopilot device, the following process is recommended:
|
**Motherboard Replacement (MBR)**
|
||||||
|
|
||||||
1. [Deregister the device](#deregister-the-autopilot-device-from-the-autopilot-program) from Windows Autopilot
|
If a motherboard replacement is needed on a Windows Autopilot device, the following process is recommended:
|
||||||
2. [Replace the motherboard](#replace-the-motherboard)
|
|
||||||
3. [Capture a new device ID (4K HH)](#capture-a-new-autopilot-device-id-4k-hh-from-the-device)
|
1. [Deregister the device](#deregister-the-autopilot-device-from-the-autopilot-program) from Windows Autopilot
|
||||||
4. [Reregister the device](#reregister-the-repaired-device-using-the-new-device-id) with Windows Autopilot
|
2. [Replace the motherboard](#replace-the-motherboard)
|
||||||
5. [Reset the device](#reset-the-device)
|
3. [Capture a new device ID (4K HH)](#capture-a-new-autopilot-device-id-4k-hh-from-the-device)
|
||||||
6. [Return the device](#return-the-repaired-device-to-the-customer)
|
4. [Reregister the device](#reregister-the-repaired-device-using-the-new-device-id) with Windows Autopilot
|
||||||
|
5. [Reset the device](#reset-the-device)
|
||||||
Each of these steps is described below.
|
6. [Return the device](#return-the-repaired-device-to-the-customer)
|
||||||
|
|
||||||
## Deregister the Autopilot device from the Autopilot program
|
Each of these steps is described below.
|
||||||
|
|
||||||
Before the device arrives at the repair facility, it must be deregistered by the entity that registered it. Only the entity that registered the device can deregister it. This might be the customer IT Admin, the OEM, or the CSP partner. If the IT Admin registered the device, they likely did so via Intune (or possibly the Microsoft Store for Business). In that case, they should deregister the device from Intune (or MSfB). This is necessary because devices registered in Intune will not show up in MPC. However, if the OEM or CSP partner registered the device, they likely did so via the Microsoft Partner Center (MPC). In that case, they should deregister the device from MPC, which will also remove it from the customer IT Admin’s Intune account. Below, we describe the steps an IT Admin would go through to deregister a device from Intune, and the steps an OEM or CSP would go through to deregister a device from MPC.
|
## Deregister the Autopilot device from the Autopilot program
|
||||||
|
|
||||||
**NOTE**: When possible, an OEM or CSP should register Autopilot devices, rather than having the customer do it. This will avoid problems where OEMs or CSPs may not be able to deregister a device if, for example, a customer leasing a device goes out of business before deregistering it themselves.
|
Before the device arrives at the repair facility, it must be deregistered by the entity that registered it. Only the entity that registered the device can deregister it. This might be the customer IT Admin, the OEM, or the CSP partner. If the IT Admin registered the device, they likely did so via Intune (or possibly the Microsoft Store for Business). In that case, they should deregister the device from Intune (or MSfB). This is necessary because devices registered in Intune will not show up in MPC. However, if the OEM or CSP partner registered the device, they likely did so via the Microsoft Partner Center (MPC). In that case, they should deregister the device from MPC, which will also remove it from the customer IT Admin's Intune account. Below, we describe the steps an IT Admin would go through to deregister a device from Intune, and the steps an OEM or CSP would go through to deregister a device from MPC.
|
||||||
|
|
||||||
**EXCEPTION**: If a customer grants an OEM permission to register devices on their behalf via the automated consent process, then an OEM can use the API to deregister devices they didn’t register themselves (instead, the customer registered the devices). But keep in mind that this would only remove those devices from the Autopilot program, it would not disenroll them from Intune or disjoin them from AAD. The customer must do those steps, if desired, through Intune.
|
**NOTE**: When possible, an OEM or CSP should register Autopilot devices, rather than having the customer do it. This will avoid problems where OEMs or CSPs may not be able to deregister a device if, for example, a customer leasing a device goes out of business before deregistering it themselves.
|
||||||
|
|
||||||
### Deregister from Intune
|
**EXCEPTION**: If a customer grants an OEM permission to register devices on their behalf via the automated consent process, then an OEM can use the API to deregister devices they didn't register themselves (instead, the customer registered the devices). But keep in mind that this would only remove those devices from the Autopilot program, it would not disenroll them from Intune or disjoin them from AAD. The customer must do those steps, if desired, through Intune.
|
||||||
|
|
||||||
To deregister an Autopilot device from Intune, an IT Admin would:
|
### Deregister from Intune
|
||||||
|
|
||||||
1. Sign in to their Intune account
|
To deregister an Autopilot device from Intune, an IT Admin would:
|
||||||
2. Navigate to Intune > Groups > All groups
|
|
||||||
3. Remove the desired device from its group
|
1. Sign in to their Intune account
|
||||||
4. Navigate to Intune > Devices > All devices
|
2. Navigate to Intune > Groups > All groups
|
||||||
5. Select the checkbox next to the device you want to delete, then click the Delete button on the top menu
|
3. Remove the desired device from its group
|
||||||
6. Navigate to Intune > Devices > Azure AD devices
|
4. Navigate to Intune > Devices > All devices
|
||||||
7. Select the checkbox next to the device you want to delete, then click the Delete button along the top menu
|
5. Select the checkbox next to the device you want to delete, then click the Delete button on the top menu
|
||||||
8. Navigate to Intune > Device enrollment > Windows enrollment > Devices
|
6. Navigate to Intune > Devices > Azure AD devices
|
||||||
9. Select the checkbox next to the device you want to deregister
|
7. Select the checkbox next to the device you want to delete, then click the Delete button along the top menu
|
||||||
10. Click the extended menu icon (“…”) on the far right end of the line containing the device you want to deregister in order to expose an additional menu with the option to “unassign user”
|
8. Navigate to Intune > Device enrollment > Windows enrollment > Devices
|
||||||
11. Click “Unassign user” if the device was previously assigned to a user; if not, this option will be grayed-out and can be ignored
|
9. Select the checkbox next to the device you want to deregister
|
||||||
12. With the unassigned device still selected, click the Delete button along the top menu to remove this device
|
10. Click the extended menu icon ("…") on the far right end of the line containing the device you want to deregister in order to expose an additional menu with the option to "unassign user"
|
||||||
|
11. Click "Unassign user" if the device was previously assigned to a user; if not, this option will be grayed-out and can be ignored
|
||||||
**NOTE**: These steps deregister the device from Autopilot, but also unenroll the device from Intune, and disjoin the device from AAD. While it may appear that only deregistering the device from Autopilot is needed, there are certain barriers in place within Intune that necessitate all the steps above be done, which is best practice anyway in case the device gets lost or becomes unrecoverable, to eliminate the possibility of orphaned devices existing in the Autopilot database, or Intune, or AAD. If a device gets into an unrecoverable state, you can contact the appropriate [Microsoft support alias](autopilot-support.md) for assistance.
|
12. With the unassigned device still selected, click the Delete button along the top menu to remove this device
|
||||||
|
|
||||||
The deregistration process will take about 15 minutes. You can accelerate the process by clicking the “Sync” button, then “Refresh” the display until the device is no longer present.
|
**NOTE**: These steps deregister the device from Autopilot, but also unenroll the device from Intune, and disjoin the device from AAD. While it may appear that only deregistering the device from Autopilot is needed, there are certain barriers in place within Intune that necessitate all the steps above be done, which is best practice anyway in case the device gets lost or becomes unrecoverable, to eliminate the possibility of orphaned devices existing in the Autopilot database, or Intune, or AAD. If a device gets into an unrecoverable state, you can contact the appropriate [Microsoft support alias](autopilot-support.md) for assistance.
|
||||||
|
|
||||||
More details on deregistering devices from Intune can be found [here](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-device-group).
|
The deregistration process will take about 15 minutes. You can accelerate the process by clicking the "Sync" button, then "Refresh" the display until the device is no longer present.
|
||||||
|
|
||||||
### Deregister from MPC
|
More details on deregistering devices from Intune can be found [here](https://docs.microsoft.com/intune/enrollment-autopilot#create-an-autopilot-device-group).
|
||||||
|
|
||||||
To deregister an Autopilot device from the Microsoft Partner Center (MPC), a CSP would:
|
### Deregister from MPC
|
||||||
|
|
||||||
1. Log into MPC
|
To deregister an Autopilot device from the Microsoft Partner Center (MPC), a CSP would:
|
||||||
2. Navigate to Customer > Devices
|
|
||||||
3. Select the device to be deregistered and click the “Delete device” button
|
1. Log into MPC
|
||||||
|
2. Navigate to Customer > Devices
|
||||||

|
3. Select the device to be deregistered and click the "Delete device" button
|
||||||
|
|
||||||
**NOTE**: Deregistering a device from Autopilot in MPC does only that; it does not also unenroll the device from the MDM (Intune), nor does it disjoin the device from AAD. Therefore, if possible, the OEM/CSP ideally should work with the customer IT Admin to have the device fully removed per the Intune steps in the previous section.
|

|
||||||
|
|
||||||
Alternatively, an OEM partner that has integrated the OEM Direct APIs can deregister a device by calling the AutopilotDeviceRegistration API with the TenantID and TenantDomain fields left blank in the request call.
|
**NOTE**: Deregistering a device from Autopilot in MPC does only that; it does not also unenroll the device from the MDM (Intune), nor does it disjoin the device from AAD. Therefore, if possible, the OEM/CSP ideally should work with the customer IT Admin to have the device fully removed per the Intune steps in the previous section.
|
||||||
|
|
||||||
Because the repair facility will not have access to the user’s login credentials, the repair facility will have to reimage the device as part of the repair process. This means that the customer should do three things before sending the device off for repair:
|
Alternatively, an OEM partner that has integrated the OEM Direct APIs can deregister a device by calling the AutopilotDeviceRegistration API with the TenantID and TenantDomain fields left blank in the request call.
|
||||||
1. Copy all important data off the device.
|
|
||||||
2. Let the repair facility know which version of Windows they should reinstall after the repair.
|
Because the repair facility will not have access to the user's login credentials, the repair facility will have to reimage the device as part of the repair process. This means that the customer should do three things before sending the device off for repair:
|
||||||
3. If applicable, let the repair facility know which version of Office they should reinstall after the repair.
|
1. Copy all important data off the device.
|
||||||
|
2. Let the repair facility know which version of Windows they should reinstall after the repair.
|
||||||
## Replace the motherboard
|
3. If applicable, let the repair facility know which version of Office they should reinstall after the repair.
|
||||||
|
|
||||||
Technicians replace the motherboard (or other hardware) on the broken device. A replacement DPK is injected.
|
## Replace the motherboard
|
||||||
|
|
||||||
Repair and key replacement processes vary between facilities. Sometimes repair facilities receive motherboard spare parts from OEMs that have replacement DPKs already injected, but sometimes not. Sometimes repair facilities receive fully-functional BIOS tools from OEMs, but sometimes not. This means that the quality of the data in the BIOS after a MBR varies. To ensure the repaired device will still be Autopilot-capable following its repair, the new (post-repair) BIOS should be able to successfully gather and populate the following information at a minimum:
|
Technicians replace the motherboard (or other hardware) on the broken device. A replacement DPK is injected.
|
||||||
|
|
||||||
- DiskSerialNumber
|
Repair and key replacement processes vary between facilities. Sometimes repair facilities receive motherboard spare parts from OEMs that have replacement DPKs already injected, but sometimes not. Sometimes repair facilities receive fully-functional BIOS tools from OEMs, but sometimes not. This means that the quality of the data in the BIOS after a MBR varies. To ensure the repaired device will still be Autopilot-capable following its repair, the new (post-repair) BIOS should be able to successfully gather and populate the following information at a minimum:
|
||||||
- SmbiosSystemSerialNumber
|
|
||||||
- SmbiosSystemManufacturer
|
- DiskSerialNumber
|
||||||
- SmbiosSystemProductName
|
- SmbiosSystemSerialNumber
|
||||||
- SmbiosUuid
|
- SmbiosSystemManufacturer
|
||||||
- TPM EKPub
|
- SmbiosSystemProductName
|
||||||
- MacAddress
|
- SmbiosUuid
|
||||||
- ProductKeyID
|
- TPM EKPub
|
||||||
- OSType
|
- MacAddress
|
||||||
|
- ProductKeyID
|
||||||
**NOTE**: For simplicity, and because processes vary between repair facilities, we have excluded many of the additional steps often used in a MBR, such as:
|
- OSType
|
||||||
- Verify that the device is still functional
|
|
||||||
- Disable BitLocker*
|
**NOTE**: For simplicity, and because processes vary between repair facilities, we have excluded many of the additional steps often used in a MBR, such as:
|
||||||
- Repair the Boot Configuration Data (BCD)
|
- Verify that the device is still functional
|
||||||
- Repair and verify the network driver operation
|
- Disable BitLocker*
|
||||||
|
- Repair the Boot Configuration Data (BCD)
|
||||||
*BitLocker can be suspended rather than disbled if the technician has the ability to resume it after the repair.
|
- Repair and verify the network driver operation
|
||||||
|
|
||||||
## Capture a new Autopilot device ID (4K HH) from the device
|
*BitLocker can be suspended rather than disbled if the technician has the ability to resume it after the repair.
|
||||||
|
|
||||||
Repair technicians must sign in to the repaired device to capture the new device ID. Assuming the repair technician does NOT have access to the customer’s login credentials, they will have to reimage the device in order to gain access, per the following steps:
|
## Capture a new Autopilot device ID (4K HH) from the device
|
||||||
|
|
||||||
1. The repair technician creates a [WinPE bootable USB drive](https://docs.microsoft.com/windows-hardware/manufacture/desktop/oem-deployment-of-windows-10-for-desktop-editions#create-a-bootable-windows-pe-winpe-partition).
|
Repair technicians must sign in to the repaired device to capture the new device ID. Assuming the repair technician does NOT have access to the customer's login credentials, they will have to reimage the device in order to gain access, per the following steps:
|
||||||
2. The repair technician boots the device to WinPE.
|
|
||||||
3. The repair technician [applies a new Windows image to the device](https://docs.microsoft.com/windows-hardware/manufacture/desktop/work-with-windows-images).
|
1. The repair technician creates a [WinPE bootable USB drive](https://docs.microsoft.com/windows-hardware/manufacture/desktop/oem-deployment-of-windows-10-for-desktop-editions#create-a-bootable-windows-pe-winpe-partition).
|
||||||
|
2. The repair technician boots the device to WinPE.
|
||||||
**NOTE**: Ideally, the same version of Windows should be reimaged onto the device that was originally on the device, so some coordination will be required between the repair facility and customer to capture this information at the time the device arrives for repair. This might include the customer sending the repair facility a customized image (.ppk file) via a USB stick, for example.
|
3. The repair technician [applies a new Windows image to the device](https://docs.microsoft.com/windows-hardware/manufacture/desktop/work-with-windows-images).
|
||||||
|
|
||||||
4. The repair technician boots the device into the new Windows image.
|
**NOTE**: Ideally, the same version of Windows should be reimaged onto the device that was originally on the device, so some coordination will be required between the repair facility and customer to capture this information at the time the device arrives for repair. This might include the customer sending the repair facility a customized image (.ppk file) via a USB stick, for example.
|
||||||
5. Once on the desktop, the repair technician captures the new device ID (4K HH) off the device using either the OA3 Tool or the PowerShell script, as described below.
|
|
||||||
|
4. The repair technician boots the device into the new Windows image.
|
||||||
Those repair facilities with access to the OA3 Tool (which is part of the ADK) can use the tool to capture the 4K Hardware Hash (4K HH).
|
5. Once on the desktop, the repair technician captures the new device ID (4K HH) off the device using either the OA3 Tool or the PowerShell script, as described below.
|
||||||
|
|
||||||
Alternatively, the [WindowsAutoPilotInfo Powershell script](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) can be used to capture the 4K HH by following these steps:
|
Those repair facilities with access to the OA3 Tool (which is part of the ADK) can use the tool to capture the 4K Hardware Hash (4K HH).
|
||||||
|
|
||||||
1. Install the script from the [PowerShell Gallery](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) or from the command line (command line installation is shown below).
|
Alternatively, the [WindowsAutoPilotInfo Powershell script](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) can be used to capture the 4K HH by following these steps:
|
||||||
2. Navigate to the script directory and run it on the device when the device is either in Full OS or Audit Mode. See the following example.
|
|
||||||
|
1. Install the script from the [PowerShell Gallery](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) or from the command line (command line installation is shown below).
|
||||||
```powershell
|
2. Navigate to the script directory and run it on the device when the device is either in Full OS or Audit Mode. See the following example.
|
||||||
md c:\HWID
|
|
||||||
Set-Location c:\HWID
|
```powershell
|
||||||
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Unrestricted -Force
|
md c:\HWID
|
||||||
Install-Script -Name Get-WindowsAutopilotInfo -Force
|
Set-Location c:\HWID
|
||||||
Get-WindowsAutopilotInfo.ps1 -OutputFile AutopilotHWID.csv
|
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Unrestricted -Force
|
||||||
```
|
Install-Script -Name Get-WindowsAutopilotInfo -Force
|
||||||
|
Get-WindowsAutopilotInfo.ps1 -OutputFile AutopilotHWID.csv
|
||||||
>If you are prompted to install the NuGet package, choose **Yes**.<br>
|
```
|
||||||
>If, after installing the script you get an error that Get-WindowsAutopilotInfo.ps1 is not found, verify that C:\Program Files\WindowsPowerShell\Scripts is present in your PATH variable.<br>
|
|
||||||
>If the Install-Script cmdlet fails, verify that you have the default PowerShell repository registered (**Get-PSRepository**) or register the default repository with **Register-PSRepository -Default -Verbose**.
|
>If you are prompted to install the NuGet package, choose **Yes**.<br>
|
||||||
|
>If, after installing the script you get an error that Get-WindowsAutopilotInfo.ps1 is not found, verify that C:\Program Files\WindowsPowerShell\Scripts is present in your PATH variable.<br>
|
||||||
The script creates a .csv file that contains the device information, including the complete 4K HH. Save this file so that you can access it later. The service facility will use this 4K HH to reregister device as described below. Be sure to use the -OutputFile parameter when saving the file, which ensures that file formatting is correct. Do not attempt to pipe the command output to a file manually.
|
>If the Install-Script cmdlet fails, verify that you have the default PowerShell repository registered (**Get-PSRepository**) or register the default repository with **Register-PSRepository -Default -Verbose**.
|
||||||
|
|
||||||
**NOTE**: If the repair facility does not have the ability to run the OA3 tool or PowerShell script to capture the new 4K HH, then the CSP (or OEM) partners must do this for them. Without some entity capturing the new 4K HH, there is no way to reregister this device as an Autopilot device.
|
The script creates a .csv file that contains the device information, including the complete 4K HH. Save this file so that you can access it later. The service facility will use this 4K HH to reregister device as described below. Be sure to use the -OutputFile parameter when saving the file, which ensures that file formatting is correct. Do not attempt to pipe the command output to a file manually.
|
||||||
|
|
||||||
|
**NOTE**: If the repair facility does not have the ability to run the OA3 tool or PowerShell script to capture the new 4K HH, then the CSP (or OEM) partners must do this for them. Without some entity capturing the new 4K HH, there is no way to reregister this device as an Autopilot device.
|
||||||
## Reregister the repaired device using the new device ID
|
|
||||||
|
|
||||||
If an OEM is not able to reregister the device, then the repair facility or CSP should reregister the device using MPC, or the customer IT Admin should be advised to reregister the device via Intune (or MSfB). Both ways of reregistering a device are shown below.
|
## Reregister the repaired device using the new device ID
|
||||||
|
|
||||||
### Reregister from Intune
|
If an OEM is not able to reregister the device, then the repair facility or CSP should reregister the device using MPC, or the customer IT Admin should be advised to reregister the device via Intune (or MSfB). Both ways of reregistering a device are shown below.
|
||||||
|
|
||||||
To reregister an Autopilot device from Intune, an IT Admin would:
|
### Reregister from Intune
|
||||||
1. Sign in to Intune.
|
|
||||||
2. Navigate to Device enrollment > Windows enrollment > Devices > Import.
|
To reregister an Autopilot device from Intune, an IT Admin would:
|
||||||
3. Click the **Import** button to upload a csv file containing the device ID of the device to be reregistered (the device ID was the 4K HH captured by the PowerShell script or OA3 tool described previously in this document).
|
1. Sign in to Intune.
|
||||||
|
2. Navigate to Device enrollment > Windows enrollment > Devices > Import.
|
||||||
The following video provides a good overview of how to (re)register devices via MSfB.<br>
|
3. Click the **Import** button to upload a csv file containing the device ID of the device to be reregistered (the device ID was the 4K HH captured by the PowerShell script or OA3 tool described previously in this document).
|
||||||
|
|
||||||
> [!VIDEO https://www.youtube.com/embed/IpLIZU_j7Z0]
|
The following video provides a good overview of how to (re)register devices via MSfB.<br>
|
||||||
|
|
||||||
### Reregister from MPC
|
> [!VIDEO https://www.youtube.com/embed/IpLIZU_j7Z0]
|
||||||
|
|
||||||
To reregister an Autopilot device from MPC, an OEM or CSP would:
|
### Reregister from MPC
|
||||||
|
|
||||||
1. Sign in to MPC.
|
To reregister an Autopilot device from MPC, an OEM or CSP would:
|
||||||
2. Navigate to the Customer > Devices page and click the **Add devices** button to upload the csv file.
|
|
||||||
|
1. Sign in to MPC.
|
||||||
<br>
|
2. Navigate to the Customer > Devices page and click the **Add devices** button to upload the csv file.
|
||||||

|
|
||||||
|
<br>
|
||||||
In the case of reregistering a repaired device through MPC, the uploaded csv file must contain the 4K HH for the device, and not just the PKID or Tuple (SerialNumber + OEMName + ModelName). If only the PKID or Tuple were used, the Autopilot service would be unable to find a match in the Autopilot database, since no 4K HH info was ever previously submitted for this essentially “new” device, and the upload will fail, likely returning a ZtdDeviceNotFound error. So, again, only upload the 4K HH, not the Tuple or PKID.
|

|
||||||
|
|
||||||
**NOTE**: When including the 4K HH in the csv file, you do NOT also need to include the PKID or Tuple. Those columns may be left blank, as shown below:
|
In the case of reregistering a repaired device through MPC, the uploaded csv file must contain the 4K HH for the device, and not just the PKID or Tuple (SerialNumber + OEMName + ModelName). If only the PKID or Tuple were used, the Autopilot service would be unable to find a match in the Autopilot database, since no 4K HH info was ever previously submitted for this essentially "new" device, and the upload will fail, likely returning a ZtdDeviceNotFound error. So, again, only upload the 4K HH, not the Tuple or PKID.
|
||||||
|
|
||||||

|
**NOTE**: When including the 4K HH in the csv file, you do NOT also need to include the PKID or Tuple. Those columns may be left blank, as shown below:
|
||||||
|
|
||||||
## Reset the device
|

|
||||||
|
|
||||||
Since the device was required to be in Full OS or Audit Mode to capture the 4K HH, the repair facility must reset the image back to a pre-OOBE state before returning it to the customer. One way this can be accomplished is by using the built-in reset feature in Windows, as follows:
|
## Reset the device
|
||||||
|
|
||||||
On the device, go to Settings > Update & Security > Recovery and click on Get started. Under Reset this PC, select Remove everything and Just remove my files. Finally, click on Reset.
|
Since the device was required to be in Full OS or Audit Mode to capture the 4K HH, the repair facility must reset the image back to a pre-OOBE state before returning it to the customer. One way this can be accomplished is by using the built-in reset feature in Windows, as follows:
|
||||||
|
|
||||||

|
On the device, go to Settings > Update & Security > Recovery and click on Get started. Under Reset this PC, select Remove everything and Just remove my files. Finally, click on Reset.
|
||||||
|
|
||||||
However, it’s likely the repair facility won’t have access to Windows because they lack the user credentials to login, in which case they need to use other means to reimage the device, such as the [Deployment Image Servicing and Management tool](https://docs.microsoft.com/windows-hardware/manufacture/desktop/oem-deployment-of-windows-10-for-desktop-editions#use-a-deployment-script-to-apply-your-image).
|

|
||||||
|
|
||||||
## Return the repaired device to the customer
|
However, it's likely the repair facility won't have access to Windows because they lack the user credentials to login, in which case they need to use other means to reimage the device, such as the [Deployment Image Servicing and Management tool](https://docs.microsoft.com/windows-hardware/manufacture/desktop/oem-deployment-of-windows-10-for-desktop-editions#use-a-deployment-script-to-apply-your-image).
|
||||||
|
|
||||||
After completing the previous steps, the repaired device can now be returned to the customer, and will be auto-enrolled into the Autopilot program on first boot-up during OOBE.
|
## Return the repaired device to the customer
|
||||||
|
|
||||||
**NOTE**: If the repair facility did NOT reimage the device, they could be sending it back in a potentially broken state (e.g., there’s no way to log into the device because it’s been dissociated from the only known user account), in which case they should tell the organization that they need to fix the registration and OS themselves.
|
After completing the previous steps, the repaired device can now be returned to the customer, and will be auto-enrolled into the Autopilot program on first boot-up during OOBE.
|
||||||
|
|
||||||
**IMPORTANT**: A device can be “registered” for Autopilot prior to being powered-on, but the device isn’t actually “deployed” to Autopilot (i.e., enabled as an Autopilot device) until it goes through OOBE, which is why resetting the device back to a pre-OOBE state is a required step.
|
**NOTE**: If the repair facility did NOT reimage the device, they could be sending it back in a potentially broken state (e.g., there's no way to log into the device because it's been dissociated from the only known user account), in which case they should tell the organization that they need to fix the registration and OS themselves.
|
||||||
|
|
||||||
## Specific repair scenarios
|
**IMPORTANT**: A device can be "registered" for Autopilot prior to being powered-on, but the device isn't actually "deployed" to Autopilot (i.e., enabled as an Autopilot device) until it goes through OOBE, which is why resetting the device back to a pre-OOBE state is a required step.
|
||||||
|
|
||||||
This section covers the most common repair scenarios, and their impact on Autopilot enablement.
|
## Specific repair scenarios
|
||||||
|
|
||||||
NOTES ON TEST RESULTS:
|
This section covers the most common repair scenarios, and their impact on Autopilot enablement.
|
||||||
|
|
||||||
- Scenarios below were tested using Intune only (no other MDMs were tested).
|
NOTES ON TEST RESULTS:
|
||||||
- In most test scenarios below, the repaired and reregistered device needed to go through OOBE again for Autopilot to be enabled.
|
|
||||||
- Motherboard replacement scenarios often result in lost data, so repair centers or customers should be reminded to backup data (if possible) prior to repair.
|
- Scenarios below were tested using Intune only (no other MDMs were tested).
|
||||||
- In the cases where a repair facility does not have the ability to write device info into the BIOS of the repaired device, new processes need to be created to successfully enable Autopilot.
|
- In most test scenarios below, the repaired and reregistered device needed to go through OOBE again for Autopilot to be enabled.
|
||||||
- Repaired device should have the Product Key (DPK) preinjected in the BIOS before capturing the new 4K HH (device ID)
|
- Motherboard replacement scenarios often result in lost data, so repair centers or customers should be reminded to backup data (if possible) prior to repair.
|
||||||
|
- In the cases where a repair facility does not have the ability to write device info into the BIOS of the repaired device, new processes need to be created to successfully enable Autopilot.
|
||||||
In the following table:<br>
|
- Repaired device should have the Product Key (DPK) preinjected in the BIOS before capturing the new 4K HH (device ID)
|
||||||
- Supported = **Yes**: the device can be reenabled for Autopilot
|
|
||||||
- Supported = **No**: the device cannot be reenabled for Autopilot
|
In the following table:<br>
|
||||||
|
- Supported = **Yes**: the device can be reenabled for Autopilot
|
||||||
<table border="1">
|
- Supported = **No**: the device cannot be reenabled for Autopilot
|
||||||
<th>Scenario<th>Supported<th>Microsoft Recommendation
|
|
||||||
<tr><td>Motherboard Replacement (MBR) in general<td>Yes<td>The recommended course of action for MBR scenarios is:
|
<table border="1">
|
||||||
|
<th>Scenario<th>Supported<th>Microsoft Recommendation
|
||||||
1. Autopilot device is deregistered from the Autopilot program
|
<tr><td>Motherboard Replacement (MBR) in general<td>Yes<td>The recommended course of action for MBR scenarios is:
|
||||||
2. The motherboard is replace
|
|
||||||
3. The device is reimaged (with BIOS info and DPK reinjected)*
|
1. Autopilot device is deregistered from the Autopilot program
|
||||||
4. A new Autopilot device ID (4K HH) is captured off the device
|
2. The motherboard is replace
|
||||||
5. The repaired device is reregistered for the Autopilot program using the new device ID
|
3. The device is reimaged (with BIOS info and DPK reinjected)*
|
||||||
6. The repaired device is reset to boot to OOBE
|
4. A new Autopilot device ID (4K HH) is captured off the device
|
||||||
7. The repaired device is shipped back to the customer
|
5. The repaired device is reregistered for the Autopilot program using the new device ID
|
||||||
|
6. The repaired device is reset to boot to OOBE
|
||||||
*It’s not necessary to reimage the device if the repair technician has access to the customer’s login credentials. It’s technically possible to do a successful MBR and Autopilot re-enablement without keys or certain BIOS info (e.g., serial #, model name, etc.), but doing so is only recommended for testing/educational purposes.
|
7. The repaired device is shipped back to the customer
|
||||||
|
|
||||||
<tr><td>MBR when motherboard has a TPM chip (enabled) and only one onboard network card (that also gets replaced)<td>Yes<td>
|
*It's not necessary to reimage the device if the repair technician has access to the customer's login credentials. It's technically possible to do a successful MBR and Autopilot re-enablement without keys or certain BIOS info (e.g., serial #, model name, etc.), but doing so is only recommended for testing/educational purposes.
|
||||||
|
|
||||||
1. Deregister damaged device
|
<tr><td>MBR when motherboard has a TPM chip (enabled) and only one onboard network card (that also gets replaced)<td>Yes<td>
|
||||||
2. Replace motherboard
|
|
||||||
3. Reimage device (to gain access), unless have access to customers’ login credentials
|
1. Deregister damaged device
|
||||||
4. Write device info into BIOS
|
2. Replace motherboard
|
||||||
5. Capture new 4K HH
|
3. Reimage device (to gain access), unless have access to customers' login credentials
|
||||||
6. Reregister repaired device
|
4. Write device info into BIOS
|
||||||
7. Reset device back to OOBE
|
5. Capture new 4K HH
|
||||||
8. Go through Autopilot OOBE (customer)
|
6. Reregister repaired device
|
||||||
9. Autopilot successfully enabled
|
7. Reset device back to OOBE
|
||||||
|
8. Go through Autopilot OOBE (customer)
|
||||||
<tr><td>MBR when motherboard has a TPM chip (enabled) and a second network card (or network interface) that is not replaced along with the motherboard<td>No<td>This scenario is not recommended, as it breaks the Autopilot experience, because the resulting Device ID will not be stable until after TPM attestation has completed, and even then registration may give incorrect results because of ambiguity with MAC Address resolution.
|
9. Autopilot successfully enabled
|
||||||
<tr><td>MBR where the NIC card, HDD, and WLAN all remain the same after the repair<td>Yes<td>
|
|
||||||
|
<tr><td>MBR when motherboard has a TPM chip (enabled) and a second network card (or network interface) that is not replaced along with the motherboard<td>No<td>This scenario is not recommended, as it breaks the Autopilot experience, because the resulting Device ID will not be stable until after TPM attestation has completed, and even then registration may give incorrect results because of ambiguity with MAC Address resolution.
|
||||||
1. Deregister damaged device
|
<tr><td>MBR where the NIC card, HDD, and WLAN all remain the same after the repair<td>Yes<td>
|
||||||
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
|
||||||
3. Reimage device (to gain access), unless have access to customers’ login credentials
|
1. Deregister damaged device
|
||||||
4. Write old device info into BIOS (same s/n, model, etc.)*
|
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
||||||
5. Capture new 4K HH
|
3. Reimage device (to gain access), unless have access to customers' login credentials
|
||||||
6. Reregister repaired device
|
4. Write old device info into BIOS (same s/n, model, etc.)*
|
||||||
7. Reset device back to OOBE
|
5. Capture new 4K HH
|
||||||
8. Go through Autopilot OOBE (customer)
|
6. Reregister repaired device
|
||||||
9. Autopilot successfully enabled
|
7. Reset device back to OOBE
|
||||||
|
8. Go through Autopilot OOBE (customer)
|
||||||
*Note that for this and subsequent scenarios, rewriting old device info would not include the TPM 2.0 endorsement key, as the associated private key is locked to the TPM device
|
9. Autopilot successfully enabled
|
||||||
|
|
||||||
<tr><td>MBR where the NIC card remains the same, but the HDD and WLAN are replaced<td>Yes<td>
|
*Note that for this and subsequent scenarios, rewriting old device info would not include the TPM 2.0 endorsement key, as the associated private key is locked to the TPM device
|
||||||
|
|
||||||
1. Deregister damaged device
|
<tr><td>MBR where the NIC card remains the same, but the HDD and WLAN are replaced<td>Yes<td>
|
||||||
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
|
||||||
3. Insert new HDD and WLAN
|
1. Deregister damaged device
|
||||||
4. Write old device info into BIOS (same s/n, model, etc.)
|
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
||||||
5. Capture new 4K HH
|
3. Insert new HDD and WLAN
|
||||||
6. Reregister repaired device
|
4. Write old device info into BIOS (same s/n, model, etc.)
|
||||||
7. Reset device back to OOBE
|
5. Capture new 4K HH
|
||||||
8. Go through Autopilot OOBE (customer)
|
6. Reregister repaired device
|
||||||
9. Autopilot successfully enabled
|
7. Reset device back to OOBE
|
||||||
|
8. Go through Autopilot OOBE (customer)
|
||||||
<tr><td>MBR where the NIC card and WLAN remains the same, but the HDD is replaced<td>Yes<td>
|
9. Autopilot successfully enabled
|
||||||
|
|
||||||
1. Deregister damaged device
|
<tr><td>MBR where the NIC card and WLAN remains the same, but the HDD is replaced<td>Yes<td>
|
||||||
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
|
||||||
3. Insert new HDD
|
1. Deregister damaged device
|
||||||
4. Write old device info into BIOS (same s/n, model, etc.)
|
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
||||||
5. Capture new 4K HH
|
3. Insert new HDD
|
||||||
6. Reregister repaired device
|
4. Write old device info into BIOS (same s/n, model, etc.)
|
||||||
7. Reset device back to OOBE
|
5. Capture new 4K HH
|
||||||
8. Go through Autopilot OOBE (customer)
|
6. Reregister repaired device
|
||||||
9. Autopilot successfully enabled
|
7. Reset device back to OOBE
|
||||||
|
8. Go through Autopilot OOBE (customer)
|
||||||
<tr><td>MBR where only the MB is replaced (all other parts remain same) but new MB was taken from a previously used device that had NOT been Autopilot-enabled before.<td>Yes<td>
|
9. Autopilot successfully enabled
|
||||||
|
|
||||||
1. Deregister damaged device
|
<tr><td>MBR where only the MB is replaced (all other parts remain same) but new MB was taken from a previously used device that had NOT been Autopilot-enabled before.<td>Yes<td>
|
||||||
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
|
||||||
3. Reimage device (to gain access), unless have access to customers’ login credentials
|
1. Deregister damaged device
|
||||||
4. Write old device info into BIOS (same s/n, model, etc.)
|
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
||||||
5. Capture new 4K HH
|
3. Reimage device (to gain access), unless have access to customers' login credentials
|
||||||
6. Reregister repaired device
|
4. Write old device info into BIOS (same s/n, model, etc.)
|
||||||
7. Reset device back to OOBE
|
5. Capture new 4K HH
|
||||||
8. Go through Autopilot OOBE (customer)
|
6. Reregister repaired device
|
||||||
9. Autopilot successfully enabled
|
7. Reset device back to OOBE
|
||||||
|
8. Go through Autopilot OOBE (customer)
|
||||||
<tr><td>MBR where only the MB is replaced (all other parts remain same) but new MB was taken from a previously used device that HAD been Autopilot-enabled before.<td>Yes<td>
|
9. Autopilot successfully enabled
|
||||||
|
|
||||||
1. Deregister old device from which MB will be taken
|
<tr><td>MBR where only the MB is replaced (all other parts remain same) but new MB was taken from a previously used device that HAD been Autopilot-enabled before.<td>Yes<td>
|
||||||
2. Deregister damaged device (that you want to repair)
|
|
||||||
3. Replace motherboard in repair device with MB from other Autopilot device (with new RDPK preinjected in BIOS)
|
1. Deregister old device from which MB will be taken
|
||||||
4. Reimage device (to gain access), unless have access to customers’ login credentials
|
2. Deregister damaged device (that you want to repair)
|
||||||
5. Write old device info into BIOS (same s/n, model, etc.)
|
3. Replace motherboard in repair device with MB from other Autopilot device (with new RDPK preinjected in BIOS)
|
||||||
6. Capture new 4K HH
|
4. Reimage device (to gain access), unless have access to customers' login credentials
|
||||||
7. Reregister repaired device
|
5. Write old device info into BIOS (same s/n, model, etc.)
|
||||||
8. Reset device back to OOBE
|
6. Capture new 4K HH
|
||||||
9. Go through Autopilot OOBE (customer)
|
7. Reregister repaired device
|
||||||
10. Autopilot successfully enabled
|
8. Reset device back to OOBE
|
||||||
|
9. Go through Autopilot OOBE (customer)
|
||||||
<b>NOTE</b>: The repaired device can also be used successfully as a normal, non-Autopilot device.
|
10. Autopilot successfully enabled
|
||||||
|
|
||||||
<tr><td>BIOS info excluded from MBR device<td>No<td>Repair facility does not have BIOS tool to write device info into BIOS after MBR.
|
<b>NOTE</b>: The repaired device can also be used successfully as a normal, non-Autopilot device.
|
||||||
|
|
||||||
1. Deregister damaged device
|
<tr><td>BIOS info excluded from MBR device<td>No<td>Repair facility does not have BIOS tool to write device info into BIOS after MBR.
|
||||||
2. Replace motherboard (BIOS does NOT contain device info)
|
|
||||||
3. Reimage and write DPK into image
|
1. Deregister damaged device
|
||||||
4. Capture new 4K HH
|
2. Replace motherboard (BIOS does NOT contain device info)
|
||||||
5. Reregister repaired device
|
3. Reimage and write DPK into image
|
||||||
6. Create Autopilot profile for device
|
4. Capture new 4K HH
|
||||||
7. Go through Autopilot OOBE (customer)
|
5. Reregister repaired device
|
||||||
8. Autopilot FAILS to recognize repaired device
|
6. Create Autopilot profile for device
|
||||||
|
7. Go through Autopilot OOBE (customer)
|
||||||
<tr><td>MBR when there is no TPM chip<td>Yes<td>Though we do not recommend enabling an Autopilot devices without a TPM chip (which is recommended for BitLocker encryption), it is possible to enable an Autopilot devices in “standard user” mode (but NOT Self-deploying mode) that does not have a TPM chip. In this case, you would:
|
8. Autopilot FAILS to recognize repaired device
|
||||||
|
|
||||||
1. Deregister damaged device
|
<tr><td>MBR when there is no TPM chip<td>Yes<td>Though we do not recommend enabling an Autopilot devices without a TPM chip (which is recommended for BitLocker encryption), it is possible to enable an Autopilot devices in "standard user" mode (but NOT Self-deploying mode) that does not have a TPM chip. In this case, you would:
|
||||||
2. Replace motherboard
|
|
||||||
3. Reimage device (to gain access), unless have access to customers’ login credentials
|
1. Deregister damaged device
|
||||||
4. Write old device info into BIOS (same s/n, model, etc.)
|
2. Replace motherboard
|
||||||
5. Capture new 4K HH
|
3. Reimage device (to gain access), unless have access to customers' login credentials
|
||||||
6. Reregister repaired device
|
4. Write old device info into BIOS (same s/n, model, etc.)
|
||||||
7. Reset device back to OOBE
|
5. Capture new 4K HH
|
||||||
8. Go through Autopilot OOBE (customer)
|
6. Reregister repaired device
|
||||||
9. Autopilot successfully enabled
|
7. Reset device back to OOBE
|
||||||
|
8. Go through Autopilot OOBE (customer)
|
||||||
<tr><td>New DPK written into image on repaired Autopilot device with a new MB<td>Yes<td>Repair facility replaces normal MB on damaged device. MB does not contain any DPK in the BIOS. Repair facility writes DPK into image after MBR.
|
9. Autopilot successfully enabled
|
||||||
|
|
||||||
1. Deregister damaged device
|
<tr><td>New DPK written into image on repaired Autopilot device with a new MB<td>Yes<td>Repair facility replaces normal MB on damaged device. MB does not contain any DPK in the BIOS. Repair facility writes DPK into image after MBR.
|
||||||
2. Replace motherboard – BIOS does NOT contain DPK info
|
|
||||||
3. Reimage device (to gain access), unless have access to customers’ login credentials
|
1. Deregister damaged device
|
||||||
4. Write device info into BIOS (same s/n, model, etc.)
|
2. Replace motherboard – BIOS does NOT contain DPK info
|
||||||
5. Capture new 4K HH
|
3. Reimage device (to gain access), unless have access to customers' login credentials
|
||||||
6. Reset or reimage device to pre-OOBE and write DPK into image
|
4. Write device info into BIOS (same s/n, model, etc.)
|
||||||
7. Reregister repaired device
|
5. Capture new 4K HH
|
||||||
8. Go through Autopilot OOBE
|
6. Reset or reimage device to pre-OOBE and write DPK into image
|
||||||
9. Autopilot successfully enabled
|
7. Reregister repaired device
|
||||||
|
8. Go through Autopilot OOBE
|
||||||
<tr><td>New Repair Product Key (RDPK)<td>Yes<td>Using a MB with a new RDPK preinjected results in a successful Autopilot refurbishment scenario.
|
9. Autopilot successfully enabled
|
||||||
|
|
||||||
1. Deregister damaged device
|
<tr><td>New Repair Product Key (RDPK)<td>Yes<td>Using a MB with a new RDPK preinjected results in a successful Autopilot refurbishment scenario.
|
||||||
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
|
||||||
3. Reimage or rest image to pre-OOBE
|
1. Deregister damaged device
|
||||||
4. Write device info into BIOS
|
2. Replace motherboard (with new RDPK preinjected in BIOS)
|
||||||
5. Capture new 4K HH
|
3. Reimage or rest image to pre-OOBE
|
||||||
6. Reregister repaired device
|
4. Write device info into BIOS
|
||||||
7. Reimage or reset image to pre-OOBE
|
5. Capture new 4K HH
|
||||||
8. Go through Autopilot OOBE
|
6. Reregister repaired device
|
||||||
9. Autopilot successfully enabled
|
7. Reimage or reset image to pre-OOBE
|
||||||
|
8. Go through Autopilot OOBE
|
||||||
<tr><td>No Repair Product Key (RDPK) injected<td>No<td>This scenario violates Microsoft policy and breaks the Windows Autopilot experience.
|
9. Autopilot successfully enabled
|
||||||
<tr><td>Reimage damaged Autopilot device that was not deregistered prior to repair<td>Yes, but the device will still be associated with previous tenant ID, so should only be returned to same customer<td>
|
|
||||||
|
<tr><td>No Repair Product Key (RDPK) injected<td>No<td>This scenario violates Microsoft policy and breaks the Windows Autopilot experience.
|
||||||
1. Reimage damaged device
|
<tr><td>Reimage damaged Autopilot device that was not deregistered prior to repair<td>Yes, but the device will still be associated with previous tenant ID, so should only be returned to same customer<td>
|
||||||
2. Write DPK into image
|
|
||||||
3. Go through Autopilot OOBE
|
1. Reimage damaged device
|
||||||
4. Autopilot successfully enabled (to previous tenant ID)
|
2. Write DPK into image
|
||||||
|
3. Go through Autopilot OOBE
|
||||||
<tr><td>Disk replacement from a non-Autopilot device to an Autopilot device<td>Yes<td>
|
4. Autopilot successfully enabled (to previous tenant ID)
|
||||||
|
|
||||||
1. Do not deregister damaged device prior to repair
|
<tr><td>Disk replacement from a non-Autopilot device to an Autopilot device<td>Yes<td>
|
||||||
2. Replace HDD on damaged device
|
|
||||||
3. Reimage or reset image back to OOBE
|
1. Do not deregister damaged device prior to repair
|
||||||
4. Go through Autopilot OOBE (customer)
|
2. Replace HDD on damaged device
|
||||||
5. Autopilot successfully enabled (repaired device recognized as its previous self)
|
3. Reimage or reset image back to OOBE
|
||||||
|
4. Go through Autopilot OOBE (customer)
|
||||||
<tr><td>Disk replacement from one Autopilot device to another Autopilot device<td>Maybe<td>If the device from which the HDD is taken was itself previously deregistered from Autopilot, then that HDD can be used in a repair device. But if the HDD was never previously deregistered from Autopilot before being used in a repaired device, the newly repaired device will not have the proper Autopilot experience.
|
5. Autopilot successfully enabled (repaired device recognized as its previous self)
|
||||||
|
|
||||||
Assuming the used HDD was previously deregistered (before being used in this repair):
|
<tr><td>Disk replacement from one Autopilot device to another Autopilot device<td>Maybe<td>If the device from which the HDD is taken was itself previously deregistered from Autopilot, then that HDD can be used in a repair device. But if the HDD was never previously deregistered from Autopilot before being used in a repaired device, the newly repaired device will not have the proper Autopilot experience.
|
||||||
|
|
||||||
1. Deregister damaged device
|
Assuming the used HDD was previously deregistered (before being used in this repair):
|
||||||
2. Replace HDD on damaged device using a HDD from another deregistered Autopilot device
|
|
||||||
3. Reimage or rest the repaired device back to a pre-OOBE state
|
1. Deregister damaged device
|
||||||
4. Go through Autopilot OOBE (customer)
|
2. Replace HDD on damaged device using a HDD from another deregistered Autopilot device
|
||||||
5. Autopilot successfully enabled
|
3. Reimage or rest the repaired device back to a pre-OOBE state
|
||||||
|
4. Go through Autopilot OOBE (customer)
|
||||||
<tr><td>Third party network card replacement <td>No<td>Whether from a non-Autopilot device to an Autopilot device, from one Autopilot device to another Autopilot device, or from an Autopilot device to a non-Autopilot device, any scenario where a 3rd party (not onboard) Network card is replaced will break the Autopilot experience, and is not recommended.
|
5. Autopilot successfully enabled
|
||||||
<tr><td>A device repaired more than 3 times<td>No<td>Autopilot is not supported when a device is repeatedly repaired, so that whatever parts NOT replaced become associated with too many parts that have been replaced, which would make it difficult to uniquely identify that device in the future.
|
|
||||||
<tr><td>Memory replacement<td>Yes<td>Replacing the memory on a damaged device does not negatively affect the Autopilot experience on that device. No de/reregistration is needed. The repair technician simply needs to replace the memory.
|
<tr><td>Third party network card replacement <td>No<td>Whether from a non-Autopilot device to an Autopilot device, from one Autopilot device to another Autopilot device, or from an Autopilot device to a non-Autopilot device, any scenario where a 3rd party (not onboard) Network card is replaced will break the Autopilot experience, and is not recommended.
|
||||||
<tr><td>GPU replacement<td>Yes<td>Replacing the GPU(s) on a damaged device does not negatively affect the Autopilot experience on that device. No de/reregistration is needed. The repair technician simply needs to replace the GPU.
|
<tr><td>A device repaired more than 3 times<td>No<td>Autopilot is not supported when a device is repeatedly repaired, so that whatever parts NOT replaced become associated with too many parts that have been replaced, which would make it difficult to uniquely identify that device in the future.
|
||||||
</table>
|
<tr><td>Memory replacement<td>Yes<td>Replacing the memory on a damaged device does not negatively affect the Autopilot experience on that device. No de/reregistration is needed. The repair technician simply needs to replace the memory.
|
||||||
|
<tr><td>GPU replacement<td>Yes<td>Replacing the GPU(s) on a damaged device does not negatively affect the Autopilot experience on that device. No de/reregistration is needed. The repair technician simply needs to replace the GPU.
|
||||||
>When scavenging parts from another Autopilot device, we recommend unregistering the scavenged device from Autopilot, scavenging it, and then NEVER REGISTERING THE SCAVENGED DEVICE (AGAIN) FOR AUTOPILOT, because reusing parts this way may cause two active devices to end up with the same ID, with no possibility of distinguishing between the two.
|
</table>
|
||||||
|
|
||||||
**NOTE**: The following parts may be replaced without compromising Autopilot enablement or requiring special additional repair steps:
|
>When scavenging parts from another Autopilot device, we recommend unregistering the scavenged device from Autopilot, scavenging it, and then NEVER REGISTERING THE SCAVENGED DEVICE (AGAIN) FOR AUTOPILOT, because reusing parts this way may cause two active devices to end up with the same ID, with no possibility of distinguishing between the two.
|
||||||
- Memory (RAM or ROM)
|
|
||||||
- Power Supply
|
**NOTE**: The following parts may be replaced without compromising Autopilot enablement or requiring special additional repair steps:
|
||||||
- Video Card
|
- Memory (RAM or ROM)
|
||||||
- Card Reader
|
- Power Supply
|
||||||
- Sound card
|
- Video Card
|
||||||
- Expansion card
|
- Card Reader
|
||||||
- Microphone
|
- Sound card
|
||||||
- Webcam
|
- Expansion card
|
||||||
- Fan
|
- Microphone
|
||||||
- Heat sink
|
- Webcam
|
||||||
- CMOS battery
|
- Fan
|
||||||
|
- Heat sink
|
||||||
Other repair scenarios not yet tested and verified include:
|
- CMOS battery
|
||||||
- Daughterboard replacement
|
|
||||||
- CPU replacement
|
Other repair scenarios not yet tested and verified include:
|
||||||
- Wifi replacement
|
- Daughterboard replacement
|
||||||
- Ethernet replacement
|
- CPU replacement
|
||||||
|
- Wifi replacement
|
||||||
## FAQ
|
- Ethernet replacement
|
||||||
|
|
||||||
| Question | Answer |
|
## FAQ
|
||||||
| --- | --- |
|
|
||||||
| If we have a tool that programs product information into the BIOS after the MBR, do we still need to submit a CBR report for the device to be Autopilot-capable? | No. Not if the in-house tool writes the minimum necessary information into the BIOS that the Autopilot program looks for to identify the device, as described earlier in this document. |
|
| Question | Answer |
|
||||||
| What if only some components are replaced rather than the full motherboard? | While it’s true that some limited repairs do not prevent the Autopilot algorithm from successfully matching the post-repair device with the pre-repair device, it is best to ensure 100% success by going through the MBR steps above even for devices that only needed limited repairs. |
|
| --- | --- |
|
||||||
| How does a repair technician gain access to a broken device if they don’t have the customer’s login credentials? | The technician will have to reimage the device and use their own credentials during the repair process. |
|
| If we have a tool that programs product information into the BIOS after the MBR, do we still need to submit a CBR report for the device to be Autopilot-capable? | No. Not if the in-house tool writes the minimum necessary information into the BIOS that the Autopilot program looks for to identify the device, as described earlier in this document. |
|
||||||
|
| What if only some components are replaced rather than the full motherboard? | While it's true that some limited repairs do not prevent the Autopilot algorithm from successfully matching the post-repair device with the pre-repair device, it is best to ensure 100% success by going through the MBR steps above even for devices that only needed limited repairs. |
|
||||||
## Related topics
|
| How does a repair technician gain access to a broken device if they don't have the customer's login credentials? | The technician will have to reimage the device and use their own credentials during the repair process. |
|
||||||
|
|
||||||
[Device guidelines](autopilot-device-guidelines.md)<br>
|
## Related topics
|
||||||
|
|
||||||
|
[Device guidelines](autopilot-device-guidelines.md)<br>
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Autopilot support
|
title: Windows Autopilot support
|
||||||
description: Find out who to contact for help with your Windows Autopilot installation.
|
description: This article provides support information and contacts to get help with your Windows Autopilot installation.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -15,6 +15,7 @@ ms.reviewer:
|
|||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot support information
|
# Windows Autopilot support information
|
||||||
@ -28,10 +29,10 @@ Before contacting the resources listed below for Windows Autopilot-related issue
|
|||||||
|
|
||||||
| Audience | Support contact |
|
| Audience | Support contact |
|
||||||
|---------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
|---------------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
| OEM or Channel Partner registering devices as a CSP (via MPC) | Use the help resources available in MPC. Whether you are a named partner or a channel partner (distributor, reseller, SI, etc.), if you’re a CSP registering Autopilot devices through MPC (either manually or through the MPC API), your first-line of support should be the help resources within MPC. |
|
| OEM or Channel Partner registering devices as a CSP (via MPC) | Use the help resources available in MPC. Whether you are a named partner or a channel partner (distributor, reseller, SI, etc.), if you're a CSP registering Autopilot devices through MPC (either manually or through the MPC API), your first-line of support should be the help resources within MPC. |
|
||||||
| OEM registering devices using OEM Direct API | Contact MSOEMOPS@microsoft.com. Response time depends on priority: <br>Low – 120 hours <br>Normal – 72 hours <br>High – 24 hours <br>Immediate – 4 hours |
|
| OEM registering devices using OEM Direct API | Contact MSOEMOPS@microsoft.com. Response time depends on priority: <br>Low – 120 hours <br>Normal – 72 hours <br>High – 24 hours <br>Immediate – 4 hours |
|
||||||
| Partners with a Partner Technology Strategist (PTS) | If you have a PTS (whether you’re a CSP or not), you may first try working through your account’s specific Partner Technology Strategist (PTS). |
|
| Partners with a Partner Technology Strategist (PTS) | If you have a PTS (whether you're a CSP or not), you may first try working through your account's specific Partner Technology Strategist (PTS). |
|
||||||
| Partners with an Ecosystem PM | If you have an Ecosystem PM (whether you’re a CSP or not), you may first try working through your account’s specific Ecosystem PM, especially for technical issues. To learn more about Ecosystem PMs and the services they offer, contact epsoinfo@microsoft.com. |
|
| Partners with an Ecosystem PM | If you have an Ecosystem PM (whether you're a CSP or not), you may first try working through your account's specific Ecosystem PM, especially for technical issues. To learn more about Ecosystem PMs and the services they offer, contact epsoinfo@microsoft.com. |
|
||||||
| Enterprise customers | Contact your Technical Account Manager (TAM), or Account Technology Strategist (ATS), or Customer Service Support (CSS) representative. |
|
| Enterprise customers | Contact your Technical Account Manager (TAM), or Account Technology Strategist (ATS), or Customer Service Support (CSS) representative. |
|
||||||
| End-user | Contact your IT administrator. |
|
| End-user | Contact your IT administrator. |
|
||||||
| Microsoft Partner Center (MPC) users | Use the [help resources](https://partner.microsoft.com/support) available in MPC. |
|
| Microsoft Partner Center (MPC) users | Use the [help resources](https://partner.microsoft.com/support) available in MPC. |
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Demonstrate Autopilot deployment
|
title: Demonstrate Autopilot deployment
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Step-by-step instructions on how to set-up a Virtual Machine with a Windows Autopilot deployment
|
description: In this article, find step-by-step instructions on how to set-up a Virtual Machine with a Windows Autopilot deployment.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune, upgrade
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune, upgrade
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -13,7 +13,9 @@ author: greg-lindsay
|
|||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.custom: autopilot
|
ms.custom:
|
||||||
|
- autopilot
|
||||||
|
- seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -225,7 +227,7 @@ Ensure the VM booted from the installation ISO, click **Next** then click **Inst
|
|||||||

|

|
||||||

|

|
||||||
|
|
||||||
After the VM restarts, during OOBE, it’s fine to select **Set up for personal use** or **Domain join instead** and then choose an offline account on the **Sign in** screen. This will offer the fastest way to the desktop. For example:
|
After the VM restarts, during OOBE, it's fine to select **Set up for personal use** or **Domain join instead** and then choose an offline account on the **Sign in** screen. This will offer the fastest way to the desktop. For example:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -244,7 +246,7 @@ Click on the **WindowsAutopilot** VM in Hyper-V Manager and verify that you see
|
|||||||
## Capture the hardware ID
|
## Capture the hardware ID
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Normally, the Device ID is captured by the OEM as they run the OA3 Tool on each device in the factory. The OEM then submits the 4K HH created by the OA3 Tool to Microsoft by submitting it with a Computer Build Report (CBR). For purposes of this lab, you are acting as the OEM (capturing the 4K HH), but you’re not going to use the OA3 Tool to capture the full 4K HH for various reasons (you’d have to install the OA3 tool, your device couldn’t have a volume license version of Windows, it’s a more complicated process than using a PS script, etc.). Instead, you’ll simulate running the OA3 tool by running a PowerShell script, which captures the device 4K HH just like the OA3 tool.
|
> Normally, the Device ID is captured by the OEM as they run the OA3 Tool on each device in the factory. The OEM then submits the 4K HH created by the OA3 Tool to Microsoft by submitting it with a Computer Build Report (CBR). For purposes of this lab, you are acting as the OEM (capturing the 4K HH), but you're not going to use the OA3 Tool to capture the full 4K HH for various reasons (you'd have to install the OA3 tool, your device couldn't have a volume license version of Windows, it's a more complicated process than using a PS script, etc.). Instead, you'll simulate running the OA3 tool by running a PowerShell script, which captures the device 4K HH just like the OA3 tool.
|
||||||
|
|
||||||
Follow these steps to run the PS script:
|
Follow these steps to run the PS script:
|
||||||
|
|
||||||
@ -303,7 +305,7 @@ Verify that there is an **AutopilotHWID.csv** file in the **c:\HWID** directory
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
You will need to upload this data into Intune to register your device for Autopilot, so it needs to be transferred to the computer you will use to access the Azure portal. If you are using a physical device instead of a VM, you can copy the file to a USB stick. If you’re using a VM, you can right-click the AutopilotHWID.csv file and copy it, then right-click and paste the file to your desktop (outside the VM).
|
You will need to upload this data into Intune to register your device for Autopilot, so it needs to be transferred to the computer you will use to access the Azure portal. If you are using a physical device instead of a VM, you can copy the file to a USB stick. If you're using a VM, you can right-click the AutopilotHWID.csv file and copy it, then right-click and paste the file to your desktop (outside the VM).
|
||||||
|
|
||||||
If you have trouble copying and pasting the file, just view the contents in Notepad on the VM and copy the text into Notepad outside the VM. Do not use another text editor to do this.
|
If you have trouble copying and pasting the file, just view the contents in Notepad on the VM and copy the text into Notepad outside the VM. Do not use another text editor to do this.
|
||||||
|
|
||||||
@ -331,7 +333,7 @@ For this lab, you need an AAD Premium subscription. You can tell if you have a
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
If the configuration blade shown above does not appear, it’s likely that you don’t have a **Premium** subscription. Auto-enrollment is a feature only available in AAD Premium.
|
If the configuration blade shown above does not appear, it's likely that you don't have a **Premium** subscription. Auto-enrollment is a feature only available in AAD Premium.
|
||||||
|
|
||||||
To convert your Intune trial account to a free Premium trial account, navigate to **Azure Active Directory** > **Licenses** > **All products** > **Try / Buy** and select **Free trial** for Azure AD Premium, or EMS E5.
|
To convert your Intune trial account to a free Premium trial account, navigate to **Azure Active Directory** > **Licenses** > **All products** > **Try / Buy** and select **Free trial** for Azure AD Premium, or EMS E5.
|
||||||
|
|
||||||
@ -376,7 +378,7 @@ Your VM (or device) can be registered either via Intune or Microsoft Store for B
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If menu items like **Windows enrollment** are not active for you, then look to the far-right blade in the UI. You might need to provide Intune configuration privileges in a challenge window that appeared.
|
> If menu items like **Windows enrollment** are not active for you, then look to the far-right blade in the UI. You might need to provide Intune configuration privileges in a challenge window that appeared.
|
||||||
|
|
||||||
2. Under **Add Windows Autopilot devices** in the far right pane, browse to the **AutopilotHWID.csv** file you previously copied to your local computer. The file should contain the serial number and 4K HH of your VM (or device). It’s okay if other fields (Windows Product ID) are left blank.
|
2. Under **Add Windows Autopilot devices** in the far right pane, browse to the **AutopilotHWID.csv** file you previously copied to your local computer. The file should contain the serial number and 4K HH of your VM (or device). It's okay if other fields (Windows Product ID) are left blank.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -473,7 +475,7 @@ To create a Group, open the Azure Portal and select **Azure Active Directory** >
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Select New group from the Groups blade to open the new groups UI. Select the “Security” group type, name the group, and select the “Assigned” membership type:
|
Select New group from the Groups blade to open the new groups UI. Select the "Security" group type, name the group, and select the "Assigned" membership type:
|
||||||
|
|
||||||
Before clicking **Create**, expand the **Members** panel, click your device's serial number (it will then appear under **Selected members**) and then click **Select** to add that device to this group.
|
Before clicking **Create**, expand the **Members** panel, click your device's serial number (it will then appear under **Selected members**) and then click **Select** to add that device to this group.
|
||||||
|
|
||||||
@ -497,7 +499,7 @@ Click **Select** and then click **Save**.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
It’s also possible to assign specific users to a profile, but we will not cover this scenario in the lab. For more detailed information, see [Enroll Windows devices in Intune by using Windows Autopilot](https://docs.microsoft.com/intune/enrollment-autopilot).
|
It's also possible to assign specific users to a profile, but we will not cover this scenario in the lab. For more detailed information, see [Enroll Windows devices in Intune by using Windows Autopilot](https://docs.microsoft.com/intune/enrollment-autopilot).
|
||||||
|
|
||||||
### Create a Windows Autopilot deployment profile using MSfB
|
### Create a Windows Autopilot deployment profile using MSfB
|
||||||
|
|
||||||
@ -544,14 +546,14 @@ Confirm the profile was successfully assigned to the intended device by checking
|
|||||||
|
|
||||||
## See Windows Autopilot in action
|
## See Windows Autopilot in action
|
||||||
|
|
||||||
If you shut down your VM after the last reset, it’s time to start it back up again, so it can progress through the Autopilot OOBE experience but do not attempt to start your device again until the **PROFILE STATUS** for your device in Intune has changed from **Not assigned** to **Assigning** and finally **Assigned**:
|
If you shut down your VM after the last reset, it's time to start it back up again, so it can progress through the Autopilot OOBE experience but do not attempt to start your device again until the **PROFILE STATUS** for your device in Intune has changed from **Not assigned** to **Assigning** and finally **Assigned**:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Also, make sure to wait at least 30 minutes from the time you've [configured company branding](#configure-company-branding), otherwise these changes might not show up.
|
Also, make sure to wait at least 30 minutes from the time you've [configured company branding](#configure-company-branding), otherwise these changes might not show up.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> If you reset your device previously after collecting the 4K HH info, and then let it restart back to the first OOBE screen, then you might need to restart the device again to ensure the device is recognized as an Autopilot device and displays the Autopilot OOBE experience you’re expecting. If you do not see the Autopilot OOBE experience, then reset the device again (Settings > Update & Security > Recovery and click on Get started. Under Reset this PC, select Remove everything and Just remove my files. Click on Reset).
|
> If you reset your device previously after collecting the 4K HH info, and then let it restart back to the first OOBE screen, then you might need to restart the device again to ensure the device is recognized as an Autopilot device and displays the Autopilot OOBE experience you're expecting. If you do not see the Autopilot OOBE experience, then reset the device again (Settings > Update & Security > Recovery and click on Get started. Under Reset this PC, select Remove everything and Just remove my files. Click on Reset).
|
||||||
|
|
||||||
- Ensure your device has an internet connection.
|
- Ensure your device has an internet connection.
|
||||||
- Turn on the device
|
- Turn on the device
|
||||||
@ -610,7 +612,7 @@ If you also (optionally) want to remove your device from AAD, navigate to **Azur
|
|||||||
|
|
||||||
## Appendix A: Verify support for Hyper-V
|
## Appendix A: Verify support for Hyper-V
|
||||||
|
|
||||||
Starting with Windows 8, the host computer’s microprocessor must support second level address translation (SLAT) to install Hyper-V. See [Hyper-V: List of SLAT-Capable CPUs for Hosts](https://social.technet.microsoft.com/wiki/contents/articles/1401.hyper-v-list-of-slat-capable-cpus-for-hosts.aspx) for more information.
|
Starting with Windows 8, the host computer's microprocessor must support second level address translation (SLAT) to install Hyper-V. See [Hyper-V: List of SLAT-Capable CPUs for Hosts](https://social.technet.microsoft.com/wiki/contents/articles/1401.hyper-v-list-of-slat-capable-cpus-for-hosts.aspx) for more information.
|
||||||
|
|
||||||
To verify your computer supports SLAT, open an administrator command prompt, type **systeminfo**, press ENTER, scroll down, and review the section displayed at the bottom of the output, next to Hyper-V Requirements. See the following example:
|
To verify your computer supports SLAT, open an administrator command prompt, type **systeminfo**, press ENTER, scroll down, and review the section displayed at the bottom of the output, next to Hyper-V Requirements. See the following example:
|
||||||
|
|
||||||
@ -654,13 +656,13 @@ EPT * Supports Intel extended page tables (SLAT)
|
|||||||
|
|
||||||
#### Prepare the app for Intune
|
#### Prepare the app for Intune
|
||||||
|
|
||||||
Before we can pull an application into Intune to make it part of our AP profile, we need to “package” the application for delivery using the [IntuneWinAppUtil.exe command-line tool](https://github.com/Microsoft/Microsoft-Win32-Content-Prep-Tool). After downloading the tool, gather the following three bits of information to use the tool:
|
Before we can pull an application into Intune to make it part of our AP profile, we need to "package" the application for delivery using the [IntuneWinAppUtil.exe command-line tool](https://github.com/Microsoft/Microsoft-Win32-Content-Prep-Tool). After downloading the tool, gather the following three bits of information to use the tool:
|
||||||
|
|
||||||
1. The source folder for your application
|
1. The source folder for your application
|
||||||
2. The name of the setup executable file
|
2. The name of the setup executable file
|
||||||
3. The output folder for the new file
|
3. The output folder for the new file
|
||||||
|
|
||||||
For the purposes of this lab, we’ll use the Notepad++ tool as our Win32 app.
|
For the purposes of this lab, we'll use the Notepad++ tool as our Win32 app.
|
||||||
|
|
||||||
Download the Notepad++ msi package [here](https://www.hass.de/content/notepad-msi-package-enterprise-deployment-available) and then copy the file to a known location, such as C:\Notepad++msi.
|
Download the Notepad++ msi package [here](https://www.hass.de/content/notepad-msi-package-enterprise-deployment-available) and then copy the file to a known location, such as C:\Notepad++msi.
|
||||||
|
|
||||||
@ -700,7 +702,7 @@ Uninstall: msiexec /x "{F188A506-C3C6-4411-BE3A-DA5BF1EA6737}" /q
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Simply using an install command like “notepad++.exe /S” will not actually install Notepad++; it will only launch the app. To actually install the program, we need to use the .msi file instead. Notepad++ doesn’t actually have an .msi version of their program, but we got an .msi version from a [third party provider](https://www.hass.de/content/notepad-msi-package-enterprise-deployment-available).
|
Simply using an install command like "notepad++.exe /S" will not actually install Notepad++; it will only launch the app. To actually install the program, we need to use the .msi file instead. Notepad++ doesn't actually have an .msi version of their program, but we got an .msi version from a [third party provider](https://www.hass.de/content/notepad-msi-package-enterprise-deployment-available).
|
||||||
|
|
||||||
Click **OK** to save your input and activate the **Requirements** blade.
|
Click **OK** to save your input and activate the **Requirements** blade.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows Autopilot Enrollment Status Page
|
title: Windows Autopilot Enrollment Status Page
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Gives an overview of the Enrollment Status Page capabilities, configuration
|
description: This article provides an overview of the Windows Autopilot Enrollment Status Page capabilities and configuration.
|
||||||
keywords: Autopilot Plug and Forget, Windows 10
|
keywords: Autopilot Plug and Forget, Windows 10
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -14,6 +14,7 @@ author: greg-lindsay
|
|||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Autopilot deployment
|
title: Windows Autopilot deployment
|
||||||
description: Discover resources for Windows Autopilot deployment with this guide.
|
description: In this article, discover resources for the zero-touch, self-service Windows deployment platform Windows Autopilot.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
ms.reviewer: mniehaus
|
ms.reviewer: mniehaus
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -14,6 +14,7 @@ author: greg-lindsay
|
|||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows Autopilot known issues
|
title: Windows Autopilot known issues
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Inform yourself about known issues that may occur during Windows Autopilot deployment.
|
description: Use this article to learn about known issues that might occur during a Windows Autopilot deployment.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -14,6 +14,7 @@ author: greg-lindsay
|
|||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -42,14 +43,14 @@ This happens because Windows 10, version 1903 and 1909 deletes the AutopilotConf
|
|||||||
<li>Add a new <b>Run command line</b> step that runs <b>c:\windows\system32\sysprep\sysprep.exe /oobe /reboot</b>.</ol>
|
<li>Add a new <b>Run command line</b> step that runs <b>c:\windows\system32\sysprep\sysprep.exe /oobe /reboot</b>.</ol>
|
||||||
<a href="https://oofhours.com/2019/09/19/a-challenge-with-windows-autopilot-for-existing-devices-and-windows-10-1903/">More information</a></tr>
|
<a href="https://oofhours.com/2019/09/19/a-challenge-with-windows-autopilot-for-existing-devices-and-windows-10-1903/">More information</a></tr>
|
||||||
|
|
||||||
<tr><td>TPM attestation fails on Windows 10 1903 due to missing AKI extension in EK certificate. (An additional validation added in Windows 10 1903 to check that the TPM EK certs had the proper attributes according to the TCG specifications uncovered that a number of them don’t, so that validation will be removed).
|
<tr><td>TPM attestation fails on Windows 10 1903 due to missing AKI extension in EK certificate. (An additional validation added in Windows 10 1903 to check that the TPM EK certs had the proper attributes according to the TCG specifications uncovered that a number of them don't, so that validation will be removed).
|
||||||
<td>Download and install the <a href="https://support.microsoft.com/help/4517211/windows-10-update-kb4517211">KB4517211 update</a>.
|
<td>Download and install the <a href="https://support.microsoft.com/help/4517211/windows-10-update-kb4517211">KB4517211 update</a>.
|
||||||
<tr><td>The following known issues are resolved by installing the August 30, 2019 KB4512941 update (OS Build 18362.329):
|
<tr><td>The following known issues are resolved by installing the August 30, 2019 KB4512941 update (OS Build 18362.329):
|
||||||
|
|
||||||
- Windows Autopilot for existing devices feature does not properly suppress “Activities” page during OOBE. (Because of this, you’ll see that extra page during OOBE).
|
- Windows Autopilot for existing devices feature does not properly suppress "Activities" page during OOBE. (Because of this, you'll see that extra page during OOBE).
|
||||||
- TPM attestation state is not cleared by sysprep /generalize, causing TPM attestation failure during later OOBE flow. (This isn’t a particularly common issue, but you could run into it while testing if you are running sysprep /generalize and then rebooting or reimaging the device to go back through an Autopilot white glove or self-deploying scenario).
|
- TPM attestation state is not cleared by sysprep /generalize, causing TPM attestation failure during later OOBE flow. (This isn't a particularly common issue, but you could run into it while testing if you are running sysprep /generalize and then rebooting or reimaging the device to go back through an Autopilot white glove or self-deploying scenario).
|
||||||
- TPM attestation may fail if the device has a valid AIK cert but no EK cert. (This is related to the previous item).
|
- TPM attestation may fail if the device has a valid AIK cert but no EK cert. (This is related to the previous item).
|
||||||
- If TPM attestation fails during the Windows Autopilot white glove process, the landing page appears to be hung. (Basically, the white glove landing page, where you click “Provision” to start the white glove process, isn’t reporting errors properly).
|
- If TPM attestation fails during the Windows Autopilot white glove process, the landing page appears to be hung. (Basically, the white glove landing page, where you click "Provision" to start the white glove process, isn't reporting errors properly).
|
||||||
- TPM attestation fails on newer Infineon TPMs (firmware version > 7.69). (Prior to this fix, only a specific list of firmware versions was accepted).
|
- TPM attestation fails on newer Infineon TPMs (firmware version > 7.69). (Prior to this fix, only a specific list of firmware versions was accepted).
|
||||||
- Device naming templates may truncate the computer name at 14 characters instead of 15.
|
- Device naming templates may truncate the computer name at 14 characters instead of 15.
|
||||||
- Assigned Access policies cause a reboot which can interfere with the configuration of single-app kiosk devices.
|
- Assigned Access policies cause a reboot which can interfere with the configuration of single-app kiosk devices.
|
||||||
@ -58,8 +59,8 @@ This happens because Windows 10, version 1903 and 1909 deletes the AutopilotConf
|
|||||||
|
|
||||||
- Windows Autopilot white glove does not work for a non-English OS and you see a red screen that says "Success."
|
- Windows Autopilot white glove does not work for a non-English OS and you see a red screen that says "Success."
|
||||||
- Windows Autopilot reports an AUTOPILOTUPDATE error during OOBE after sysprep, reset or other variations. This typically happens if you reset the OS or used a custom sysprepped image.
|
- Windows Autopilot reports an AUTOPILOTUPDATE error during OOBE after sysprep, reset or other variations. This typically happens if you reset the OS or used a custom sysprepped image.
|
||||||
- BitLocker encryption is not correctly configured. Ex: BitLocker didn’t get an expected notification after policies were applied to begin encryption.
|
- BitLocker encryption is not correctly configured. Ex: BitLocker didn't get an expected notification after policies were applied to begin encryption.
|
||||||
- You are unable to install UWP apps from the Microsoft Store, causing failures during Windows Autopilot. If you are deploying Company Portal as a blocking app during Windows Autopilot ESP, you’ve probably seen this error.
|
- You are unable to install UWP apps from the Microsoft Store, causing failures during Windows Autopilot. If you are deploying Company Portal as a blocking app during Windows Autopilot ESP, you've probably seen this error.
|
||||||
- A user is not granted administrator rights in the Windows Autopilot user-driven Hybrid Azure AD join scenario. This is another non-English OS issue.
|
- A user is not granted administrator rights in the Windows Autopilot user-driven Hybrid Azure AD join scenario. This is another non-English OS issue.
|
||||||
<td>Download and install the <a href="https://support.microsoft.com/help/4505903">KB4505903 update</a>. <br><br>See the section: <b>How to get this update</b> for information on specific release channels you can use to obtain the update.
|
<td>Download and install the <a href="https://support.microsoft.com/help/4505903">KB4505903 update</a>. <br><br>See the section: <b>How to get this update</b> for information on specific release channels you can use to obtain the update.
|
||||||
<tr><td>Windows Autopilot <a href="https://docs.microsoft.com/windows/deployment/windows-autopilot/self-deploying">self-deploying mode</a> fails with an error code:
|
<tr><td>Windows Autopilot <a href="https://docs.microsoft.com/windows/deployment/windows-autopilot/self-deploying">self-deploying mode</a> fails with an error code:
|
||||||
@ -68,7 +69,7 @@ This happens because Windows 10, version 1903 and 1909 deletes the AutopilotConf
|
|||||||
<tr><td>0x801c03ea<td>This error indicates that TPM attestation failed, causing a failure to join Azure Active Directory with a device token.
|
<tr><td>0x801c03ea<td>This error indicates that TPM attestation failed, causing a failure to join Azure Active Directory with a device token.
|
||||||
<tr><td>0xc1036501<td>The device cannot do an automatic MDM enrollment because there are multiple MDM configurations in Azure AD. See <a href="https://oofhours.com/2019/10/01/inside-windows-autopilot-self-deploying-mode/">Inside Windows Autopilot self-deploying mode</a>.
|
<tr><td>0xc1036501<td>The device cannot do an automatic MDM enrollment because there are multiple MDM configurations in Azure AD. See <a href="https://oofhours.com/2019/10/01/inside-windows-autopilot-self-deploying-mode/">Inside Windows Autopilot self-deploying mode</a>.
|
||||||
</table>
|
</table>
|
||||||
<tr><td>White glove gives a red screen and the <b>Microsoft-Windows-User Device Registration/Admin</b> event log displays <b>HResult error code 0x801C03F3</b><td>This can happen if Azure AD can’t find an AAD device object for the device that you are trying to deploy. This will occur if you manually delete the object. To fix it, remove the device from AAD, Intune, and Autopilot, then re-register it with Autopilot, which will recreate the AAD device object.<br>
|
<tr><td>White glove gives a red screen and the <b>Microsoft-Windows-User Device Registration/Admin</b> event log displays <b>HResult error code 0x801C03F3</b><td>This can happen if Azure AD can't find an AAD device object for the device that you are trying to deploy. This will occur if you manually delete the object. To fix it, remove the device from AAD, Intune, and Autopilot, then re-register it with Autopilot, which will recreate the AAD device object.<br>
|
||||||
<br>To obtain troubleshooting logs use: <b>Mdmdiagnosticstool.exe -area Autopilot;TPM -cab c:\autopilot.cab</b>
|
<br>To obtain troubleshooting logs use: <b>Mdmdiagnosticstool.exe -area Autopilot;TPM -cab c:\autopilot.cab</b>
|
||||||
<tr><td>White glove gives a red screen<td>White glove is not supported on a VM.
|
<tr><td>White glove gives a red screen<td>White glove is not supported on a VM.
|
||||||
<tr><td>Error importing Windows Autopilot devices from a .csv file<td>Ensure that you have not edited the .csv file in Microsoft Excel or an editor other than Notepad. Some of these editors can introduce extra characters causing the file format to be invalid.
|
<tr><td>Error importing Windows Autopilot devices from a .csv file<td>Ensure that you have not edited the .csv file in Microsoft Excel or an editor other than Notepad. Some of these editors can introduce extra characters causing the file format to be invalid.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure Autopilot profiles
|
title: Configure Autopilot profiles
|
||||||
description: Learn how to configure device profiles while performing a Windows Autopilot deployment.
|
description: In this article, learn how to configure device profiles while performing a Windows Autopilot deployment.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
ms.reviewer: mniehaus
|
ms.reviewer: mniehaus
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -14,6 +14,7 @@ author: greg-lindsay
|
|||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -33,7 +34,7 @@ The following profile settings are available:
|
|||||||
|
|
||||||
- **Automatically setup for work or school**. All devices registered with Autopilot will automatically be considered work or school devices, so this question will not be asked during the OOBE process.
|
- **Automatically setup for work or school**. All devices registered with Autopilot will automatically be considered work or school devices, so this question will not be asked during the OOBE process.
|
||||||
|
|
||||||
- **Sign in experience with company branding**. Instead of presenting a generic Azure Active Directory sign-in page, all devices registered with Autopilot will automatically present a customized sign-in page with the organization’s name, logon, and additional help text, as configured in Azure Active Directory. See [Add company branding to your directory](https://docs.microsoft.com/azure/active-directory/customize-branding#add-company-branding-to-your-directory) to customize these settings.
|
- **Sign in experience with company branding**. Instead of presenting a generic Azure Active Directory sign-in page, all devices registered with Autopilot will automatically present a customized sign-in page with the organization's name, logon, and additional help text, as configured in Azure Active Directory. See [Add company branding to your directory](https://docs.microsoft.com/azure/active-directory/customize-branding#add-company-branding-to-your-directory) to customize these settings.
|
||||||
|
|
||||||
- **Skip privacy settings**. This optional Autopilot profile setting enables organizations to not ask about privacy settings during the OOBE process. This is typically desirable so that the organization can configure these settings via Intune or other management tool.
|
- **Skip privacy settings**. This optional Autopilot profile setting enables organizations to not ask about privacy settings during the OOBE process. This is typically desirable so that the organization can configure these settings via Intune or other management tool.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Troubleshooting Windows Autopilot
|
title: Troubleshooting Windows Autopilot
|
||||||
description: Learn how to handle issues as they arise during the Windows Autopilot deployment process.
|
description: In this article, learn how to handle issues as they arise during the Windows Autopilot deployment process.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
ms.reviewer: mniehaus
|
ms.reviewer: mniehaus
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -14,6 +14,7 @@ author: greg-lindsay
|
|||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -92,18 +93,18 @@ To see details related to the Autopilot profile settings and OOBE flow, Windows
|
|||||||
|
|
||||||
| Event ID | Type | Description |
|
| Event ID | Type | Description |
|
||||||
|----------|------|-------------|
|
|----------|------|-------------|
|
||||||
| 100 | Warning | “AutoPilot policy [name] not found.” This is typically a temporary problem, while the device is waiting for an Autopilot profile to be downloaded. |
|
| 100 | Warning | "AutoPilot policy [name] not found." This is typically a temporary problem, while the device is waiting for an Autopilot profile to be downloaded. |
|
||||||
| 101 | Info | “AutoPilotGetPolicyDwordByName succeeded: policy name = [setting name]; policy value [value].” This shows Autopilot retrieving and processing numeric OOBE settings. |
|
| 101 | Info | "AutoPilotGetPolicyDwordByName succeeded: policy name = [setting name]; policy value [value]." This shows Autopilot retrieving and processing numeric OOBE settings. |
|
||||||
| 103 | Info | “AutoPilotGetPolicyStringByName succeeded: policy name = [name]; value = [value].” This shows Autopilot retrieving and processing OOBE setting strings such as the Azure AD tenant name. |
|
| 103 | Info | "AutoPilotGetPolicyStringByName succeeded: policy name = [name]; value = [value]." This shows Autopilot retrieving and processing OOBE setting strings such as the Azure AD tenant name. |
|
||||||
| 109 | Info | “AutoPilotGetOobeSettingsOverride succeeded: OOBE setting [setting name]; state = [state].” This shows Autopilot retrieving and processing state-related OOBE settings. |
|
| 109 | Info | "AutoPilotGetOobeSettingsOverride succeeded: OOBE setting [setting name]; state = [state]." This shows Autopilot retrieving and processing state-related OOBE settings. |
|
||||||
| 111 | Info | “AutoPilotRetrieveSettings succeeded.” This means that the settings stored in the Autopilot profile that control the OOBE behavior have been retrieved successfully. |
|
| 111 | Info | "AutoPilotRetrieveSettings succeeded." This means that the settings stored in the Autopilot profile that control the OOBE behavior have been retrieved successfully. |
|
||||||
| 153 | Info | “AutoPilotManager reported the state changed from [original state] to [new state].” Typically this should say “ProfileState_Unknown” to “ProfileState_Available” to show that a profile was available for the device and downloaded, so the device is ready to be deployed using Autopilot. |
|
| 153 | Info | "AutoPilotManager reported the state changed from [original state] to [new state]." Typically this should say "ProfileState_Unknown" to "ProfileState_Available" to show that a profile was available for the device and downloaded, so the device is ready to be deployed using Autopilot. |
|
||||||
| 160 | Info | “AutoPilotRetrieveSettings beginning acquisition.” This shows that Autopilot is getting ready to download the needed Autopilot profile settings. |
|
| 160 | Info | "AutoPilotRetrieveSettings beginning acquisition." This shows that Autopilot is getting ready to download the needed Autopilot profile settings. |
|
||||||
| 161 | Info | “AutoPilotManager retrieve settings succeeded.” The Autopilot profile was successfully downloaded. |
|
| 161 | Info | "AutoPilotManager retrieve settings succeeded." The Autopilot profile was successfully downloaded. |
|
||||||
| 163 | Info | “AutoPilotManager determined download is not required and the device is already provisioned. Clean or reset the device to change this.” This message indicates that an Autopilot profile is resident on the device; it typically would only be removed by the **Sysprep /Generalize** process. |
|
| 163 | Info | "AutoPilotManager determined download is not required and the device is already provisioned. Clean or reset the device to change this." This message indicates that an Autopilot profile is resident on the device; it typically would only be removed by the **Sysprep /Generalize** process. |
|
||||||
| 164 | Info | “AutoPilotManager determined Internet is available to attempt policy download.” |
|
| 164 | Info | "AutoPilotManager determined Internet is available to attempt policy download." |
|
||||||
| 171 | Error | “AutoPilotManager failed to set TPM identity confirmed. HRESULT=[error code].” This indicates an issue performing TPM attestation, needed to complete the self-deploying mode process. |
|
| 171 | Error | "AutoPilotManager failed to set TPM identity confirmed. HRESULT=[error code]." This indicates an issue performing TPM attestation, needed to complete the self-deploying mode process. |
|
||||||
| 172 | Error | “AutoPilotManager failed to set AutoPilot profile as available. HRESULT=[error code].” This is typically related to event ID 171. |
|
| 172 | Error | "AutoPilotManager failed to set AutoPilot profile as available. HRESULT=[error code]." This is typically related to event ID 171. |
|
||||||
|
|
||||||
In addition to the event log entries, the registry and ETW trace options described below also work with Windows 10 version 1803 and above.
|
In addition to the event log entries, the registry and ETW trace options described below also work with Windows 10 version 1803 and above.
|
||||||
|
|
||||||
@ -114,8 +115,8 @@ On Windows 10 version 1709 and above, information about the Autopilot profile se
|
|||||||
| Value | Description |
|
| Value | Description |
|
||||||
|-------|-------------|
|
|-------|-------------|
|
||||||
| AadTenantId | The GUID of the Azure AD tenant the user signed into. This should match the tenant that the device was registered with; if it does not match the user will receive an error. |
|
| AadTenantId | The GUID of the Azure AD tenant the user signed into. This should match the tenant that the device was registered with; if it does not match the user will receive an error. |
|
||||||
| CloudAssignedTenantDomain | The Azure AD tenant the device has been registered with, e.g. “contosomn.onmicrosoft.com.” If the device is not registered with Autopilot, this value will be blank. |
|
| CloudAssignedTenantDomain | The Azure AD tenant the device has been registered with, e.g. "contosomn.onmicrosoft.com." If the device is not registered with Autopilot, this value will be blank. |
|
||||||
| CloudAssignedTenantId | The GUID of the Azure AD tenant the device has been registered with (the GUID corresponds to the tenant domain from the CloudAssignedTenantDomain registry value). If the device isn’t registered with Autopilot, this value will be blank.|
|
| CloudAssignedTenantId | The GUID of the Azure AD tenant the device has been registered with (the GUID corresponds to the tenant domain from the CloudAssignedTenantDomain registry value). If the device isn't registered with Autopilot, this value will be blank.|
|
||||||
| IsAutoPilotDisabled | If set to 1, this indicates that the device is not registered with Autopilot. This could also indicate that the Autopilot profile could not be downloaded due to network connectivity or firewall issues, or network timeouts. |
|
| IsAutoPilotDisabled | If set to 1, this indicates that the device is not registered with Autopilot. This could also indicate that the Autopilot profile could not be downloaded due to network connectivity or firewall issues, or network timeouts. |
|
||||||
| TenantMatched | This will be set to 1 if the tenant ID of the user matches the tenant ID that the device was registered with. If this is 0, the user would be shown an error and forced to start over. |
|
| TenantMatched | This will be set to 1 if the tenant ID of the user matches the tenant ID that the device was registered with. If this is 0, the user would be shown an error and forced to start over. |
|
||||||
| CloudAssignedOobeConfig | This is a bitmap that shows which Autopilot settings were configured. Values include: SkipCortanaOptIn = 1, OobeUserNotLocalAdmin = 2, SkipExpressSettings = 4, SkipOemRegistration = 8, SkipEula = 16 |
|
| CloudAssignedOobeConfig | This is a bitmap that shows which Autopilot settings were configured. Values include: SkipCortanaOptIn = 1, OobeUserNotLocalAdmin = 2, SkipExpressSettings = 4, SkipOemRegistration = 8, SkipEula = 16 |
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Autopilot for white glove deployment
|
title: Windows Autopilot for white glove deployment
|
||||||
description: Windows Autopilot for white glove deployment
|
description: Learn how to use Windows Autopilot for a white glove deployment that enables partners or IT staff to pre-provision a Windows 10 PC.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune, pre-provisioning
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune, pre-provisioning
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -14,6 +14,7 @@ ms.audience: itpro
|
|||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot for white glove deployment
|
# Windows Autopilot for white glove deployment
|
||||||
@ -24,7 +25,7 @@ Windows Autopilot enables organizations to easily provision new devices - levera
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Windows Autopilot can also provide a <I>white glove</I> service that enables partners or IT staff to pre-provision a Windows 10 PC so that it is fully configured and business-ready. From the end user’s perspective, the Windows Autopilot user-driven experience is unchanged, but getting their device to a fully provisioned state is faster.
|
Windows Autopilot can also provide a <I>white glove</I> service that enables partners or IT staff to pre-provision a Windows 10 PC so that it is fully configured and business-ready. From the end user's perspective, the Windows Autopilot user-driven experience is unchanged, but getting their device to a fully provisioned state is faster.
|
||||||
|
|
||||||
With **Windows Autopilot for white glove deployment**, the provisioning process is split. The time-consuming portions are performed by IT, partners, or OEMs. The end user simply completes a few necessary settings and polices and then they can begin using their device.
|
With **Windows Autopilot for white glove deployment**, the provisioning process is split. The time-consuming portions are performed by IT, partners, or OEMs. The end user simply completes a few necessary settings and polices and then they can begin using their device.
|
||||||
|
|
||||||
@ -42,7 +43,7 @@ In addition to [Windows Autopilot requirements](windows-autopilot-requirements.m
|
|||||||
- Physical devices with Ethernet connectivity; Wi-fi connectivity is not supported due to the requirement to choose a language, locale, and keyboard to make that Wi-fi connection; doing that in a pre-provisioning process could prevent the user from choosing their own language, locale, and keyboard when they receive the device.
|
- Physical devices with Ethernet connectivity; Wi-fi connectivity is not supported due to the requirement to choose a language, locale, and keyboard to make that Wi-fi connection; doing that in a pre-provisioning process could prevent the user from choosing their own language, locale, and keyboard when they receive the device.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Because the OEM or vendor performs the white glove process, this <u>doesn’t require access to an end-user's on-prem domain infrastructure</u>. This is unlike a typical hybrid Azure AD-joined scenario because rebooting the device is postponed. The device is resealed prior to the time when connectivity to a domain controller is expected, and the domain network is contacted when the device is unboxed on-prem by the end-user.
|
>Because the OEM or vendor performs the white glove process, this <u>doesn't require access to an end-user's on-prem domain infrastructure</u>. This is unlike a typical hybrid Azure AD-joined scenario because rebooting the device is postponed. The device is resealed prior to the time when connectivity to a domain controller is expected, and the domain network is contacted when the device is unboxed on-prem by the end-user.
|
||||||
|
|
||||||
## Preparation
|
## Preparation
|
||||||
|
|
||||||
@ -110,8 +111,8 @@ If the pre-provisioning process completed successfully and the device was reseal
|
|||||||
- Power on the device.
|
- Power on the device.
|
||||||
- Select the appropriate language, locale, and keyboard layout.
|
- Select the appropriate language, locale, and keyboard layout.
|
||||||
- Connect to a network (if using Wi-Fi). If using Hybrid Azure AD Join, there must be connectivity to a domain controller; if using Azure AD Join, internet connectivity is required.
|
- Connect to a network (if using Wi-Fi). If using Hybrid Azure AD Join, there must be connectivity to a domain controller; if using Azure AD Join, internet connectivity is required.
|
||||||
- On the branded sign-on screen, enter the user’s Azure Active Directory credentials.
|
- On the branded sign-on screen, enter the user's Azure Active Directory credentials.
|
||||||
- If using Hybrid Azure AD Join, the device will reboot; after the reboot, enter the user’s Active Directory credentials.
|
- If using Hybrid Azure AD Join, the device will reboot; after the reboot, enter the user's Active Directory credentials.
|
||||||
- Additional policies and apps will be delivered to the device, as tracked by the Enrollment Status Page (ESP). Once complete, the user will be able to access the desktop.
|
- Additional policies and apps will be delivered to the device, as tracked by the Enrollment Status Page (ESP). Once complete, the user will be able to access the desktop.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows Autopilot what's new
|
title: Windows Autopilot what's new
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Read news and resources about the latest updates and past versions of Windows Autopilot.
|
description: In this article, read news and resources about the latest updates and past versions of Windows Autopilot.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -14,6 +14,7 @@ author: greg-lindsay
|
|||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.collection: M365-modern-desktop
|
ms.collection: M365-modern-desktop
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
ms.custom: seo-marvel-apr2020
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -45,9 +46,9 @@ Also new in this version of Windows:
|
|||||||
|
|
||||||
## New in Windows 10, version 1809
|
## New in Windows 10, version 1809
|
||||||
|
|
||||||
Windows Autopilot [self-deploying mode](self-deploying.md) enables a zero touch device provisioning experience. Simply power on the device, plug it into the Ethernet, and the device is fully configured by Windows Autopilot. This self-deploying capability removes the current need to have an end user interact by pressing the “Next” button during the deployment process.
|
Windows Autopilot [self-deploying mode](self-deploying.md) enables a zero touch device provisioning experience. Simply power on the device, plug it into the Ethernet, and the device is fully configured by Windows Autopilot. This self-deploying capability removes the current need to have an end user interact by pressing the "Next" button during the deployment process.
|
||||||
|
|
||||||
You can utilize Windows Autopilot self-deploying mode to register the device to an AAD tenant, enroll in your organization’s MDM provider, and provision policies and applications, all with no user authentication or user interaction required.
|
You can utilize Windows Autopilot self-deploying mode to register the device to an AAD tenant, enroll in your organization's MDM provider, and provision policies and applications, all with no user authentication or user interaction required.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Window 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809.
|
>Window 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user