mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
resolved two content conflicts
This commit is contained in:
commit
3126413c90
@ -45,6 +45,16 @@
|
|||||||
"redirect_url": "https://docs.microsoft.com/hololens/hololens1-clicker#restart-or-recover-the-clicker",
|
"redirect_url": "https://docs.microsoft.com/hololens/hololens1-clicker#restart-or-recover-the-clicker",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"source_path": "devices/hololens/hololens-find-and-save-files.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/hololens/holographic-data",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "devices/hololens/hololens-management-overview.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/hololens",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source_path": "devices/surface/manage-surface-pro-3-firmware-updates.md",
|
"source_path": "devices/surface/manage-surface-pro-3-firmware-updates.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/surface/manage-surface-driver-and-firmware-updates",
|
"redirect_url": "https://docs.microsoft.com/surface/manage-surface-driver-and-firmware-updates",
|
||||||
@ -956,6 +966,11 @@
|
|||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/overview-hunting.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
@ -966,6 +981,51 @@
|
|||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-filecreationevents-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefileevents-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-imageloadevents-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-logonevents-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicelogonevents-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machineinfo-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceinfo-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-machinenetworkinfo-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-miscevents-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceevents-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-networkcommunicationevents-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicenetworkevents-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-processcreationevents-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceprocessevents-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-registryevents-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-deviceregistryevents-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
"source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md",
|
"source_path": "windows/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
@ -1657,11 +1717,6 @@
|
|||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/windows-defender-atp/overview-hunting-windows-defender-advanced-threat-protection.md",
|
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview",
|
|
||||||
"redirect_document_id": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"source_path": "windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md",
|
"source_path": "windows/security/threat-protection/windows-defender-atp/overview-secure-score-windows-defender-advanced-threat-protection.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
|
@ -2,19 +2,19 @@
|
|||||||
|
|
||||||
documentType: LandingData
|
documentType: LandingData
|
||||||
|
|
||||||
title: Microsoft Edge group policies
|
title: Microsoft Edge Legacy group policies
|
||||||
|
|
||||||
metadata:
|
metadata:
|
||||||
|
|
||||||
document_id:
|
document_id:
|
||||||
|
|
||||||
title: Microsoft Edge group policies
|
title: Microsoft Edge Legacy group policies
|
||||||
|
|
||||||
description: Learn how to configure group policies in Microsoft Edge on Windows 10.
|
description: Learn how to configure group policies in Microsoft Edge Legacy on Windows 10.
|
||||||
|
|
||||||
text: Some of the features in Microsoft Edge gives you the ability to set a custom URL for the New Tab page or Home button. Another new feature allows you to hide or show the Favorites bar, giving you more control over the favorites bar.
|
text: Some of the features in Microsoft Edge Legacy gives you the ability to set a custom URL for the New Tab page or Home button. Another new feature allows you to hide or show the Favorites bar, giving you more control over the favorites bar. (To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).)
|
||||||
|
|
||||||
keywords: Microsoft Edge, Windows 10, Windows 10 Mobile
|
keywords: Microsoft Edge Legacy, Windows 10, Windows 10 Mobile
|
||||||
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
|
||||||
@ -36,7 +36,7 @@ sections:
|
|||||||
|
|
||||||
- type: markdown
|
- type: markdown
|
||||||
|
|
||||||
text: Microsoft Edge works with Group Policy and Microsoft Intune to help you manage your organization's computer settings. Group Policy objects (GPOs) can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences.
|
text: (Note - You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).) Microsoft Edge Legacy works with Group Policy and Microsoft Intune to help you manage your organization's computer settings. Group Policy objects (GPOs) can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences.
|
||||||
|
|
||||||
- items:
|
- items:
|
||||||
|
|
||||||
|
@ -2,19 +2,19 @@
|
|||||||
|
|
||||||
documentType: LandingData
|
documentType: LandingData
|
||||||
|
|
||||||
title: Microsoft Edge Group Policy configuration options
|
title: Microsoft Edge Legacy Group Policy configuration options
|
||||||
|
|
||||||
metadata:
|
metadata:
|
||||||
|
|
||||||
document_id:
|
document_id:
|
||||||
|
|
||||||
title: Microsoft Edge Group Policy configuration options
|
title: Microsoft Edge Group Legacy Policy configuration options
|
||||||
|
|
||||||
description:
|
description:
|
||||||
|
|
||||||
text: Learn how to deploy and configure group policies in Microsoft Edge on Windows 10. Some of the features coming to Microsoft Edge gives you the ability to set a custom URL for the New Tab page or Home button. Another new feature allows you to hide or show the Favorites bar, giving you more control over the favorites bar.
|
text: (Note - You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).) Learn how to deploy and configure group policies in Microsoft Edge Legacy on Windows 10. Some of the features coming to Microsoft Edge Legacy gives you the ability to set a custom URL for the New Tab page or Home button. Another new feature allows you to hide or show the Favorites bar, giving you more control over the favorites bar.
|
||||||
|
|
||||||
keywords: Microsoft Edge, Windows 10
|
keywords: Microsoft Edge Legacy, Windows 10
|
||||||
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
|
||||||
@ -36,7 +36,7 @@ sections:
|
|||||||
|
|
||||||
- type: markdown
|
- type: markdown
|
||||||
|
|
||||||
text: Learn about interoperability goals and enterprise guidance along with system requirements, language support and frequently asked questions.
|
text: (Note - You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).) Learn about interoperability goals and enterprise guidance along with system requirements, language support and frequently asked questions.
|
||||||
|
|
||||||
- items:
|
- items:
|
||||||
|
|
||||||
|
@ -28,10 +28,11 @@
|
|||||||
# Navigating Windows Holographic
|
# Navigating Windows Holographic
|
||||||
## [Start menu and mixed reality home](holographic-home.md)
|
## [Start menu and mixed reality home](holographic-home.md)
|
||||||
## [Use your voice with HoloLens](hololens-cortana.md)
|
## [Use your voice with HoloLens](hololens-cortana.md)
|
||||||
## [Find and save files](hololens-find-and-save-files.md)
|
## [Find and save files](holographic-data.md)
|
||||||
## [Create, share, and view photos and video](holographic-photos-and-videos.md)
|
## [Create, share, and view photos and video](holographic-photos-and-videos.md)
|
||||||
|
|
||||||
# User management and access management
|
# User management and access management
|
||||||
|
## [Accounts on HoloLens](hololens-identity.md)
|
||||||
## [Share your HoloLens with multiple people](hololens-multiple-users.md)
|
## [Share your HoloLens with multiple people](hololens-multiple-users.md)
|
||||||
## [Set up HoloLens as a kiosk (single application access)](hololens-kiosk.md)
|
## [Set up HoloLens as a kiosk (single application access)](hololens-kiosk.md)
|
||||||
## [Set up limited application access](hololens-kiosk.md)
|
## [Set up limited application access](hololens-kiosk.md)
|
||||||
@ -53,15 +54,14 @@
|
|||||||
## [Spatial mapping on HoloLens](hololens-spaces.md)
|
## [Spatial mapping on HoloLens](hololens-spaces.md)
|
||||||
|
|
||||||
# Update, troubleshoot, or recover HoloLens
|
# Update, troubleshoot, or recover HoloLens
|
||||||
## [Update, troubleshoot, or recover HoloLens](hololens-management-overview.md)
|
|
||||||
## [Update HoloLens](hololens-update-hololens.md)
|
## [Update HoloLens](hololens-update-hololens.md)
|
||||||
## [Restart, reset, or recover](hololens-recovery.md)
|
## [Restart, reset, or recover](hololens-recovery.md)
|
||||||
## [Troubleshoot HoloLens](hololens-troubleshooting.md)
|
## [Troubleshoot HoloLens](hololens-troubleshooting.md)
|
||||||
## [Known issues](hololens-known-issues.md)
|
## [Known issues](hololens-known-issues.md)
|
||||||
## [Frequently asked questions](hololens-faq.md)
|
## [Frequently asked questions](hololens-faq.md)
|
||||||
|
## [Hololens services status](hololens-status.md)
|
||||||
|
|
||||||
# [Release Notes](hololens-release-notes.md)
|
# [Release Notes](hololens-release-notes.md)
|
||||||
# [Hololens status](hololens-status.md)
|
|
||||||
# [Give us feedback](hololens-feedback.md)
|
# [Give us feedback](hololens-feedback.md)
|
||||||
# [Join the Windows Insider program](hololens-insider.md)
|
# [Join the Windows Insider program](hololens-insider.md)
|
||||||
# [Change history for Microsoft HoloLens documentation](change-history-hololens.md)
|
# [Change history for Microsoft HoloLens documentation](change-history-hololens.md)
|
||||||
|
100
devices/hololens/holographic-data.md
Normal file
100
devices/hololens/holographic-data.md
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
---
|
||||||
|
title: Find and save files on HoloLens
|
||||||
|
description: Use File Explorer on HoloLens to view and manage files on your device
|
||||||
|
keywords: how-to, file picker, files, photos, videos, pictures, OneDrive, storage, file explorer
|
||||||
|
ms.assetid: 77d2e357-f65f-43c8-b62f-6cd9bf37070a
|
||||||
|
author: mattzmsft
|
||||||
|
ms.author: mazeller
|
||||||
|
manager: v-miegge
|
||||||
|
ms.reviewer: jarrettrenshaw
|
||||||
|
ms.date: 12/30/2019
|
||||||
|
keywords: hololens
|
||||||
|
ms.prod: hololens
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.topic: article
|
||||||
|
audience: ITPro
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
appliesto:
|
||||||
|
- HoloLens (1st gen)
|
||||||
|
- HoloLens 2
|
||||||
|
---
|
||||||
|
|
||||||
|
# Find, open, and save files on HoloLens
|
||||||
|
|
||||||
|
Files you create on HoloLens, including photos and videos, are saved directly to your HoloLens device. View and manage them in the same way you would manage files on Windows 10:
|
||||||
|
|
||||||
|
- Using the File Explorer app to access local folders.
|
||||||
|
- Within an app's storage.
|
||||||
|
- In a special folder (such as the video or music library).
|
||||||
|
- Using a storage service that includes an app and file picker (such as OneDrive).
|
||||||
|
- Using a desktop PC connected to your HoloLens by using a USB cable, using MTP (Media Transfer Protocol) support.
|
||||||
|
|
||||||
|
## View files on HoloLens using File Explorer
|
||||||
|
|
||||||
|
> Applies to all HoloLens 2 devices and HoloLens (1st gen) as of the [Windows 10 April 2018 Update (RS4) for HoloLens](https://docs.microsoft.com/windows/mixed-reality/release-notes-april-2018).
|
||||||
|
|
||||||
|
Use File Explorer on HoloLens to view and manage files on your device, including 3D objects, documents, and pictures. Go to **Start** > **All apps** > **File Explorer** to get started.
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> If there are no files listed in File Explorer, select **This Device** in the top left pane.
|
||||||
|
|
||||||
|
If you don’t see any files in File Explorer, the "Recent" filter may be active (clock icon is highlighted in left pane). To fix this, select the **This Device** document icon in the left pane (beneath the clock icon), or open the menu and select **This Device**.
|
||||||
|
|
||||||
|
## Find and view your photos and videos
|
||||||
|
|
||||||
|
[Mixed reality capture](holographic-photos-and-videos.md) lets you take mixed reality photos and videos on HoloLens. These photos and videos are saved to the device's Camera Roll folder.
|
||||||
|
|
||||||
|
You can access photos and videos taken with HoloLens by:
|
||||||
|
|
||||||
|
- accessing the Camera Roll directly through the [Photos app](holographic-photos-and-videos.md).
|
||||||
|
- uploading photos and videos to cloud storage by syncing your photos and videos to OneDrive.
|
||||||
|
- using the Mixed Reality Capture page of the [Windows Device Portal](https://docs.microsoft.com/windows/mixed-reality/using-the-windows-device-portal#mixed-reality-capture).
|
||||||
|
|
||||||
|
### Photos app
|
||||||
|
|
||||||
|
The Photos app is one of the default apps on the **Start** menu, and comes built-in with HoloLens. Learn more about [using the Photos app to view content](holographic-photos-and-videos.md).
|
||||||
|
|
||||||
|
You can also install the [OneDrive app](https://www.microsoft.com/p/onedrive/9wzdncrfj1p3) from the Microsoft Store to sync photos to other devices.
|
||||||
|
|
||||||
|
### OneDrive app
|
||||||
|
|
||||||
|
[OneDrive](https://onedrive.live.com/) lets you access, manage, and share your photos and videos with any device and with any user. To access the photos and videos captured on HoloLens, download the [OneDrive app](https://www.microsoft.com/p/onedrive/9wzdncrfj1p3) from the Microsoft Store on your HoloLens. Once downloaded, open the OneDrive app and select **Settings** > **Camera upload**, and turn on **Camera upload**.
|
||||||
|
|
||||||
|
### Connect to a PC
|
||||||
|
|
||||||
|
If your HoloLens is running the [Windows 10 April 2018 update](https://docs.microsoft.com/windows/mixed-reality/release-notes-april-2018) or later, you can connect your HoloLens to a Windows 10 PC by using a USB cable to browse photos and videos on the device by using MTP (media transfer protocol). You'll need to make sure the device is unlocked to browse files if you have a PIN or password set up on your device.
|
||||||
|
|
||||||
|
If you have enabled the [Windows Device Portal](https://docs.microsoft.com/windows/mixed-reality/using-the-windows-device-portal), you can use it to browse, retrieve, and manage the photos and videos stored on your device.
|
||||||
|
|
||||||
|
## Access files within an app
|
||||||
|
|
||||||
|
If an application saves files on your device, you can use that application to access them.
|
||||||
|
|
||||||
|
### Requesting files from another app
|
||||||
|
|
||||||
|
An application can request to save a file or open a file from another app by using [file pickers](https://docs.microsoft.com/windows/mixed-reality/app-model#file-pickers).
|
||||||
|
|
||||||
|
### Known folders
|
||||||
|
|
||||||
|
HoloLens supports a number of [known folders](https://docs.microsoft.com/windows/mixed-reality/app-model#known-folders) that apps can request permission to access.
|
||||||
|
|
||||||
|
## View HoloLens files on your PC
|
||||||
|
|
||||||
|
Similar to other mobile devices, connect HoloLens to your desktop PC using MTP (Media Transfer Protocol) and open File Explorer on the PC to access your HoloLens libraries for easy transfer.
|
||||||
|
|
||||||
|
To see your HoloLens files in File Explorer on your PC:
|
||||||
|
|
||||||
|
1. Sign in to HoloLens, then plug it into the PC using the USB cable that came with the HoloLens.
|
||||||
|
|
||||||
|
1. Select **Open Device to view files with File Explorer**, or open File Explorer on the PC and navigate to the device.
|
||||||
|
|
||||||
|
To see info about your HoloLens, right-click the device name in File Explorer on your PC, then select **Properties**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> HoloLens (1st gen) does not support connecting to external hard drives or SD cards.
|
||||||
|
|
||||||
|
## Sync to the cloud
|
||||||
|
|
||||||
|
To sync photos and other files from your HoloLens to the cloud, install and set up OneDrive on HoloLens. To get OneDrive, search for it in the Microsoft Store on your HoloLens.
|
||||||
|
|
||||||
|
HoloLens doesn't back up app files and data, so it's a good idea to save your important stuff to OneDrive. That way, if you reset your device or uninstall an app, your info will be backed up.
|
@ -137,7 +137,7 @@ Try walking around and looking at the area where you're placing the app so HoloL
|
|||||||
|
|
||||||
Free up some storage space by doing one or more of the following:
|
Free up some storage space by doing one or more of the following:
|
||||||
|
|
||||||
- Remove some of the holograms you've placed, or remove some saved data from within apps. [How do I find my data?](hololens-find-and-save-files.md)
|
- Remove some of the holograms you've placed, or remove some saved data from within apps. [How do I find my data?](holographic-data.md)
|
||||||
- Delete some pictures and videos in the Photos app.
|
- Delete some pictures and videos in the Photos app.
|
||||||
- Uninstall some apps from your HoloLens. In the All apps list, tap and hold the app you want to uninstall, then select **Uninstall**. (This will also delete any of the app's data stored on the device.)
|
- Uninstall some apps from your HoloLens. In the All apps list, tap and hold the app you want to uninstall, then select **Uninstall**. (This will also delete any of the app's data stored on the device.)
|
||||||
|
|
||||||
|
@ -36,6 +36,9 @@ Get around HoloLens faster with these basic commands. In order to use these you
|
|||||||
|
|
||||||
Use these commands throughout Windows Mixed Reality to get around faster. Some commands use the gaze cursor, which you bring up by saying “select.”
|
Use these commands throughout Windows Mixed Reality to get around faster. Some commands use the gaze cursor, which you bring up by saying “select.”
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Hand rays are not supported on HoloLens (1st Gen).
|
||||||
|
|
||||||
| Say this | To do this |
|
| Say this | To do this |
|
||||||
| - | - |
|
| - | - |
|
||||||
| "Select" | Say "select" to bring up the gaze cursor. Then, turn your head to position the cursor on the thing you want to select, and say “select” again. |
|
| "Select" | Say "select" to bring up the gaze cursor. Then, turn your head to position the cursor on the thing you want to select, and say “select” again. |
|
||||||
|
@ -1,66 +0,0 @@
|
|||||||
---
|
|
||||||
title: Find and save files on HoloLens
|
|
||||||
description: Use File Explorer on HoloLens to view and manage files on your device
|
|
||||||
ms.assetid: 77d2e357-f65f-43c8-b62f-6cd9bf37070a
|
|
||||||
ms.reviewer: jarrettrenshaw
|
|
||||||
ms.date: 07/01/2019
|
|
||||||
manager: v-miegge
|
|
||||||
keywords: hololens
|
|
||||||
ms.prod: hololens
|
|
||||||
ms.sitesec: library
|
|
||||||
author: v-miegge
|
|
||||||
ms.author: v-miegge
|
|
||||||
ms.topic: article
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
appliesto:
|
|
||||||
- HoloLens (1st gen)
|
|
||||||
- HoloLens 2
|
|
||||||
---
|
|
||||||
|
|
||||||
# Find and save files on HoloLens
|
|
||||||
|
|
||||||
Add content from [Find and save files](https://docs.microsoft.com/windows/mixed-reality/saving-and-finding-your-files)
|
|
||||||
|
|
||||||
|
|
||||||
Files you create on HoloLens, including Office documents, photos, and videos, are saved to your HoloLens. To view and manage them, you can use the File Explorer app on HoloLens or File Explorer on your PC. To sync photos and other files to the cloud, use the OneDrive app on HoloLens.
|
|
||||||
|
|
||||||
## View files on HoloLens
|
|
||||||
|
|
||||||
Use File Explorer on HoloLens to view and manage files on your device, including 3D objects, documents, and pictures. Go to Start > All apps > File Explorer on HoloLens to get started.
|
|
||||||
|
|
||||||
>[!TIP]
|
|
||||||
>If there are no files listed in File Explorer, select **This Device** in the top left pane.
|
|
||||||
|
|
||||||
## View HoloLens files on your PC
|
|
||||||
|
|
||||||
To see your HoloLens files in File Explorer on your PC:
|
|
||||||
|
|
||||||
1. Sign in to HoloLens, then plug it into the PC using the USB cable that came with the HoloLens.
|
|
||||||
|
|
||||||
1. Select **Open Device to view files with File Explorer**, or open File Explorer on the PC and navigate to the device.
|
|
||||||
|
|
||||||
>[!TIP]
|
|
||||||
>To see info about your HoloLens, right-click the device name in File Explorer on your PC, then select **Properties**.
|
|
||||||
|
|
||||||
## View HoloLens files on Windows Device Portal
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>To use Device Portal you must enable [Developer Mode](https://docs.microsoft.com/windows/mixed-reality/using-the-windows-device-portal#setting-up-hololens-to-use-windows-device-portal).
|
|
||||||
|
|
||||||
1. Enable Developer Mode and Device Portal on your HoloLens. (See note above if not enabled.)
|
|
||||||
|
|
||||||
1. Navigate to the Device Portal page on your PC.
|
|
||||||
1. To connect to a HoloLens connected to your PC type in 127.0.0.1:10080/ in your browser.
|
|
||||||
1. To connect to a HoloLens wirelessly instead navigate to your IP address.
|
|
||||||
|
|
||||||
>[!TIP]
|
|
||||||
>You may need to install a certificate, OR you may see more details and navigate to the website anyways. (Path per web broswer will differ.)
|
|
||||||
|
|
||||||
1. Once succesfully connected, on the left side of the windw you can navigate to the [File Explorer](https://docs.microsoft.com/windows/mixed-reality/using-the-windows-device-portal#file-explorer) workspace.
|
|
||||||
|
|
||||||
## Sync to the cloud
|
|
||||||
|
|
||||||
To sync photos and other files from your HoloLens to the cloud, install and set up OneDrive on HoloLens. To get OneDrive, search for it in the Microsoft Store on your HoloLens.
|
|
||||||
|
|
||||||
>[!TIP]
|
|
||||||
>HoloLens doesn't back up app files and data, so it's a good idea to save your important stuff to OneDrive. That way, if you reset your device or uninstall an app, your info will be backed up.
|
|
111
devices/hololens/hololens-identity.md
Normal file
111
devices/hololens/hololens-identity.md
Normal file
@ -0,0 +1,111 @@
|
|||||||
|
---
|
||||||
|
title: Managing user identity and login on HoloLens
|
||||||
|
description: Manage user identity, security, and login on HoloLens.
|
||||||
|
keywords: HoloLens, user, account, aad, adfs, microsoft account, msa, credentials, reference
|
||||||
|
ms.assetid: 728cfff2-81ce-4eb8-9aaa-0a3c3304660e
|
||||||
|
author: scooley
|
||||||
|
ms.author: scooley
|
||||||
|
ms.date: 1/6/2019
|
||||||
|
ms.prod: hololens
|
||||||
|
ms.topic: article
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.topic: article
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
audience: ITPro
|
||||||
|
manager: jarrettr
|
||||||
|
appliesto:
|
||||||
|
- HoloLens (1st gen)
|
||||||
|
- HoloLens 2
|
||||||
|
---
|
||||||
|
|
||||||
|
# User identity and signin
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This article is a technical reference for IT Pros and tech enthusiasts. If you're looking for HoloLens set up instructions, read "[Setting up your HoloLens (1st gen)](hololens1-start.md)" or "[Setting up your HoloLens 2](hololens2-start.md)".
|
||||||
|
|
||||||
|
Like other Windows devices, HoloLens always operates under a user context. There is always a user identity. HoloLens treats identity in almost the same manner as other Windows 10 devices do. This article is a deep-dive reference for identity on HoloLens, and focuses on how HoloLens differs from other Windows 10 devices.
|
||||||
|
|
||||||
|
HoloLens supports several kinds of user identities. You can use one or more user accounts to sign in. Here's an overview of the identity types and authentication options on HoloLens:
|
||||||
|
|
||||||
|
| Identity type | Accounts per device | Authentication options |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| [Azure Active Directory (AAD)](https://docs.microsoft.com/azure/active-directory/) | 32 (see details) | <ul><li>Azure web credential provider</li><li>Azure Authenticator App</li><li>Biometric (Iris) – HoloLens 2 only</li><li>PIN – Optional for HoloLens (1st gen), required for HoloLens 2</li><li>Password</li></ul> |
|
||||||
|
| [Microsoft Account (MSA)](https://docs.microsoft.com/windows/security/identity-protection/access-control/microsoft-accounts) | 1 | <ul><li>Biometric (Iris) – HoloLens 2 only</li><li>PIN – Optional for HoloLens (1st gen), required for HoloLens 2</li><li>Password</li></ul> |
|
||||||
|
| [Local account](https://docs.microsoft.com/windows/security/identity-protection/access-control/local-accounts) | 1 | Password |
|
||||||
|
|
||||||
|
Cloud-connected accounts (AAD and MSA) offer more features because they can use Azure services.
|
||||||
|
|
||||||
|
## Setting up users
|
||||||
|
|
||||||
|
The most common way to set up a new user is during the HoloLens out-of-box experience (OOBE). During setup, HoloLens prompts for a user to sign in by using the account that they want to use on the device. This account can be a consumer Microsoft account or an enterprise account that has been configured in Azure. See Setting up your [HoloLens (1st gen)](hololens1-start.md) or [HoloLens 2](hololens2-start.md).
|
||||||
|
|
||||||
|
Like Windows on other devices, signing in during setup creates a user profile on the device. The user profile stores apps and data. The same account also provides Single Sign-on for apps such as Edge or Skype by using the Windows Account Manager APIs.
|
||||||
|
|
||||||
|
If you use an enterprise or organizational account to sign in to HoloLens, HoloLens enrolls in the organization's IT infrastructure. This enrollment allows your IT Admin to configure Mobile Device Management (MDM) to send group policies to your HoloLens.
|
||||||
|
|
||||||
|
By default, as for other Windows 10 devices, you'll have to sign in again when HoloLens restarts or resumes from standby. You can use the Settings app to change this behavior, or the behavior can be controlled by group policy.
|
||||||
|
|
||||||
|
### Linked accounts
|
||||||
|
|
||||||
|
As in the Desktop version of Windows, you can link additional web account credentials to your HoloLens account. Such linking makes it easier to access resources across or within apps (such as the Store) or to combine access to personal and work resources. After you connect an account to the device, you can grant permission to use the device to apps so that you don't have to sign in to each app individually.
|
||||||
|
|
||||||
|
Linking accounts does not separate the user data created on the device, such as images or downloads.
|
||||||
|
|
||||||
|
### Setting up multi-user support (AAD only)
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> **HoloLens (1st gen)** began supporting multiple AAD users in the [Windows 10 April 2018 Update](https://docs.microsoft.com/windows/mixed-reality/release-notes-april-2018) as part of [Windows Holographic for Business](hololens-upgrade-enterprise.md).
|
||||||
|
|
||||||
|
HoloLens supports multiple users from the same AAD tenant. To use this feature, you must use an account that belongs to your organization to set up the device. Subsequently, other users from the same tenant can sign in to the device from the sign-in screen or by tapping the user tile on the Start panel. Only one user can be signed in at a time. When a user signs in, HoloLens signs out the previous user.
|
||||||
|
|
||||||
|
All users can use the apps installed on the device. However, each user has their own app data and preferences. Removing an app from the device removes it for all users.
|
||||||
|
|
||||||
|
## Removing users
|
||||||
|
|
||||||
|
You can remove a user from the device by going to **Settings** > **Accounts** > **Other people**. This action also reclaims space by removing all of that user's app data from the device.
|
||||||
|
|
||||||
|
## Using single sign-on within an app
|
||||||
|
|
||||||
|
As an app developer, you can take advantage of linked identities on HoloLens by using the [Windows Account Manager APIs](https://docs.microsoft.com/uwp/api/Windows.Security.Authentication.Web.Core), just as you would on other Windows devices. Some code samples for these APIs are available [here](https://go.microsoft.com/fwlink/p/?LinkId=620621).
|
||||||
|
|
||||||
|
Any account interrupts that might occur, such as requesting user consent for account information, two-factor authentication, and so forth, must be handled when the app requests an authentication token.
|
||||||
|
|
||||||
|
If your app requires a specific account type that hasn't been linked previously, your app can ask the system to prompt the user to add one. This request triggers the account settings pane to launch as a modal child of your app. For 2D apps, this window renders directly over the center of your app. For Unity apps, this request briefly takes the user out of your holographic app to render the child window. For information about customizing the commands and actions on this pane, see [WebAccountCommand Class](https://docs.microsoft.com/uwp/api/Windows.UI.ApplicationSettings.WebAccountCommand).
|
||||||
|
|
||||||
|
## Enterprise and other authentication
|
||||||
|
|
||||||
|
If your app uses other types of authentication, such as NTLM, Basic, or Kerberos, you can use [Windows Credential UI](https://docs.microsoft.com/uwp/api/Windows.Security.Credentials.UI) to collect, process, and store the user's credentials. The user experience for collecting these credentials is very similar to other cloud-driven account interrupts, and appears as a child app on top of your 2D app or briefly suspends a Unity app to show the UI.
|
||||||
|
|
||||||
|
## Deprecated APIs
|
||||||
|
|
||||||
|
One way in which developing for HoloLens differs from developing for Desktop is that the [OnlineIDAuthenticator](https://docs.microsoft.com/uwp/api/Windows.Security.Authentication.OnlineId.OnlineIdAuthenticator) API is not fully supported. Although the API returns a token if the primary account is in good-standing, interrupts such as those described in this article do not display any UI for the user and fail to correctly authenticate the account.
|
||||||
|
|
||||||
|
## Frequently asked questions
|
||||||
|
|
||||||
|
### Is Windows Hello for Business supported on HoloLens?
|
||||||
|
|
||||||
|
Windows Hello for Business (which supports using a PIN to sign in) is supported for HoloLens. To allow Windows Hello for Business PIN sign-in on HoloLens:
|
||||||
|
|
||||||
|
1. The HoloLens device must be [managed by MDM](hololens-enroll-mdm.md).
|
||||||
|
1. You must enable Windows Hello for Business for the device. ([See instructions for Microsoft Intune.](https://docs.microsoft.com/intune/windows-hello))
|
||||||
|
1. On HoloLens, the user can then use **Settings** > **Sign-in Options** > **Add PIN** to set up a PIN.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Users who sign in by using a Microsoft account can also set up a PIN in **Settings** > **Sign-in Options** > **Add PIN**. This PIN is associated with [Windows Hello](https://support.microsoft.com/help/17215/windows-10-what-is-hello), rather than [Windows Hello for Business](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-overview).
|
||||||
|
|
||||||
|
#### Does the type of account change the sign-in behavior?
|
||||||
|
|
||||||
|
Yes, the behavior for the type of account affects the sign-in behavior. If you apply policies for sign-in, the policy is always respected. If no policy for sign-in is applied, these are the default behaviors for each account type:
|
||||||
|
|
||||||
|
- **Microsoft account**: signs in automatically
|
||||||
|
- **Local account**: always asks for password, not configurable in **Settings**
|
||||||
|
- **Azure AD**: asks for password by default, and configurable by **Settings** to no longer ask for password.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Inactivity timers are currently not supported, which means that the **AllowIdleReturnWithoutPassword** policy is only respected when the device goes into StandBy.
|
||||||
|
|
||||||
|
## Additional resources
|
||||||
|
|
||||||
|
Read much more about user identity protection and authentication on [the Windows 10 security and identity documentation](https://docs.microsoft.com/windows/security/identity-protection/).
|
||||||
|
|
||||||
|
Learn more about setting up hybrid identity infrastructure thorough the [Azure Hybrid identity documentation](https://docs.microsoft.com/azure/active-directory/hybrid/).
|
@ -3,11 +3,12 @@ title: Insider preview for Microsoft HoloLens (HoloLens)
|
|||||||
description: It’s simple to get started with Insider builds and to provide valuable feedback for our next major operating system update for HoloLens.
|
description: It’s simple to get started with Insider builds and to provide valuable feedback for our next major operating system update for HoloLens.
|
||||||
ms.prod: hololens
|
ms.prod: hololens
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: dansimp
|
author: scooley
|
||||||
ms.author: dansimp
|
ms.author: scooley
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/23/2018
|
audience: ITPro
|
||||||
|
ms.date: 1/6/2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
appliesto:
|
appliesto:
|
||||||
@ -17,38 +18,37 @@ appliesto:
|
|||||||
|
|
||||||
# Insider preview for Microsoft HoloLens
|
# Insider preview for Microsoft HoloLens
|
||||||
|
|
||||||
Welcome to the latest Insider Preview builds for HoloLens! It’s simple to get started and provide valuable feedback for our next major operating system update for HoloLens.
|
Welcome to the latest Insider Preview builds for HoloLens! It’s simple to get started and provide valuable feedback for our next major operating system update for HoloLens.
|
||||||
|
|
||||||
## How do I install the Insider builds?
|
|
||||||
|
|
||||||
On a device running the Windows 10 April 2018 Update, go to <strong>Settings -> Update & Security -> Windows Insider Program</strong> and select <strong>Get started</strong>. Link the account you used to register as a Windows Insider.
|
|
||||||
|
|
||||||
Then, select **Active development of Windows**, choose whether you’d like to receive **Fast** or **Slow** builds, and review the program terms.
|
## Start receiving Insider builds
|
||||||
|
|
||||||
Select **Confirm -> Restart Now** to finish up. After your device has rebooted, go to **Settings -> Update & Security -> Check for updates** to get the latest build.
|
On a device running the Windows 10 April 2018 Update, go to **Settings** -> **Update & Security** -> **Windows Insider Program** and select **Get started**. Link the account you used to register as a Windows Insider.
|
||||||
|
|
||||||
## How do I stop receiving Insider builds?
|
Then, select **Active development of Windows**, choose whether you’d like to receive **Fast** or **Slow** builds, and review the program terms.
|
||||||
|
|
||||||
If you no longer want to receive Insider builds of Windows Holographic, you can opt out when your HoloLens is running a production build, or you can [recover your device](https://docs.microsoft.com/windows/mixed-reality/reset-or-recover-your-hololens#perform-a-full-device-recovery) using the Windows Device Recovery Tool to recover your device to a non-Insider version of Windows Holographic.
|
Select **Confirm -> Restart Now** to finish up. After your device has rebooted, go to **Settings -> Update & Security -> Check for updates** to get the latest build.
|
||||||
|
|
||||||
|
## Stop receiving Insider builds
|
||||||
|
|
||||||
|
If you no longer want to receive Insider builds of Windows Holographic, you can opt out when your HoloLens is running a production build, or you can [recover your device](hololens-recovery.md) using the Windows Device Recovery Tool to recover your device to a non-Insider version of Windows Holographic.
|
||||||
|
|
||||||
To verify that your HoloLens is running a production build:
|
To verify that your HoloLens is running a production build:
|
||||||
|
|
||||||
- Go to **Settings > System > About**, and find the build number.
|
- Go to **Settings > System > About**, and find the build number.
|
||||||
- If the build number is 10.0.17763.1, your HoloLens is running a production build. [See the list of production build numbers.](https://www.microsoft.com/itpro/windows-10/release-information)
|
- [See the release notes for production build numbers.](hololens-release-notes.md)
|
||||||
|
|
||||||
To opt out of Insider builds:
|
To opt out of Insider builds:
|
||||||
|
|
||||||
- On a HoloLens running a production build, go to **Settings > Update & Security > Windows Insider Program**, and select **Stop Insider builds**.
|
- On a HoloLens running a production build, go to **Settings > Update & Security > Windows Insider Program**, and select **Stop Insider builds**.
|
||||||
- Follow the instructions to opt out your device.
|
- Follow the instructions to opt out your device.
|
||||||
|
|
||||||
|
## Provide feedback and report issues
|
||||||
|
|
||||||
|
Please use [the Feedback Hub app](hololens-feedback.md) on your HoloLens to provide feedback and report issues. Using Feedback Hub ensures that all necessary diagnostics information is included to help our engineers quickly debug and resolve the problem. Issues with the Chinese and Japanese version of HoloLens should be reported the same way.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Be sure to accept the prompt that asks whether you’d like Feedback Hub to access your Documents folder (select **Yes** when prompted).
|
||||||
|
|
||||||
## Note for developers
|
## Note for developers
|
||||||
|
|
||||||
You are welcome and encouraged to try developing your applications using Insider builds of HoloLens. Check out the [HoloLens Developer Documentation](https://developer.microsoft.com/windows/mixed-reality/development) to get started. Those same instructions work with Insider builds of HoloLens. You can use the same builds of Unity and Visual Studio that you're already using for HoloLens development.
|
You are welcome and encouraged to try developing your applications using Insider builds of HoloLens. Check out the [HoloLens Developer Documentation](https://developer.microsoft.com/windows/mixed-reality/development) to get started. Those same instructions work with Insider builds of HoloLens. You can use the same builds of Unity and Visual Studio that you're already using for HoloLens development.
|
||||||
|
|
||||||
## Provide feedback and report issues
|
|
||||||
|
|
||||||
Please use [the Feedback Hub app](https://docs.microsoft.com/windows/mixed-reality/give-us-feedback) on your HoloLens or Windows 10 PC to provide feedback and report issues. Using Feedback Hub ensures that all necessary diagnostics information is included to help our engineers quickly debug and resolve the problem. Issues with the Chinese and Japanese version of HoloLens should be reported the same way.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Be sure to accept the prompt that asks whether you’d like Feedback Hub to access your Documents folder (select **Yes** when prompted).
|
|
||||||
|
|
||||||
|
@ -1,32 +0,0 @@
|
|||||||
---
|
|
||||||
title: Update, troubleshoot, or recover HoloLens
|
|
||||||
description:
|
|
||||||
author: Teresa-Motiv
|
|
||||||
ms.author: v-tea
|
|
||||||
ms.date: 11/27/2019
|
|
||||||
ms.prod: hololens
|
|
||||||
ms.topic: article
|
|
||||||
ms.custom: CSSTroubleshooting
|
|
||||||
audience: ITPro
|
|
||||||
keywords: issues, bug, troubleshoot, fix, help, support, HoloLens
|
|
||||||
manager: jarrettr
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
appliesto:
|
|
||||||
- HoloLens (1st gen)
|
|
||||||
- HoloLens 2
|
|
||||||
---
|
|
||||||
|
|
||||||
# Update, troubleshoot, or recover HoloLens
|
|
||||||
|
|
||||||
The articles in this section help you keep your HoloLens up-to-date and help you resolve any issues that you encounter.
|
|
||||||
|
|
||||||
**In this section**
|
|
||||||
|
|
||||||
| Article | Description |
|
|
||||||
| --- | --- |
|
|
||||||
| [Update HoloLens](hololens-update-hololens.md) | Describes how to identify the build number of your device, and how to update your device manually. |
|
|
||||||
| [Manage updates on many HoloLens](hololens-updates.md) | Describes how to use policies to manage device updates. |
|
|
||||||
| [Restart, reset, or recover](hololens-recovery.md) | Describes how to restart, reset, or recover a HoloLens device |
|
|
||||||
| [Troubleshoot HoloLens](hololens-troubleshooting.md) | Describes solutions to common HoloLens problems. |
|
|
||||||
| [Known issues](hololens-known-issues.md) | Describes known HoloLens issues. |
|
|
||||||
| [Frequently asked questions](hololens-faq.md) | Provides answers to common questions about HoloLens.|
|
|
@ -22,6 +22,10 @@ appliesto:
|
|||||||
> [!Note]
|
> [!Note]
|
||||||
> HoloLens Emulator Release Notes can be found [here](https://docs.microsoft.com/windows/mixed-reality/hololens-emulator-archive).
|
> HoloLens Emulator Release Notes can be found [here](https://docs.microsoft.com/windows/mixed-reality/hololens-emulator-archive).
|
||||||
|
|
||||||
|
### January Update - build 18362.1043
|
||||||
|
|
||||||
|
- Stability improvements for exclusive apps when working with the HoloLens 2 emulator.
|
||||||
|
|
||||||
### December Update - build 18362.1042
|
### December Update - build 18362.1042
|
||||||
|
|
||||||
- Introduces LSR (Last Stage Reproduction) fixes. Improves visual rendering of holograms to appear more stable and crisp by more accurately accounting for their depth. This will be more noticeable if apps do not set the depth of holograms correctly, after this update.
|
- Introduces LSR (Last Stage Reproduction) fixes. Improves visual rendering of holograms to appear more stable and crisp by more accurately accounting for their depth. This will be more noticeable if apps do not set the depth of holograms correctly, after this update.
|
||||||
|
@ -33,24 +33,26 @@ If your HoloLens becomes frozen or unresponsive:
|
|||||||
|
|
||||||
If these steps don't work, you can try [recovering your device](hololens-recovery.md).
|
If these steps don't work, you can try [recovering your device](hololens-recovery.md).
|
||||||
|
|
||||||
## Holograms don't look good or are moving around
|
## Holograms don't look good
|
||||||
|
|
||||||
If your holograms are unstable, jumpy, or don’t look right, try one of these fixes:
|
If your holograms are unstable, jumpy, or don’t look right, try:
|
||||||
|
|
||||||
- Clean your device visor and make sure that nothing is obstructing the sensors.
|
- Cleaning your device visor and sensor bar on the front of your HoloLens.
|
||||||
- Make sure that there’s enough light in your room.
|
- Increasing the light in your room.
|
||||||
- Try walking around and looking at your surroundings so that HoloLens can scan them more completely.
|
- Walking around and looking at your surroundings so that HoloLens can scan them more completely.
|
||||||
- Try running the Calibration app. It calibrates your HoloLens to work best for your eyes. Go to **Settings** > **System** > **Utilities**. Under **Calibration**, select **Open Calibration**.
|
- Calibrating your HoloLens for your eyes. Go to **Settings** > **System** > **Utilities**. Under **Calibration**, select **Open Calibration**.
|
||||||
|
|
||||||
## HoloLens doesn’t respond to my gestures
|
## HoloLens doesn’t respond to gestures
|
||||||
|
|
||||||
To make sure that HoloLens can see your gestures, keep your hand in the gesture frame. The gesture frame extends a couple of feet on either side of you. When HoloLens can see your hand, the cursor changes from a dot to a ring. Learn more about [using gestures](hololens1-basic-usage.md#use-hololens-with-your-hands).
|
To make sure that HoloLens can see your gestures. Keep your hand in the gesture frame - when HoloLens can see your hand, the cursor changes from a dot to a ring.
|
||||||
|
|
||||||
|
Learn more about using gestures on [HoloLens (1st gen)](hololens1-basic-usage.md#use-hololens-with-your-hands) or [HoloLens 2](hololens2-basic-usage.md#the-hand-tracking-frame).
|
||||||
|
|
||||||
If your environment is too dark, HoloLens might not see your hand, so make sure that there’s enough light.
|
If your environment is too dark, HoloLens might not see your hand, so make sure that there’s enough light.
|
||||||
|
|
||||||
If your visor has fingerprints or smudges, use the microfiber cleaning cloth that came with the HoloLens to clean your visor gently.
|
If your visor has fingerprints or smudges, use the microfiber cleaning cloth that came with the HoloLens to clean your visor gently.
|
||||||
|
|
||||||
## HoloLens doesn’t respond to my voice commands.
|
## HoloLens doesn’t respond to my voice commands
|
||||||
|
|
||||||
If Cortana isn’t responding to your voice commands, make sure Cortana is turned on. On the All apps list, select **Cortana** > **Menu** > **Notebook** > **Settings** to make changes. To learn more about what you can say, see [Use your voice with HoloLens](hololens-cortana.md).
|
If Cortana isn’t responding to your voice commands, make sure Cortana is turned on. On the All apps list, select **Cortana** > **Menu** > **Notebook** > **Settings** to make changes. To learn more about what you can say, see [Use your voice with HoloLens](hololens-cortana.md).
|
||||||
|
|
||||||
@ -64,10 +66,6 @@ If HoloLens can’t map or load your space, it enters Limited mode and you won
|
|||||||
- To see if the correct space is active, or to manually load a space, go to **Settings** > **System** > **Spaces**.
|
- To see if the correct space is active, or to manually load a space, go to **Settings** > **System** > **Spaces**.
|
||||||
- If the correct space is loaded and you’re still having problems, the space may be corrupt. To fix this issue, select the space, then select **Remove**. After you remove the space, HoloLens starts to map your surroundings and create a new space.
|
- If the correct space is loaded and you’re still having problems, the space may be corrupt. To fix this issue, select the space, then select **Remove**. After you remove the space, HoloLens starts to map your surroundings and create a new space.
|
||||||
|
|
||||||
## My HoloLens frequently enters Limited mode or shows a “Tracking lost” message
|
|
||||||
|
|
||||||
If your device often shows a "Limited mode" or "Tracking lost" message, try the suggestions listed in [My Holograms don't look good or are moving around](#holograms-dont-look-good-or-are-moving-around).
|
|
||||||
|
|
||||||
## My HoloLens can’t tell what space I’m in
|
## My HoloLens can’t tell what space I’m in
|
||||||
|
|
||||||
If your HoloLens can’t identify and load the space you’re in automatically, check the following factors:
|
If your HoloLens can’t identify and load the space you’re in automatically, check the following factors:
|
||||||
@ -90,3 +88,7 @@ You’ll need to free up some storage space by doing one or more of the followin
|
|||||||
## My HoloLens can’t create a new space
|
## My HoloLens can’t create a new space
|
||||||
|
|
||||||
The most likely problem is that you’re running low on storage space. Try one of the [previous tips](#im-getting-a-low-disk-space-error) to free up some disk space.
|
The most likely problem is that you’re running low on storage space. Try one of the [previous tips](#im-getting-a-low-disk-space-error) to free up some disk space.
|
||||||
|
|
||||||
|
## The HoloLens emulators isn't working
|
||||||
|
|
||||||
|
Information about the HoloLens emulator is located in our developer documentation. Read more about [troubleshooting the HoloLens emulator](https://docs.microsoft.com/windows/mixed-reality/using-the-hololens-emulator#troubleshooting).
|
||||||
|
@ -47,7 +47,7 @@ Create the account using the Microsoft 365 admin center or by using PowerShell.
|
|||||||
|
|
||||||
- **Skype for Business:** For Skype for Business only (on-premises or online), you can enable the Skype for Business object by running **Enable-CsMeetingRoom** to enable features such as Meeting room prompt for audio and Lobby hold.
|
- **Skype for Business:** For Skype for Business only (on-premises or online), you can enable the Skype for Business object by running **Enable-CsMeetingRoom** to enable features such as Meeting room prompt for audio and Lobby hold.
|
||||||
|
|
||||||
- **Calendar:** Set **Calendar Auto processing** for this account.
|
- **Microsoft Teams and Skype for Business Calendar:** Set [**Calendar Auto processing**](https://docs.microsoft.com/surface-hub/surface-hub-2s-account?source=docs#set-calendar-auto-processing) for this account.
|
||||||
|
|
||||||
## Create account using PowerShell
|
## Create account using PowerShell
|
||||||
Instead of using the Microsoft Admin Center portal, you can create the account using PowerShell.
|
Instead of using the Microsoft Admin Center portal, you can create the account using PowerShell.
|
||||||
|
@ -15,46 +15,55 @@ ms.localizationpriority: Medium
|
|||||||
|
|
||||||
# Reset and recovery for Surface Hub 2S
|
# Reset and recovery for Surface Hub 2S
|
||||||
|
|
||||||
If you encounter problems with Surface Hub 2S, you can reset the device to factory settings or recover using a USB drive.
|
If you encounter problems with Surface Hub 2S, you can reset the device to factory settings or restore by using a USB drive.
|
||||||
|
|
||||||
To begin, sign into Surface Hub 2S with admin credentials, open the **Settings** app, select **Update & security**, and then select **Recovery**.
|
To begin, sign in to Surface Hub 2S with admin credentials, open the **Settings** app, select **Update & security**, and then select **Recovery**.
|
||||||
|
|
||||||
## Reset device
|
## Reset the device
|
||||||
|
|
||||||
1. To reset, select **Get Started**.
|
1. To reset the device, select **Get Started**.
|
||||||
2. When the **Ready to reset this device** window appears, select **Reset**. Surface Hub 2S reinstalls the operating system from the recovery partition and may take up to one hour to complete.
|
2. When the **Ready to reset this device** window appears, select **Reset**.
|
||||||
3. Run **the first time Setup program** to reconfigure the device.
|
>[!NOTE]
|
||||||
4. If you manage the device using Intune or other mobile device manager (MDM) solution, retire and delete the previous record and re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/intune/devices-wipe).
|
>Surface Hub 2S reinstalls the operating system from the recovery partition. This may take up to one hour to complete.
|
||||||
|
3. To reconfigure the device, run the first-time Setup program.
|
||||||
|
4. If you manage the device using Microsoft Intune or another mobile device management solution, retire and delete the previous record, and then re-enroll the new device. For more information, see [Remove devices by using wipe, retire, or manually unenrolling the device](https://docs.microsoft.com/intune/devices-wipe).
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
*Figure 1. Reset and recovery for Surface Hub 2S.*
|
*Figure 1. Reset and recovery for Surface Hub 2S*
|
||||||
|
|
||||||
## Recover Surface Hub 2S using USB recovery drive
|
## Recover Surface Hub 2S by using a USB recovery drive
|
||||||
|
|
||||||
New in Surface Hub 2S, you can now reinstall the device using a recovery image.
|
New in Surface Hub 2S, you can now reinstall the device by using a recovery image.
|
||||||
|
|
||||||
### Recover from USB drive
|
### Recovery from a USB drive
|
||||||
|
|
||||||
Surface Hub 2S lets you reinstall the device using a recovery image, which allows you to reinstall the device to factory settings if you lost the Bitlocker key or no longer have admin credentials to the Settings app.
|
Using Surface Hub 2S, you can reinstall the device by using a recovery image. By doing this, you can reinstall the device to the factory settings if you lost the BitLocker key, or if you no longer have admin credentials to the Settings app.
|
||||||
|
|
||||||
1. Begin with a USB 3.0 drive with 8 GB or 16 GB of storage, formatted as FAT32.
|
>[!NOTE]
|
||||||
2. From a separate PC, download the .zip file recovery image from the [Surface Recovery website](https://support.microsoft.com/surfacerecoveryimage?devicetype=surfacehub2s) and then return to these instructions.
|
>Use a USB 3.0 drive with 8 GB or 16 GB of storage, formatted as FAT32.
|
||||||
3. Unzip the downloaded file onto the root of the USB drive.
|
|
||||||
4. Connect the USB drive to any USB-C or USB-A port on Surface Hub 2S.
|
|
||||||
5. Turn off the device. While holding down the Volume down button, press the Power button. Keep holding both buttons until you see the Windows logo. Release the Power button but continue to hold the Volume until the Install UI begins.
|
|
||||||
|
|
||||||
 <br>
|
1. From a separate PC, download the .zip file recovery image from the [Surface Recovery website](https://support.microsoft.com/surfacerecoveryimage?devicetype=surfacehub2s) and then return to these instructions.
|
||||||
|
1. Unzip the downloaded file onto the root of the USB drive.
|
||||||
|
1. Connect the USB drive to any USB-C or USB-A port on Surface Hub 2S.
|
||||||
|
1. Turn off the device:
|
||||||
|
1. While holding down the Volume down button, press the Power button.
|
||||||
|
1. Keep holding both buttons until you see the Windows logo.
|
||||||
|
1. Release the Power button but continue to hold the Volume until the Install UI begins.
|
||||||
|
|
||||||
6. In the language selection screen, select the display language for your Surface Hub 2S.
|
 <br>
|
||||||
7. Choose **Recover from a drive** and **Fully clean the drive** and then select **Recover**. If prompted for a BitLocker key, select **Skip this drive**. Surface Hub 2S reboots several times and takes approximately 30 minutes to complete the recovery process.
|
**Figure 2. Volume and Power buttons**
|
||||||
Remove the USB drive when the first time setup screen appears.
|
|
||||||
|
1. On the language selection screen, select the display language for your Surface Hub 2S.
|
||||||
|
1. Select **Recover from a drive** and **Fully clean the drive**, and then select **Recover**. If you're prompted for a BitLocker key, select **Skip this drive**. Surface Hub 2S reboots several times and takes approximately 30 minutes to complete the recovery process.
|
||||||
|
|
||||||
|
When the first-time setup screen appears,remove the USB drive.
|
||||||
|
|
||||||
## Recover a locked Surface Hub
|
## Recover a locked Surface Hub
|
||||||
|
|
||||||
On rare occasions, Surface Hub 2S may encounter an error during cleanup of user and app data at the end of a session. If this occurs, the device will automatically reboot and resume data cleanup. But if this operation fails repeatedly, the device will be automatically locked to protect user data.
|
At the end of a session, Surface Hub 2S may occasionally encounter an error during the cleanup of user and app data at the end of a session. If this occurs, the device automatically reboots and resumes the data cleanup. However, if this operation repeatedly fails, the device automatically locks to protect user data.
|
||||||
|
|
||||||
**To unlock Surface Hub 2S:** <br>
|
**To unlock a Surface Hub 2S:** <br>
|
||||||
Reset or recover the device from Windows Recovery Environment (Windows RE). For more information, see [What is Windows RE?](https://technet.microsoft.com/library/cc765966.aspx)
|
- Reset or recover the device from the Windows Recovery Environment. For more information, see [What is Windows RE?](https://technet.microsoft.com/library/cc765966.aspx)
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> To enter recovery mode, you need to physically unplug and replug the power cord three times.
|
> To enter recovery mode, unplug the power cord and plug it in again three times.
|
||||||
|
@ -1,12 +1,12 @@
|
|||||||
---
|
---
|
||||||
title: Surface Hub Site Readiness Guide
|
title: Surface Hub Site Readiness Guide
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: laurawi
|
||||||
description: Use this Site Readiness Guide to help plan your Surface Hub installation.
|
description: Use this Site Readiness Guide to help plan your Surface Hub installation.
|
||||||
ms.prod: surface-hub
|
ms.prod: surface-hub
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: dansimp
|
author: greg-lindsay
|
||||||
ms.author: dansimp
|
ms.author: greglin
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
@ -28,7 +28,7 @@ The room needs to be large enough to provide good viewing angles, but small enou
|
|||||||
- The screen is not in direct sunlight, which could affect viewing or damage the screen.
|
- The screen is not in direct sunlight, which could affect viewing or damage the screen.
|
||||||
- Ventilation openings are not blocked.
|
- Ventilation openings are not blocked.
|
||||||
- Microphones are not affected by noise sources, such as fans or vents.
|
- Microphones are not affected by noise sources, such as fans or vents.
|
||||||
You can find more details in the [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md) sections. For cleaning, care, and safety information, see the mounting guides and user guide at http://www.microsoft.com/surface/support/surface-hub.
|
You can find more details in the [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md) sections. For cleaning, care, and safety information, see the mounting guides and user guide at https://www.microsoft.com/surface/support/surface-hub.
|
||||||
|
|
||||||
### Hardware considerations
|
### Hardware considerations
|
||||||
|
|
||||||
@ -47,7 +47,7 @@ For details about cable ports, see the [55” Microsoft Surface Hub technical in
|
|||||||
|
|
||||||
Microsoft Surface Hub has an internal PC and does not require an external computer system.
|
Microsoft Surface Hub has an internal PC and does not require an external computer system.
|
||||||
|
|
||||||
For power recommendations, see [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md). For power cable safety warnings, see the mounting guides at http://www.microsoft.com/surface/support/surface-hub.
|
For power recommendations, see [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md). For power cable safety warnings, see the mounting guides at https://www.microsoft.com/surface/support/surface-hub.
|
||||||
|
|
||||||
### Data and other connections
|
### Data and other connections
|
||||||
|
|
||||||
@ -77,7 +77,7 @@ Before you move Surface Hub, make sure that all the doorways, thresholds, hallwa
|
|||||||
|
|
||||||
### Unpacking Surface Hub
|
### Unpacking Surface Hub
|
||||||
|
|
||||||
For unpacking information, refer to the unpacking guide included in the shipping container. You can open the unpacking instructions before you open the shipping container. These instructions can also be found here: http://www.microsoft.com/surface/support/surface-hub
|
For unpacking information, refer to the unpacking guide included in the shipping container. You can open the unpacking instructions before you open the shipping container. These instructions can also be found here: https://www.microsoft.com/surface/support/surface-hub
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Retain and store all Surface Hub shipping materials—including the pallet, container, and screws—in case you need to ship Surface Hub to a new location or send it
|
>Retain and store all Surface Hub shipping materials—including the pallet, container, and screws—in case you need to ship Surface Hub to a new location or send it
|
||||||
@ -85,17 +85,17 @@ for repairs. For the 84” Surface Hub, retain the lifting handles.
|
|||||||
|
|
||||||
### Lifting Surface Hub
|
### Lifting Surface Hub
|
||||||
|
|
||||||
The 55” Surface Hub requires two people to safely lift and mount. The 84” Surface Hub requires four people to safely lift and mount. Those assisting must be able to lift 70 pounds to waist height. Review the unpacking and mounting guide for details on lifting Surface Hub. You can find it at http://www.microsoft.com/surface/support/surface-hub.
|
The 55” Surface Hub requires two people to safely lift and mount. The 84” Surface Hub requires four people to safely lift and mount. Those assisting must be able to lift 70 pounds to waist height. Review the unpacking and mounting guide for details on lifting Surface Hub. You can find it at https://www.microsoft.com/surface/support/surface-hub.
|
||||||
|
|
||||||
## Mounting and setup
|
## Mounting and setup
|
||||||
|
|
||||||
See your mounting guide at http://www.microsoft.com/surface/support/surface-hub for detailed instructions.
|
See your mounting guide at https://www.microsoft.com/surface/support/surface-hub for detailed instructions.
|
||||||
|
|
||||||
There are three ways to mount your Surface Hub:
|
There are three ways to mount your Surface Hub:
|
||||||
|
|
||||||
- **Wall mount**: Lets you permanently hang Surface Hub on a conference space wall.
|
- **Wall mount**: Lets you permanently hang Surface Hub on a conference space wall.
|
||||||
- **Floor support mount**: Supports Surface Hub on the floor while it is permanently anchored to a conference space wall.
|
- **Floor support mount**: Supports Surface Hub on the floor while it is permanently anchored to a conference space wall.
|
||||||
- **Rolling stand**: Supports Surface Hub and lets you move it to other conference locations. For links to guides that provide details about each mounting method, including building requirements, see http://www.microsoft.com/surface/support/surface-hub.
|
- **Rolling stand**: Supports Surface Hub and lets you move it to other conference locations. For links to guides that provide details about each mounting method, including building requirements, see https://www.microsoft.com/surface/support/surface-hub.
|
||||||
|
|
||||||
For specifications on available mounts for the original Surface Hub, see the following:
|
For specifications on available mounts for the original Surface Hub, see the following:
|
||||||
|
|
||||||
@ -129,13 +129,10 @@ For example, to provide audio, video, and touchback capability to all three vide
|
|||||||
|
|
||||||
When you create your wired connect cable bundles, check the [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md) sections for specific technical and physical details and port locations for each type of Surface Hub. Make the cables long enough to reach from Surface Hub to where the presenter will sit or stand.
|
When you create your wired connect cable bundles, check the [55” Microsoft Surface Hub technical information](surface-hub-technical-55.md) or [84” Microsoft Surface Hub technical information](surface-hub-technical-84.md) sections for specific technical and physical details and port locations for each type of Surface Hub. Make the cables long enough to reach from Surface Hub to where the presenter will sit or stand.
|
||||||
|
|
||||||
For details on Touchback and Inkback, see the user guide at http://www.microsoft.com/surface/support/surface-hub.
|
For details on Touchback and Inkback, see the user guide at https://www.microsoft.com/surface/support/surface-hub.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
[Watch the video (opens in a pop-up media player)](http://compass.xbox.com/assets/27/aa/27aa7dd7-7cb7-40ea-9bd6-c7de0795f68c.mov?n=04.07.16_installation_video_01_site_readiness.mov)
|
[Watch the video (opens in a pop-up media player)](https://compass.xbox.com/assets/27/aa/27aa7dd7-7cb7-40ea-9bd6-c7de0795f68c.mov?n=04.07.16_installation_video_01_site_readiness.mov)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -182,7 +182,3 @@ This example shows a link to a website and a link to a .pdf file. The secondary
|
|||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The default value for `ForegroundText` is light; you don't need to include `ForegroundText` in your XML unless you're changing the value to dark.
|
>The default value for `ForegroundText` is light; you don't need to include `ForegroundText` in your XML unless you're changing the value to dark.
|
||||||
|
|
||||||
## More information
|
|
||||||
|
|
||||||
- [Blog post: Changing Surface Hub’s Start Menu](https://blogs.technet.microsoft.com/y0av/2018/02/13/47/)
|
|
||||||
|
@ -442,7 +442,7 @@ This update brings the Windows 10 Team Anniversary Update to Surface Hub and inc
|
|||||||
* General
|
* General
|
||||||
* Enabled Audio Device Selection (for Surface Hubs attached using external audio devices)
|
* Enabled Audio Device Selection (for Surface Hubs attached using external audio devices)
|
||||||
* Enabled support for HDCP on DisplayPort output connector
|
* Enabled support for HDCP on DisplayPort output connector
|
||||||
* System UI changes to settings for usability optimization (refer to [User and Admin Guides](http://www.microsoft.com/surface/support/surface-hub) for additional details)
|
* System UI changes to settings for usability optimization (refer to [User and Admin Guides](https://www.microsoft.com/surface/support/surface-hub) for additional details)
|
||||||
* Bug fixes and performance optimizations to speed up the Azure Active Directory sign-in flow
|
* Bug fixes and performance optimizations to speed up the Azure Active Directory sign-in flow
|
||||||
* Significantly improved time needed to reset and restore Surface Hub
|
* Significantly improved time needed to reset and restore Surface Hub
|
||||||
* Windows Defender UI has been added within settings
|
* Windows Defender UI has been added within settings
|
||||||
@ -520,9 +520,9 @@ This update to the Surface Hub includes quality improvements and security fixes.
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
* [Windows 10 feature road map](http://go.microsoft.com/fwlink/p/?LinkId=785967)
|
* [Windows 10 feature roadmap](https://go.microsoft.com/fwlink/p/?LinkId=785967)
|
||||||
* [Windows 10 release information](http://go.microsoft.com/fwlink/p/?LinkId=724328)
|
* [Windows 10 release information](https://go.microsoft.com/fwlink/p/?LinkId=724328)
|
||||||
* [Windows 10 November update: FAQ](http://windows.microsoft.com/windows-10/windows-update-faq)
|
* [Windows 10 November update: FAQ](https://windows.microsoft.com/windows-10/windows-update-faq)
|
||||||
* [Microsoft Surface update history](http://go.microsoft.com/fwlink/p/?LinkId=724327)
|
* [Microsoft Surface update history](https://go.microsoft.com/fwlink/p/?LinkId=724327)
|
||||||
* [Microsoft Lumia update history](http://go.microsoft.com/fwlink/p/?LinkId=785968)
|
* [Microsoft Lumia update history](https://go.microsoft.com/fwlink/p/?LinkId=785968)
|
||||||
* [Get Windows 10](http://go.microsoft.com/fwlink/p/?LinkId=616447)
|
* [Get Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=616447)
|
||||||
|
@ -50,9 +50,6 @@ You can use Windows Installer commands (Msiexec.exe) to deploy Surface Dock Firm
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> A log file is not created by default. In order to create a log file, you will need to append "/l*v [path]"
|
> A log file is not created by default. In order to create a log file, you will need to append "/l*v [path]"
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> A log file is not created by default. In order to create a log file, you will need to append "/l*v [path]"
|
|
||||||
|
|
||||||
For more information, refer to [Command line options](https://docs.microsoft.com/windows/win32/msi/command-line-options) documentation.
|
For more information, refer to [Command line options](https://docs.microsoft.com/windows/win32/msi/command-line-options) documentation.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
|
@ -10,7 +10,7 @@ ms.localizationpriority: medium
|
|||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 10/10/2019
|
ms.date: 12/30/2019
|
||||||
ms.reviewer: scottmca
|
ms.reviewer: scottmca
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.audience: itpro
|
ms.audience: itpro
|
||||||
@ -44,6 +44,8 @@ The following devices are supported for WOL:
|
|||||||
* Surface Go
|
* Surface Go
|
||||||
* Surface Go with LTE Advanced
|
* Surface Go with LTE Advanced
|
||||||
* Surface Studio 2 (see Surface Studio 2 instructions below)
|
* Surface Studio 2 (see Surface Studio 2 instructions below)
|
||||||
|
* Surface Pro 7
|
||||||
|
* Surface Laptop 3
|
||||||
|
|
||||||
## WOL driver
|
## WOL driver
|
||||||
|
|
||||||
@ -66,15 +68,15 @@ To enable WOL on Surface Studio 2, you must use the following procedure
|
|||||||
|
|
||||||
1. Create the following registry keys:
|
1. Create the following registry keys:
|
||||||
|
|
||||||
```
|
```console
|
||||||
; Set CONNECTIVITYINSTANDBY to 1:
|
; Set CONNECTIVITYINSTANDBY to 1:
|
||||||
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\F15576E8-98B7-4186-B944-EAFA664402D9]
|
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\F15576E8-98B7-4186-B944-EAFA664402D9]
|
||||||
"Attributes"=dword:00000001
|
"Attributes"=dword:00000001
|
||||||
; Set EnforceDisconnectedStandby to 0 and AllowSystemRequiredPowerRequests to 1:
|
; Set EnforceDisconnectedStandby to 0 and AllowSystemRequiredPowerRequests to 1:
|
||||||
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power]
|
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power]
|
||||||
"EnforceDisconnectedStandby"=dword:00000000
|
"EnforceDisconnectedStandby"=dword:00000000
|
||||||
"AllowSystemRequiredPowerRequests"=dword:00000001
|
"AllowSystemRequiredPowerRequests"=dword:00000001
|
||||||
```
|
```
|
||||||
|
|
||||||
2. Run the following command
|
2. Run the following command
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Windows Autopilot and Surface Devices
|
title: Windows Autopilot and Surface devices
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
description: Find out about Windows Autopilot deployment options for Surface devices.
|
description: Find out about Windows Autopilot deployment options for Surface devices.
|
||||||
@ -18,21 +18,27 @@ ms.date: 11/26/2019
|
|||||||
|
|
||||||
# Windows Autopilot and Surface devices
|
# Windows Autopilot and Surface devices
|
||||||
|
|
||||||
Windows Autopilot is a cloud-based deployment technology available in Windows 10. Using Windows Autopilot, you can remotely deploy and configure devices in a zero-touch process right out of the box. Windows Autopilot registered devices are identified over the internet at first boot using a unique device signature, known as a hardware hash, and automatically enrolled and configured using modern management solutions such as Azure Active Directory (AAD) and Mobile Device Management (MDM).
|
Windows Autopilot is a cloud-based deployment technology in Windows 10. You can use Windows Autopilot to remotely deploy and configure devices in a zero-touch process right out of the box.
|
||||||
|
|
||||||
With Surface devices, you can choose to register your devices at the time of purchase when purchasing from a Surface partner enabled for Windows Autopilot. New devices can be shipped directly to your end-users and will be automatically enrolled and configured when the units are unboxed and turned on for the first time. This process eliminates need to reimage your devices as part of your deployment process, reducing the work required of your deployment staff and opening up new, agile methods for device management and distribution.
|
Windows Autopilot-registered devices are identified over the Internet at first startup through a unique device signature that's called a *hardware hash*. They're automatically enrolled and configured by using modern management solutions such as Azure Active Directory (Azure AD) and mobile device management.
|
||||||
|
|
||||||
|
You can register Surface devices at the time of purchase from a Surface partner that's enabled for Windows Autopilot. These partners can ship new devices directly to your users. The devices will be automatically enrolled and configured when they are first turned on. This process eliminates reimaging during deployment, which lets you implement new, agile methods of device management and distribution.
|
||||||
|
|
||||||
## Modern management
|
## Modern management
|
||||||
Autopilot is the recommended deployment option for Surface devices including Surface Pro 7, Surface Laptop 3, and Surface Pro X, which is specifically designed to be deployed with Autopilot.
|
Autopilot is the recommended deployment option for Surface devices, including Surface Pro 7, Surface Laptop 3, and Surface Pro X, which is specifically designed for deployment through Autopilot.
|
||||||
|
|
||||||
For the best experience, enroll your Surface devices with the assistance of a Microsoft Cloud Solution Provider. Doing so enables you to manage UEFI firmware settings on Surface devices directly from Intune, eliminating the need to physically touch devices for certificate management. For more information, see [Intune management of Surface UEFI settings](surface-manage-dfci-guide.md).
|
It's best to enroll your Surface devices with the help of a Microsoft Cloud Solution Provider. This step allows you to manage UEFI firmware settings on Surface directly from Intune. It eliminates the need to physically touch devices for certificate management. See [Intune management of Surface UEFI settings](surface-manage-dfci-guide.md) for details.
|
||||||
|
|
||||||
## Windows version considerations
|
## Windows version considerations
|
||||||
Support for broad deployments of Surface devices using Windows Autopilot, including enrollment performed by Surface partners at the time of purchase, requires devices manufactured with or otherwise installed with Windows 10 Version 1709 (Fall Creators Update) or later. These versions support a 4000-byte (4k) hash value to uniquely identify devices for Windows Autopilot that is necessary for deployments at scale. All new Surface devices including Surface Pro 7, Surface Pro X, and Surface Laptop 3 ship with Windows 10 Version 1903 or above.
|
Broad deployment of Surface devices through Windows Autopilot, including enrollment by Surface partners at the time of purchase, requires Windows 10 Version 1709 (Fall Creators Update) or later.
|
||||||
|
|
||||||
|
These Windows versions support a 4,000-byte (4k) hash value that uniquely identifies devices for Windows Autopilot, which is necessary for deployments at scale. All new Surface devices, including Surface Pro 7, Surface Pro X, and Surface Laptop 3, ship with Windows 10 Version 1903 or later.
|
||||||
|
|
||||||
## Surface partners enabled for Windows Autopilot
|
## Surface partners enabled for Windows Autopilot
|
||||||
Enrolling Surface devices in Windows Autopilot at the time of purchase is performed by select Surface partners that enroll devices on an organization’s behalf. Devices can then be shipped directly to users and configured entirely through the zero-touch process of Windows Autopilot, Azure Active Directory, and Mobile Device Management.
|
|
||||||
Surface partners enabled for Windows Autopilot include:
|
Select Surface partners can enroll Surface devices in Windows Autopilot for you at the time of purchase. They can also ship enrolled devices directly to your users. The devices can be configured entirely through a zero-touch process by using Windows Autopilot, Azure AD, and mobile device management.
|
||||||
|
|
||||||
|
Surface partners that are enabled for Windows Autopilot include:
|
||||||
|
|
||||||
- [ALSO](https://www.also.com/ec/cms5/de_1010/1010_anbieter/microsoft/windows-autopilot/index.jsp)
|
- [ALSO](https://www.also.com/ec/cms5/de_1010/1010_anbieter/microsoft/windows-autopilot/index.jsp)
|
||||||
- [Atea](https://www.atea.com/)
|
- [Atea](https://www.atea.com/)
|
||||||
@ -47,6 +53,6 @@ Surface partners enabled for Windows Autopilot include:
|
|||||||
- [Techdata](https://www.techdata.com/)
|
- [Techdata](https://www.techdata.com/)
|
||||||
|
|
||||||
## Learn more
|
## Learn more
|
||||||
For more information about Windows Autopilot, refer to:
|
For more information about Windows Autopilot, see:
|
||||||
- [Overview of Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot)
|
- [Overview of Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot)
|
||||||
- [Windows Autopilot requirements](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-autopilot-requirements)
|
- [Windows Autopilot requirements](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-autopilot-requirements)
|
@ -12,7 +12,7 @@ ms.localizationpriority: Normal
|
|||||||
|
|
||||||
# Upgrade from MBAM 2.5 to MBAM 2.5 SP1 Servicing Release Update
|
# Upgrade from MBAM 2.5 to MBAM 2.5 SP1 Servicing Release Update
|
||||||
|
|
||||||
This article provides step-by-step instructions to upgrade Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 to MBAM 2.5 Service Pack 1 (SP1) together with the Microsoft Desktop Optimization Pack (MDOP) July 2018 servicing update in a standalone configuration.
|
This article provides step-by-step instructions to upgrade Microsoft BitLocker Administration and Monitoring (MBAM) 2.5 to MBAM 2.5 Service Pack 1 (SP1) together with the [Microsoft Desktop Optimization Pack (MDOP) May 2019 servicing update](https://support.microsoft.com/help/4505175/may-2019-servicing-release-for-microsoft-desktop-optimization-pack) in a standalone configuration.
|
||||||
|
|
||||||
In this guide, we will use a two-server configuration. One server will be a database server that's running Microsoft SQL Server 2016. This server will host the MBAM databases and reports. The other server will be a Windows Server 2012 R2 web server. This server will host "Administration and Monitoring" and "Self-Service Portal."
|
In this guide, we will use a two-server configuration. One server will be a database server that's running Microsoft SQL Server 2016. This server will host the MBAM databases and reports. The other server will be a Windows Server 2012 R2 web server. This server will host "Administration and Monitoring" and "Self-Service Portal."
|
||||||
|
|
||||||
|
@ -31,5 +31,6 @@
|
|||||||
#### [Advanced troubleshooting for Windows-based computer freeze](troubleshoot-windows-freeze.md)
|
#### [Advanced troubleshooting for Windows-based computer freeze](troubleshoot-windows-freeze.md)
|
||||||
#### [Advanced troubleshooting for stop error or blue screen error](troubleshoot-stop-errors.md)
|
#### [Advanced troubleshooting for stop error or blue screen error](troubleshoot-stop-errors.md)
|
||||||
#### [Advanced troubleshooting for stop error 7B or Inaccessible_Boot_Device](troubleshoot-inaccessible-boot-device.md)
|
#### [Advanced troubleshooting for stop error 7B or Inaccessible_Boot_Device](troubleshoot-inaccessible-boot-device.md)
|
||||||
|
#### [Advanced troubleshooting for Event ID 41 "The system has rebooted without cleanly shutting down first"](troubleshoot-event-id-41-restart.md)
|
||||||
## [Mobile device management for solution providers](mdm/index.md)
|
## [Mobile device management for solution providers](mdm/index.md)
|
||||||
## [Change history for Client management](change-history-for-client-management.md)
|
## [Change history for Client management](change-history-for-client-management.md)
|
||||||
|
@ -220,7 +220,6 @@ If Windows cannot load the system registry hive into memory, you must restore th
|
|||||||
|
|
||||||
If the problem persists, you may want to restore the system state backup to an alternative location, and then retrieve the registry hives to be replaced.
|
If the problem persists, you may want to restore the system state backup to an alternative location, and then retrieve the registry hives to be replaced.
|
||||||
|
|
||||||
|
|
||||||
## Kernel Phase
|
## Kernel Phase
|
||||||
|
|
||||||
If the system gets stuck during the kernel phase, you experience multiple symptoms or receive multiple error messages. These include, but are not limited to, the following:
|
If the system gets stuck during the kernel phase, you experience multiple symptoms or receive multiple error messages. These include, but are not limited to, the following:
|
||||||
@ -228,8 +227,9 @@ If the system gets stuck during the kernel phase, you experience multiple sympto
|
|||||||
- A Stop error appears after the splash screen (Windows Logo screen).
|
- A Stop error appears after the splash screen (Windows Logo screen).
|
||||||
|
|
||||||
- Specific error code is displayed.
|
- Specific error code is displayed.
|
||||||
For example, "0x00000C2" , "0x0000007B" , "inaccessible boot device" and so on.
|
For example, "0x00000C2" , "0x0000007B" , "inaccessible boot device" and so on.
|
||||||
[Advanced troubleshooting for Stop error 7B or Inaccessible_Boot_Device](https://docs.microsoft.com/windows/client-management/troubleshoot-inaccessible-boot-device)
|
- [Advanced troubleshooting for Stop error 7B or Inaccessible_Boot_Device](https://docs.microsoft.com/windows/client-management/troubleshoot-inaccessible-boot-device)
|
||||||
|
- [Advanced troubleshooting for Event ID 41 "The system has rebooted without cleanly shutting down first"](troubleshoot-event-id-41-restart.md)
|
||||||
|
|
||||||
- The screen is stuck at the "spinning wheel" (rolling dots) "system busy" icon.
|
- The screen is stuck at the "spinning wheel" (rolling dots) "system busy" icon.
|
||||||
|
|
||||||
|
@ -9,7 +9,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.date: 12/13/2019
|
ms.date: 12/27/2019
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -24,6 +24,7 @@ This topic lists new and updated topics in the [Client management](index.md) doc
|
|||||||
New or changed topic | Description
|
New or changed topic | Description
|
||||||
--- | ---
|
--- | ---
|
||||||
[Change in default removal policy for external storage media in Windows 10, version 1809](change-default-removal-policy-external-storage-media.md) | New
|
[Change in default removal policy for external storage media in Windows 10, version 1809](change-default-removal-policy-external-storage-media.md) | New
|
||||||
|
[Advanced troubleshooting for Event ID 41 "The system has rebooted without cleanly shutting down first"](troubleshoot-event-id-41-restart.md) | New
|
||||||
|
|
||||||
## December 2018
|
## December 2018
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Accounts CSP
|
title: Accounts CSP
|
||||||
description: The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and joint it to a local user group.
|
description: The Accounts configuration service provider (CSP) is used by the enterprise to rename devices, as well as create local Windows accounts & joint them to a group.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Mobile device management MDM for device updates
|
title: Mobile device management MDM for device updates
|
||||||
description: In the current device landscape of PC, tablets, phones, and IoT devices, the Mobile Device Management (MDM) solutions are becoming prevalent as a lightweight device management technology.
|
description: Windows 10 provides several APIs to help mobile device management (MDM) solutions manage updates. Learn how to use these APIs to implement update management.
|
||||||
ms.assetid: C27BAEE7-2890-4FB7-9549-A6EACC790777
|
ms.assetid: C27BAEE7-2890-4FB7-9549-A6EACC790777
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Diagnose MDM failures in Windows 10
|
title: Diagnose MDM failures in Windows 10
|
||||||
description: To help diagnose enrollment or device management issues in Windows 10 devices managed by an MDM server, you can examine the MDM logs collected from the desktop or mobile device. The following sections describe the procedures for collecting MDM logs.
|
description: Learn how to collect MDM logs. Examining these logs can help diagnose enrollment or device management issues in Windows 10 devices managed by an MDM server.
|
||||||
ms.assetid: 12D8263B-D839-4B19-9346-31E0CDD0CBF9
|
ms.assetid: 12D8263B-D839-4B19-9346-31E0CDD0CBF9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
@ -118,7 +118,7 @@ Since there is no Event Viewer in Windows 10 Mobile, you can use the [Field Medi
|
|||||||
|
|
||||||
**To collect logs manually**
|
**To collect logs manually**
|
||||||
|
|
||||||
1. Download and install the [Field Medic]( http://go.microsoft.com/fwlink/p/?LinkId=718232) app from the store.
|
1. Download and install the [Field Medic]( https://go.microsoft.com/fwlink/p/?LinkId=718232) app from the store.
|
||||||
2. Open the Field Medic app and then click on **Advanced**.
|
2. Open the Field Medic app and then click on **Advanced**.
|
||||||
|
|
||||||

|

|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: EnterpriseDataProtection CSP
|
title: EnterpriseDataProtection CSP
|
||||||
description: The EnterpriseDataProtection configuration service provider (CSP) is used to configure Windows Information Protection (WIP) (formerly known as Enterprise Data Protection) specific settings.
|
description: The EnterpriseDataProtection configuration service provider (CSP) configures Windows Information Protection (formerly, Enterprise Data Protection) settings.
|
||||||
ms.assetid: E2D4467F-A154-4C00-9208-7798EF3E25B3
|
ms.assetid: E2D4467F-A154-4C00-9208-7798EF3E25B3
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
@ -249,7 +249,7 @@ typedef enum _PUBLIC_KEY_SOURCE_TAG {
|
|||||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls whether to revoke the WIP keys when a device upgrades from MAM to MDM. If set to 0 (Don't revoke keys), the keys will not be revoked and the user will continue to have access to protected files after upgrade. This is recommended if the MDM service is configured with the same WIP EnterpriseID as the MAM service.
|
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls whether to revoke the WIP keys when a device upgrades from MAM to MDM. If set to 0 (Don't revoke keys), the keys will not be revoked and the user will continue to have access to protected files after upgrade. This is recommended if the MDM service is configured with the same WIP EnterpriseID as the MAM service.
|
||||||
|
|
||||||
- 0 - Don't revoke keys
|
- 0 - Don't revoke keys
|
||||||
- 1 (dafault) - Revoke keys
|
- 1 (default) - Revoke keys
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add, Get, Replace and Delete. Value type is integer.
|
<p style="margin-left: 20px">Supported operations are Add, Get, Replace and Delete. Value type is integer.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: EnterpriseDesktopAppManagement CSP
|
title: EnterpriseDesktopAppManagement CSP
|
||||||
description: The EnterpriseDesktopAppManagement configuration service provider is used to handle enterprise desktop application management tasks, such as querying installed enterprise applications, installing applications, or removing applications.
|
description: The EnterpriseDesktopAppManagement CSP handles enterprise desktop application management tasks, such as installing or removing applications.
|
||||||
ms.assetid: 2BFF7491-BB01-41BA-9A22-AB209EE59FC5
|
ms.assetid: 2BFF7491-BB01-41BA-9A22-AB209EE59FC5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Mobile device management
|
title: Mobile device management
|
||||||
description: Windows 10 provides an enterprise management solution to help IT pros manage company security policies and business applications, while avoiding compromise of the users’ privacy on their personal devices.
|
description: Windows 10 provides an enterprise-level solution to mobile management, to help IT pros comply with security policies while avoiding compromise of user's privacy
|
||||||
MS-HAID:
|
MS-HAID:
|
||||||
- 'p\_phDeviceMgmt.provisioning\_and\_device\_management'
|
- 'p\_phDeviceMgmt.provisioning\_and\_device\_management'
|
||||||
- 'p\_phDeviceMgmt.mobile\_device\_management\_windows\_mdm'
|
- 'p\_phDeviceMgmt.mobile\_device\_management\_windows\_mdm'
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: NetworkQoSPolicy DDF
|
title: NetworkQoSPolicy DDF
|
||||||
description: This topic shows the OMA DM device description framework (DDF) for the NetworkQoSPolicy configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
description: View the OMA DM device description framework (DDF) for the NetworkQoSPolicy configuration service provider. DDF files are used only with OMA DM provisioning XML
|
||||||
ms.assetid:
|
ms.assetid:
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: What's new in MDM enrollment and management
|
title: What's new in MDM enrollment and management
|
||||||
description: This topic provides information about what's new and breaking changes in Windows 10 mobile device management (MDM) enrollment and management experience across all Windows 10 devices.
|
description: Discover what's new and breaking changes in Windows 10 mobile device management (MDM) enrollment and management experience across all Windows 10 devices.
|
||||||
MS-HAID:
|
MS-HAID:
|
||||||
- 'p\_phdevicemgmt.mdm\_enrollment\_and\_management\_overview'
|
- 'p\_phdevicemgmt.mdm\_enrollment\_and\_management\_overview'
|
||||||
- 'p\_phDeviceMgmt.new\_in\_windows\_mdm\_enrollment\_management'
|
- 'p\_phDeviceMgmt.new\_in\_windows\_mdm\_enrollment\_management'
|
||||||
@ -58,6 +58,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
|||||||
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
|
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
|
||||||
|
|
||||||
- **Change history in MDM documentation**
|
- **Change history in MDM documentation**
|
||||||
|
- [January 2020](#january-2020)
|
||||||
- [November 2019](#november-2019)
|
- [November 2019](#november-2019)
|
||||||
- [October 2019](#october-2019)
|
- [October 2019](#october-2019)
|
||||||
- [September 2019](#september-2019)
|
- [September 2019](#september-2019)
|
||||||
@ -1935,6 +1936,12 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
|
|
||||||
## Change history in MDM documentation
|
## Change history in MDM documentation
|
||||||
|
|
||||||
|
### January 2020
|
||||||
|
|New or updated topic | Description|
|
||||||
|
|--- | ---|
|
||||||
|
|[Policy CSP - Defender](policy-csp-defender.md)|Added descriptions for supported actions for Defender/ThreatSeverityDefaultAction.|
|
||||||
|
|
||||||
|
|
||||||
### November 2019
|
### November 2019
|
||||||
|
|
||||||
|New or updated topic | Description|
|
|New or updated topic | Description|
|
||||||
|
@ -206,7 +206,7 @@ This node is deprecated. Use **Biometrics/UseBiometrics** node instead.
|
|||||||
|
|
||||||
<a href="" id="biometrics--only-for---device-vendor-msft-"></a>**Biometrics** (only for ./Device/Vendor/MSFT)
|
<a href="" id="biometrics--only-for---device-vendor-msft-"></a>**Biometrics** (only for ./Device/Vendor/MSFT)
|
||||||
Node for defining biometric settings. This node was added in Windows 10, version 1511.
|
Node for defining biometric settings. This node was added in Windows 10, version 1511.
|
||||||
*Not supported on Windows Holographic and Windows Holographic for Business prior to Windows 10 version 1903 (May 2019 Update).*
|
*Not supported on Windows Holographic and Windows Holographic for Business.*
|
||||||
|
|
||||||
<a href="" id="biometrics-usebiometrics--only-for---device-vendor-msft-"></a>**Biometrics/UseBiometrics** (only for ./Device/Vendor/MSFT)
|
<a href="" id="biometrics-usebiometrics--only-for---device-vendor-msft-"></a>**Biometrics/UseBiometrics** (only for ./Device/Vendor/MSFT)
|
||||||
Boolean value used to enable or disable the use of biometric gestures, such as face and fingerprint, as an alternative to the PIN gesture for Windows Hello for Business. Users must still configure a PIN if they configure biometric gestures to use in case of failures. This node was added in Windows 10, version 1511.
|
Boolean value used to enable or disable the use of biometric gestures, such as face and fingerprint, as an alternative to the PIN gesture for Windows Hello for Business. Users must still configure a PIN if they configure biometric gestures to use in case of failures. This node was added in Windows 10, version 1511.
|
||||||
@ -217,7 +217,7 @@ Default value is true, enabling the biometric gestures for use with Windows Hell
|
|||||||
|
|
||||||
Supported operations are Add, Get, Delete, and Replace.
|
Supported operations are Add, Get, Delete, and Replace.
|
||||||
|
|
||||||
*Not supported on Windows Holographic and Windows Holographic for Business.*
|
*Not supported on Windows Holographic and Windows Holographic for Business prior to Windows 10 version 1903 (May 2019 Update).*
|
||||||
|
|
||||||
<a href="" id="biometrics-facialfeaturesuseenhancedantispoofing--only-for---device-vendor-msft-"></a>**Biometrics/FacialFeaturesUseEnhancedAntiSpoofing** (only for ./Device/Vendor/MSFT)
|
<a href="" id="biometrics-facialfeaturesuseenhancedantispoofing--only-for---device-vendor-msft-"></a>**Biometrics/FacialFeaturesUseEnhancedAntiSpoofing** (only for ./Device/Vendor/MSFT)
|
||||||
Boolean value used to enable or disable enhanced anti-spoofing for facial feature recognition on Windows Hello face authentication. This node was added in Windows 10, version 1511.
|
Boolean value used to enable or disable enhanced anti-spoofing for facial feature recognition on Windows Hello face authentication. This node was added in Windows 10, version 1511.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: PassportForWork DDF
|
title: PassportForWork DDF
|
||||||
description: This topic shows the OMA DM device description framework (DDF) for the PassportForWork configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
description: View the OMA DM device description framework (DDF) for the PassportForWork configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||||
ms.assetid: A2182898-1577-4675-BAE5-2A3A9C2AAC9B
|
ms.assetid: A2182898-1577-4675-BAE5-2A3A9C2AAC9B
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -14,10 +14,14 @@ ms.localizationpriority: medium
|
|||||||
|
|
||||||
# Policy CSP - Browser
|
# Policy CSP - Browser
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> You've reached the documentation for Microsoft Edge version 45 and earlier. To see the documentation for Microsoft Edge version 77 or later, go to the [Microsoft Edge documentation landing page](https://docs.microsoft.com/DeployEdge/).
|
||||||
|
|
||||||
<!--Policies-->
|
<!--Policies-->
|
||||||
## Browser policies
|
## Browser policies
|
||||||
|
|
||||||
|
@ -7,7 +7,7 @@ ms.prod: w10
|
|||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: manikadhiman
|
author: manikadhiman
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 09/27/2019
|
ms.date: 01/08/2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
@ -3068,7 +3068,7 @@ The following list shows the supported values:
|
|||||||
|
|
||||||
Allows an administrator to specify any valid threat severity levels and the corresponding default action ID to take.
|
Allows an administrator to specify any valid threat severity levels and the corresponding default action ID to take.
|
||||||
|
|
||||||
This value is a list of threat severity level IDs and corresponding actions, separated by a<strong>|</strong> using the format "*threat level*=*action*|*threat level*=*action*". For example "1=6|2=2|4=10|5=3
|
This value is a list of threat severity level IDs and corresponding actions, separated by a <strong>|</strong> using the format "*threat level*=*action*|*threat level*=*action*". For example, "1=6|2=2|4=10|5=3".
|
||||||
|
|
||||||
The following list shows the supported values for threat severity levels:
|
The following list shows the supported values for threat severity levels:
|
||||||
|
|
||||||
@ -3079,12 +3079,12 @@ The following list shows the supported values for threat severity levels:
|
|||||||
|
|
||||||
The following list shows the supported values for possible actions:
|
The following list shows the supported values for possible actions:
|
||||||
|
|
||||||
- 1 – Clean
|
- 1 – Clean. Service tries to recover files and try to disinfect.
|
||||||
- 2 – Quarantine
|
- 2 – Quarantine. Moves files to quarantine.
|
||||||
- 3 – Remove
|
- 3 – Remove. Removes files from system.
|
||||||
- 6 – Allow
|
- 6 – Allow. Allows file/does none of the above actions.
|
||||||
- 8 – User defined
|
- 8 – User defined. Requires user to make a decision on which action to take.
|
||||||
- 10 – Block
|
- 10 – Block. Blocks file execution.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Register your free Azure Active Directory subscription
|
title: Register your free Azure Active Directory subscription
|
||||||
description: If you have paid subscriptions to Office 365, Microsoft Dynamics CRM Online, Enterprise Mobility Suite, or other Microsoft services, you have a free subscription to Azure AD.
|
description: Paid subscribers to Office 365, Microsoft Dynamics CRM Online, Enterprise Mobility Suite, or other Microsoft services, have a free subscription to Azure AD.
|
||||||
ms.assetid: 97DCD303-BB11-4AFF-84FE-B7F14CDF64F7
|
ms.assetid: 97DCD303-BB11-4AFF-84FE-B7F14CDF64F7
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
@ -29,21 +29,11 @@ If you have paid subscriptions to Office 365, Microsoft Dynamics CRM Online, Ent
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. On the **Admin center** page, hover your mouse over the Admin tools icon on the left and then click **Azure AD**. This will take you to the Azure Active Directory sign-up page and brings up your existing Office 365 organization account information.
|
3. On the **Admin center** page, under Admin Centers on the left, click **Azure Active Directory**. This will take you to the Azure Active Directory portal.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. On the **Sign up** page, make sure to enter a valid phone number and then click **Sign up**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. It may take a few minutes to process the request.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. You will see a welcome page when the process completes.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Reporting DDF file
|
title: Reporting DDF file
|
||||||
description: This topic shows the OMA DM device description framework (DDF) for the Reporting configuration service provider. This CSP was added in Windows 10, version 1511. Support for desktop security auditing was added for the desktop in Windows 10, version 1607.
|
description: View the OMA DM device description framework (DDF) for the Reporting configuration service provider.
|
||||||
ms.assetid: 7A5B79DB-9571-4F7C-ABED-D79CD08C1E35
|
ms.assetid: 7A5B79DB-9571-4F7C-ABED-D79CD08C1E35
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: SecureAssessment DDF file
|
title: SecureAssessment DDF file
|
||||||
description: This topic shows the OMA DM device description framework (DDF) for the SecureAssessment configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
description: View the OMA DM device description framework (DDF) for the SecureAssessment configuration service provider. DDF files are used only with OMA DM provisioning XML
|
||||||
ms.assetid: 68D17F2A-FAEA-4608-8727-DBEC1D7BE48A
|
ms.assetid: 68D17F2A-FAEA-4608-8727-DBEC1D7BE48A
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: UnifiedWriteFilter CSP
|
title: UnifiedWriteFilter CSP
|
||||||
description: The UnifiedWriteFilter (UWF) configuration service provider enables the IT administrator to remotely manage the UWF to help protect physical storage media including any writable storage type.
|
description: The UnifiedWriteFilter (UWF) configuration service provider allows you to remotely manage the UWF. Understand how it helps protect physical storage media.
|
||||||
ms.assetid: F4716AC6-0AA5-4A67-AECE-E0F200BA95EB
|
ms.assetid: F4716AC6-0AA5-4A67-AECE-E0F200BA95EB
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Enterprise settings, policies, and app management
|
title: Enterprise settings, policies, and app management
|
||||||
description: The actual management interaction between the device and server is done via the DM client. The DM client communicates with the enterprise management server via DM v1.2 SyncML syntax.
|
description: The DM client manages the interaction between a device and a server. Learn more about the client-server management workflow.
|
||||||
MS-HAID:
|
MS-HAID:
|
||||||
- 'p\_phdevicemgmt.enterprise\_settings\_\_policies\_\_and\_app\_management'
|
- 'p\_phdevicemgmt.enterprise\_settings\_\_policies\_\_and\_app\_management'
|
||||||
- 'p\_phDeviceMgmt.windows\_mdm\_enterprise\_settings'
|
- 'p\_phDeviceMgmt.windows\_mdm\_enterprise\_settings'
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: WindowsSecurityAuditing DDF file
|
title: WindowsSecurityAuditing DDF file
|
||||||
description: This topic shows the OMA DM device description framework (DDF) for the WindowsSecurityAuditing configuration service provider. This CSP was added in Windows 10, version 1511.
|
description: View the OMA DM device description framework (DDF) for the WindowsSecurityAuditing configuration service provider.
|
||||||
ms.assetid: B1F9A5FA-185B-48C6-A7F4-0F0F23B971F0
|
ms.assetid: B1F9A5FA-185B-48C6-A7F4-0F0F23B971F0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
121
windows/client-management/troubleshoot-event-id-41-restart.md
Normal file
121
windows/client-management/troubleshoot-event-id-41-restart.md
Normal file
@ -0,0 +1,121 @@
|
|||||||
|
---
|
||||||
|
title: Advanced troubleshooting for Event ID 41 - "The system has rebooted without cleanly shutting down first"
|
||||||
|
description: Describes the circumstances that cause a computer to generate Event ID 41, and provides guidance for troubleshooting the issue
|
||||||
|
author: Teresa-Motiv
|
||||||
|
ms.author: v-tea
|
||||||
|
ms.date: 12/27/2019
|
||||||
|
ms.prod: w10
|
||||||
|
ms.topic: article
|
||||||
|
ms.custom:
|
||||||
|
- CI 111437
|
||||||
|
- CSSTroubleshooting
|
||||||
|
audience: ITPro
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
keywords: event id 41, reboot, restart, stop error, bug check code
|
||||||
|
manager: kaushika
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
# Advanced troubleshooting for Event ID 41: "The system has rebooted without cleanly shutting down first"
|
||||||
|
|
||||||
|
> **Home users**
|
||||||
|
> This article is intended for use by support agents and IT professionals. If you're looking for more information about blue screen error messages, please visit [Troubleshoot blue screen errors](https://support.microsoft.com/help/14238/windows-10-troubleshoot-blue-screen-errors).
|
||||||
|
|
||||||
|
The preferred way to shut down Windows is to select **Start**, and then select an option to turn off or shut down the computer. When you use this standard method, the operating system closes all files and notifies the running services and applications so that they can write any unsaved data to disk and flush any active caches.
|
||||||
|
|
||||||
|
If your computer shuts down unexpectedly, Windows logs Event ID 41 the next time that the computer starts. The event text resembles the following:
|
||||||
|
|
||||||
|
> Event ID: 41
|
||||||
|
> Description: The system has rebooted without cleanly shutting down first.
|
||||||
|
|
||||||
|
This event indicates that some unexpected activity prevented Windows from shutting down correctly. Such a shutdown might be caused by an interruption in the power supply or by a Stop error. If feasible, Windows records any error codes as it shuts down. During the [kernel phase](advanced-troubleshooting-boot-problems.md#kernel-phase) of the next Windows startup, Windows checks for these codes and includes any existing codes in the event data of Event ID 41.
|
||||||
|
|
||||||
|
> EventData
|
||||||
|
> BugcheckCode 159
|
||||||
|
> BugcheckParameter1 0x3
|
||||||
|
> BugcheckParameter2 0xfffffa80029c5060
|
||||||
|
> BugcheckParameter3 0xfffff8000403d518
|
||||||
|
> BugcheckParameter4 0xfffffa800208c010
|
||||||
|
> SleepInProgress false
|
||||||
|
> PowerButtonTimestamp 0Converts to 0x9f (0x3, 0xfffffa80029c5060, 0xfffff8000403d518, 0xfffffa800208c010)
|
||||||
|
|
||||||
|
## How to use Event ID 41 when you troubleshoot an unexpected shutdown or restart
|
||||||
|
|
||||||
|
By itself, Event ID 41 might not contain sufficient information to explicitly define what occurred. Typically, you have to also consider what was occurring at the time of the unexpected shutdown (for example, the power supply failed). Use the information in this article to identify a troubleshooting approach that is appropriate for your circumstances:
|
||||||
|
|
||||||
|
- [Scenario 1](#scen1): The computer restarts because of a Stop error, and Event ID 41 contains a Stop error (bug check) code
|
||||||
|
- [Scenario 2](#scen2): The computer restarts because you pressed and held the power button
|
||||||
|
- [Scenario 3](#scen3): The computer is unresponsive or randomly restarts, and Event ID 41 is not logged or the Event ID 41 entry lists error code values of zero
|
||||||
|
|
||||||
|
### <a name="scen1"></a>Scenario 1: The computer restarts because of a Stop error, and Event ID 41 contains a Stop error (bug check) code
|
||||||
|
|
||||||
|
When a computer shuts down or restarts because of a Stop error, Windows includes the Stop error data in Event ID 41 as part of the additional event data. This information includes the Stop error code (also called a bug check code), as shown in the following example:
|
||||||
|
|
||||||
|
> EventData
|
||||||
|
> BugcheckCode 159
|
||||||
|
> BugcheckParameter1 0x3
|
||||||
|
> BugcheckParameter2 0xfffffa80029c5060
|
||||||
|
> BugcheckParameter3 0xfffff8000403d518
|
||||||
|
> BugcheckParameter4 0xfffffa800208c010
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Event ID 41 includes the bug check code in decimal format. Most documentation that describes bug check codes refers to the codes as hexadecimal values instead of decimal values. To convert decimal to hexadecimal, follow these steps:
|
||||||
|
>
|
||||||
|
> 1. Select **Start**, type **calc** in the **Search** box, and then select **Calculator**.
|
||||||
|
> 1. In the **Calculator** window, select **View** > **Programmer**.
|
||||||
|
> 1. On the left side of calculator, verify that **Dec** is highlighted.
|
||||||
|
> 1. Use the keyboard to enter the decimal value of the bug check code.
|
||||||
|
> 1. On the left side of the calculator, select **Hex**.
|
||||||
|
> The value that the calculator displays is now the hexadecimal code.
|
||||||
|
>
|
||||||
|
> When you convert a bug check code to hexadecimal format, verify that the “0x” designation is followed by eight digits (that is, the part of the code after the “x” includes enough zeros to fill out eight digits). For example, 0x9F is typically documented as 0x0000009f, and 0xA is documented as 0x0000000A. In the case of the example event data in this article, "159" converts to 0x0000009f.
|
||||||
|
|
||||||
|
After you identify the hexadecimal value, use the following references to continue troubleshooting:
|
||||||
|
|
||||||
|
- [Advanced troubleshooting for Stop error or blue screen error issue](troubleshoot-stop-errors.md).
|
||||||
|
- [Bug Check Code Reference](https://docs.microsoft.com/windows-hardware/drivers/debugger/bug-check-code-reference2). This page lists links to documentation for different bug check codes.
|
||||||
|
- [How to Debug Kernel Mode Blue Screen Crashes (for beginners)](https://blogs.technet.microsoft.com/askcore/2008/10/31/how-to-debug-kernel-mode-blue-screen-crashes-for-beginners/).
|
||||||
|
|
||||||
|
### <a name="scen2"></a>Scenario 2: The computer restarts because you pressed and held the power button
|
||||||
|
|
||||||
|
Because this method of restarting the computer interferes with the Windows shutdown operation, we recommend that you use this method only if you have no alternative. For example, you might have to use this approach if your computer is not responding. When you restart the computer by pressing and holding the power button, the computer logs an Event ID 41 that includes a non-zero value for the **PowerButtonTimestamp** entry.
|
||||||
|
|
||||||
|
For help when troubleshooting an unresponsive computer, see [Windows Help](https://support.microsoft.com/hub/4338813/windows-help?os=windows-10). Consider searching for assistance by using keywords such as "hang," "responding," or "blank screen."
|
||||||
|
|
||||||
|
### <a name="scen3"></a>Scenario 3: The computer is unresponsive or randomly restarts, and Event ID 41 is not recorded or the Event ID 41 entry or lists error code values of zero
|
||||||
|
|
||||||
|
This scenario includes the following circumstances:
|
||||||
|
|
||||||
|
- You shut off power to an unresponsive computer, and then you restart the computer.
|
||||||
|
To verify that a computer is unresponsive, press the CAPS LOCK key on the keyboard. If the CAPS LOCK light on the keyboard does not change when you press the CAPS LOCK key, the computer might be completely unresponsive (also known as a *hard hang*).
|
||||||
|
- The computer restarts, but it does not generate Event ID 41.
|
||||||
|
- The computer restarts and generates Event ID 41, but the **BugcheckCode** and **PowerButtonTimestamp** values are zero.
|
||||||
|
|
||||||
|
In such cases, something prevents Windows from generating error codes or from writing error codes to disk. Something might block write access to the disk (as in the case of an unresponsive computer) or the computer might shut down too quickly to write the error codes or even detect an error.
|
||||||
|
|
||||||
|
The information in Event ID 41 provides some indication of where to start checking for problems:
|
||||||
|
|
||||||
|
- **Event ID 41 is not recorded or the bug check code is zero**. This behavior might indicate a power supply problem. If the power to a computer is interrupted, the computer might shut down without generating a Stop error. If it does generate a Stop error, it might not finish writing the error codes to disk. The next time the computer starts, it might not log Event ID 41. Or, if it does, the bug check code is zero. Conditions such as the following might be the cause:
|
||||||
|
- In the case of a portable computer, the battery was removed or completely drained.
|
||||||
|
- In the case of a desktop computer, the computer was unplugged or experienced a power outage.
|
||||||
|
- The power supply is underpowered or faulty.
|
||||||
|
|
||||||
|
- **The PowerButtonTimestamp value is zero**. This behavior might occur if you disconnected the power to a computer that was not responding to input. Conditions such as the following might be the cause:
|
||||||
|
- A Windows process blocked write access to the disk, and you shut down the computer by pressing and holding the power button for at least four seconds.
|
||||||
|
- You disconnected the power to an unresponsive computer.
|
||||||
|
|
||||||
|
Typically, the symptoms described in this scenario indicate a hardware problem. To help isolate the problem, do the following:
|
||||||
|
|
||||||
|
- **Disable overclocking**. If the computer has overclocking enabled, disable it. Verify that the issue occurs when the system runs at the correct speed.
|
||||||
|
- **Check the memory**. Use a memory checker to determine the memory health and configuration. Verify that all memory chips run at the same speed and that every chip is configured correctly in the system.
|
||||||
|
- **Check the power supply**. Verify that the power supply has enough wattage to appropriately handle the installed devices. If you added memory, installed a newer processor, installed additional drives, or added external devices, such devices can require more energy than the current power supply can provide consistently. If the computer logged Event ID 41 because the power to the computer was interrupted, consider obtaining an uninterruptible power supply (UPS) such as a battery backup power supply.
|
||||||
|
- **Check for overheating**. Examine the internal temperature of the hardware and check for any overheating components.
|
||||||
|
|
||||||
|
If you perform these checks and still cannot isolate the problem, set the system to its default configuration and verify whether the issue still occurs.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If you see a Stop error message that includes a bug check code, but Event ID 41 does not include that code, change the restart behavior for the computer. To do this, follow these steps:
|
||||||
|
>
|
||||||
|
> 1. Right-click **My Computer**, then select **Properties** > **Advanced system settings** > **Advanced**.
|
||||||
|
> 1. In the **Startup and Recovery** section, select **Settings**.
|
||||||
|
> 1. Clear the **Automatically restart** check box.
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Set up and test Cortana with Microsoft Dynamics CRM (Preview feature) in your organization (Windows 10)
|
title: Set up and test Cortana with Microsoft Dynamics CRM (Preview feature) in your organization (Windows 10)
|
||||||
description: How to set up Cortana to help your salespeople get proactive insights on important CRM activities, including sales leads, accounts, and opportunities; presenting the most relevant info at any given time.
|
description: How to set up Cortana to give salespeople insights on important CRM activities, including sales leads, accounts, and opportunities.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Set up and test Cortana with Office 365 in your organization (Windows 10)
|
title: Set up and test Cortana with Office 365 in your organization (Windows 10)
|
||||||
description: How to connect Cortana to Office 365 so your employees are notified about regular meetings, unusual events, such as meetings over lunch or during a typical commute time, and about early meetings, even setting an alarm so the employee isn’t late.
|
description: Learn how to connect Cortana to Office 365 so employees are notified about regular meetings and unusual events. You can even set an alarm for early meetings.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Cortana integration in your business or enterprise (Windows 10)
|
title: Cortana integration in your business or enterprise (Windows 10)
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
description: The world’s first personal digital assistant helps users get things done, even at work. Cortana includes powerful configuration options specifically to optimize for unique small to medium-sized business and enterprise environments.
|
description: Cortana includes powerful configuration options specifically to optimize for unique small to medium-sized business and enterprise environments.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure access to Microsoft Store (Windows 10)
|
title: Configure access to Microsoft Store (Windows 10)
|
||||||
description: IT Pros can configure access to Microsoft Store for client computers in their organization. For some organizations, business policies require blocking access to Microsoft Store.
|
description: Learn how to configure access to Microsoft Store for client computers and mobile devices in your organization.
|
||||||
ms.assetid: 7AA60D3D-2A69-45E7-AAB0-B8AFC29C2E97
|
ms.assetid: 7AA60D3D-2A69-45E7-AAB0-B8AFC29C2E97
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,50 +1,51 @@
|
|||||||
---
|
---
|
||||||
title: Configure MDT settings (Windows 10)
|
title: Configure MDT settings (Windows 10)
|
||||||
description: One of the most powerful features in Microsoft Deployment Toolkit (MDT) is its extension capabilities; there is virtually no limitation to what you can do in terms of customization.
|
description: One of the most powerful features in Microsoft Deployment Toolkit (MDT) is its extension capabilities. Learn how to customize your environment.
|
||||||
ms.assetid: d3e1280c-3d1b-4fad-8ac4-b65dc711f122
|
ms.assetid: d3e1280c-3d1b-4fad-8ac4-b65dc711f122
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
keywords: customize, customization, deploy, features, tools
|
keywords: customize, customization, deploy, features, tools
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: mdt
|
ms.pagetype: mdt
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# Configure MDT settings
|
|
||||||
|
# Configure MDT settings
|
||||||
One of the most powerful features in Microsoft Deployment Toolkit (MDT) is its extension capabilities; there is virtually no limitation to what you can do in terms of customization. In this topic, you learn about configuring customizations for your environment.
|
|
||||||
For the purposes of this topic, we will use four machines: DC01, MDT01, HV01, and PC0001. DC01 is a domain controller, MDT01 is a Windows Server 2012 R2 Standard server, and PC0001 is a Windows 10 Enterprise x64 client used for the MDT simulation environment. OR01 has Microsoft System Center 2012 R2 Orchestrator installed. MDT01, OR01, and PC0001 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
One of the most powerful features in Microsoft Deployment Toolkit (MDT) is its extension capabilities; there is virtually no limitation to what you can do in terms of customization. In this topic, you learn about configuring customizations for your environment.
|
||||||
|
For the purposes of this topic, we will use four machines: DC01, MDT01, HV01, and PC0001. DC01 is a domain controller, MDT01 is a Windows Server 2012 R2 Standard server, and PC0001 is a Windows 10 Enterprise x64 client used for the MDT simulation environment. OR01 has Microsoft System Center 2012 R2 Orchestrator installed. MDT01, OR01, and PC0001 are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
||||||

|
|
||||||
|

|
||||||
Figure 1. The machines used in this topic.
|
|
||||||
|
Figure 1. The machines used in this topic.
|
||||||
## In this section
|
|
||||||
|
## In this section
|
||||||
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
|
||||||
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
- [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||||
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
- [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||||
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
- [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||||
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
- [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||||
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
- [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||||
- [Use web services in MDT](use-web-services-in-mdt.md)
|
- [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||||
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
- [Use web services in MDT](use-web-services-in-mdt.md)
|
||||||
|
- [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
||||||
## Related topics
|
|
||||||
|
## Related topics
|
||||||
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
|
||||||
|
[Get started with the Microsoft Deployment Toolkit (MDT)](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||||
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
|
||||||
|
[Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||||
[Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
|
||||||
|
[Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||||
[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
|
||||||
|
[Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
||||||
[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
|
||||||
|
[Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||||
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
|
||||||
|
[Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Integrate Configuration Manager with MDT (Windows 10)
|
title: Integrate Configuration Manager with MDT (Windows 10)
|
||||||
description: This topic will help you understand the benefits of integrating the Microsoft Deployment Toolkit with Microsoft System Center 2012 R2 Configuration Manager SP1 when you deploy a new or updated version of the Windows operating system.
|
description: Understand the benefits of integrating the Microsoft Deployment Toolkit with Microsoft System Center 2012 R2 Configuration Manager SP1 when you deploy Windows.
|
||||||
ms.assetid: 3bd1cf92-81e5-48dc-b874-0f5d9472e5a5
|
ms.assetid: 3bd1cf92-81e5-48dc-b874-0f5d9472e5a5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Prepare for deployment with MDT (Windows 10)
|
title: Prepare for deployment with MDT (Windows 10)
|
||||||
description: This topic will walk you through the steps necessary to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT).
|
description: Learn how to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT).
|
||||||
ms.assetid: 5103c418-0c61-414b-b93c-a8e8207d1226
|
ms.assetid: 5103c418-0c61-414b-b93c-a8e8207d1226
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Replace a Windows 7 computer with a Windows 10 computer (Windows 10)
|
title: Replace a Windows 7 computer with a Windows 10 computer (Windows 10)
|
||||||
description: A computer replace scenario for Windows 10 is quite similar to a computer refresh for Windows 10; however, because you are replacing a machine, you cannot store the backup on the old computer.
|
description: Learn how to replace a Windows 7 device with a Windows 10 device. Although the process is similar to performing a refresh, you'll need to backup data externally
|
||||||
ms.assetid: acf091c9-f8f4-4131-9845-625691c09a2a
|
ms.assetid: acf091c9-f8f4-4131-9845-625691c09a2a
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,117 +1,118 @@
|
|||||||
---
|
---
|
||||||
title: Create a custom Windows PE boot image with Configuration Manager (Windows 10)
|
title: Create a custom Windows PE boot image with Configuration Manager (Windows 10)
|
||||||
description: In Microsoft System Center 2012 R2 Configuration Manager, you can create custom Windows Preinstallation Environment (Windows PE) boot images that include extra components and features.
|
description: Microsoft System Center 2012 R2 Configuration Manager can create custom Windows Preinstallation Environment (Windows PE) boot images with extra features.
|
||||||
ms.assetid: b9e96974-324d-4fa4-b0ce-33cfc49c4809
|
ms.assetid: b9e96974-324d-4fa4-b0ce-33cfc49c4809
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
keywords: tool, customize, deploy, boot image
|
keywords: tool, customize, deploy, boot image
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# Create a custom Windows PE boot image with Configuration Manager
|
|
||||||
|
# Create a custom Windows PE boot image with Configuration Manager
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
|
**Applies to**
|
||||||
- Windows 10 versions 1507, 1511
|
|
||||||
|
- Windows 10 versions 1507, 1511
|
||||||
>[!IMPORTANT]
|
|
||||||
>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems).
|
>[!IMPORTANT]
|
||||||
>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10).
|
>For instructions to deploy the most recent version of Windows 10 with Configuration Manager, see [Scenarios to deploy enterprise operating systems with System Center Configuration Manager](https://docs.microsoft.com/sccm/osd/deploy-use/scenarios-to-deploy-enterprise-operating-systems).
|
||||||
|
>Configuration Manager 2012 and 2012 R2 provide support for Windows 10 versions 1507 and 1511 only. Later versions of Windows 10 require an updated Configuration Manager release. For a list of Configuration Manager versions and the corresponding Windows 10 client versions that are supported, see [Support for Windows 10 for System Center Configuration Manager](https://docs.microsoft.com/sccm/core/plan-design/configs/support-for-windows-10).
|
||||||
In Microsoft System Center 2012 R2 Configuration Manager, you can create custom Windows Preinstallation Environment (Windows PE) boot images that include extra components and features. This topic shows you how to create a custom Windows PE 5.0 boot image with the Microsoft Deployment Toolkit (MDT) wizard. You can also add the Microsoft Diagnostics and Recovery Toolset (DaRT) 10 to the boot image as part of the boot image creation process.
|
|
||||||
|
In Microsoft System Center 2012 R2 Configuration Manager, you can create custom Windows Preinstallation Environment (Windows PE) boot images that include extra components and features. This topic shows you how to create a custom Windows PE 5.0 boot image with the Microsoft Deployment Toolkit (MDT) wizard. You can also add the Microsoft Diagnostics and Recovery Toolset (DaRT) 10 to the boot image as part of the boot image creation process.
|
||||||
For the purposes of this topic, we will use two machines: DC01 and CM01. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. Both are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
|
||||||
|
For the purposes of this topic, we will use two machines: DC01 and CM01. DC01 is a domain controller and CM01 is a machine running Windows Server 2012 R2 Standard. Both are members of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
||||||
## <a href="" id="sec01"></a>Add DaRT 10 files and prepare to brand the boot image
|
|
||||||
|
## <a href="" id="sec01"></a>Add DaRT 10 files and prepare to brand the boot image
|
||||||
|
|
||||||
The steps below outline the process for adding DaRT 10 installation files to the MDT installation directory. You also copy a custom background image to be used later. We assume you have downloaded Microsoft Desktop Optimization Pack (MDOP) 2015 and copied the x64 version of MSDaRT10.msi to the C:\\Setup\\DaRT 10 folder. We also assume you have created a custom background image and saved it in C:\\Setup\\Branding on CM01. In this section, we use a custom background image named ContosoBackground.bmp.
|
|
||||||
|
The steps below outline the process for adding DaRT 10 installation files to the MDT installation directory. You also copy a custom background image to be used later. We assume you have downloaded Microsoft Desktop Optimization Pack (MDOP) 2015 and copied the x64 version of MSDaRT10.msi to the C:\\Setup\\DaRT 10 folder. We also assume you have created a custom background image and saved it in C:\\Setup\\Branding on CM01. In this section, we use a custom background image named ContosoBackground.bmp.
|
||||||
1. Install DaRT 10 (C:\\Setup\\DaRT 10\\MSDaRT10.msi) using the default settings.
|
|
||||||
|
1. Install DaRT 10 (C:\\Setup\\DaRT 10\\MSDaRT10.msi) using the default settings.
|
||||||
2. Using File Explorer, navigate to the **C:\\Program Files\\Microsoft DaRT\\v10** folder.
|
|
||||||
|
2. Using File Explorer, navigate to the **C:\\Program Files\\Microsoft DaRT\\v10** folder.
|
||||||
3. Copy the Toolsx64.cab file to the **C:\\Program Files\\Microsoft Deployment Toolkit\\Templates\\Distribution\\Tools\\x64** folder.
|
|
||||||
|
3. Copy the Toolsx64.cab file to the **C:\\Program Files\\Microsoft Deployment Toolkit\\Templates\\Distribution\\Tools\\x64** folder.
|
||||||
4. Copy the Toolsx86.cab file to the **C:\\Program Files\\Microsoft Deployment Toolkit\\Templates\\Distribution\\Tools\\x86** folder.
|
|
||||||
|
4. Copy the Toolsx86.cab file to the **C:\\Program Files\\Microsoft Deployment Toolkit\\Templates\\Distribution\\Tools\\x86** folder.
|
||||||
5. Using File Explorer, navigate to the **C:\\Setup** folder.
|
|
||||||
|
5. Using File Explorer, navigate to the **C:\\Setup** folder.
|
||||||
6. Copy the **Branding** folder to **E:\\Sources\\OSD**.
|
|
||||||
|
6. Copy the **Branding** folder to **E:\\Sources\\OSD**.
|
||||||
## <a href="" id="sec02"></a>Create a boot image for Configuration Manager using the MDT wizard
|
|
||||||
|
## <a href="" id="sec02"></a>Create a boot image for Configuration Manager using the MDT wizard
|
||||||
|
|
||||||
By using the MDT wizard to create the boot image in Configuration Manager, you gain additional options for adding components and features to the boot image. In this section, you create a boot image for Configuration Manager using the MDT wizard.
|
|
||||||
|
By using the MDT wizard to create the boot image in Configuration Manager, you gain additional options for adding components and features to the boot image. In this section, you create a boot image for Configuration Manager using the MDT wizard.
|
||||||
1. Using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click **Boot Images**, and select **Create Boot Image using MDT**.
|
|
||||||
|
1. Using the Configuration Manager Console, in the Software Library workspace, expand **Operating Systems**, right-click **Boot Images**, and select **Create Boot Image using MDT**.
|
||||||
2. On the **Package Source** page, in the **Package source folder to be created (UNC Path):** text box, type **\\\\CM01\\Sources$\\OSD\\Boot\\Zero Touch WinPE x64** and click **Next**.
|
|
||||||
|
2. On the **Package Source** page, in the **Package source folder to be created (UNC Path):** text box, type **\\\\CM01\\Sources$\\OSD\\Boot\\Zero Touch WinPE x64** and click **Next**.
|
||||||
>[!NOTE]
|
|
||||||
>The Zero Touch WinPE x64 folder does not yet exist. The folder will be created later by the wizard.
|
>[!NOTE]
|
||||||
|
>The Zero Touch WinPE x64 folder does not yet exist. The folder will be created later by the wizard.
|
||||||
3. On the **General Settings** page, assign the name **Zero Touch WinPE x64** and click **Next**.
|
|
||||||
|
3. On the **General Settings** page, assign the name **Zero Touch WinPE x64** and click **Next**.
|
||||||
4. On the **Options** page, select the **x64** platform, and click **Next**.
|
|
||||||
|
4. On the **Options** page, select the **x64** platform, and click **Next**.
|
||||||
5. On the **Components** page, in addition to the default selected **Microsoft Data Access Components (MDAC/ADO)** support, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box.
|
|
||||||
|
5. On the **Components** page, in addition to the default selected **Microsoft Data Access Components (MDAC/ADO)** support, select the **Microsoft Diagnostics and Recovery Toolkit (DaRT)** check box.
|
||||||

|
|
||||||
|

|
||||||
Figure 15. Add the DaRT component to the Configuration Manager boot image.
|
|
||||||
|
Figure 15. Add the DaRT component to the Configuration Manager boot image.
|
||||||
6. On the **Customization** page, select the **Use a custom background bitmap file** check box, and in the **UNC path:** text box, browse to **\\\\CM01\\Sources$\\OSD\\Branding\\ ContosoBackground.bmp**. Then click **Next** twice.
|
|
||||||
|
6. On the **Customization** page, select the **Use a custom background bitmap file** check box, and in the **UNC path:** text box, browse to **\\\\CM01\\Sources$\\OSD\\Branding\\ ContosoBackground.bmp**. Then click **Next** twice.
|
||||||
>[!NOTE]
|
|
||||||
>It will take a few minutes to generate the boot image.
|
>[!NOTE]
|
||||||
|
>It will take a few minutes to generate the boot image.
|
||||||
7. Distribute the boot image to the CM01 distribution point by selecting the **Boot images** node, right-clicking the **Zero Touch WinPE x64** boot image, and selecting **Distribute Content**.
|
|
||||||
|
7. Distribute the boot image to the CM01 distribution point by selecting the **Boot images** node, right-clicking the **Zero Touch WinPE x64** boot image, and selecting **Distribute Content**.
|
||||||
8. In the Distribute Content Wizard, add the CM01 distribution point, and complete the wizard.
|
|
||||||
|
8. In the Distribute Content Wizard, add the CM01 distribution point, and complete the wizard.
|
||||||
9. Using Configuration Manager Trace, review the E:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file. Do not continue until you can see that the boot image is distributed. Look for the line that reads STATMSG: ID=2301. You also can view Content Status in the Configuration Manager Console by selecting **the Zero Touch WinPE x86** boot image.
|
|
||||||
|
9. Using Configuration Manager Trace, review the E:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file. Do not continue until you can see that the boot image is distributed. Look for the line that reads STATMSG: ID=2301. You also can view Content Status in the Configuration Manager Console by selecting **the Zero Touch WinPE x86** boot image.
|
||||||

|
|
||||||
|

|
||||||
Figure 16. Content status for the Zero Touch WinPE x64 boot image
|
|
||||||
|
Figure 16. Content status for the Zero Touch WinPE x64 boot image
|
||||||
10. Using the Configuration Manager Console, right-click the **Zero Touch WinPE x64** boot image and select **Properties**.
|
|
||||||
|
10. Using the Configuration Manager Console, right-click the **Zero Touch WinPE x64** boot image and select **Properties**.
|
||||||
11. In the **Data Source** tab, select the **Deploy this boot image from the PXE-enabled distribution point** check box, and click **OK**.
|
|
||||||
|
11. In the **Data Source** tab, select the **Deploy this boot image from the PXE-enabled distribution point** check box, and click **OK**.
|
||||||
12. Using Configuration Manager Trace, review the E:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file and look for this text: Expanding PS10000B to E:\\RemoteInstall\\SMSImages.
|
|
||||||
|
12. Using Configuration Manager Trace, review the E:\\Program Files\\Microsoft Configuration Manager\\Logs\\distmgr.log file and look for this text: Expanding PS10000B to E:\\RemoteInstall\\SMSImages.
|
||||||
13. Review the **E:\\RemoteInstall\\SMSImages** folder. You should see three folders containing boot images. Two are from the default boot images, and the third folder (PS10000B) is from your new boot image with DaRT.
|
|
||||||
|
13. Review the **E:\\RemoteInstall\\SMSImages** folder. You should see three folders containing boot images. Two are from the default boot images, and the third folder (PS10000B) is from your new boot image with DaRT.
|
||||||
## Related topics
|
|
||||||
|
## Related topics
|
||||||
|
|
||||||
[Integrate Configuration Manager with MDT](../deploy-windows-mdt/integrate-configuration-manager-with-mdt.md)
|
|
||||||
|
[Integrate Configuration Manager with MDT](../deploy-windows-mdt/integrate-configuration-manager-with-mdt.md)
|
||||||
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
|
|
||||||
|
[Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
|
||||||
[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
|
|
||||||
|
[Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
|
||||||
[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
|
|
||||||
|
[Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
|
||||||
[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
|
|
||||||
|
[Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
|
||||||
[Create a task sequence with Configuration Manager and MDT](../deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt.md)
|
|
||||||
|
[Create a task sequence with Configuration Manager and MDT](../deploy-windows-mdt/create-a-task-sequence-with-configuration-manager-and-mdt.md)
|
||||||
[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
|
|
||||||
|
[Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
|
||||||
[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
|
|
||||||
|
[Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
|
||||||
[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
|
|
||||||
|
[Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,48 +1,49 @@
|
|||||||
---
|
---
|
||||||
title: Application Compatibility Toolkit (ACT) Technical Reference (Windows 10)
|
title: Application Compatibility Toolkit (ACT) Technical Reference (Windows 10)
|
||||||
description: The Microsoft® Application Compatibility Toolkit (ACT) helps you determine whether the applications, devices, and computers in your organization are compatible with versions of the Windows® operating system.
|
description: The Microsoft Application Compatibility Toolkit (ACT) helps you see if the apps and devices in your org are compatible with different versions of Windows.
|
||||||
ms.assetid: d90d38b2-2718-4481-90eb-4480719627ba
|
ms.assetid: d90d38b2-2718-4481-90eb-4480719627ba
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# Application Compatibility Toolkit (ACT) Technical Reference
|
|
||||||
|
# Application Compatibility Toolkit (ACT) Technical Reference
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
- Windows 10, version 1607
|
**Applies to**
|
||||||
|
- Windows 10, version 1607
|
||||||
>[!IMPORTANT]
|
|
||||||
>We've replaced the majority of functionality included in the Application Compatibility Toolkit (ACT) with [Windows Analytics](../update/windows-analytics-overview.md), a solution in the Microsoft Operations Management Suite. Windows Analytics gives enterprises the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released.
|
>[!IMPORTANT]
|
||||||
|
>We've replaced the majority of functionality included in the Application Compatibility Toolkit (ACT) with [Windows Analytics](../update/windows-analytics-overview.md), a solution in the Microsoft Operations Management Suite. Windows Analytics gives enterprises the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With new Windows versions being released multiple times a year, ensuring application and driver compatibility on an ongoing basis is key to adopting new Windows versions as they are released.
|
||||||
Microsoft developed Windows Analytics in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Windows Analytics was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10.
|
|
||||||
|
Microsoft developed Windows Analytics in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Windows Analytics was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10.
|
||||||
With Windows diagnostic data enabled, Windows Analytics collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft.
|
|
||||||
|
With Windows diagnostic data enabled, Windows Analytics collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft.
|
||||||
Use Windows Analytics to get:
|
|
||||||
- A visual workflow that guides you from pilot to production
|
Use Windows Analytics to get:
|
||||||
- Detailed computer and application inventory
|
- A visual workflow that guides you from pilot to production
|
||||||
- Powerful computer level search and drill-downs
|
- Detailed computer and application inventory
|
||||||
- Guidance and insights into application and driver compatibility issues, with suggested fixes
|
- Powerful computer level search and drill-downs
|
||||||
- Data driven application rationalization tools
|
- Guidance and insights into application and driver compatibility issues, with suggested fixes
|
||||||
- Application usage information, allowing targeted validation; workflow to track validation progress and decisions
|
- Data driven application rationalization tools
|
||||||
- Data export to commonly used software deployment tools, including System Center Configuration Manager
|
- Application usage information, allowing targeted validation; workflow to track validation progress and decisions
|
||||||
|
- Data export to commonly used software deployment tools, including System Center Configuration Manager
|
||||||
The Windows Analytics workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded.
|
|
||||||
|
The Windows Analytics workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded.
|
||||||
At the same time, we've kept the Standard User Analyzer tool, which helps you test your apps and to monitor API calls for potential compatibility issues, and the Compatibility Administrator, which helps you to resolve potential compatibility issues.
|
|
||||||
|
At the same time, we've kept the Standard User Analyzer tool, which helps you test your apps and to monitor API calls for potential compatibility issues, and the Compatibility Administrator, which helps you to resolve potential compatibility issues.
|
||||||
## In this section
|
|
||||||
|
## In this section
|
||||||
|Topic |Description |
|
|
||||||
|------|------------|
|
|Topic |Description |
|
||||||
|[Standard User Analyzer (SUA) User's Guide](sua-users-guide.md) |The Standard User Analyzer (SUA) helps you test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows. |
|
|------|------------|
|
||||||
|[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) |The Compatibility Administrator tool helps you resolve potential application-compatibility issues before deploying a new version of Windows to your organization. |
|
|[Standard User Analyzer (SUA) User's Guide](sua-users-guide.md) |The Standard User Analyzer (SUA) helps you test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows. |
|
||||||
|[Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) |You can fix some compatibility issues that are due to the changes made between Windows operating system versions. These issues can include User Account Control (UAC) restrictions. |
|
|[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md) |The Compatibility Administrator tool helps you resolve potential application-compatibility issues before deploying a new version of Windows to your organization. |
|
||||||
|
|[Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista](compatibility-fixes-for-windows-8-windows-7-and-windows-vista.md) |You can fix some compatibility issues that are due to the changes made between Windows operating system versions. These issues can include User Account Control (UAC) restrictions. |
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista (Windows 10)
|
title: Compatibility Fixes for Windows 10, Windows 8, Windows 7, and Windows Vista (Windows 10)
|
||||||
description: You can fix some compatibility issues that are due to the changes made between Windows operating system versions. These issues can include User Account Control (UAC) restrictions.
|
description: Find compatibility fixes for all Windows operating systems that have been released from Windows Vista through Windows 10.
|
||||||
ms.assetid: cd51c824-557f-462a-83bb-54b0771b7dff
|
ms.assetid: cd51c824-557f-462a-83bb-54b0771b7dff
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Searching for Fixed Applications in Compatibility Administrator (Windows 10)
|
title: Searching for Fixed Applications in Compatibility Administrator (Windows 10)
|
||||||
description: With the search functionality in Compatibility Administrator, you can locate specific executable (.exe) files with previously applied compatibility fixes, compatibility modes, or AppHelp messages.
|
description: Compatibility Administrator can locate specific executable (.exe) files with previously applied compatibility fixes, compatibility modes, or AppHelp messages.
|
||||||
ms.assetid: 1051a2dc-0362-43a4-8ae8-07dae39b1cb8
|
ms.assetid: 1051a2dc-0362-43a4-8ae8-07dae39b1cb8
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,69 +1,70 @@
|
|||||||
---
|
---
|
||||||
title: SUA User's Guide (Windows 10)
|
title: SUA User's Guide (Windows 10)
|
||||||
description: You can use Standard User Analyzer (SUA) to test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows.
|
description: Standard User Analyzer (SUA) can test your apps and monitor API calls to detect compatibility issues related to Windows' User Account Control (UAC) feature.
|
||||||
ms.assetid: ea525c25-b557-4ed4-b042-3e4d0e543e10
|
ms.assetid: ea525c25-b557-4ed4-b042-3e4d0e543e10
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.date: 04/19/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.date: 04/19/2017
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# SUA User's Guide
|
|
||||||
|
# SUA User's Guide
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
|
**Applies to**
|
||||||
- Windows 10
|
|
||||||
- Windows 8.1
|
- Windows 10
|
||||||
- Windows 8
|
- Windows 8.1
|
||||||
- Windows 7
|
- Windows 8
|
||||||
- Windows Server 2012
|
- Windows 7
|
||||||
- Windows Server 2008 R2
|
- Windows Server 2012
|
||||||
|
- Windows Server 2008 R2
|
||||||
You can use Standard User Analyzer (SUA) to test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows.
|
|
||||||
|
You can use Standard User Analyzer (SUA) to test your applications and monitor API calls to detect compatibility issues related to the User Account Control (UAC) feature in Windows.
|
||||||
You can use SUA in either of the following ways:
|
|
||||||
|
You can use SUA in either of the following ways:
|
||||||
- **Standard User Analyzer Wizard.** A wizard that guides you through a step-by-step process to locate and fix issues, without options for additional analysis.
|
|
||||||
|
- **Standard User Analyzer Wizard.** A wizard that guides you through a step-by-step process to locate and fix issues, without options for additional analysis.
|
||||||
- **Standard User Analyzer Tool.** A full-function tool in which you can perform in-depth analysis and fix issues.
|
|
||||||
|
- **Standard User Analyzer Tool.** A full-function tool in which you can perform in-depth analysis and fix issues.
|
||||||
## In this section
|
|
||||||
|
## In this section
|
||||||
|
|
||||||
<table>
|
|
||||||
<colgroup>
|
<table>
|
||||||
<col width="50%" />
|
<colgroup>
|
||||||
<col width="50%" />
|
<col width="50%" />
|
||||||
</colgroup>
|
<col width="50%" />
|
||||||
<thead>
|
</colgroup>
|
||||||
<tr class="header">
|
<thead>
|
||||||
<th align="left">Topic</th>
|
<tr class="header">
|
||||||
<th align="left">Description</th>
|
<th align="left">Topic</th>
|
||||||
</tr>
|
<th align="left">Description</th>
|
||||||
</thead>
|
</tr>
|
||||||
<tbody>
|
</thead>
|
||||||
<tr class="odd">
|
<tbody>
|
||||||
<td align="left"><p><a href="using-the-sua-wizard.md" data-raw-source="[Using the SUA Wizard](using-the-sua-wizard.md)">Using the SUA Wizard</a></p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions.</p></td>
|
<td align="left"><p><a href="using-the-sua-wizard.md" data-raw-source="[Using the SUA Wizard](using-the-sua-wizard.md)">Using the SUA Wizard</a></p></td>
|
||||||
</tr>
|
<td align="left"><p>The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions.</p></td>
|
||||||
<tr class="even">
|
</tr>
|
||||||
<td align="left"><p><a href="using-the-sua-tool.md" data-raw-source="[Using the SUA Tool](using-the-sua-tool.md)">Using the SUA Tool</a></p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>By using the Standard User Analyzer (SUA) tool, you can test your applications and monitor API calls to detect compatibility issues with the User Account Control (UAC) feature.</p></td>
|
<td align="left"><p><a href="using-the-sua-tool.md" data-raw-source="[Using the SUA Tool](using-the-sua-tool.md)">Using the SUA Tool</a></p></td>
|
||||||
</tr>
|
<td align="left"><p>By using the Standard User Analyzer (SUA) tool, you can test your applications and monitor API calls to detect compatibility issues with the User Account Control (UAC) feature.</p></td>
|
||||||
</tbody>
|
</tr>
|
||||||
</table>
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Testing Your Application Mitigation Packages (Windows 10)
|
title: Testing Your Application Mitigation Packages (Windows 10)
|
||||||
description: This topic provides details about testing your application-mitigation packages, including recommendations about how to report your information and how to resolve any outstanding issues.
|
description: Learn how to test your application-mitigation packages, including how to report your information and how to resolve any outstanding issues.
|
||||||
ms.assetid: ae946f27-d377-4db9-b179-e8875d454ccf
|
ms.assetid: ae946f27-d377-4db9-b179-e8875d454ccf
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,113 +1,114 @@
|
|||||||
---
|
---
|
||||||
title: Using the Sdbinst.exe Command-Line Tool (Windows 10)
|
title: Using the Sdbinst.exe Command-Line Tool (Windows 10)
|
||||||
description: You must deploy your customized database (.sdb) files to other computers in your organization before your compatibility fixes, compatibility modes, and AppHelp messages are applied.
|
description: Learn how to deploy customized database (.sdb) files using the Sdbinst.exe Command-Line Tool. Review a list of command line options.
|
||||||
ms.assetid: c1945425-3f8d-4de8-9d2d-59f801f07034
|
ms.assetid: c1945425-3f8d-4de8-9d2d-59f801f07034
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.date: 04/19/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.date: 04/19/2017
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# Using the Sdbinst.exe Command-Line Tool
|
|
||||||
|
# Using the Sdbinst.exe Command-Line Tool
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
|
**Applies to**
|
||||||
- Windows 10
|
|
||||||
- Windows 8.1
|
- Windows 10
|
||||||
- Windows 8
|
- Windows 8.1
|
||||||
- Windows 7
|
- Windows 8
|
||||||
- Windows Server 2016
|
- Windows 7
|
||||||
- Windows Server 2012
|
- Windows Server 2016
|
||||||
- Windows Server 2008 R2
|
- Windows Server 2012
|
||||||
|
- Windows Server 2008 R2
|
||||||
You must deploy your customized database (.sdb) files to other computers in your organization before your compatibility fixes, compatibility modes, and AppHelp messages are applied. You can deploy your customized database files in several ways, including by using a logon script, by using Group Policy, or by performing file copy operations.
|
|
||||||
|
You must deploy your customized database (.sdb) files to other computers in your organization before your compatibility fixes, compatibility modes, and AppHelp messages are applied. You can deploy your customized database files in several ways, including by using a logon script, by using Group Policy, or by performing file copy operations.
|
||||||
After you deploy and store the customized databases on each of your local computers, you must register the database files. Until you register the database files, the operating system is unable to identify the available compatibility fixes when starting an application.
|
|
||||||
|
After you deploy and store the customized databases on each of your local computers, you must register the database files. Until you register the database files, the operating system is unable to identify the available compatibility fixes when starting an application.
|
||||||
## Command-Line Options for Deploying Customized Database Files
|
|
||||||
|
## Command-Line Options for Deploying Customized Database Files
|
||||||
Sample output from the command `Sdbinst.exe /?` in an elevated CMD window:
|
|
||||||
|
Sample output from the command `Sdbinst.exe /?` in an elevated CMD window:
|
||||||
```
|
|
||||||
Microsoft Windows [Version 10.0.14393]
|
```
|
||||||
(c) 2016 Microsoft Corporation. All rights reserved.
|
Microsoft Windows [Version 10.0.14393]
|
||||||
|
(c) 2016 Microsoft Corporation. All rights reserved.
|
||||||
C:\Windows\system32>Sdbinst.exe /?
|
|
||||||
Usage: Sdbinst.exe [-?] [-q] [-u] [-g] [-p] [-n[:WIN32|WIN64]] myfile.sdb | {guid} | "name"
|
C:\Windows\system32>Sdbinst.exe /?
|
||||||
|
Usage: Sdbinst.exe [-?] [-q] [-u] [-g] [-p] [-n[:WIN32|WIN64]] myfile.sdb | {guid} | "name"
|
||||||
-? - print this help text.
|
|
||||||
-p - Allow SDBs containing patches.
|
-? - print this help text.
|
||||||
-q - Quiet mode: prompts are auto-accepted.
|
-p - Allow SDBs containing patches.
|
||||||
-u - Uninstall.
|
-q - Quiet mode: prompts are auto-accepted.
|
||||||
-g {guid} - GUID of file (uninstall only).
|
-u - Uninstall.
|
||||||
-n "name" - Internal name of file (uninstall only).
|
-g {guid} - GUID of file (uninstall only).
|
||||||
|
-n "name" - Internal name of file (uninstall only).
|
||||||
C:\Windows\system32>_
|
|
||||||
```
|
C:\Windows\system32>_
|
||||||
|
```
|
||||||
The command-line options use the following conventions:
|
|
||||||
|
The command-line options use the following conventions:
|
||||||
Sdbinst.exe \[-?\] \[-p\] \[-q\] \[-u\] \[-g\] \[-u filepath\] \[-g *GUID*\] \[-n *"name"*\]
|
|
||||||
|
Sdbinst.exe \[-?\] \[-p\] \[-q\] \[-u\] \[-g\] \[-u filepath\] \[-g *GUID*\] \[-n *"name"*\]
|
||||||
The following table describes the available command-line options.
|
|
||||||
|
The following table describes the available command-line options.
|
||||||
<table>
|
|
||||||
<colgroup>
|
<table>
|
||||||
<col width="50%" />
|
<colgroup>
|
||||||
<col width="50%" />
|
<col width="50%" />
|
||||||
</colgroup>
|
<col width="50%" />
|
||||||
<thead>
|
</colgroup>
|
||||||
<tr class="header">
|
<thead>
|
||||||
<th align="left">Option</th>
|
<tr class="header">
|
||||||
<th align="left">Description</th>
|
<th align="left">Option</th>
|
||||||
</tr>
|
<th align="left">Description</th>
|
||||||
</thead>
|
</tr>
|
||||||
<tbody>
|
</thead>
|
||||||
<tr class="odd">
|
<tbody>
|
||||||
<td align="left"><p>-?</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>Displays the Help for the Sdbinst.exe tool.</p>
|
<td align="left"><p>-?</p></td>
|
||||||
<p>For example,</p>
|
<td align="left"><p>Displays the Help for the Sdbinst.exe tool.</p>
|
||||||
<p><code>sdbinst.exe -?</code></p></td>
|
<p>For example,</p>
|
||||||
</tr>
|
<p><code>sdbinst.exe -?</code></p></td>
|
||||||
<tr class="even">
|
</tr>
|
||||||
<td align="left"><p>-p</p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Allows SDBs installation with Patches</p>
|
<td align="left"><p>-p</p></td>
|
||||||
<p>For example,</p>
|
<td align="left"><p>Allows SDBs installation with Patches</p>
|
||||||
<p><code>sdbinst.exe -p C:\Windows\AppPatch\Myapp.sdb</code></p></td>
|
<p>For example,</p>
|
||||||
</tr>
|
<p><code>sdbinst.exe -p C:\Windows\AppPatch\Myapp.sdb</code></p></td>
|
||||||
<tr class="odd">
|
</tr>
|
||||||
<td align="left"><p>-q</p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>Performs a silent installation with no visible window, status, or warning information. Fatal errors appear only in Event Viewer (Eventvwr.exe).</p>
|
<td align="left"><p>-q</p></td>
|
||||||
<p>For example,</p>
|
<td align="left"><p>Performs a silent installation with no visible window, status, or warning information. Fatal errors appear only in Event Viewer (Eventvwr.exe).</p>
|
||||||
<p><code>sdbinst.exe -q</code></p></td>
|
<p>For example,</p>
|
||||||
</tr>
|
<p><code>sdbinst.exe -q</code></p></td>
|
||||||
<tr class="even">
|
</tr>
|
||||||
<td align="left"><p>-u <em>filepath</em></p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Performs an uninstallation of the specified database.</p>
|
<td align="left"><p>-u <em>filepath</em></p></td>
|
||||||
<p>For example,</p>
|
<td align="left"><p>Performs an uninstallation of the specified database.</p>
|
||||||
<p><code>sdbinst.exe -u C:\example.sdb</code></p></td>
|
<p>For example,</p>
|
||||||
</tr>
|
<p><code>sdbinst.exe -u C:\example.sdb</code></p></td>
|
||||||
<tr class="odd">
|
</tr>
|
||||||
<td align="left"><p>-g <em>GUID</em></p></td>
|
<tr class="odd">
|
||||||
<td align="left"><p>Specifies the customized database to uninstall by a globally unique identifier (GUID).</p>
|
<td align="left"><p>-g <em>GUID</em></p></td>
|
||||||
<p>For example,</p>
|
<td align="left"><p>Specifies the customized database to uninstall by a globally unique identifier (GUID).</p>
|
||||||
<p><code>sdbinst.exe -g 6586cd8f-edc9-4ea8-ad94-afabea7f62e3</code></p></td>
|
<p>For example,</p>
|
||||||
</tr>
|
<p><code>sdbinst.exe -g 6586cd8f-edc9-4ea8-ad94-afabea7f62e3</code></p></td>
|
||||||
<tr class="even">
|
</tr>
|
||||||
<td align="left"><p>-n <em>"name"</em></p></td>
|
<tr class="even">
|
||||||
<td align="left"><p>Specifies the customized database to uninstall by file name.</p>
|
<td align="left"><p>-n <em>"name"</em></p></td>
|
||||||
<p>For example,</p>
|
<td align="left"><p>Specifies the customized database to uninstall by file name.</p>
|
||||||
<p><code>sdbinst.exe -n "My_Database"</code></p></td>
|
<p>For example,</p>
|
||||||
</tr>
|
<p><code>sdbinst.exe -n "My_Database"</code></p></td>
|
||||||
</tbody>
|
</tr>
|
||||||
</table>
|
</tbody>
|
||||||
|
</table>
|
||||||
## Related topics
|
|
||||||
[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md)
|
## Related topics
|
||||||
|
[Compatibility Administrator User's Guide](compatibility-administrator-users-guide.md)
|
||||||
|
@ -1,90 +1,91 @@
|
|||||||
---
|
---
|
||||||
title: Using the SUA Wizard (Windows 10)
|
title: Using the SUA Wizard (Windows 10)
|
||||||
description: The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions.
|
description: The Standard User Analyzer (SUA) Wizard, although it does not offer deep analysis, works much like the SUA tool to test for User Account Control (UAC) issues.
|
||||||
ms.assetid: 29d07074-3de7-4ace-9a54-678af7255d6c
|
ms.assetid: 29d07074-3de7-4ace-9a54-678af7255d6c
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.pagetype: appcompat
|
ms.pagetype: appcompat
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.date: 04/19/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.date: 04/19/2017
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# Using the SUA Wizard
|
|
||||||
|
# Using the SUA Wizard
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
|
**Applies to**
|
||||||
- Windows 10
|
|
||||||
- Windows 8.1
|
- Windows 10
|
||||||
- Windows 8
|
- Windows 8.1
|
||||||
- Windows 7
|
- Windows 8
|
||||||
- Windows Server 2012
|
- Windows 7
|
||||||
- Windows Server 2008 R2
|
- Windows Server 2012
|
||||||
|
- Windows Server 2008 R2
|
||||||
The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions.
|
|
||||||
|
The Standard User Analyzer (SUA) Wizard works much like the SUA tool to evaluate User Account Control (UAC) issues. However, the SUA Wizard does not offer detailed analysis, and it cannot disable virtualization or elevate your permissions.
|
||||||
For information about the SUA tool, see [Using the SUA Tool](using-the-sua-tool.md).
|
|
||||||
|
For information about the SUA tool, see [Using the SUA Tool](using-the-sua-tool.md).
|
||||||
## Testing an Application by Using the SUA Wizard
|
|
||||||
|
## Testing an Application by Using the SUA Wizard
|
||||||
|
|
||||||
You must install Application Verifier before you can use the SUA Wizard. If Application Verifier is not installed on the computer that is running the SUA Wizard, the SUA Wizard notifies you. You must also install the Microsoft® .NET Framework 3.5 or later before you can use the SUA Wizard.
|
|
||||||
|
You must install Application Verifier before you can use the SUA Wizard. If Application Verifier is not installed on the computer that is running the SUA Wizard, the SUA Wizard notifies you. You must also install the Microsoft® .NET Framework 3.5 or later before you can use the SUA Wizard.
|
||||||
The following flowchart shows the process of using the SUA Wizard.
|
|
||||||
|
The following flowchart shows the process of using the SUA Wizard.
|
||||||

|
|
||||||
|

|
||||||
**To test an application by using the SUA Wizard**
|
|
||||||
|
**To test an application by using the SUA Wizard**
|
||||||
1. On the computer where the SUA Wizard is installed, log on by using a non-administrator account.
|
|
||||||
|
1. On the computer where the SUA Wizard is installed, log on by using a non-administrator account.
|
||||||
2. Run the Standard User Analyzer Wizard.
|
|
||||||
|
2. Run the Standard User Analyzer Wizard.
|
||||||
3. Click **Browse for Application**, browse to the folder that contains the application that you want to test, and then double-click the executable file for the application.
|
|
||||||
|
3. Click **Browse for Application**, browse to the folder that contains the application that you want to test, and then double-click the executable file for the application.
|
||||||
4. Click **Launch**.
|
|
||||||
|
4. Click **Launch**.
|
||||||
If you are prompted, elevate your permissions. The SUA Wizard may require elevation of permissions to correctly diagnose the application.
|
|
||||||
|
If you are prompted, elevate your permissions. The SUA Wizard may require elevation of permissions to correctly diagnose the application.
|
||||||
If a **Permission denied** dialog box appears, click **OK**. The application starts, despite the warning.
|
|
||||||
|
If a **Permission denied** dialog box appears, click **OK**. The application starts, despite the warning.
|
||||||
5. In the application, exercise the functionality that you want to test.
|
|
||||||
|
5. In the application, exercise the functionality that you want to test.
|
||||||
6. After you finish testing, exit the application.
|
|
||||||
|
6. After you finish testing, exit the application.
|
||||||
The SUA Wizard displays a message that asks whether the application ran without any issues.
|
|
||||||
|
The SUA Wizard displays a message that asks whether the application ran without any issues.
|
||||||
7. Click **No**.
|
|
||||||
|
7. Click **No**.
|
||||||
The SUA Wizard shows a list of potential remedies that you might use to fix the application.
|
|
||||||
|
The SUA Wizard shows a list of potential remedies that you might use to fix the application.
|
||||||
8. Select the fixes that you want to apply, and then click **Launch**.
|
|
||||||
|
8. Select the fixes that you want to apply, and then click **Launch**.
|
||||||
The application appears again, with the fixes applied.
|
|
||||||
|
The application appears again, with the fixes applied.
|
||||||
9. Test the application again, and after you finish testing, exit the application.
|
|
||||||
|
9. Test the application again, and after you finish testing, exit the application.
|
||||||
The SUA Wizard displays a message that asks whether the application ran without any issues.
|
|
||||||
|
The SUA Wizard displays a message that asks whether the application ran without any issues.
|
||||||
10. If the application ran correctly, click **Yes**.
|
|
||||||
|
10. If the application ran correctly, click **Yes**.
|
||||||
The SUA Wizard closes the issue as resolved on the local computer.
|
|
||||||
|
The SUA Wizard closes the issue as resolved on the local computer.
|
||||||
If the remedies do not fix the issue with the application, click **No** again, and the wizard may offer additional remedies. If the additional remedies do not fix the issue, the wizard informs you that there are no more remedies available. For information about how to run the SUA tool for additional investigation, see [Using the SUA Tool](using-the-sua-tool.md).
|
|
||||||
|
If the remedies do not fix the issue with the application, click **No** again, and the wizard may offer additional remedies. If the additional remedies do not fix the issue, the wizard informs you that there are no more remedies available. For information about how to run the SUA tool for additional investigation, see [Using the SUA Tool](using-the-sua-tool.md).
|
||||||
## Related topics
|
|
||||||
[SUA User's Guide](sua-users-guide.md)
|
## Related topics
|
||||||
|
[SUA User's Guide](sua-users-guide.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Viewing the Events Screen in Compatibility Administrator (Windows 10)
|
title: Viewing the Events Screen in Compatibility Administrator (Windows 10)
|
||||||
description: The Events screen enables you to record and to view your activities in the Compatibility Administrator tool, provided that the screen is open while you perform the activities.
|
description: You can use the Events screen to record and view activities in the Compatibility Administrator tool.
|
||||||
ms.assetid: f2b2ada4-1b7b-4558-989d-5b52b40454b3
|
ms.assetid: f2b2ada4-1b7b-4558-989d-5b52b40454b3
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 infrastructure requirements (Windows 10)
|
title: Windows 10 infrastructure requirements (Windows 10)
|
||||||
description: There are specific infrastructure requirements to deploy and manage Windows 10 that should be in place prior to significant Windows 10 deployments within your organization.
|
description: Review the specific infrastructure requirements to deploy and manage Windows 10, prior to significant Windows 10 deployments within your organization.
|
||||||
ms.assetid: B0FA27D9-A206-4E35-9AE6-74E70748BE64
|
ms.assetid: B0FA27D9-A206-4E35-9AE6-74E70748BE64
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -92,9 +92,9 @@ As of the date of publication, the following are the USB drives currently certif
|
|||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Using a USB drive that has not been certified is not supported.
|
> Using a USB drive that has not been certified is not supported.
|
||||||
|
|
||||||
- IronKey Workspace W700 ([http://www.ironkey.com/windows-to-go-drives/ironkey-workspace-w700.html](https://go.microsoft.com/fwlink/p/?LinkId=618714))
|
- IronKey Workspace W700 ([http://www.ironkey.com/windows-to-go-drives/ironkey-workspace-w700.html](https://www.kingston.com/support/technical/products?model=dtws))
|
||||||
- IronKey Workspace W500 ([http://www.ironkey.com/windows-to-go-drives/ironkey-workspace-w500.html](https://go.microsoft.com/fwlink/p/?LinkId=618717))
|
- IronKey Workspace W500 ([http://www.ironkey.com/windows-to-go-drives/ironkey-workspace-w500.html](https://www.kingston.com/support/technical/products?model=dtws))
|
||||||
- IronKey Workspace W300 ([http://www.ironkey.com/windows-to-go-drives/ironkey-workspace-w300.html](https://go.microsoft.com/fwlink/p/?LinkId=618718))
|
- IronKey Workspace W300 ([http://www.ironkey.com/windows-to-go-drives/ironkey-workspace-w300.html](https://www.kingston.com/support/technical/products?model=dtws))
|
||||||
- Kingston DataTraveler Workspace for Windows To Go ([http://www.kingston.com/wtg/](https://go.microsoft.com/fwlink/p/?LinkId=618719))
|
- Kingston DataTraveler Workspace for Windows To Go ([http://www.kingston.com/wtg/](https://go.microsoft.com/fwlink/p/?LinkId=618719))
|
||||||
- Spyrus Portable Workplace ([http://www.spyruswtg.com/](https://go.microsoft.com/fwlink/p/?LinkId=618720))
|
- Spyrus Portable Workplace ([http://www.spyruswtg.com/](https://go.microsoft.com/fwlink/p/?LinkId=618720))
|
||||||
|
|
||||||
|
@ -125,9 +125,9 @@ Starting with Windows 10, version 1703, using Settings to control the pause beha
|
|||||||
|
|
||||||
## Configure when devices receive Quality Updates
|
## Configure when devices receive Quality Updates
|
||||||
|
|
||||||
Quality Updates are typically published on the first Tuesday of every month, although they can be released at any time. You can define if, and for how long, you would like to defer receiving Quality Updates following their availability. You can defer receiving these Quality Updates for a period of up to 35 days from their release by setting the **DeferQualityUpdatesPeriodinDays** value.
|
Quality updates are typically published on the first Tuesday of every month, although they can be released at any time. You can define if, and for how long, you would like to defer receiving Quality updates following their availability. You can defer receiving these quality updates for a period of up to 30 days from their release by setting the **DeferQualityUpdatesPeriodinDays** value.
|
||||||
|
|
||||||
You can set your system to receive updates for other Microsoft products—known as Microsoft Updates (such as Microsoft Office, Visual Studio)—along with Windows Updates by setting the **AllowMUUpdateService** policy. When you do this, these Microsoft Updates will follow the same deferral and pause rules as all other Quality Updates.
|
You can set your system to receive updates for other Microsoft products—known as Microsoft updates (such as Microsoft Office, Visual Studio)—along with Windows updates by setting the **AllowMUUpdateService** policy. When you do this, these Microsoft updates will follow the same deferral and pause rules as all other quality updates.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>This policy defers both Feature and Quality Updates on Windows 10 Mobile Enterprise.
|
>This policy defers both Feature and Quality Updates on Windows 10 Mobile Enterprise.
|
||||||
@ -146,7 +146,7 @@ You can set your system to receive updates for other Microsoft products—known
|
|||||||
|
|
||||||
## Pause quality updates
|
## Pause quality updates
|
||||||
|
|
||||||
You can also pause a system from receiving Quality Updates for a period of up to 35 days from when the value is set. After 35 days has passed, the pause setting will automatically expire and the device will scan Windows Update for applicable quality Updates. Following this scan, you can then pause quality Updates for the device again.
|
You can also pause a system from receiving quality updates for a period of up to 35 days from when the value is set. After 35 days have passed, the pause setting will automatically expire and the device will scan Windows Update for applicable quality updates. Following this scan, you can then pause quality updates for the device again.
|
||||||
|
|
||||||
Starting with Windows 10, version 1703, when you configure a pause by using policy, you must set a start date for the pause to begin. The pause period is calculated by adding 35 days to this start date.
|
Starting with Windows 10, version 1703, when you configure a pause by using policy, you must set a start date for the pause to begin. The pause period is calculated by adding 35 days to this start date.
|
||||||
|
|
||||||
@ -201,9 +201,9 @@ The policy settings to **Select when Feature Updates are received** allows you t
|
|||||||
* Group Policy: **Computer Configuration/Administrative Templates/Windows Components/Windows Update/ Windows Update for Business** - *Select when Preview Builds and Feature Updates are received*
|
* Group Policy: **Computer Configuration/Administrative Templates/Windows Components/Windows Update/ Windows Update for Business** - *Select when Preview Builds and Feature Updates are received*
|
||||||
* MDM: **Update/BranchReadinessLevel**
|
* MDM: **Update/BranchReadinessLevel**
|
||||||
|
|
||||||
## Exclude drivers from Quality Updates
|
## Exclude drivers from quality updates
|
||||||
|
|
||||||
Starting with Windows 10, version 1607, you can selectively opt out of receiving driver update packages as part of your normal quality update cycle. This policy will not apply to updates to drivers provided with the operating system (which will be packaged within a security or critical update) or to Feature Updates, where drivers might be dynamically installed to ensure the Feature Update process can complete.
|
Starting with Windows 10, version 1607, you can selectively opt out of receiving driver update packages as part of your normal quality update cycle. This policy will not apply to updates to drivers provided with the operating system (which will be packaged within a security or critical update) or to feature updates, where drivers might be dynamically installed to ensure the feature update process can complete.
|
||||||
|
|
||||||
**Policy settings to exclude drivers**
|
**Policy settings to exclude drivers**
|
||||||
|
|
||||||
|
@ -35,7 +35,7 @@ The following table describes some log files and how to use them for troubleshoo
|
|||||||
<br>
|
<br>
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<tr><td BGCOLOR="#a0e4fa"><B>Log file</td><td BGCOLOR="#a0e4fa"><B>Phase: Location</td><td BGCOLOR="#a0e4fa"><B>Description</td><td BGCOLOR="#a0e4fa"><B>When to use</td>
|
<tr><td BGCOLOR="#a0e4fa"><font color="#000000"><B>Log file</td><td BGCOLOR="#a0e4fa"><font color="#000000"><B>Phase: Location</td><td BGCOLOR="#a0e4fa"><font color="#000000"><B>Description</td><td BGCOLOR="#a0e4fa"><font color="#000000"><B>When to use</td>
|
||||||
<tr><td rowspan="5">setupact.log</td><td>Down-Level:<br>$Windows.~BT\Sources\Panther</td><td>Contains information about setup actions during the downlevel phase. </td>
|
<tr><td rowspan="5">setupact.log</td><td>Down-Level:<br>$Windows.~BT\Sources\Panther</td><td>Contains information about setup actions during the downlevel phase. </td>
|
||||||
<td>All down-level failures and starting point for rollback investigations.<br> This is the most important log for diagnosing setup issues.</td>
|
<td>All down-level failures and starting point for rollback investigations.<br> This is the most important log for diagnosing setup issues.</td>
|
||||||
<tr><td>OOBE:<br>$Windows.~BT\Sources\Panther\UnattendGC</td>
|
<tr><td>OOBE:<br>$Windows.~BT\Sources\Panther\UnattendGC</td>
|
||||||
@ -52,7 +52,7 @@ setupapi.dev.log<br>
|
|||||||
Event logs (*.evtx)</td>
|
Event logs (*.evtx)</td>
|
||||||
<td>$Windows.~BT\Sources\Rollback<td>Additional logs collected during rollback.</td>
|
<td>$Windows.~BT\Sources\Rollback<td>Additional logs collected during rollback.</td>
|
||||||
<td>
|
<td>
|
||||||
Setupmem.dmp: If OS bugchecks during upgrade, setup will attempt to extract a mini-dump.<br>
|
Setupmem.dmp: If OS bug checks during upgrade, setup will attempt to extract a mini-dump.<br>
|
||||||
Setupapi: Device install issues - 0x30018<br>
|
Setupapi: Device install issues - 0x30018<br>
|
||||||
Event logs: Generic rollbacks (0xC1900101) or unexpected reboots.</td>
|
Event logs: Generic rollbacks (0xC1900101) or unexpected reboots.</td>
|
||||||
</table>
|
</table>
|
||||||
|
@ -513,9 +513,9 @@ This error has more than one possible cause. Attempt [quick fixes](quick-fixes.m
|
|||||||
<br /><table>
|
<br /><table>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td BGCOLOR="#a0e4fa"><b>Error code</b></th>
|
<td BGCOLOR="#a0e4fa"><font color="#000000"><b>Error code</b></font></td>
|
||||||
<td BGCOLOR="#a0e4fa"><b>Cause</b></th>
|
<td BGCOLOR="#a0e4fa"><font color="#000000"><b>Cause</b></font></td>
|
||||||
<td BGCOLOR="#a0e4fa"><b>Mitigation</b></th>
|
<td BGCOLOR="#a0e4fa"><font color="#000000"><b>Mitigation</b></font></td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
@ -647,7 +647,7 @@ For detailed information on how to run these steps check out <a href="https://bl
|
|||||||
|
|
||||||
<br><table>
|
<br><table>
|
||||||
|
|
||||||
<tr><td BGCOLOR="#a0e4fa">Error Codes<td BGCOLOR="#a0e4fa">Cause<td BGCOLOR="#a0e4fa">Mitigation</td></tr>
|
<tr><td BGCOLOR="#a0e4fa"><font color="#000000">Error Codes<td BGCOLOR="#a0e4fa"><font color="#000000">Cause<td BGCOLOR="#a0e4fa"><font color="#000000">Mitigation</td></tr>
|
||||||
<tr><td>0x80070003- 0x20007
|
<tr><td>0x80070003- 0x20007
|
||||||
<td>This is a failure during SafeOS phase driver installation.
|
<td>This is a failure during SafeOS phase driver installation.
|
||||||
|
|
||||||
|
@ -91,7 +91,7 @@ The following tables provide the corresponding phase and operation for values of
|
|||||||
<br>
|
<br>
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
<table cellspacing="0" cellpadding="0">
|
||||||
<tr><td colspan="2" align="center" valign="top" BGCOLOR="#a0e4fa"><b>Extend code: phase</b></td>
|
<tr><td colspan="2" align="center" valign="top" BGCOLOR="#a0e4fa"><font color="#000000"><b>Extend code: phase</b></td>
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt'><b>Hex</b><td style='padding:0in 5.4pt 0in 5.4pt'><b>Phase</b>
|
<tr><td style='padding:0in 4pt 0in 4pt'><b>Hex</b><td style='padding:0in 5.4pt 0in 5.4pt'><b>Phase</b>
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt'>0<td style='padding:0in 4pt 0in 4pt'>SP_EXECUTION_UNKNOWN
|
<tr><td style='padding:0in 4pt 0in 4pt'>0<td style='padding:0in 4pt 0in 4pt'>SP_EXECUTION_UNKNOWN
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt'>1<td style='padding:0in 4pt 0in 4pt'>SP_EXECUTION_DOWNLEVEL
|
<tr><td style='padding:0in 4pt 0in 4pt'>1<td style='padding:0in 4pt 0in 4pt'>SP_EXECUTION_DOWNLEVEL
|
||||||
@ -103,7 +103,7 @@ The following tables provide the corresponding phase and operation for values of
|
|||||||
|
|
||||||
|
|
||||||
<table border="0" style='border-collapse:collapse;border:none'>
|
<table border="0" style='border-collapse:collapse;border:none'>
|
||||||
<tr><td colspan="2" align="center" valign="top" BGCOLOR="#a0e4fa"><B>Extend code: operation</B></td>
|
<tr><td colspan="2" align="center" valign="top" BGCOLOR="#a0e4fa"><font color="#000000"><B>Extend code: operation</B></td>
|
||||||
<tr><td align="left" valign="top" style='border:dotted #A6A6A6 1.0pt;'>
|
<tr><td align="left" valign="top" style='border:dotted #A6A6A6 1.0pt;'>
|
||||||
<table>
|
<table>
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt'><b>Hex</b><td style='padding:0in 4pt 0in 4pt'><span style='padding:0in 5.4pt 0in 5.4pt;'><b>Operation</b>
|
<tr><td style='padding:0in 4pt 0in 4pt'><b>Hex</b><td style='padding:0in 4pt 0in 4pt'><span style='padding:0in 5.4pt 0in 5.4pt;'><b>Operation</b>
|
||||||
|
@ -1,59 +1,60 @@
|
|||||||
---
|
---
|
||||||
title: User State Migration Tool (USMT) Technical Reference (Windows 10)
|
title: User State Migration Tool (USMT) Technical Reference (Windows 10)
|
||||||
description: The User State Migration Tool (USMT) is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals.
|
description: The User State Migration Tool (USMT) provides a highly customizable user-profile migration experience for IT professionals.
|
||||||
ms.assetid: f90bf58b-5529-4520-a9f8-b6cb4e4d3add
|
ms.assetid: f90bf58b-5529-4520-a9f8-b6cb4e4d3add
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.date: 04/19/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.date: 04/19/2017
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# User State Migration Tool (USMT) Technical Reference
|
|
||||||
The User State Migration Tool (USMT) is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals.
|
# User State Migration Tool (USMT) Technical Reference
|
||||||
|
The User State Migration Tool (USMT) is included with the Windows Assessment and Deployment Kit (Windows ADK) for Windows 10. USMT provides a highly customizable user-profile migration experience for IT professionals.
|
||||||
Download the Windows ADK [from this website](https://go.microsoft.com/fwlink/p/?LinkID=526803).
|
|
||||||
|
Download the Windows ADK [from this website](https://go.microsoft.com/fwlink/p/?LinkID=526803).
|
||||||
**USMT support for Microsoft Office**
|
|
||||||
>USMT in the Windows ADK for Windows 10, version 1511 (10.1.10586.0) supports migration of user settings for installations of Microsoft Office 2003, 2007, 2010, and 2013.<BR>
|
**USMT support for Microsoft Office**
|
||||||
>USMT in the Windows ADK for Windows 10, version 1607 (10.1.14393.0) adds support for migration of user settings for installations of Microsoft Office 2016.
|
>USMT in the Windows ADK for Windows 10, version 1511 (10.1.10586.0) supports migration of user settings for installations of Microsoft Office 2003, 2007, 2010, and 2013.<BR>
|
||||||
|
>USMT in the Windows ADK for Windows 10, version 1607 (10.1.14393.0) adds support for migration of user settings for installations of Microsoft Office 2016.
|
||||||
USMT includes three command-line tools:
|
|
||||||
|
USMT includes three command-line tools:
|
||||||
- ScanState.exe<BR>
|
|
||||||
- LoadState.exe<BR>
|
- ScanState.exe<BR>
|
||||||
- UsmtUtils.exe
|
- LoadState.exe<BR>
|
||||||
|
- UsmtUtils.exe
|
||||||
USMT also includes a set of three modifiable .xml files:
|
|
||||||
|
USMT also includes a set of three modifiable .xml files:
|
||||||
- MigApp.xml<BR>
|
|
||||||
- MigDocs.xml<BR>
|
- MigApp.xml<BR>
|
||||||
- MigUser.xml
|
- MigDocs.xml<BR>
|
||||||
|
- MigUser.xml
|
||||||
Additionally, you can create custom .xml files to support your migration needs. You can also create a Config.xml file to specify files or settings to exclude from the migration.
|
|
||||||
|
Additionally, you can create custom .xml files to support your migration needs. You can also create a Config.xml file to specify files or settings to exclude from the migration.
|
||||||
USMT tools can be used on several versions of Windows operating systems, for more information, see [USMT Requirements](usmt-requirements.md). For more information about previous releases of the USMT tools, see [User State Migration Tool (USMT) 4.0 User’s Guide](https://go.microsoft.com/fwlink/p/?LinkId=246564).
|
|
||||||
|
USMT tools can be used on several versions of Windows operating systems, for more information, see [USMT Requirements](usmt-requirements.md). For more information about previous releases of the USMT tools, see [User State Migration Tool (USMT) 4.0 User’s Guide](https://go.microsoft.com/fwlink/p/?LinkId=246564).
|
||||||
## In This Section
|
|
||||||
|Topic |Description|
|
## In This Section
|
||||||
|------|-----------|
|
|Topic |Description|
|
||||||
|[User State Migration Tool (USMT) Overview Topics](usmt-topics.md)|Describes what’s new in USMT, how to get started with USMT, and the benefits and limitations of using USMT.|
|
|------|-----------|
|
||||||
|[User State Migration Tool (USMT) How-to topics](usmt-how-to.md)|Includes step-by-step instructions for using USMT, as well as how-to topics for conducting tasks in USMT.|
|
|[User State Migration Tool (USMT) Overview Topics](usmt-topics.md)|Describes what’s new in USMT, how to get started with USMT, and the benefits and limitations of using USMT.|
|
||||||
|[User State Migration Tool (USMT) Troubleshooting](usmt-troubleshooting.md)|Provides answers to frequently asked questions and common issues in USMT, as well as a reference for return codes used in USMT.|
|
|[User State Migration Tool (USMT) How-to topics](usmt-how-to.md)|Includes step-by-step instructions for using USMT, as well as how-to topics for conducting tasks in USMT.|
|
||||||
|[User State Migration Toolkit (USMT) Reference](usmt-reference.md)|Includes reference information for migration planning, migration best practices, command-line syntax, using XML, and requirements for using USMT.|
|
|[User State Migration Tool (USMT) Troubleshooting](usmt-troubleshooting.md)|Provides answers to frequently asked questions and common issues in USMT, as well as a reference for return codes used in USMT.|
|
||||||
|
|[User State Migration Toolkit (USMT) Reference](usmt-reference.md)|Includes reference information for migration planning, migration best practices, command-line syntax, using XML, and requirements for using USMT.|
|
||||||
## Related topics
|
|
||||||
- [Windows Assessment and Deployment Kit](https://msdn.microsoft.com/library/windows/hardware/dn247001.aspx)
|
## Related topics
|
||||||
|
- [Windows Assessment and Deployment Kit](https://msdn.microsoft.com/library/windows/hardware/dn247001.aspx)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,79 +1,80 @@
|
|||||||
---
|
---
|
||||||
title: Use the Volume Activation Management Tool (Windows 10)
|
title: Use the Volume Activation Management Tool (Windows 10)
|
||||||
description: The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to perform VAMT proxy activation and to track and monitor several types of product keys.
|
description: The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to track and monitor several types of product keys.
|
||||||
ms.assetid: b11f0aee-7b60-44d1-be40-c960fc6c4c47
|
ms.assetid: b11f0aee-7b60-44d1-be40-c960fc6c4c47
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
keywords: vamt, volume activation, activation, windows activation
|
keywords: vamt, volume activation, activation, windows activation
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: activation
|
ms.pagetype: activation
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.localizationpriority: medium
|
author: greg-lindsay
|
||||||
ms.date: 07/27/2017
|
ms.localizationpriority: medium
|
||||||
ms.topic: article
|
ms.date: 07/27/2017
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# Use the Volume Activation Management Tool
|
|
||||||
|
# Use the Volume Activation Management Tool
|
||||||
**Applies to**
|
|
||||||
- Windows 10
|
**Applies to**
|
||||||
- Windows 8.1
|
- Windows 10
|
||||||
- Windows 8
|
- Windows 8.1
|
||||||
- Windows 7
|
- Windows 8
|
||||||
- Windows Server 2012 R2
|
- Windows 7
|
||||||
- Windows Server 2012
|
- Windows Server 2012 R2
|
||||||
- Windows Server 2008 R2
|
- Windows Server 2012
|
||||||
|
- Windows Server 2008 R2
|
||||||
**Looking for retail activation?**
|
|
||||||
- [Get Help Activating Microsoft Windows](https://go.microsoft.com/fwlink/p/?LinkId=618644)
|
**Looking for retail activation?**
|
||||||
|
- [Get Help Activating Microsoft Windows](https://go.microsoft.com/fwlink/p/?LinkId=618644)
|
||||||
The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to perform VAMT proxy activation and to track and monitor several types of product keys.
|
|
||||||
|
The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to perform VAMT proxy activation and to track and monitor several types of product keys.
|
||||||
By using the VAMT, you can automate and centrally manage the volume, retail, and MAK activation process for Windows, Office, and select other Microsoft products. The VAMT can manage volume activation by using MAKs or KMS. It is a standard Microsoft Management Console snap-in, and it can be
|
|
||||||
installed on any computer running Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2.
|
By using the VAMT, you can automate and centrally manage the volume, retail, and MAK activation process for Windows, Office, and select other Microsoft products. The VAMT can manage volume activation by using MAKs or KMS. It is a standard Microsoft Management Console snap-in, and it can be
|
||||||
|
installed on any computer running Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2012 R2, Windows Server 2012, or Windows Server 2008 R2.
|
||||||
The VAMT is distributed as part of the Windows Assessment and Deployment Kit (Windows ADK), which is a free download available from Microsoft Download Center. For more information, see [Windows Assessment and Deployment Kit (Windows ADK) for Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=526740).
|
|
||||||
|
The VAMT is distributed as part of the Windows Assessment and Deployment Kit (Windows ADK), which is a free download available from Microsoft Download Center. For more information, see [Windows Assessment and Deployment Kit (Windows ADK) for Windows 10](https://go.microsoft.com/fwlink/p/?LinkId=526740).
|
||||||
In Windows Server 2012 R2, you can install the VAMT directly from Server Manager without downloading the Windows ADK by selecting the Volume Activation Services role or the Remote Server Administration Tools/Role Administration Tools/Volume Activation Tools feature.
|
|
||||||
|
In Windows Server 2012 R2, you can install the VAMT directly from Server Manager without downloading the Windows ADK by selecting the Volume Activation Services role or the Remote Server Administration Tools/Role Administration Tools/Volume Activation Tools feature.
|
||||||
## Activating with the Volume Activation Management Tool
|
|
||||||
|
## Activating with the Volume Activation Management Tool
|
||||||
You can use the VAMT to complete the activation process in products by using MAK and retail keys, and you can work with computers individually or in groups. The VAMT enables two activation scenarios:
|
|
||||||
- **Online activation**. Online activation enables you to activate over the Internet any products that are installed with MAK, KMS host, or retail product keys. You can activate one or more connected computers within a network. This process requires that each product communicate activation information directly to Microsoft.
|
You can use the VAMT to complete the activation process in products by using MAK and retail keys, and you can work with computers individually or in groups. The VAMT enables two activation scenarios:
|
||||||
- **Proxy activation**. This activation method enables you to perform volume activation for products that are installed on client computers that do not have Internet access. The VAMT host computer distributes a MAK, KMS host key, or retail product key to one or more client products and collects the installation ID from each client product. The VAMT host sends the installation IDs to Microsoft on behalf of the client products and obtains the corresponding confirmation IDs. The VAMT host then installs the confirmation IDs on the client products to complete their activation.
|
- **Online activation**. Online activation enables you to activate over the Internet any products that are installed with MAK, KMS host, or retail product keys. You can activate one or more connected computers within a network. This process requires that each product communicate activation information directly to Microsoft.
|
||||||
By using this method, only the VAMT host computer requires Internet access. Proxy activation by using the VAMT is beneficial for isolated network segments and for cases where your organization has a mix of retail, MAK, and KMS-based activations.
|
- **Proxy activation**. This activation method enables you to perform volume activation for products that are installed on client computers that do not have Internet access. The VAMT host computer distributes a MAK, KMS host key, or retail product key to one or more client products and collects the installation ID from each client product. The VAMT host sends the installation IDs to Microsoft on behalf of the client products and obtains the corresponding confirmation IDs. The VAMT host then installs the confirmation IDs on the client products to complete their activation.
|
||||||
|
By using this method, only the VAMT host computer requires Internet access. Proxy activation by using the VAMT is beneficial for isolated network segments and for cases where your organization has a mix of retail, MAK, and KMS-based activations.
|
||||||
## Tracking products and computers with the Volume Activation Management Tool
|
|
||||||
|
## Tracking products and computers with the Volume Activation Management Tool
|
||||||
The VAMT provides an overview of the activation and licensing status of computers across your network, as shown in Figure 18. Several prebuilt reports are also available to help you proactively manage licensing.
|
|
||||||
|
The VAMT provides an overview of the activation and licensing status of computers across your network, as shown in Figure 18. Several prebuilt reports are also available to help you proactively manage licensing.
|
||||||

|
|
||||||
|

|
||||||
**Figure 18**. The VAMT showing the licensing status of multiple computers
|
|
||||||
|
**Figure 18**. The VAMT showing the licensing status of multiple computers
|
||||||
## Tracking key usage with the Volume Activation Management Tool
|
|
||||||
|
## Tracking key usage with the Volume Activation Management Tool
|
||||||
The VAMT makes it easier to track the various keys that are issued to your organization. You can enter each key into VAMT, and then the VAMT can use those keys for online or proxy activation of clients. The tool can also describe what type of key it is and to which product group it belongs. The VAMT is the most convenient way to quickly determine how many activations remain on a MAK. Figure 19 shows an example of key types and usage.
|
|
||||||
|
The VAMT makes it easier to track the various keys that are issued to your organization. You can enter each key into VAMT, and then the VAMT can use those keys for online or proxy activation of clients. The tool can also describe what type of key it is and to which product group it belongs. The VAMT is the most convenient way to quickly determine how many activations remain on a MAK. Figure 19 shows an example of key types and usage.
|
||||||

|
|
||||||
|

|
||||||
**Figure 19**. The VAMT showing key types and usage
|
|
||||||
|
**Figure 19**. The VAMT showing key types and usage
|
||||||
## Other Volume Activation Management Tool features
|
|
||||||
|
## Other Volume Activation Management Tool features
|
||||||
The VAMT stores information in a Microsoft SQL Server database for performance and flexibility, and it provides a single graphical user interface for managing activations and performing other activation-related tasks, such as:
|
|
||||||
- **Adding and removing computers**. You can use the VAMT to discover computers in the local environment. The VAMT can discover computers by querying AD DS, workgroups, or individual computer names or IP addresses, or through a general LDAP query.
|
The VAMT stores information in a Microsoft SQL Server database for performance and flexibility, and it provides a single graphical user interface for managing activations and performing other activation-related tasks, such as:
|
||||||
- **Discovering products**. You can use the VAMT to discover Windows, Windows Server, Office, and select other products that are installed on the client computers.
|
- **Adding and removing computers**. You can use the VAMT to discover computers in the local environment. The VAMT can discover computers by querying AD DS, workgroups, or individual computer names or IP addresses, or through a general LDAP query.
|
||||||
- **Managing activation data**. The VAMT stores activation data in a SQL Server database. The tool can export this data in XML format to other VAMT hosts or to an archive.
|
- **Discovering products**. You can use the VAMT to discover Windows, Windows Server, Office, and select other products that are installed on the client computers.
|
||||||
|
- **Managing activation data**. The VAMT stores activation data in a SQL Server database. The tool can export this data in XML format to other VAMT hosts or to an archive.
|
||||||
For more information, see:
|
|
||||||
- [Volume Activation Management Tool (VAMT) Overview](https://go.microsoft.com/fwlink/p/?LinkId=618266)
|
For more information, see:
|
||||||
- [VAMT Step-by-Step Scenarios](https://go.microsoft.com/fwlink/p/?LinkId=618267)
|
- [Volume Activation Management Tool (VAMT) Overview](https://go.microsoft.com/fwlink/p/?LinkId=618266)
|
||||||
|
- [VAMT Step-by-Step Scenarios](https://go.microsoft.com/fwlink/p/?LinkId=618267)
|
||||||
## See also
|
|
||||||
- [Volume Activation for Windows 10](volume-activation-windows-10.md)
|
## See also
|
||||||
|
- [Volume Activation for Windows 10](volume-activation-windows-10.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -20,39 +20,33 @@ ms.custom:
|
|||||||
|
|
||||||
# VAMT known issues
|
# VAMT known issues
|
||||||
|
|
||||||
The following list and the section that follows contain the current known issues regarding the Volume Activation Management Tool (VAMT), versions 3.0. and 3.1.
|
The current known issues with the Volume Activation Management Tool (VAMT), versions 3.0. and 3.1, include:
|
||||||
|
|
||||||
- VAMT Windows Management Infrastructure (WMI) remote operations might take longer to execute if the target computer is in a sleep or standby state.
|
- VAMT Windows Management Infrastructure (WMI) remote operations might take longer to execute if the target computer is in a sleep or standby state.
|
||||||
- When opening a Computer Information List (CIL file) that was saved by using a previous version of VAMT, the edition information is not shown for each product in the center pane. Users must update the product status again to obtain the edition information.
|
- When you open a Computer Information List (CIL) file that was saved by using a previous version of VAMT, the edition information is not shown for each product in the center pane. You must update the product status again to obtain the edition information.
|
||||||
- The remaining activation count can only be retrieved for MAKs.
|
- The remaining activation count can only be retrieved for Multiple Activation Key (MAKs).
|
||||||
|
|
||||||
## Can't add CSVLKs for Windows 10 activation to VAMT 3.1
|
## Workarounds for adding CSVLKs for Windows 10 activation to VAMT 3.1
|
||||||
|
|
||||||
When you try to add a Windows 10 Key Management Service (KMS) Host key (CSVLK) or a Windows Server 2012 R2 for Windows 10 CSVLK into VAMT 3.1 (version 10.0.10240.0), you receive the following error message:
|
Another known issue is that when you try to add a Windows 10 Key Management Service (KMS) Host key (CSVLK) or a Windows Server 2012 R2 for Windows 10 CSVLK into VAMT 3.1 (version 10.0.10240.0), you receive the error message shown here.
|
||||||
|
|
||||||
> The specified product key is invalid, or is unsupported by this version of VAMT. An update to support additional products may be available online.
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
This issue occurs because VAMT 3.1 does not contain the correct Pkconfig files to recognize this kind of key.
|
This issue occurs because VAMT 3.1 does not contain the correct Pkconfig files to recognize this kind of key. To work around this issue, use one of the following methods.
|
||||||
|
|
||||||
### Workaround
|
### Method 1
|
||||||
|
|
||||||
To work around this issue, use one of the following methods.
|
Do not add the CSVLK to the VAMT 3.1 tool. Instead, use the **slmgr.vbs /ipk \<*CSVLK*>** command to install a CSVLK on a KMS host. In this command, \<*CSVLK*> represents the specific key that you want to install. For more information about how to use the Slmgr.vbs tool, see [Slmgr.vbs options for obtaining volume activation information](https://docs.microsoft.com/windows-server/get-started/activation-slmgr-vbs-options).
|
||||||
|
|
||||||
**Method 1**
|
### Method 2
|
||||||
|
|
||||||
Do not add the CSVLK to the VAMT 3.1 tool. Instead, use the **slmgr.vbs /ipk \<*CSVLK*>** command-line tool to install a CSVLK on a KMS host. In this command, \<*CSVLK*> represents the specific key that you want to install. For more information about how to use the Slmgr.vbs tool, see [Slmgr.vbs options for obtaining volume activation information](https://docs.microsoft.com/windows-server/get-started/activation-slmgr-vbs-options).
|
On the KMS host computer, perform the following steps:
|
||||||
|
|
||||||
**Method 2**
|
|
||||||
|
|
||||||
On the KMS host computer, follow these steps:
|
|
||||||
|
|
||||||
1. Download the hotfix from [July 2016 update rollup for Windows 8.1 and Windows Server 2012 R2](https://support.microsoft.com/help/3172614/).
|
1. Download the hotfix from [July 2016 update rollup for Windows 8.1 and Windows Server 2012 R2](https://support.microsoft.com/help/3172614/).
|
||||||
|
|
||||||
1. In Windows Explorer, right-click **485392_intl_x64_zip**, and then extract the hotfix to **C:\KB3058168**.
|
1. In Windows Explorer, right-click **485392_intl_x64_zip** and extract the hotfix to C:\KB3058168.
|
||||||
|
|
||||||
1. To extract the contents of the update, open a Command Prompt window and run the following command:
|
1. To extract the contents of the update, run the following command:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
expand c:\KB3058168\Windows8.1-KB3058168-x64.msu -f:* C:\KB3058168\
|
expand c:\KB3058168\Windows8.1-KB3058168-x64.msu -f:* C:\KB3058168\
|
||||||
@ -64,6 +58,6 @@ On the KMS host computer, follow these steps:
|
|||||||
expand c:\KB3058168\Windows8.1-KB3058168-x64.cab -f:pkeyconfig-csvlk.xrm-ms c:\KB3058168
|
expand c:\KB3058168\Windows8.1-KB3058168-x64.cab -f:pkeyconfig-csvlk.xrm-ms c:\KB3058168
|
||||||
```
|
```
|
||||||
|
|
||||||
1. In the "C:\KB3058168\x86_microsoft-windows-s..nent-sku-csvlk-pack_31bf3856ad364e35_6.3.9600.17815_none_bd26b4f34d049716\" folder, copy the **pkeyconfig-csvlk.xrm-ms** file. Paste this file to the "C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\VAMT3\pkconfig" folder.
|
1. In the C:\KB3058168\x86_microsoft-windows-s..nent-sku-csvlk-pack_31bf3856ad364e35_6.3.9600.17815_none_bd26b4f34d049716 folder, copy the pkeyconfig-csvlk.xrm-ms file. Paste this file into the C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\VAMT3\pkconfig folder.
|
||||||
|
|
||||||
1. Restart VAMT.
|
1. Restart VAMT.
|
||||||
|
@ -1,43 +1,44 @@
|
|||||||
---
|
---
|
||||||
title: Volume Activation Management Tool (VAMT) Technical Reference (Windows 10)
|
title: Volume Activation Management Tool (VAMT) Technical Reference (Windows 10)
|
||||||
description: The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process.
|
description: The Volume Activation Management Tool (VAMT) enables network administrators to automate and centrally manage volume activation and retail activation.
|
||||||
ms.assetid: 1df0f795-f41c-473b-850c-e98af1ad2f2a
|
ms.assetid: 1df0f795-f41c-473b-850c-e98af1ad2f2a
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: activation
|
ms.pagetype: activation
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.date: 04/25/2017
|
author: greg-lindsay
|
||||||
ms.topic: article
|
ms.date: 04/25/2017
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# Volume Activation Management Tool (VAMT) Technical Reference
|
|
||||||
|
# Volume Activation Management Tool (VAMT) Technical Reference
|
||||||
The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process.
|
|
||||||
VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in that requires the Microsoft Management Console (MMC) 3.0. VAMT can be installed on any computer that has one of the following Windows operating systems:
|
The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process.
|
||||||
- Windows® 7 or above
|
VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in that requires the Microsoft Management Console (MMC) 3.0. VAMT can be installed on any computer that has one of the following Windows operating systems:
|
||||||
- Windows Server 2008 R2 or above
|
- Windows® 7 or above
|
||||||
|
- Windows Server 2008 R2 or above
|
||||||
|
|
||||||
**Important**
|
|
||||||
VAMT is designed to manage volume activation for: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008 (or obove), Microsoft Office 2010 (or above).
|
**Important**
|
||||||
|
VAMT is designed to manage volume activation for: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008 (or later), Microsoft Office 2010 (or above).
|
||||||
VAMT is only available in an EN-US (x86) package.
|
|
||||||
|
VAMT is only available in an EN-US (x86) package.
|
||||||
## In this Section
|
|
||||||
|
## In this Section
|
||||||
|Topic |Description |
|
|
||||||
|------|------------|
|
|Topic |Description |
|
||||||
|[Introduction to VAMT](introduction-vamt.md) |Provides a description of VAMT and common usages. |
|
|------|------------|
|
||||||
|[Active Directory-Based Activation Overview](active-directory-based-activation-overview.md) |Describes Active Directory-Based Activation scenarios. |
|
|[Introduction to VAMT](introduction-vamt.md) |Provides a description of VAMT and common usages. |
|
||||||
|[Install and Configure VAMT](install-configure-vamt.md) |Describes how to install VAMT and use it to configure client computers on your network. |
|
|[Active Directory-Based Activation Overview](active-directory-based-activation-overview.md) |Describes Active Directory-Based Activation scenarios. |
|
||||||
|[Add and Manage Products](add-manage-products-vamt.md) |Describes how to add client computers into VAMT. |
|
|[Install and Configure VAMT](install-configure-vamt.md) |Describes how to install VAMT and use it to configure client computers on your network. |
|
||||||
|[Manage Product Keys](manage-product-keys-vamt.md) |Describes how to add and remove a product key from VAMT. |
|
|[Add and Manage Products](add-manage-products-vamt.md) |Describes how to add client computers into VAMT. |
|
||||||
|[Manage Activations](manage-activations-vamt.md) |Describes how to activate a client computer by using a variety of activation methods. |
|
|[Manage Product Keys](manage-product-keys-vamt.md) |Describes how to add and remove a product key from VAMT. |
|
||||||
|[Manage VAMT Data](manage-vamt-data.md) |Describes how to save, import, export, and merge a Computer Information List (CILX) file using VAMT. |
|
|[Manage Activations](manage-activations-vamt.md) |Describes how to activate a client computer by using a variety of activation methods. |
|
||||||
|[VAMT Step-by-Step Scenarios](vamt-step-by-step.md) |Provides step-by-step instructions for using VAMT in typical environments. |
|
|[Manage VAMT Data](manage-vamt-data.md) |Describes how to save, import, export, and merge a Computer Information List (CILX) file using VAMT. |
|
||||||
|[VAMT Known Issues](vamt-known-issues.md) |Lists known issues in VAMT. |
|
|[VAMT Step-by-Step Scenarios](vamt-step-by-step.md) |Provides step-by-step instructions for using VAMT in typical environments. |
|
||||||
|
|[VAMT Known Issues](vamt-known-issues.md) |Lists known issues in VAMT. |
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Volume Activation for Windows 10
|
title: Volume Activation for Windows 10
|
||||||
description: This guide is designed to help organizations that are planning to use volume activation to deploy and activate Windows 10, including organizations that have used volume activation for earlier versions of Windows.
|
description: Learn how to use volume activation to deploy & activate Windows 10. Includes details for orgs that have used volume activation for earlier versions of Windows.
|
||||||
ms.assetid: 6e8cffae-7322-4fd3-882a-cde68187aef2
|
ms.assetid: 6e8cffae-7322-4fd3-882a-cde68187aef2
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,275 +1,277 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 deployment scenarios (Windows 10)
|
title: Windows 10 deployment scenarios (Windows 10)
|
||||||
description: To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider.
|
description: Understand the different ways Windows 10 operating system can be deployed in your organization. Explore several Windows 10 deployment scenarios.
|
||||||
ms.assetid: 7A29D546-52CC-482C-8870-8123C7DC04B5
|
ms.assetid: 7A29D546-52CC-482C-8870-8123C7DC04B5
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.audience: itpro
author: greg-lindsay
|
ms.audience: itpro
|
||||||
keywords: upgrade, in-place, configuration, deploy
|
author: greg-lindsay
|
||||||
ms.prod: w10
|
keywords: upgrade, in-place, configuration, deploy
|
||||||
ms.mktglfcycl: deploy
|
ms.prod: w10
|
||||||
ms.localizationpriority: medium
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.localizationpriority: medium
|
||||||
ms.date: 11/06/2018
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
ms.date: 11/06/2018
|
||||||
ms.topic: article
|
audience: itpro
|
||||||
---
|
author: greg-lindsay
|
||||||
|
ms.topic: article
|
||||||
# Windows 10 deployment scenarios
|
---
|
||||||
|
|
||||||
**Applies to**
|
# Windows 10 deployment scenarios
|
||||||
- Windows 10
|
|
||||||
|
**Applies to**
|
||||||
To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the capabilities and limitations of each, is a key task.
|
- Windows 10
|
||||||
|
|
||||||
The following table summarizes various Windows 10 deployment scenarios. The scenarios are each assigned to one of three categories.
|
To successfully deploy the Windows 10 operating system in your organization, it is important to understand the different ways that it can be deployed, especially now that there are new scenarios to consider. Choosing among these scenarios, and understanding the capabilities and limitations of each, is a key task.
|
||||||
- Modern deployment methods are recommended unless you have a specific need to use a different procedure. These methods are supported with existing tools such as Microsoft Deployment Toolkit (MDT) and System Center Configuration Manager. These methods are discussed in detail on the [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home).
|
|
||||||
- Dynamic deployment methods enable you to configure applications and settings for specific use cases.
|
The following table summarizes various Windows 10 deployment scenarios. The scenarios are each assigned to one of three categories.
|
||||||
- Traditional deployment methods use existing tools to deploy operating system images.<br>
|
- Modern deployment methods are recommended unless you have a specific need to use a different procedure. These methods are supported with existing tools such as Microsoft Deployment Toolkit (MDT) and System Center Configuration Manager. These methods are discussed in detail on the [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home).
|
||||||
|
- Dynamic deployment methods enable you to configure applications and settings for specific use cases.
|
||||||
<table border="0">
|
- Traditional deployment methods use existing tools to deploy operating system images.<br>
|
||||||
<tr><td align="center" style="width:16%; border:1;" bgcolor='#a0e4fa'><b>Category</b></td>
|
|
||||||
<td align="center" style="width:16%; border:1;" bgcolor='#a0e4fa'><b>Scenario</b></td>
|
<table border="0">
|
||||||
<td align="center" style="width:16%; border:1;" bgcolor='#a0e4fa'><b>Description</b></td>
|
<tr><td align="center" style="width:16%; border:1;" bgcolor='#a0e4fa'><b>Category</b></td>
|
||||||
<td align="center" style="width:16%; border:1;" bgcolor='#a0e4fa'><b>More information</b></td></tr>
|
<td align="center" style="width:16%; border:1;" bgcolor='#a0e4fa'><b>Scenario</b></td>
|
||||||
<tr><td align='center' valign='middle' style='width:16%; border:1;' rowspan="2">Modern</td>
|
<td align="center" style="width:16%; border:1;" bgcolor='#a0e4fa'><b>Description</b></td>
|
||||||
<td align="center">
|
<td align="center" style="width:16%; border:1;" bgcolor='#a0e4fa'><b>More information</b></td></tr>
|
||||||
|
<tr><td align='center' valign='middle' style='width:16%; border:1;' rowspan="2">Modern</td>
|
||||||
[Windows Autopilot](#windows-autopilot)</td>
|
<td align="center">
|
||||||
<td align="center" style="width:16%; border:1;">
|
|
||||||
Customize the out-of-box-experience (OOBE) for your organization, and deploy a new system with apps and settings already configured.
|
[Windows Autopilot](#windows-autopilot)</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
<td align="center" style="width:16%; border:1;">
|
Customize the out-of-box-experience (OOBE) for your organization, and deploy a new system with apps and settings already configured.
|
||||||
<a href="https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot">Overview of Windows Autopilot</a>
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
</tr>
|
<a href="https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot">Overview of Windows Autopilot</a>
|
||||||
<tr>
|
</td>
|
||||||
<td align="center" style="width:16%; border:1;">
|
</tr>
|
||||||
|
<tr>
|
||||||
[In-place upgrade](#in-place-upgrade)
|
<td align="center" style="width:16%; border:1;">
|
||||||
|
|
||||||
</td>
|
[In-place upgrade](#in-place-upgrade)
|
||||||
<td align="center" style="width:16%; border:1;">
|
|
||||||
Use Windows Setup to update your OS and migrate apps and settings. Rollback data is saved in Windows.old.
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
<td align="center" style="width:16%; border:1;">
|
Use Windows Setup to update your OS and migrate apps and settings. Rollback data is saved in Windows.old.
|
||||||
<a href="https://docs.microsoft.com/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit">Perform an in-place upgrade to Windows 10 with MDT</a><br><a href="https://docs.microsoft.com/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager">Perform an in-place upgrade to Windows 10 using Configuration Manager</a>
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
</tr>
|
<a href="https://docs.microsoft.com/windows/deployment/upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit">Perform an in-place upgrade to Windows 10 with MDT</a><br><a href="https://docs.microsoft.com/windows/deployment/upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager">Perform an in-place upgrade to Windows 10 using Configuration Manager</a>
|
||||||
<tr>
|
</td>
|
||||||
<td align="center" style="width:16%; border:1;" rowspan="3">
|
</tr>
|
||||||
Dynamic
|
<tr>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;" rowspan="3">
|
||||||
<td align="center" style="width:16%; border:1;">
|
Dynamic
|
||||||
|
</td>
|
||||||
[Subscription Activation](#windows-10-subscription-activation)
|
<td align="center" style="width:16%; border:1;">
|
||||||
</td>
|
|
||||||
<td align="center" style="width:16%; border:1;">
|
[Subscription Activation](#windows-10-subscription-activation)
|
||||||
Switch from Windows 10 Pro to Enterprise when a subscribed user signs in.
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
<td align="center" style="width:16%; border:1;">
|
Switch from Windows 10 Pro to Enterprise when a subscribed user signs in.
|
||||||
<a href="https://docs.microsoft.com/windows/deployment/windows-10-enterprise-subscription-activation">Windows 10 Subscription Activation</a>
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
</tr>
|
<a href="https://docs.microsoft.com/windows/deployment/windows-10-enterprise-subscription-activation">Windows 10 Subscription Activation</a>
|
||||||
<tr>
|
</td>
|
||||||
<td align="center" style="width:16%; border:1;">
|
</tr>
|
||||||
|
<tr>
|
||||||
[AAD / MDM](#dynamic-provisioning)
|
<td align="center" style="width:16%; border:1;">
|
||||||
</td>
|
|
||||||
<td align="center" style="width:16%; border:1;">
|
[AAD / MDM](#dynamic-provisioning)
|
||||||
The device is automatically joined to AAD and configured by MDM.
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
<td align="center" style="width:16%; border:1;">
|
The device is automatically joined to AAD and configured by MDM.
|
||||||
<a href="https://docs.microsoft.com/windows/client-management/mdm/azure-active-directory-integration-with-mdm">Azure Active Directory integration with MDM</a>
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
</tr>
|
<a href="https://docs.microsoft.com/windows/client-management/mdm/azure-active-directory-integration-with-mdm">Azure Active Directory integration with MDM</a>
|
||||||
<tr>
|
</td>
|
||||||
<td align="center" style="width:16%; border:1;">
|
</tr>
|
||||||
|
<tr>
|
||||||
[Provisioning packages](#dynamic-provisioning)
|
<td align="center" style="width:16%; border:1;">
|
||||||
</td>
|
|
||||||
<td align="center" style="width:16%; border:1;">
|
[Provisioning packages](#dynamic-provisioning)
|
||||||
Using the Windows Imaging and Configuration Designer tool, create provisioning packages that can be applied to devices.
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
<td align="center" style="width:16%; border:1;">
|
Using the Windows Imaging and Configuration Designer tool, create provisioning packages that can be applied to devices.
|
||||||
<a href="https://docs.microsoft.com/windows/configuration/configure-devices-without-mdm">Configure devices without MDM</a>
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
</tr>
|
<a href="https://docs.microsoft.com/windows/configuration/configure-devices-without-mdm">Configure devices without MDM</a>
|
||||||
<tr>
|
</td>
|
||||||
<td align="center" style="width:16%; border:1;" rowspan="3">
|
</tr>
|
||||||
Traditional
|
<tr>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;" rowspan="3">
|
||||||
<td align="center" style="width:16%; border:1;">
|
Traditional
|
||||||
|
</td>
|
||||||
[Bare metal](#new-computer)
|
<td align="center" style="width:16%; border:1;">
|
||||||
</td>
|
|
||||||
<td align="center" style="width:16%; border:1;">
|
[Bare metal](#new-computer)
|
||||||
Deploy a new device, or wipe an existing device and deploy with a fresh image.
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
<td align="center" style="width:16%; border:1;">
|
Deploy a new device, or wipe an existing device and deploy with a fresh image.
|
||||||
<a href="https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt">Deploy a Windows 10 image using MDT</a><br><a href="https://docs.microsoft.com/sccm/osd/deploy-use/install-new-windows-version-new-computer-bare-metal">Install a new version of Windows on a new computer with System Center Configuration Manager</a>
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
</tr>
|
<a href="https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/deploy-a-windows-10-image-using-mdt">Deploy a Windows 10 image using MDT</a><br><a href="https://docs.microsoft.com/sccm/osd/deploy-use/install-new-windows-version-new-computer-bare-metal">Install a new version of Windows on a new computer with System Center Configuration Manager</a>
|
||||||
<tr>
|
</td>
|
||||||
<td align="center" style="width:16%; border:1;">
|
</tr>
|
||||||
|
<tr>
|
||||||
[Refresh](#computer-refresh)
|
<td align="center" style="width:16%; border:1;">
|
||||||
</td>
|
|
||||||
<td align="center" style="width:16%; border:1;">
|
[Refresh](#computer-refresh)
|
||||||
Also called wipe and load. Redeploy a device by saving the user state, wiping the disk, then restoring the user state.
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
<td align="center" style="width:16%; border:1;">
|
Also called wipe and load. Redeploy a device by saving the user state, wiping the disk, then restoring the user state.
|
||||||
<a href="https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10">Refresh a Windows 7 computer with Windows 10</a><br><a href="https://docs.microsoft.com/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager">Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager</a>
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
</tr>
|
<a href="https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/refresh-a-windows-7-computer-with-windows-10">Refresh a Windows 7 computer with Windows 10</a><br><a href="https://docs.microsoft.com/windows/deployment/deploy-windows-sccm/refresh-a-windows-7-client-with-windows-10-using-configuration-manager">Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager</a>
|
||||||
<tr>
|
</td>
|
||||||
<td align="center" style="width:16%; border:1;">
|
</tr>
|
||||||
|
<tr>
|
||||||
[Replace](#computer-replace)
|
<td align="center" style="width:16%; border:1;">
|
||||||
</td>
|
|
||||||
<td align="center" style="width:16%; border:1;">
|
[Replace](#computer-replace)
|
||||||
Replace an existing device with a new one by saving the user state on the old device and then restoring it to the new device.
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
<td align="center" style="width:16%; border:1;">
|
Replace an existing device with a new one by saving the user state on the old device and then restoring it to the new device.
|
||||||
<a href="https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer">Replace a Windows 7 computer with a Windows 10 computer</a><br><a href="https://docs.microsoft.com/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager">Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager</a>
|
</td>
|
||||||
</td>
|
<td align="center" style="width:16%; border:1;">
|
||||||
</tr>
|
<a href="https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/replace-a-windows-7-computer-with-a-windows-10-computer">Replace a Windows 7 computer with a Windows 10 computer</a><br><a href="https://docs.microsoft.com/windows/deployment/deploy-windows-sccm/replace-a-windows-7-client-with-windows-10-using-configuration-manager">Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager</a>
|
||||||
</table>
|
</td>
|
||||||
|
</tr>
|
||||||
<br>
|
</table>
|
||||||
|
|
||||||
|
<br>
|
||||||
>[!IMPORTANT]
|
|
||||||
>The Windows Autopilot and Subscription Activation scenarios require that the beginning OS be Windows 10 version 1703, or later.<br>
|
|
||||||
>Except for clean install scenarios such as traditional bare metal and Windows Autopilot, all the methods described can optionally migrate apps and settings to the new OS.
|
>[!IMPORTANT]
|
||||||
|
>The Windows Autopilot and Subscription Activation scenarios require that the beginning OS be Windows 10 version 1703, or later.<br>
|
||||||
## Modern deployment methods
|
>Except for clean install scenarios such as traditional bare metal and Windows Autopilot, all the methods described can optionally migrate apps and settings to the new OS.
|
||||||
|
|
||||||
Modern deployment methods embrace both traditional on-prem and cloud services to deliver a simple, streamlined, cost effective deployment experience.
|
## Modern deployment methods
|
||||||
|
|
||||||
### Windows Autopilot
|
Modern deployment methods embrace both traditional on-prem and cloud services to deliver a simple, streamlined, cost effective deployment experience.
|
||||||
|
|
||||||
Windows Autopilot is a new suite of capabilities designed to simplify and modernize the deployment and management of new Windows 10 PCs. Windows Autopilot enables IT professionals to customize the Out of Box Experience (OOBE) for Windows 10 PCs and provide end users with a fully configured new Windows 10 device after just a few clicks. There are no images to deploy, no drivers to inject, and no infrastructure to manage. Users can go through the deployment process independently, without the need consult their IT administrator.
|
### Windows Autopilot
|
||||||
|
|
||||||
For more information about Windows Autopilot, see [Overview of Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-10-auto-pilot) and [Modernizing Windows deployment with Windows Autopilot](https://blogs.technet.microsoft.com/windowsitpro/2017/06/29/modernizing-windows-deployment-with-windows-autopilot/).
|
Windows Autopilot is a new suite of capabilities designed to simplify and modernize the deployment and management of new Windows 10 PCs. Windows Autopilot enables IT professionals to customize the Out of Box Experience (OOBE) for Windows 10 PCs and provide end users with a fully configured new Windows 10 device after just a few clicks. There are no images to deploy, no drivers to inject, and no infrastructure to manage. Users can go through the deployment process independently, without the need consult their IT administrator.
|
||||||
|
|
||||||
### In-place upgrade
|
For more information about Windows Autopilot, see [Overview of Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-10-auto-pilot) and [Modernizing Windows deployment with Windows Autopilot](https://blogs.technet.microsoft.com/windowsitpro/2017/06/29/modernizing-windows-deployment-with-windows-autopilot/).
|
||||||
|
|
||||||
For existing computers running Windows 7, Windows 8, or Windows 8.1, the recommended path for organizations deploying Windows 10 leverages the Windows installation program (Setup.exe) to perform an in-place upgrade, which automatically preserves all data, settings, applications, and drivers from the existing operating system version. This requires the least IT effort, because there is no need for any complex deployment infrastructure.
|
### In-place upgrade
|
||||||
|
|
||||||
Although consumer PCs will be upgraded using Windows Update, organizations want more control over the process. This is accomplished by leveraging tools like System Center Configuration Manager or the Microsoft Deployment Toolkit to completely automate the upgrade process through simple task sequences.
|
For existing computers running Windows 7, Windows 8, or Windows 8.1, the recommended path for organizations deploying Windows 10 leverages the Windows installation program (Setup.exe) to perform an in-place upgrade, which automatically preserves all data, settings, applications, and drivers from the existing operating system version. This requires the least IT effort, because there is no need for any complex deployment infrastructure.
|
||||||
|
|
||||||
The in-place upgrade process is designed to be extremely reliable, with the ability to automatically roll back to the previous operating system if any issues are encountered during the deployment process, without any IT staff involvement. Rolling back manually can also be done by leveraging the automatically-created recovery information (stored in the Windows.old folder), in case any issues are encountered after the upgrade is finished. The upgrade process is also typically faster than traditional deployments, because applications do not need to be reinstalled as part of the process.
|
Although consumer PCs will be upgraded using Windows Update, organizations want more control over the process. This is accomplished by leveraging tools like System Center Configuration Manager or the Microsoft Deployment Toolkit to completely automate the upgrade process through simple task sequences.
|
||||||
|
|
||||||
Because existing applications are preserved through the process, the upgrade process uses the standard Windows installation media image (Install.wim); custom images are not needed and cannot be used because the upgrade process is unable to deal with conflicts between apps in the old and new operating system. (For example, Contoso Timecard 1.0 in Windows 7 and Contoso Timecard 3.0 in the Windows 10 image.)
|
The in-place upgrade process is designed to be extremely reliable, with the ability to automatically roll back to the previous operating system if any issues are encountered during the deployment process, without any IT staff involvement. Rolling back manually can also be done by leveraging the automatically-created recovery information (stored in the Windows.old folder), in case any issues are encountered after the upgrade is finished. The upgrade process is also typically faster than traditional deployments, because applications do not need to be reinstalled as part of the process.
|
||||||
|
|
||||||
Scenarios that support in-place upgrade with some additional procedures include changing from BIOS to UEFI boot mode and upgrade of devices that use non-Microsoft disk encryption software.
|
Because existing applications are preserved through the process, the upgrade process uses the standard Windows installation media image (Install.wim); custom images are not needed and cannot be used because the upgrade process is unable to deal with conflicts between apps in the old and new operating system. (For example, Contoso Timecard 1.0 in Windows 7 and Contoso Timecard 3.0 in the Windows 10 image.)
|
||||||
|
|
||||||
- **Legacy BIOS to UEFI booting**: To perform an in-place upgrade on a UEFI-capable system that currently boots using legacy BIOS, first perform the in-place upgrade to Windows 10, maintaining the legacy BIOS boot mode. Windows 10 does not require UEFI, so it will work fine to upgrade a system using legacy BIOS emulation. After the upgrade, if you wish to enable Windows 10 features that require UEFI (such as Secure Boot), you can convert the system disk to a format that supports UEFI boot using the [MBR2GPT](https://docs.microsoft.com/windows/deployment/mbr-to-gpt) tool. Note: [UEFI specification](http://www.uefi.org/specifications) requires GPT disk layout. After the disk has been converted, you must also configure the firmware to boot in UEFI mode.
|
Scenarios that support in-place upgrade with some additional procedures include changing from BIOS to UEFI boot mode and upgrade of devices that use non-Microsoft disk encryption software.
|
||||||
|
|
||||||
- **Non-Microsoft disk encryption software**: While devices encrypted with BitLocker can easily be upgraded, more work is necessary for non-Microsoft disk encryption tools. Some ISVs will provide instructions on how to integrate their software into the in-place upgrade process. Check with your ISV to see if they have instructions. The following articles provide details on how to provision encryption drivers for use during Windows Setup via the ReflectDrivers setting:
|
- **Legacy BIOS to UEFI booting**: To perform an in-place upgrade on a UEFI-capable system that currently boots using legacy BIOS, first perform the in-place upgrade to Windows 10, maintaining the legacy BIOS boot mode. Windows 10 does not require UEFI, so it will work fine to upgrade a system using legacy BIOS emulation. After the upgrade, if you wish to enable Windows 10 features that require UEFI (such as Secure Boot), you can convert the system disk to a format that supports UEFI boot using the [MBR2GPT](https://docs.microsoft.com/windows/deployment/mbr-to-gpt) tool. Note: [UEFI specification](http://www.uefi.org/specifications) requires GPT disk layout. After the disk has been converted, you must also configure the firmware to boot in UEFI mode.
|
||||||
- [Windows Setup Automation Overview](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-automation-overview)
|
|
||||||
- [Windows Setup Command-Line Options](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-command-line-options)
|
- **Non-Microsoft disk encryption software**: While devices encrypted with BitLocker can easily be upgraded, more work is necessary for non-Microsoft disk encryption tools. Some ISVs will provide instructions on how to integrate their software into the in-place upgrade process. Check with your ISV to see if they have instructions. The following articles provide details on how to provision encryption drivers for use during Windows Setup via the ReflectDrivers setting:
|
||||||
|
- [Windows Setup Automation Overview](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-automation-overview)
|
||||||
There are some situations where you cannot use in-place upgrade; in these situations, you can use traditional deployment (wipe-and-load) instead. Examples of these situations include:
|
- [Windows Setup Command-Line Options](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-command-line-options)
|
||||||
|
|
||||||
- Changing from Windows 7, Windows 8, or Windows 8.1 x86 to Windows 10 x64. The upgrade process cannot change from a 32-bit operating system to a 64-bit operating system, because of possible complications with installed applications and drivers.
|
There are some situations where you cannot use in-place upgrade; in these situations, you can use traditional deployment (wipe-and-load) instead. Examples of these situations include:
|
||||||
- Windows To Go and Boot from VHD installations. The upgrade process is unable to upgrade these installations. Instead, new installations would need to be performed.
|
|
||||||
- Updating existing images. While it might be tempting to try to upgrade existing Windows 7, Windows 8, or Windows 8.1 images to Windows 10 by installing the old image, upgrading it, and then recapturing the new Windows 10 image, this is not supported – preparing an upgraded OS for imaging (using Sysprep.exe) is not supported and will not work when it detects the upgraded OS.
|
- Changing from Windows 7, Windows 8, or Windows 8.1 x86 to Windows 10 x64. The upgrade process cannot change from a 32-bit operating system to a 64-bit operating system, because of possible complications with installed applications and drivers.
|
||||||
- Dual-boot and multi-boot systems. The upgrade process is designed for devices running a single OS; if using dual-boot or multi-boot systems with multiple operating systems (not leveraging virtual machines for the second and subsequent operating systems), additional care should be taken.
|
- Windows To Go and Boot from VHD installations. The upgrade process is unable to upgrade these installations. Instead, new installations would need to be performed.
|
||||||
|
- Updating existing images. While it might be tempting to try to upgrade existing Windows 7, Windows 8, or Windows 8.1 images to Windows 10 by installing the old image, upgrading it, and then recapturing the new Windows 10 image, this is not supported – preparing an upgraded OS for imaging (using Sysprep.exe) is not supported and will not work when it detects the upgraded OS.
|
||||||
|
- Dual-boot and multi-boot systems. The upgrade process is designed for devices running a single OS; if using dual-boot or multi-boot systems with multiple operating systems (not leveraging virtual machines for the second and subsequent operating systems), additional care should be taken.
|
||||||
## Dynamic provisioning
|
|
||||||
|
|
||||||
For new PCs, organizations have historically replaced the version of Windows included on the device with their own custom Windows image, because this was often faster and easier than leveraging the preinstalled version. But this is an added expense due to the time and effort required. With the new dynamic provisioning capabilities and tools provided with Windows 10, it is now possible to avoid this.
|
## Dynamic provisioning
|
||||||
|
|
||||||
The goal of dynamic provisioning is to take a new PC out of the box, turn it on, and transform it into a productive organization device, with minimal time and effort. The types of transformations that are available include:
|
For new PCs, organizations have historically replaced the version of Windows included on the device with their own custom Windows image, because this was often faster and easier than leveraging the preinstalled version. But this is an added expense due to the time and effort required. With the new dynamic provisioning capabilities and tools provided with Windows 10, it is now possible to avoid this.
|
||||||
|
|
||||||
### Windows 10 Subscription Activation<A ID="windows-10-subscription-activation"></A>
|
The goal of dynamic provisioning is to take a new PC out of the box, turn it on, and transform it into a productive organization device, with minimal time and effort. The types of transformations that are available include:
|
||||||
|
|
||||||
Windows 10 Subscription Activation is a modern deployment method that enables you to change the SKU from Pro to Enterprise with no keys and no reboots. For more information about Subscription Activation, see [Windows 10 Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-enterprise-subscription-activation).
|
### Windows 10 Subscription Activation<A ID="windows-10-subscription-activation"></A>
|
||||||
|
|
||||||
|
Windows 10 Subscription Activation is a modern deployment method that enables you to change the SKU from Pro to Enterprise with no keys and no reboots. For more information about Subscription Activation, see [Windows 10 Subscription Activation](https://docs.microsoft.com/windows/deployment/windows-10-enterprise-subscription-activation).
|
||||||
### Azure Active Directory (AAD) join with automatic mobile device management (MDM) enrollment
|
|
||||||
|
|
||||||
In this scenario, the organization member just needs to provide their work or school user ID and password; the device can then be automatically joined to Azure Active Directory and enrolled in a mobile device management (MDM) solution with no additional user interaction. Once done, the MDM solution can finish configuring the device as needed. For more information, see [Azure Active Directory integration with MDM](https://docs.microsoft.com/windows/client-management/mdm/azure-active-directory-integration-with-mdm).
|
### Azure Active Directory (AAD) join with automatic mobile device management (MDM) enrollment
|
||||||
|
|
||||||
### Provisioning package configuration
|
In this scenario, the organization member just needs to provide their work or school user ID and password; the device can then be automatically joined to Azure Active Directory and enrolled in a mobile device management (MDM) solution with no additional user interaction. Once done, the MDM solution can finish configuring the device as needed. For more information, see [Azure Active Directory integration with MDM](https://docs.microsoft.com/windows/client-management/mdm/azure-active-directory-integration-with-mdm).
|
||||||
|
|
||||||
Using the [Windows Imaging and Configuration Designer (ICD)](https://go.microsoft.com/fwlink/p/?LinkId=619358), IT administrators can create a self-contained package that contains all of the configuration, settings, and apps that need to be applied to a machine. These packages can then be deployed to new PCs through a variety of means, typically by IT professionals. For more information, see [Configure devices without MDM](/windows/configuration/configure-devices-without-mdm).
|
### Provisioning package configuration
|
||||||
|
|
||||||
These scenarios can be used to enable “choose your own device” (CYOD) programs where the organization’s users can pick their own PC and not be restricted to a small list of approved or certified models (programs that are difficult to implement using traditional deployment scenarios).
|
Using the [Windows Imaging and Configuration Designer (ICD)](https://go.microsoft.com/fwlink/p/?LinkId=619358), IT administrators can create a self-contained package that contains all of the configuration, settings, and apps that need to be applied to a machine. These packages can then be deployed to new PCs through a variety of means, typically by IT professionals. For more information, see [Configure devices without MDM](/windows/configuration/configure-devices-without-mdm).
|
||||||
|
|
||||||
While the initial Windows 10 release includes a variety of provisioning settings and deployment mechanisms, these will continue to be enhanced and extended based on feedback from organizations. As with all Windows features, organizations can submit suggestions for additional features through the Windows Feedback app or through their Microsoft Support contacts.
|
These scenarios can be used to enable “choose your own device” (CYOD) programs where the organization’s users can pick their own PC and not be restricted to a small list of approved or certified models (programs that are difficult to implement using traditional deployment scenarios).
|
||||||
|
|
||||||
## Traditional deployment:
|
While the initial Windows 10 release includes a variety of provisioning settings and deployment mechanisms, these will continue to be enhanced and extended based on feedback from organizations. As with all Windows features, organizations can submit suggestions for additional features through the Windows Feedback app or through their Microsoft Support contacts.
|
||||||
|
|
||||||
New versions of Windows have typically been deployed by organizations using an image-based process built on top of tools provided in the [Windows Assessment and Deployment Kit](windows-adk-scenarios-for-it-pros.md), Windows Deployment Services, the [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md), and [System Center Configuration Manager](deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md).
|
## Traditional deployment:
|
||||||
|
|
||||||
With the release of Windows 10, all of these tools are being updated to fully support Windows 10. Although newer scenarios such as in-place upgrade and dynamic provisioning may reduce the need for traditional deployment capabilities in some organizations, these traditional methods remain important and will continue to be available to organizations that need them.
|
New versions of Windows have typically been deployed by organizations using an image-based process built on top of tools provided in the [Windows Assessment and Deployment Kit](windows-adk-scenarios-for-it-pros.md), Windows Deployment Services, the [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md), and [System Center Configuration Manager](deploy-windows-sccm/deploy-windows-10-with-system-center-2012-r2-configuration-manager.md).
|
||||||
|
|
||||||
The traditional deployment scenario can be divided into different sub-scenarios. These are explained in detail in the following sections, but the following provides a brief summary:
|
With the release of Windows 10, all of these tools are being updated to fully support Windows 10. Although newer scenarios such as in-place upgrade and dynamic provisioning may reduce the need for traditional deployment capabilities in some organizations, these traditional methods remain important and will continue to be available to organizations that need them.
|
||||||
|
|
||||||
- **New computer.** A bare-metal deployment of a new machine.
|
The traditional deployment scenario can be divided into different sub-scenarios. These are explained in detail in the following sections, but the following provides a brief summary:
|
||||||
|
|
||||||
- **Computer refresh.** A reinstall of the same machine (with user-state migration and an optional full Windows Imaging (WIM) image backup).
|
- **New computer.** A bare-metal deployment of a new machine.
|
||||||
|
|
||||||
- **Computer replace.** A replacement of the old machine with a new machine (with user-state migration and an optional full WIM image backup).
|
- **Computer refresh.** A reinstall of the same machine (with user-state migration and an optional full Windows Imaging (WIM) image backup).
|
||||||
|
|
||||||
### New computer
|
- **Computer replace.** A replacement of the old machine with a new machine (with user-state migration and an optional full WIM image backup).
|
||||||
|
|
||||||
Also called a "bare metal" deployment. This scenario occurs when you have a blank machine you need to deploy, or an existing machine you want to wipe and redeploy without needing to preserve any existing data. The setup starts from a boot media, using CD, USB, ISO, or Pre-Boot Execution Environment (PXE). You can also generate a full offline media that includes all the files needed for a client deployment, allowing you to deploy without having to connect to a central deployment share. The target can be a physical computer, a virtual machine, or a Virtual Hard Disk (VHD) running on a physical computer (boot from VHD).
|
### New computer
|
||||||
|
|
||||||
The deployment process for the new machine scenario is as follows:
|
Also called a "bare metal" deployment. This scenario occurs when you have a blank machine you need to deploy, or an existing machine you want to wipe and redeploy without needing to preserve any existing data. The setup starts from a boot media, using CD, USB, ISO, or Pre-Boot Execution Environment (PXE). You can also generate a full offline media that includes all the files needed for a client deployment, allowing you to deploy without having to connect to a central deployment share. The target can be a physical computer, a virtual machine, or a Virtual Hard Disk (VHD) running on a physical computer (boot from VHD).
|
||||||
|
|
||||||
1. Start the setup from boot media (CD, USB, ISO, or PXE).
|
The deployment process for the new machine scenario is as follows:
|
||||||
|
|
||||||
2. Wipe the hard disk clean and create new volume(s).
|
1. Start the setup from boot media (CD, USB, ISO, or PXE).
|
||||||
|
|
||||||
3. Install the operating system image.
|
2. Wipe the hard disk clean and create new volume(s).
|
||||||
|
|
||||||
4. Install other applications (as part of the task sequence).
|
3. Install the operating system image.
|
||||||
|
|
||||||
After taking these steps, the computer is ready for use.
|
4. Install other applications (as part of the task sequence).
|
||||||
|
|
||||||
### Computer refresh
|
After taking these steps, the computer is ready for use.
|
||||||
|
|
||||||
A refresh is sometimes called wipe-and-load. The process is normally initiated in the running operating system. User data and settings are backed up and restored later as part of the deployment process. The target can be the same as for the new computer scenario.
|
### Computer refresh
|
||||||
|
|
||||||
The deployment process for the wipe-and-load scenario is as follows:
|
A refresh is sometimes called wipe-and-load. The process is normally initiated in the running operating system. User data and settings are backed up and restored later as part of the deployment process. The target can be the same as for the new computer scenario.
|
||||||
|
|
||||||
1. Start the setup on a running operating system.
|
The deployment process for the wipe-and-load scenario is as follows:
|
||||||
|
|
||||||
2. Save the user state locally.
|
1. Start the setup on a running operating system.
|
||||||
|
|
||||||
3. Wipe the hard disk clean (except for the folder containing the backup).
|
2. Save the user state locally.
|
||||||
|
|
||||||
4. Install the operating system image.
|
3. Wipe the hard disk clean (except for the folder containing the backup).
|
||||||
|
|
||||||
5. Install other applications.
|
4. Install the operating system image.
|
||||||
|
|
||||||
6. Restore the user state.
|
5. Install other applications.
|
||||||
|
|
||||||
After taking these steps, the machine is ready for use.
|
6. Restore the user state.
|
||||||
|
|
||||||
### Computer replace
|
After taking these steps, the machine is ready for use.
|
||||||
|
|
||||||
A computer replace is similar to the refresh scenario. However, since we are replacing the machine, we divide this scenario into two main tasks: backup of the old client and bare-metal deployment of the new client. As with the refresh scenario, user data and settings are backed up and restored.
|
### Computer replace
|
||||||
|
|
||||||
The deployment process for the replace scenario is as follows:
|
A computer replace is similar to the refresh scenario. However, since we are replacing the machine, we divide this scenario into two main tasks: backup of the old client and bare-metal deployment of the new client. As with the refresh scenario, user data and settings are backed up and restored.
|
||||||
|
|
||||||
1. Save the user state (data and settings) on the server through a backup job on the running operating system.
|
The deployment process for the replace scenario is as follows:
|
||||||
|
|
||||||
2. Deploy the new computer as a bare-metal deployment.
|
1. Save the user state (data and settings) on the server through a backup job on the running operating system.
|
||||||
|
|
||||||
**Note**<br>In some situations, you can use the replace scenario even if the target is the same machine. For example, you can use replace if you want to modify the disk layout from the master boot record (MBR) to the GUID partition table (GPT), which will allow you to take advantage of the Unified Extensible Firmware Interface (UEFI) functionality. You can also use replace if the disk needs to be repartitioned since user data needs to be transferred off the disk.
|
2. Deploy the new computer as a bare-metal deployment.
|
||||||
|
|
||||||
## Related topics
|
**Note**<br>In some situations, you can use the replace scenario even if the target is the same machine. For example, you can use replace if you want to modify the disk layout from the master boot record (MBR) to the GUID partition table (GPT), which will allow you to take advantage of the Unified Extensible Firmware Interface (UEFI) functionality. You can also use replace if the disk needs to be repartitioned since user data needs to be transferred off the disk.
|
||||||
|
|
||||||
- [Upgrade to Windows 10 with the Microsoft Deployment Toolkit](upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md)
|
## Related topics
|
||||||
- [Upgrade to Windows 10 with System Center Configuration Manager](upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md)
|
|
||||||
- [Deploy Windows 10 with System Center 2012 R2 Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkId=620230)
|
- [Upgrade to Windows 10 with the Microsoft Deployment Toolkit](upgrade/upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md)
|
||||||
- [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md)
|
- [Upgrade to Windows 10 with System Center Configuration Manager](upgrade/upgrade-to-windows-10-with-system-center-configuraton-manager.md)
|
||||||
- [Windows setup technical reference](https://go.microsoft.com/fwlink/p/?LinkId=619357)
|
- [Deploy Windows 10 with System Center 2012 R2 Configuration Manager](https://go.microsoft.com/fwlink/p/?LinkId=620230)
|
||||||
- [Windows Imaging and Configuration Designer](https://go.microsoft.com/fwlink/p/?LinkId=619358)
|
- [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md)
|
||||||
- [UEFI firmware](https://go.microsoft.com/fwlink/p/?LinkId=619359)
|
- [Windows setup technical reference](https://go.microsoft.com/fwlink/p/?LinkId=619357)
|
||||||
|
- [Windows Imaging and Configuration Designer](https://go.microsoft.com/fwlink/p/?LinkId=619358)
|
||||||
|
- [UEFI firmware](https://go.microsoft.com/fwlink/p/?LinkId=619359)
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -63,6 +63,9 @@ Note that the hardware hash also contains details about when it was generated, s
|
|||||||
|
|
||||||
Starting with System Center Configuration Manager current branch version 1802, the hardware hashes for existing Windows 10 version 1703 and higher devices are automatically collected by Configuration Manager. See the [What’s new in version 1802](https://docs.microsoft.com/sccm/core/plan-design/changes/whats-new-in-version-1802#report-on-windows-autopilot-device-information) documentation for more details. The hash information can be extracted from Configuration Manager into a CSV file.
|
Starting with System Center Configuration Manager current branch version 1802, the hardware hashes for existing Windows 10 version 1703 and higher devices are automatically collected by Configuration Manager. See the [What’s new in version 1802](https://docs.microsoft.com/sccm/core/plan-design/changes/whats-new-in-version-1802#report-on-windows-autopilot-device-information) documentation for more details. The hash information can be extracted from Configuration Manager into a CSV file.
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> Before uploading the CSV file on Intune, please make sure that the first row contains the device serial number, Windows product ID, hardware hash, group tag, and assigned user. If there is header information on the top of CSV file, please delete that header information. See details at [Enroll Windows devices in Intune](https://docs.microsoft.com/intune/enrollment/enrollment-autopilot).
|
||||||
|
|
||||||
### Collecting the hardware ID from existing devices using PowerShell
|
### Collecting the hardware ID from existing devices using PowerShell
|
||||||
|
|
||||||
The hardware ID, or hardware hash, for an existing device is available through Windows Management Instrumentation (WMI), as long as that device is running Windows 10 version 1703 or later. To help gather this information, as well as the serial number of the device (useful to see at a glance the machine to which it belongs), a PowerShell script called [Get-WindowsAutoPilotInfo.ps1 has been published to the PowerShell Gallery website](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo).
|
The hardware ID, or hardware hash, for an existing device is available through Windows Management Instrumentation (WMI), as long as that device is running Windows 10 version 1703 or later. To help gather this information, as well as the serial number of the device (useful to see at a glance the machine to which it belongs), a PowerShell script called [Get-WindowsAutoPilotInfo.ps1 has been published to the PowerShell Gallery website](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo).
|
||||||
@ -101,13 +104,13 @@ Once the hardware IDs have been captured from existing devices, they can be uplo
|
|||||||
- [Microsoft Store for Business](https://docs.microsoft.com/microsoft-store/add-profile-to-devices#manage-autopilot-deployment-profiles). You might already be using MSfB to manage your apps and settings.
|
- [Microsoft Store for Business](https://docs.microsoft.com/microsoft-store/add-profile-to-devices#manage-autopilot-deployment-profiles). You might already be using MSfB to manage your apps and settings.
|
||||||
|
|
||||||
A summary of each platform's capabilities is provided below.
|
A summary of each platform's capabilities is provided below.
|
||||||
|
<br>
|
||||||
<table>
|
<table>
|
||||||
<tr>
|
<tr>
|
||||||
<td BGCOLOR="#a0e4fa"><B>Platform/Portal</th>
|
<td BGCOLOR="#a0e4fa"><B><font color="#000000">Platform/Portal</font></td>
|
||||||
<td BGCOLOR="#a0e4fa"><B>Register devices?</th>
|
<td BGCOLOR="#a0e4fa"><B><font color="#000000">Register devices?</font></td>
|
||||||
<td BGCOLOR="#a0e4fa"><B>Create/Assign profile</th>
|
<td BGCOLOR="#a0e4fa"><B><font color="#000000">Create/Assign profile</font></td>
|
||||||
<td BGCOLOR="#a0e4fa"><B>Acceptable DeviceID</th>
|
<td BGCOLOR="#a0e4fa"><B><font color="#000000">Acceptable DeviceID</font></td>
|
||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
|
@ -68,15 +68,16 @@ See the following examples.
|
|||||||
Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force
|
Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force
|
||||||
Install-Module AzureAD -Force
|
Install-Module AzureAD -Force
|
||||||
Install-Module WindowsAutopilotIntune -Force
|
Install-Module WindowsAutopilotIntune -Force
|
||||||
|
Install-Module Microsoft.Graph.Intune -Force
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Enter the following lines and provide Intune administrative credentials
|
3. Enter the following lines and provide Intune administrative credentials
|
||||||
- In the following command, replace the example user principal name for Azure authentication (admin@M365x373186.onmicrosoft.com) with your user account. Be sure that the user account you specify has sufficient administrative rights.
|
- Be sure that the user account you specify has sufficient administrative rights.
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Connect-AutopilotIntune -user admin@M365x373186.onmicrosoft.com
|
Connect-MSGraph
|
||||||
```
|
```
|
||||||
The password for your account will be requested using a standard Azure AD form. Type your password and then click **Sign in**.
|
The user and password for your account will be requested using a standard Azure AD form. Type your username and password and then click **Sign in**.
|
||||||
<br>See the following example:
|
<br>See the following example:
|
||||||
|
|
||||||

|

|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 deployment scenarios and tools
|
title: Windows 10 deployment scenarios and tools
|
||||||
description: To successfully deploy the Windows 10 operating system and applications for your organization, it is essential that you know about the available tools to help with the process.
|
description: Learn about the tools you can use to deploy Windows 10 and related applications to your organization. Explore deployment scenarios.
|
||||||
ms.assetid: 0d6cee1f-14c4-4b69-b29a-43b0b327b877
|
ms.assetid: 0d6cee1f-14c4-4b69-b29a-43b0b327b877
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Manage connections from Windows 10 operating system components to Microsoft services
|
title: Manage connections from Windows 10 operating system components to Microsoft services
|
||||||
description: If you want to minimize connections from Windows to Microsoft services, or configure particular privacy settings, this article covers the settings that you could consider.
|
description: Learn how to minimize connections from Windows to Microsoft services, and configure particular privacy settings related to these connections.
|
||||||
ms.assetid: ACCEB0DD-BC6F-41B1-B359-140B242183D9
|
ms.assetid: ACCEB0DD-BC6F-41B1-B359-140B242183D9
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016
|
keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016
|
||||||
|
@ -289,6 +289,16 @@ Capability Security Identifiers (SIDs) are used to uniquely and immutably identi
|
|||||||
|
|
||||||
All Capability SIDs that the operating system is aware of are stored in the Windows Registry in the path `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities'. Any Capability SID added to Windows by first or third-party applications will be added to this location.
|
All Capability SIDs that the operating system is aware of are stored in the Windows Registry in the path `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities'. Any Capability SID added to Windows by first or third-party applications will be added to this location.
|
||||||
|
|
||||||
|
## Examples of registry keys taken from Windows 10, version 1909, 64-bit Enterprise edition
|
||||||
|
You may see the following registry keys under AllCachedCapabilities:
|
||||||
|
|
||||||
|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities\capabilityClass_DevUnlock
|
||||||
|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities\capabilityClass_DevUnlock_Internal
|
||||||
|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities\capabilityClass_Enterprise
|
||||||
|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities\capabilityClass_General
|
||||||
|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities\capabilityClass_Restricted
|
||||||
|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities\capabilityClass_Windows
|
||||||
|
|
||||||
All Capability SIDs are prefixed by S-1-15-3
|
All Capability SIDs are prefixed by S-1-15-3
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure S/MIME for Windows 10 and Windows 10 Mobile (Windows 10)
|
title: Configure S/MIME for Windows 10 and Windows 10 Mobile (Windows 10)
|
||||||
description: In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them.
|
description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, aka a certificate, can read them.
|
||||||
ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05
|
ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
keywords: encrypt, digital signature
|
keywords: encrypt, digital signature
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How Windows Defender Credential Guard works
|
title: How Windows Defender Credential Guard works
|
||||||
description: Using virtualization-based security, Windows Defender Credential Guard features a new component called the isolated LSA process, which stores and protects secrets, isolating them from the rest of the operating system, so that only privileged system software can access them.
|
description: Learn how Windows Defender Credential Guard uses virtualization to protect secrets, so that only privileged system software can access them.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Manage Windows Defender Credential Guard (Windows 10)
|
title: Manage Windows Defender Credential Guard (Windows 10)
|
||||||
description: Deploying and managing Windows Defender Credential Guard using Group Policy, the registry, or the Windows Defender Device Guard and Windows Defender Credential Guard hardware readiness tool.
|
description: Learn how to deploy and manage Windows Defender Credential Guard using Group Policy, the registry, or hardware readiness tools.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender Credential Guard Requirements (Windows 10)
|
title: Windows Defender Credential Guard Requirements (Windows 10)
|
||||||
description: Windows Defender Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security associated with available hardware and firmware options.
|
description: Windows Defender Credential Guard baseline hardware, firmware, and software requirements, and additional protections for improved security.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Protect derived domain credentials with Windows Defender Credential Guard (Windows 10)
|
title: Protect derived domain credentials with Windows Defender Credential Guard (Windows 10)
|
||||||
description: Introduced in Windows 10 Enterprise, Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
description: Windows Defender Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them.
|
||||||
ms.assetid: 4F1FE390-A166-4A24-8530-EA3369FEB4B1
|
ms.assetid: 4F1FE390-A166-4A24-8530-EA3369FEB4B1
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -35,7 +35,7 @@ By enabling Windows Defender Credential Guard, the following features and soluti
|
|||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Isolated User Mode in Windows 10 with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-in-Windows-10-with-Dave-Probert)
|
- [Isolated User Mode in Windows 10 with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-in-Windows-10-with-Dave-Probert)
|
||||||
- [Isolated User Mode Processes and Features in Windows 10 with Logan Gabriel (Channel 9)](http://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-Processes-and-Features-in-Windows-10-with-Logan-Gabriel)
|
- [Isolated User Mode Processes and Features in Windows 10 with Logan Gabriel (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Isolated-User-Mode-Processes-and-Features-in-Windows-10-with-Logan-Gabriel)
|
||||||
- [More on Processes and Features in Windows 10 Isolated User Mode with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/More-on-Processes-and-Features-in-Windows-10-Isolated-User-Mode-with-Dave-Probert)
|
- [More on Processes and Features in Windows 10 Isolated User Mode with Dave Probert (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/More-on-Processes-and-Features-in-Windows-10-Isolated-User-Mode-with-Dave-Probert)
|
||||||
- [Mitigating Credential Theft using the Windows 10 Isolated User Mode (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Mitigating-Credential-Theft-using-the-Windows-10-Isolated-User-Mode)
|
- [Mitigating Credential Theft using the Windows 10 Isolated User Mode (Channel 9)](https://channel9.msdn.com/Blogs/Seth-Juarez/Mitigating-Credential-Theft-using-the-Windows-10-Isolated-User-Mode)
|
||||||
- [Protecting network passwords with Windows Defender Credential Guard](https://www.microsoft.com/itshowcase/Article/Content/831/Protecting-network-passwords-with-Windows-10-Credential-Guard)
|
- [Protecting network passwords with Windows Defender Credential Guard](https://www.microsoft.com/itshowcase/Article/Content/831/Protecting-network-passwords-with-Windows-10-Credential-Guard)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Hello biometrics in the enterprise (Windows 10)
|
title: Windows Hello biometrics in the enterprise (Windows 10)
|
||||||
description: Windows Hello is the biometric authentication feature that helps strengthen authentication and helps to guard against potential spoofing through fingerprint matching and facial recognition.
|
description: Windows Hello uses biometrics to authenticate users and guard against potential spoofing, through fingerprint matching and facial recognition.
|
||||||
ms.assetid: d3f27d94-2226-4547-86c0-65c84d6df8Bc
|
ms.assetid: d3f27d94-2226-4547-86c0-65c84d6df8Bc
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
keywords: Windows Hello, enterprise biometrics
|
keywords: Windows Hello, enterprise biometrics
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Smart Card Technical Reference (Windows 10)
|
title: Smart Card Technical Reference (Windows 10)
|
||||||
description: This technical reference for the IT professional and smart card developer describes the Windows smart card infrastructure for physical smart cards and how smart card-related components work in Windows.
|
description: Learn about the Windows smart card infrastructure for physical smart cards, and how smart card-related components work in Windows.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Understanding and Evaluating Virtual Smart Cards (Windows 10)
|
title: Understanding and Evaluating Virtual Smart Cards (Windows 10)
|
||||||
description: This topic for IT professional provides information about how smart card technology can fit into your authentication design, and provides links to additional topics about virtual smart cards.
|
description: Learn how smart card technology can fit into your authentication design. Find links to additional topics about virtual smart cards.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: VPN profile options (Windows 10)
|
title: VPN profile options (Windows 10)
|
||||||
description: Virtual private networks (VPN) let you give your users secure remote access to your company network. Windows 10 adds useful new VPN profile options to help you manage how users connect.
|
description: Windows 10 adds Virtual Private Network (VPN) profile options to help manage how users connect. VPNs give users secure remote access to the company network.
|
||||||
ms.assetid: E3F99DF9-863D-4E28-BAED-5C1B1B913523
|
ms.assetid: E3F99DF9-863D-4E28-BAED-5C1B1B913523
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: BitLocker Upgrading FAQ (Windows 10)
|
title: BitLocker Upgrading FAQ (Windows 10)
|
||||||
description: Learn more about upgrading systems that have BitLocker enabled.
|
description: Learn more about upgrading systems that have BitLocker enabled. Find frequently asked questions, such as, "Can I upgrade to Windows 10 with BitLocker enabled?"
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
title: Unenlightened and enlightened app behavior while using Windows Information Protection (WIP) (Windows 10)
|
||||||
description: How unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) networking policies, app configuration, and potentially whether the app connects to network resources directly by using IP addresses or by using hostnames.
|
description: Learn how unenlightened and enlightened apps might behave, based on Windows Information Protection (WIP) network policies, app configuration, and other criteria
|
||||||
keywords: WIP, Enterprise Data Protection, EDP, Windows Information Protection, unenlightened apps, enlightened apps
|
keywords: WIP, Enterprise Data Protection, EDP, Windows Information Protection, unenlightened apps, enlightened apps
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
|
title: How to collect Windows Information Protection (WIP) audit event logs (Windows 10)
|
||||||
description: How to collect and understand your Windows Information Protection audit event logs by using the Reporting configuration service provider (CSP) or the Windows Event Forwarding (for Windows desktop domain-joined devices only).
|
description: How to collect & understand Windows Information Protection audit event logs via the Reporting configuration service provider (CSP) or Windows Event Forwarding.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10)
|
title: List of enlightened Microsoft apps for use with Windows Information Protection (WIP) (Windows 10)
|
||||||
description: Learn the difference between enlightened and unenlightened apps, and then review the list of enlightened apps provided by Microsoft along with the text you will need to use to add them to your allowed apps list.
|
description: Learn the difference between enlightened and unenlightened apps. Find out which enlightened apps are provided by Microsoft. Learn how to allow-list them.
|
||||||
ms.assetid: 17c85ea3-9b66-4b80-b511-8f277cb4345f
|
ms.assetid: 17c85ea3-9b66-4b80-b511-8f277cb4345f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: General guidance and best practices for Windows Information Protection (WIP) (Windows 10)
|
title: General guidance and best practices for Windows Information Protection (WIP) (Windows 10)
|
||||||
description: This section includes info about the enlightened Microsoft apps, including how to add them to your Protected Apps list in Microsoft Intune. It also includes some testing scenarios that we recommend running through with Windows Information Protection (WIP).
|
description: Find resources about apps that can work with Windows Information Protection (WIP) to protect data. Enlightened apps can tell corporate and personal data apart.
|
||||||
ms.assetid: aa94e733-53be-49a7-938d-1660deaf52b0
|
ms.assetid: aa94e733-53be-49a7-938d-1660deaf52b0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
keywords: WIP, Windows Information Protection, EDP, Enterprise Data Protection
|
||||||
|
@ -42,6 +42,7 @@
|
|||||||
#### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
#### [Network firewall](windows-firewall/windows-firewall-with-advanced-security.md)
|
||||||
|
|
||||||
### [Next generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
### [Next generation protection](windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
||||||
|
#### [Better together: Windows Defender Antivirus and Microsoft Defender ATP](windows-defender-antivirus/why-use-microsoft-antivirus.md)
|
||||||
|
|
||||||
### [Endpoint detection and response]()
|
### [Endpoint detection and response]()
|
||||||
#### [Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)
|
#### [Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)
|
||||||
@ -114,21 +115,21 @@
|
|||||||
#### [Advanced hunting schema reference]()
|
#### [Advanced hunting schema reference]()
|
||||||
##### [Understand the schema](microsoft-defender-atp/advanced-hunting-schema-reference.md)
|
##### [Understand the schema](microsoft-defender-atp/advanced-hunting-schema-reference.md)
|
||||||
##### [AlertEvents](microsoft-defender-atp/advanced-hunting-alertevents-table.md)
|
##### [AlertEvents](microsoft-defender-atp/advanced-hunting-alertevents-table.md)
|
||||||
##### [FileCreationEvents](microsoft-defender-atp/advanced-hunting-filecreationevents-table.md)
|
##### [DeviceFileEvents](microsoft-defender-atp/advanced-hunting-devicefileevents-table.md)
|
||||||
##### [ImageLoadEvents](microsoft-defender-atp/advanced-hunting-imageloadevents-table.md)
|
##### [DeviceImageLoadEvents](microsoft-defender-atp/advanced-hunting-deviceimageloadevents-table.md)
|
||||||
##### [LogonEvents](microsoft-defender-atp/advanced-hunting-logonevents-table.md)
|
##### [DeviceLogonEvents](microsoft-defender-atp/advanced-hunting-devicelogonevents-table.md)
|
||||||
##### [MachineInfo](microsoft-defender-atp/advanced-hunting-machineinfo-table.md)
|
##### [DeviceInfo](microsoft-defender-atp/advanced-hunting-deviceinfo-table.md)
|
||||||
##### [MachineNetworkInfo](microsoft-defender-atp/advanced-hunting-machinenetworkinfo-table.md)
|
##### [DeviceNetworkInfo](microsoft-defender-atp/advanced-hunting-devicenetworkinfo-table.md)
|
||||||
##### [MiscEvents](microsoft-defender-atp/advanced-hunting-miscevents-table.md)
|
##### [DeviceEvents](microsoft-defender-atp/advanced-hunting-deviceevents-table.md)
|
||||||
##### [NetworkCommunicationEvents](microsoft-defender-atp/advanced-hunting-networkcommunicationevents-table.md)
|
##### [DeviceNetworkEvents](microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md)
|
||||||
##### [ProcessCreationEvents](microsoft-defender-atp/advanced-hunting-processcreationevents-table.md)
|
##### [DeviceProcessEvents](microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md)
|
||||||
##### [RegistryEvents](microsoft-defender-atp/advanced-hunting-registryevents-table.md)
|
##### [DeviceRegistryEvents](microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md)
|
||||||
##### [DeviceTvmSoftwareInventoryVulnerabilities](microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md)
|
##### [DeviceTvmSoftwareInventoryVulnerabilities](microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md)
|
||||||
##### [DeviceTvmSoftwareVulnerabilitiesKB](microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md)
|
##### [DeviceTvmSoftwareVulnerabilitiesKB](microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md)
|
||||||
##### [DeviceTvmSecureConfigurationAssessment](microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md)
|
##### [DeviceTvmSecureConfigurationAssessment](microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md)
|
||||||
##### [DeviceTvmSecureConfigurationAssessmentKB](microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md)
|
##### [DeviceTvmSecureConfigurationAssessmentKB](microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md)
|
||||||
#### [Apply query best practices](microsoft-defender-atp/advanced-hunting-best-practices.md)
|
#### [Apply query best practices](microsoft-defender-atp/advanced-hunting-best-practices.md)
|
||||||
#### [Stream Advanced hunting events to Azure Event Hubs](microsoft-defender-atp/raw-data-export-event-hub.md)
|
|
||||||
|
|
||||||
#### [Custom detections]()
|
#### [Custom detections]()
|
||||||
##### [Understand custom detection rules](microsoft-defender-atp/overview-custom-detections.md)
|
##### [Understand custom detection rules](microsoft-defender-atp/overview-custom-detections.md)
|
||||||
@ -136,8 +137,6 @@
|
|||||||
|
|
||||||
### [Management and APIs]()
|
### [Management and APIs]()
|
||||||
#### [Overview of management and APIs](microsoft-defender-atp/management-apis.md)
|
#### [Overview of management and APIs](microsoft-defender-atp/management-apis.md)
|
||||||
#### [Understand threat intelligence concepts](microsoft-defender-atp/threat-indicator-concepts.md)
|
|
||||||
#### [Managed security service provider support](microsoft-defender-atp/mssp-support.md)
|
|
||||||
|
|
||||||
### [Integrations]()
|
### [Integrations]()
|
||||||
#### [Microsoft Defender ATP integrations](microsoft-defender-atp/threat-protection-integration.md)
|
#### [Microsoft Defender ATP integrations](microsoft-defender-atp/threat-protection-integration.md)
|
||||||
@ -361,14 +360,15 @@
|
|||||||
###### [Troubleshoot subscription and portal access issues](microsoft-defender-atp/troubleshoot-onboarding-error-messages.md)
|
###### [Troubleshoot subscription and portal access issues](microsoft-defender-atp/troubleshoot-onboarding-error-messages.md)
|
||||||
|
|
||||||
#### [Microsoft Defender ATP API]()
|
#### [Microsoft Defender ATP API]()
|
||||||
##### [Microsoft Defender ATP API license and terms](microsoft-defender-atp/api-terms-of-use.md)
|
|
||||||
##### [Get started with Microsoft Defender ATP APIs]()
|
##### [Get started with Microsoft Defender ATP APIs]()
|
||||||
###### [Introduction](microsoft-defender-atp/apis-intro.md)
|
###### [Microsoft Defender ATP API license and terms](microsoft-defender-atp/api-terms-of-use.md)
|
||||||
|
###### [Access the Microsoft Defender ATP APIs](microsoft-defender-atp/apis-intro.md)
|
||||||
###### [Hello World](microsoft-defender-atp/api-hello-world.md)
|
###### [Hello World](microsoft-defender-atp/api-hello-world.md)
|
||||||
###### [Get access with application context](microsoft-defender-atp/exposed-apis-create-app-webapp.md)
|
###### [Get access with application context](microsoft-defender-atp/exposed-apis-create-app-webapp.md)
|
||||||
###### [Get access with user context](microsoft-defender-atp/exposed-apis-create-app-nativeapp.md)
|
###### [Get access with user context](microsoft-defender-atp/exposed-apis-create-app-nativeapp.md)
|
||||||
|
###### [Get partner application access](microsoft-defender-atp/exposed-apis-create-app-partners.md)
|
||||||
|
|
||||||
##### [APIs]()
|
##### [Microsoft Defender ATP APIs Schema]()
|
||||||
###### [Supported Microsoft Defender ATP APIs](microsoft-defender-atp/exposed-apis-list.md)
|
###### [Supported Microsoft Defender ATP APIs](microsoft-defender-atp/exposed-apis-list.md)
|
||||||
###### [Advanced Hunting](microsoft-defender-atp/run-advanced-query-api.md)
|
###### [Advanced Hunting](microsoft-defender-atp/run-advanced-query-api.md)
|
||||||
|
|
||||||
@ -406,7 +406,12 @@
|
|||||||
####### [Run antivirus scan](microsoft-defender-atp/run-av-scan.md)
|
####### [Run antivirus scan](microsoft-defender-atp/run-av-scan.md)
|
||||||
####### [Offboard machine](microsoft-defender-atp/offboard-machine-api.md)
|
####### [Offboard machine](microsoft-defender-atp/offboard-machine-api.md)
|
||||||
####### [Stop and quarantine file](microsoft-defender-atp/stop-and-quarantine-file.md)
|
####### [Stop and quarantine file](microsoft-defender-atp/stop-and-quarantine-file.md)
|
||||||
####### [Initiate investigation (preview)](microsoft-defender-atp/initiate-autoir-investigation.md)
|
|
||||||
|
###### [Automated Investigation]()
|
||||||
|
####### [Investigation methods and properties](microsoft-defender-atp/investigation.md)
|
||||||
|
####### [List Investigation](microsoft-defender-atp/get-investigation-collection.md)
|
||||||
|
####### [Get Investigation](microsoft-defender-atp/get-investigation-object.md)
|
||||||
|
####### [Start Investigation](microsoft-defender-atp/initiate-autoir-investigation.md)
|
||||||
|
|
||||||
###### [Indicators]()
|
###### [Indicators]()
|
||||||
####### [Indicators methods and properties](microsoft-defender-atp/ti-indicator.md)
|
####### [Indicators methods and properties](microsoft-defender-atp/ti-indicator.md)
|
||||||
@ -442,14 +447,14 @@
|
|||||||
###### [Advanced Hunting using PowerShell](microsoft-defender-atp/run-advanced-query-sample-powershell.md)
|
###### [Advanced Hunting using PowerShell](microsoft-defender-atp/run-advanced-query-sample-powershell.md)
|
||||||
###### [Using OData Queries](microsoft-defender-atp/exposed-apis-odata-samples.md)
|
###### [Using OData Queries](microsoft-defender-atp/exposed-apis-odata-samples.md)
|
||||||
|
|
||||||
#### [Windows updates (KB) info]()
|
#### [Raw data streaming API]()
|
||||||
##### [Get KbInfo collection](microsoft-defender-atp/get-kbinfo-collection.md)
|
##### [Raw data streaming (preview)](microsoft-defender-atp/raw-data-export.md)
|
||||||
|
##### [Stream advanced hunting events to Azure Events hub](microsoft-defender-atp/raw-data-export-event-hub.md)
|
||||||
|
##### [Stream advanced hunting events to your storage account](microsoft-defender-atp/raw-data-export-storage.md)
|
||||||
|
|
||||||
|
|
||||||
#### [Common Vulnerabilities and Exposures (CVE) to KB map]()
|
#### [SIEM integration]()
|
||||||
##### [Get CVE-KB map](microsoft-defender-atp/get-cvekbmap-collection.md)
|
##### [Understand threat intelligence concepts](microsoft-defender-atp/threat-indicator-concepts.md)
|
||||||
|
|
||||||
|
|
||||||
#### [Pull detections to your SIEM tools]()
|
|
||||||
##### [Learn about different ways to pull detections](microsoft-defender-atp/configure-siem.md)
|
##### [Learn about different ways to pull detections](microsoft-defender-atp/configure-siem.md)
|
||||||
##### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
|
##### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
|
||||||
##### [Configure Splunk to pull detections](microsoft-defender-atp/configure-splunk.md)
|
##### [Configure Splunk to pull detections](microsoft-defender-atp/configure-splunk.md)
|
||||||
@ -458,6 +463,7 @@
|
|||||||
##### [Pull detections using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api.md)
|
##### [Pull detections using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api.md)
|
||||||
##### [Troubleshoot SIEM tool integration issues](microsoft-defender-atp/troubleshoot-siem.md)
|
##### [Troubleshoot SIEM tool integration issues](microsoft-defender-atp/troubleshoot-siem.md)
|
||||||
|
|
||||||
|
|
||||||
#### [Reporting]()
|
#### [Reporting]()
|
||||||
##### [Power BI - How to use API - Samples](microsoft-defender-atp/api-power-bi.md)
|
##### [Power BI - How to use API - Samples](microsoft-defender-atp/api-power-bi.md)
|
||||||
##### [Create and build Power BI reports using Microsoft Defender ATP data connectors (deprecated)](microsoft-defender-atp/powerbi-reports.md)
|
##### [Create and build Power BI reports using Microsoft Defender ATP data connectors (deprecated)](microsoft-defender-atp/powerbi-reports.md)
|
||||||
@ -484,45 +490,55 @@
|
|||||||
###### [Using machine groups](microsoft-defender-atp/machine-groups.md)
|
###### [Using machine groups](microsoft-defender-atp/machine-groups.md)
|
||||||
###### [Create and manage machine tags](microsoft-defender-atp/machine-tags.md)
|
###### [Create and manage machine tags](microsoft-defender-atp/machine-tags.md)
|
||||||
|
|
||||||
#### [Configure managed security service provider (MSSP) support](microsoft-defender-atp/configure-mssp-support.md)
|
#### [Configure managed security service provider (MSSP) integration](microsoft-defender-atp/configure-mssp-support.md)
|
||||||
|
|
||||||
|
## [Partner integration scenarios]()
|
||||||
|
### [Technical partner opportunities](microsoft-defender-atp/partner-integration.md)
|
||||||
|
### [Managed security service provider opportunity](microsoft-defender-atp/mssp-support.md)
|
||||||
|
### [Become a Microsoft Defender ATP partner](microsoft-defender-atp/get-started-partner-integration.md)
|
||||||
|
|
||||||
|
|
||||||
|
## [Configure Microsoft threat protection integration]()
|
||||||
|
### [Configure conditional access](microsoft-defender-atp/configure-conditional-access.md)
|
||||||
|
### [Configure Microsoft Cloud App Security integration](microsoft-defender-atp/microsoft-cloud-app-security-config.md)
|
||||||
|
### [Configure information protection in Windows](microsoft-defender-atp/information-protection-in-windows-config.md)
|
||||||
|
|
||||||
|
## [Configure portal settings]()
|
||||||
|
### [Set up preferences](microsoft-defender-atp/preferences-setup.md)
|
||||||
|
### [General]()
|
||||||
|
#### [Update data retention settings](microsoft-defender-atp/data-retention-settings.md)
|
||||||
|
#### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications.md)
|
||||||
|
#### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports.md)
|
||||||
|
#### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score.md)
|
||||||
|
#### [Configure advanced features](microsoft-defender-atp/advanced-features.md)
|
||||||
|
|
||||||
|
### [Permissions]()
|
||||||
|
#### [Use basic permissions to access the portal](microsoft-defender-atp/basic-permissions.md)
|
||||||
|
#### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md)
|
||||||
|
##### [Create and manage roles](microsoft-defender-atp/user-roles.md)
|
||||||
|
##### [Create and manage machine groups](microsoft-defender-atp/machine-groups.md)
|
||||||
|
###### [Create and manage machine tags](microsoft-defender-atp/machine-tags.md)
|
||||||
|
|
||||||
|
### [APIs]()
|
||||||
|
#### [Enable Threat intel (Deprecated)](microsoft-defender-atp/enable-custom-ti.md)
|
||||||
|
#### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
|
||||||
|
|
||||||
|
### [Rules]()
|
||||||
|
#### [Manage suppression rules](microsoft-defender-atp/manage-suppression-rules.md)
|
||||||
|
#### [Manage indicators](microsoft-defender-atp/manage-indicators.md)
|
||||||
|
#### [Manage automation file uploads](microsoft-defender-atp/manage-automation-file-uploads.md)
|
||||||
|
#### [Manage automation folder exclusions](microsoft-defender-atp/manage-automation-folder-exclusions.md)
|
||||||
|
|
||||||
|
### [Machine management]()
|
||||||
|
#### [Onboarding machines](microsoft-defender-atp/onboard-configure.md)
|
||||||
|
#### [Offboarding machines](microsoft-defender-atp/offboard-machines.md)
|
||||||
|
|
||||||
|
### [Configure Microsoft Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md)
|
||||||
|
|
||||||
|
|
||||||
### [Configure Microsoft threat protection integration]()
|
|
||||||
#### [Configure conditional access](microsoft-defender-atp/configure-conditional-access.md)
|
|
||||||
#### [Configure Microsoft Cloud App Security integration](microsoft-defender-atp/microsoft-cloud-app-security-config.md)
|
|
||||||
#### [Configure information protection in Windows](microsoft-defender-atp/information-protection-in-windows-config.md)
|
|
||||||
|
|
||||||
### [Configure portal settings]()
|
|
||||||
#### [Set up preferences](microsoft-defender-atp/preferences-setup.md)
|
|
||||||
#### [General]()
|
|
||||||
##### [Update data retention settings](microsoft-defender-atp/data-retention-settings.md)
|
|
||||||
##### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications.md)
|
|
||||||
##### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports.md)
|
|
||||||
##### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score.md)
|
|
||||||
##### [Configure advanced features](microsoft-defender-atp/advanced-features.md)
|
|
||||||
|
|
||||||
#### [Permissions]()
|
|
||||||
##### [Use basic permissions to access the portal](microsoft-defender-atp/basic-permissions.md)
|
|
||||||
##### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md)
|
|
||||||
###### [Create and manage roles](microsoft-defender-atp/user-roles.md)
|
|
||||||
###### [Create and manage machine groups](microsoft-defender-atp/machine-groups.md)
|
|
||||||
####### [Create and manage machine tags](microsoft-defender-atp/machine-tags.md)
|
|
||||||
|
|
||||||
#### [APIs]()
|
|
||||||
##### [Enable Threat intel (Deprecated)](microsoft-defender-atp/enable-custom-ti.md)
|
|
||||||
##### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
|
|
||||||
|
|
||||||
#### [Rules]()
|
|
||||||
##### [Manage suppression rules](microsoft-defender-atp/manage-suppression-rules.md)
|
|
||||||
##### [Manage indicators](microsoft-defender-atp/manage-indicators.md)
|
|
||||||
##### [Manage automation file uploads](microsoft-defender-atp/manage-automation-file-uploads.md)
|
|
||||||
##### [Manage automation folder exclusions](microsoft-defender-atp/manage-automation-folder-exclusions.md)
|
|
||||||
|
|
||||||
#### [Machine management]()
|
|
||||||
##### [Onboarding machines](microsoft-defender-atp/onboard-configure.md)
|
|
||||||
##### [Offboarding machines](microsoft-defender-atp/offboard-machines.md)
|
|
||||||
|
|
||||||
#### [Configure Microsoft Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md)
|
|
||||||
|
|
||||||
|
|
||||||
## [Troubleshoot Microsoft Defender ATP]()
|
## [Troubleshoot Microsoft Defender ATP]()
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Account Lockout (Windows 10)
|
title: Audit Account Lockout (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Account Lockout, which enables you to audit security events that are generated by a failed attempt to log on to an account that is locked out.
|
description: The policy setting, Audit Account Lockout, enables you to audit security events generated by a failed attempt to log on to an account that is locked out.
|
||||||
ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589
|
ms.assetid: da68624b-a174-482c-9bc5-ddddab38e589
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Application Group Management (Windows 10)
|
title: Audit Application Group Management (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Application Group Management, which determines whether the operating system generates audit events when application group management tasks are performed.
|
description: The policy setting, Audit Application Group Management, determines if audit events are generated when application group management tasks are performed.
|
||||||
ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606
|
ms.assetid: 1bcaa41e-5027-4a86-96b7-f04eaf1c0606
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Authentication Policy Change (Windows 10)
|
title: Audit Authentication Policy Change (Windows 10)
|
||||||
description: This topic for the IT professional describes this Advanced Security Audit policy setting, Audit Authentication Policy Change, which determines whether the operating system generates audit events when changes are made to authentication policy.
|
description: The Advanced Security Audit policy setting, Audit Authentication Policy Change, determines if audit events are generated when authentication policy is changed.
|
||||||
ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be
|
ms.assetid: aa9cea7a-aadf-47b7-b704-ac253b8e79be
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Authorization Policy Change (Windows 10)
|
title: Audit Authorization Policy Change (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Authorization Policy Change, which determines whether the operating system generates audit events when specific changes are made to the authorization policy.
|
description: The policy setting, Audit Authorization Policy Change, determines if audit events are generated when specific changes are made to the authorization policy.
|
||||||
ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36
|
ms.assetid: ca0587a2-a2b3-4300-aa5d-48b4553c3b36
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Certification Services (Windows 10)
|
title: Audit Certification Services (Windows 10)
|
||||||
description: This topic for the IT professional describes the Advanced Security Audit policy setting, Audit Certification Services, which determines whether the operating system generates events when Active Directory Certificate Services (ADÂ CS) operations are performed.
|
description: The policy setting, Audit Certification Services, decides if events are generated when Active Directory Certificate Services (ADA CS) operations are performed.
|
||||||
ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03
|
ms.assetid: cdefc34e-fb1f-4eff-b766-17713c5a1b03
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Audit Computer Account Management (Windows 10)
|
title: Audit Computer Account Management (Windows 10)
|
||||||
description: This topic for the IT professional describes the advanced security audit policy setting, Audit Computer Account Management, which determines whether the operating system generates audit events when a computer account is created, changed, or deleted.
|
description: The policy setting, Audit Computer Account Management, determines if audit events are generated when a computer account is created, changed, or deleted.
|
||||||
ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991
|
ms.assetid: 6c406693-57bf-4411-bb6c-ff83ce548991
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user