mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 18:33:43 +00:00
Merge branch 'sheshachary-5859198-4' of https://github.com/MicrosoftDocs/windows-docs-pr into sheshachary-5859198-4
This commit is contained in:
@ -51,6 +51,8 @@ DMClient
|
|||||||
------------Unenroll
|
------------Unenroll
|
||||||
------------AADResourceID
|
------------AADResourceID
|
||||||
------------AADDeviceID
|
------------AADDeviceID
|
||||||
|
------------AADSendDeviceToken
|
||||||
|
------------ForceAadToken
|
||||||
------------EnrollmentType
|
------------EnrollmentType
|
||||||
------------EnableOmaDmKeepAliveMessage
|
------------EnableOmaDmKeepAliveMessage
|
||||||
------------HWDevID
|
------------HWDevID
|
||||||
@ -73,6 +75,21 @@ DMClient
|
|||||||
----------------NumberOfRemainingScheduledRetries
|
----------------NumberOfRemainingScheduledRetries
|
||||||
----------------PollOnLogin
|
----------------PollOnLogin
|
||||||
----------------AllUsersPollOnFirstLogin
|
----------------AllUsersPollOnFirstLogin
|
||||||
|
------------LinkedEnrollment
|
||||||
|
----------------Priority
|
||||||
|
----------------Enroll
|
||||||
|
----------------Unenroll
|
||||||
|
----------------EnrollStatus
|
||||||
|
----------------LastError
|
||||||
|
------------Recovery
|
||||||
|
----------------AllowRecovery
|
||||||
|
----------------RecoveryStatus
|
||||||
|
----------------InitiateRecovery
|
||||||
|
------------MultipleSession
|
||||||
|
----------------NumAllowedConcurrentUserSessionForBackgroundSync
|
||||||
|
----------------NumAllowedConcurrentUserSessionAtUserLogonSync
|
||||||
|
----------------IntervalForScheduledRetriesForUserSession
|
||||||
|
----------------NumberOfScheduledRetriesForUserSession
|
||||||
----Unenroll
|
----Unenroll
|
||||||
----UpdateManagementServiceAddress
|
----UpdateManagementServiceAddress
|
||||||
```
|
```
|
||||||
@ -326,6 +343,11 @@ Supported operations are Add, Delete, Get, and Replace.
|
|||||||
|
|
||||||
Value type is bool.
|
Value type is bool.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-forceaadtoken"></a>**Provider/*ProviderID*/ForceAadToken**
|
||||||
|
The value type is integer/enum.
|
||||||
|
|
||||||
|
The value is "1" and it means client should always send AAD device token during check-in/sync.
|
||||||
|
|
||||||
<a href="" id="provider-providerid-poll"></a>**Provider/*ProviderID*/Poll**
|
<a href="" id="provider-providerid-poll"></a>**Provider/*ProviderID*/Poll**
|
||||||
Optional. Polling schedules must use the DMClient CSP. The Registry paths previously associated with polling using the Registry CSP are now deprecated.
|
Optional. Polling schedules must use the DMClient CSP. The Registry paths previously associated with polling using the Registry CSP are now deprecated.
|
||||||
|
|
||||||
@ -444,6 +466,113 @@ Optional. Boolean value that allows the IT admin to require the device to start
|
|||||||
|
|
||||||
Supported operations are Add, Get, and Replace.
|
Supported operations are Add, Get, and Replace.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-linkedenrollment-priority"></a>**Provider/*ProviderID*/LinkedEnrollment/Priority**
|
||||||
|
This node is an integer, value is "0" or "1".
|
||||||
|
|
||||||
|
Default is 1, meaning the MDM enrollment is the “winning” authority for conflicting policies/resources. Value 1 means MMP-C enrollment is the “winning” one.
|
||||||
|
Support operations are Get and Set.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-linkedenrollment-enroll"></a>**Provider/*ProviderID*/LinkedEnrollment/Enroll**
|
||||||
|
This is an execution node and will trigger a silent MMP-C enrollment, using the AAD device token pulled from the AADJ’ed device. There is no user interaction needed.
|
||||||
|
|
||||||
|
Support operation is Exec.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-linkedenrollment-unenroll"></a>**Provider/*ProviderID*/LinkedEnrollment/Unenroll**
|
||||||
|
This is an execution node and will trigger a silent MMP-C unenroll, there is no user interaction needed. On un-enrollment, all the settings/resources set by MMPC will be rolled back(rollback details will be covered later).
|
||||||
|
|
||||||
|
Support operation is Exec.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-linkedenrollment-enrollstatus"></a>**Provider/*ProviderID*/LinkedEnrollment/EnrollStatus**
|
||||||
|
|
||||||
|
This node can be used to check both enroll and unenroll statuses.
|
||||||
|
This will return the enroll action status and is defined as a enum class LinkedEnrollmentStatus. The values are aas follows:
|
||||||
|
|
||||||
|
- Undefined = 0
|
||||||
|
- EnrollmentNotStarted = 1
|
||||||
|
- InProgress = 2
|
||||||
|
- Failed = 3
|
||||||
|
- Succeeded = 4
|
||||||
|
- UnEnrollmentQueued = 5
|
||||||
|
- UnEnrollmentSucceeded = 8
|
||||||
|
|
||||||
|
Support operation is Get only.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-linkedenrollment-lasterror"></a>**Provider/*ProviderID*/LinkedEnrollment/LastError**
|
||||||
|
|
||||||
|
This specifies the Hresult to report the enrollment/unenroll results.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-recovery-allowrecovery"></a>**Provider/*ProviderID*/Recovery/AllowRecovery**
|
||||||
|
|
||||||
|
This node determines whether or not the client will automatically initiate a MDM Recovery operation when it detects issues with the MDM certificate.
|
||||||
|
|
||||||
|
Supported operations are Get, Add, Replace and Delete.
|
||||||
|
|
||||||
|
The supported values for this node are 1-true (allow) and 0-false(not allow). Default value is 0.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-recovery-recoverystatus"></a>**Provider/*ProviderID*/Recovery/RecoveryStatus**
|
||||||
|
|
||||||
|
This node tracks the status of a Recovery request from the InitiateRecovery node. The values are as follows:
|
||||||
|
|
||||||
|
0 - No Recovery request has been processed.
|
||||||
|
1 - Recovery is in Process.
|
||||||
|
2 - Recovery has finished successfully.
|
||||||
|
3 - Recovery has failed to start because TPM is not available.
|
||||||
|
4 - Recovery has failed to start because AAD keys are not protected by the TPM.
|
||||||
|
5 - Recovery has failed to start because the MDM keys are already protected by the TPM.
|
||||||
|
6 - Recovery has failed to start because the TPM is not ready for attestation.
|
||||||
|
7 - Recovery has failed because the client cannot authenticate to the server.
|
||||||
|
8 - Recovery has failed because the server has rejected the client's request.
|
||||||
|
|
||||||
|
Supported operation is Get only.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-recovery-initiaterecovery"></a>**Provider/*ProviderID*/Recovery/InitiateRecovery**
|
||||||
|
|
||||||
|
This node initiates an MDM Recovery operation on the client.
|
||||||
|
|
||||||
|
If initiated with argument 0, it triggers MDM Recovery, no matter the state of the device.
|
||||||
|
|
||||||
|
If initiated with argument 1, it triggers only if the MDM certificate’s private key isn’t already protected by the TPM, if there is a TPM to put the private key into, and if the TPM is ready for attestation.
|
||||||
|
|
||||||
|
Supported operation is Exec only.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-multiplesession-numallowedconcurrentusersessionforbackgroundsync"></a>**Provider/*ProviderID*/MultipleSession/NumAllowedConcurrentUserSessionForBackgroundSync**
|
||||||
|
|
||||||
|
Optional. This node specifies maximum number of concurrent user sync sessions in background. Default value is 25.
|
||||||
|
|
||||||
|
The values are : 0= none, 1= sequential, anything else= parallel.
|
||||||
|
|
||||||
|
Supported operations are Get, Add, Replace and Delete.
|
||||||
|
|
||||||
|
Value type is integer. Only applicable for Windows 10 multi-session.
|
||||||
|
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-multiplesession-numallowedconcurrentusersessionatuserlogonsync"></a>**Provider/*ProviderID*/MultipleSession/NumAllowedConcurrentUserSessionAtUserLogonSync**
|
||||||
|
Optional. This node specifies maximum number of concurrent user sync sessions at User Login. Default value is 25.
|
||||||
|
|
||||||
|
The values are : 0= none, 1= sequential, anything else= parallel.
|
||||||
|
|
||||||
|
Supported operations are Get, Add, Replace and Delete.
|
||||||
|
|
||||||
|
Value type is integer. Only applicable for Windows 10 multi-session.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-multiplesession-intervalforscheduledretriesforusersession"></a>**Provider/*ProviderID*/MultipleSession/IntervalForScheduledRetriesForUserSession**
|
||||||
|
Optional. This node specifies the waiting time (in minutes) for the initial set of retries as specified by the number of retries in `/<ProviderID>/Poll/NumberOfScheduledRetriesForUserSession`.
|
||||||
|
|
||||||
|
If IntervalForScheduledRetriesForUserSession is not set, then the default value is used. The default value is 1440. If the value is set to 0, this schedule is disabled.
|
||||||
|
|
||||||
|
This configuration is only applicable for Windows Multi-session Editions.
|
||||||
|
|
||||||
|
Supported operations are Get and Replace.
|
||||||
|
|
||||||
|
<a href="" id="provider-providerid-multiplesession-numberofscheduledretriesforusersession"></a>**Provider/*ProviderID*/MultipleSession/NumberOfScheduledRetriesForUserSession**
|
||||||
|
Optional. This node specifies the number of times the DM client should retry to connect to the server when the client is initially configured or enrolled to communicate with the server.
|
||||||
|
|
||||||
|
If the value is set to 0 and the IntervalForScheduledRetriesForUserSession value is not 0, then the schedule will be set to repeat an infinite number of times.
|
||||||
|
|
||||||
|
The default value is 0. This configuration is only applicable for Windows Multi-session Editions.
|
||||||
|
|
||||||
|
Supported operations are Get and Replace.
|
||||||
|
|
||||||
<a href="" id="provider-providerid-configlock"></a>**Provider/*ProviderID*/ConfigLock**
|
<a href="" id="provider-providerid-configlock"></a>**Provider/*ProviderID*/ConfigLock**
|
||||||
|
|
||||||
Optional. This node enables [Config Lock](config-lock.md) feature. If enabled, policies defined in the Config Lock document will be monitored and quickly remediated when a configuration drift is detected.
|
Optional. This node enables [Config Lock](config-lock.md) feature. If enabled, policies defined in the Config Lock document will be monitored and quickly remediated when a configuration drift is detected.
|
||||||
|
@ -19,7 +19,7 @@ msreviewer: hathind
|
|||||||
| Question | Answer |
|
| Question | Answer |
|
||||||
| ----- | ----- |
|
| ----- | ----- |
|
||||||
| What Windows versions are supported? | Windows Autopatch works with all [supported versions of Windows 10 and Windows 11 Enterprise edition](/windows/release-health/supported-versions-windows-client). |
|
| What Windows versions are supported? | Windows Autopatch works with all [supported versions of Windows 10 and Windows 11 Enterprise edition](/windows/release-health/supported-versions-windows-client). |
|
||||||
| What is the difference between Windows Updates for Business and Windows Autopatch? | Windows Autopatch is a service that removes the need for organizations to plan and operate the update process.<p> Windows Autopatch moves the burden from your IT to Microsoft. Windows Autopatch uses [Windows Update for Business](/windows/deployment/update/deployment-service-overview) and other service components to update devices. Both are part of Windows Enterprise E3. |
|
| What is the difference between Windows Update for Business and Windows Autopatch? | Windows Autopatch is a service that removes the need for organizations to plan and operate the update process.<p> Windows Autopatch moves the burden from your IT to Microsoft. Windows Autopatch uses [Windows Update for Business](/windows/deployment/update/deployment-service-overview) and other service components to update devices. Both are part of Windows Enterprise E3. |
|
||||||
| Is Windows 365 for Enterprise supported with Windows Autopatch? | Windows Autopatch supports Windows 365 for Enterprise. Windows 365 for Business isn't supported.|
|
| Is Windows 365 for Enterprise supported with Windows Autopatch? | Windows Autopatch supports Windows 365 for Enterprise. Windows 365 for Business isn't supported.|
|
||||||
| Does Windows Autopatch support Windows Education (A3) or Windows Front Line Worker (F3) licensing? | Autopatch isn't available for 'A' or 'F' series licensing. |
|
| Does Windows Autopatch support Windows Education (A3) or Windows Front Line Worker (F3) licensing? | Autopatch isn't available for 'A' or 'F' series licensing. |
|
||||||
| Will Windows Autopatch support local domain join Windows 10? | Windows Autopatch doesn't support local (on-premise) domain join. Windows Autopatch supports [Hybrid AD join](/azure/active-directory/devices/concept-azure-ad-join-hybrid) or pure [Azure AD join](/azure/active-directory/devices/concept-azure-ad-join-hybrid). |
|
| Will Windows Autopatch support local domain join Windows 10? | Windows Autopatch doesn't support local (on-premise) domain join. Windows Autopatch supports [Hybrid AD join](/azure/active-directory/devices/concept-azure-ad-join-hybrid) or pure [Azure AD join](/azure/active-directory/devices/concept-azure-ad-join-hybrid). |
|
||||||
@ -30,7 +30,7 @@ msreviewer: hathind
|
|||||||
| Question | Answer |
|
| Question | Answer |
|
||||||
| ----- | ----- |
|
| ----- | ----- |
|
||||||
| What are the prerequisites for Windows Autopatch? | <ul><li>[Supported Windows 10/11 Enterprise edition versions](/windows/release-health/supported-versions-windows-client)</li><li>[Azure Active Directory (Azure AD) Premium](/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses)</li><li>[Hybrid Azure AD-Joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid) or [Azure AD-joined only](/azure/active-directory/devices/concept-azure-ad-join-hybrid)</li><li>[Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune)</li><li>[Co-management](/prepare/windows-autopatch-prerequisites.md#co-management-requirements)</li><li>[Configuration Manager version 2010 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2010)</li><li>[Switch workloads for device configuration, Windows Update and Microsoft 365 Apps from Configuration Manager to Intune](/mem/configmgr/comanage/how-to-switch-workloads) (minimum Pilot Intune)</li></ul> |
|
| What are the prerequisites for Windows Autopatch? | <ul><li>[Supported Windows 10/11 Enterprise edition versions](/windows/release-health/supported-versions-windows-client)</li><li>[Azure Active Directory (Azure AD) Premium](/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses)</li><li>[Hybrid Azure AD-Joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid) or [Azure AD-joined only](/azure/active-directory/devices/concept-azure-ad-join-hybrid)</li><li>[Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune)</li><li>[Co-management](/prepare/windows-autopatch-prerequisites.md#co-management-requirements)</li><li>[Configuration Manager version 2010 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2010)</li><li>[Switch workloads for device configuration, Windows Update and Microsoft 365 Apps from Configuration Manager to Intune](/mem/configmgr/comanage/how-to-switch-workloads) (minimum Pilot Intune)</li></ul> |
|
||||||
| What are the licensing requirements for Windows Autopatch? |<ul><li>Windows Autopatch is included with Window 10/11 Enterprise E3 or higher. For more information, see More about licenses.</li><li>[Azure AD Premium](/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses) (for Co-management)</li><li>[Microsoft Intune](/mem/intune/fundamentals/licenses) (includes Configuration Manager 2010 or greater via co-management)</li></ul> |
|
| What are the licensing requirements for Windows Autopatch? |<ul><li>Windows Autopatch is included with Window 10/11 Enterprise E3 or higher. For more information, see [More about licenses](../prepare/windows-autopatch-prerequisites.md#more-about-licenses).</li><li>[Azure AD Premium](/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses) (for Co-management)</li><li>[Microsoft Intune](/mem/intune/fundamentals/licenses) (includes Configuration Manager 2010 or greater via co-management)</li></ul> |
|
||||||
| Are there hardware requirements for Windows Autopatch? | No, Windows Autopatch doesn't require any specific hardware. However, general hardware requirements for updates are still applicable. For example, to deliver Windows 11 to your Autopatch devices they must meet [specific hardware requirements](/windows/windows-11-specifications?r=1). Windows devices must be supported by your hardware OEM. |
|
| Are there hardware requirements for Windows Autopatch? | No, Windows Autopatch doesn't require any specific hardware. However, general hardware requirements for updates are still applicable. For example, to deliver Windows 11 to your Autopatch devices they must meet [specific hardware requirements](/windows/windows-11-specifications?r=1). Windows devices must be supported by your hardware OEM. |
|
||||||
|
|
||||||
## Device registration
|
## Device registration
|
||||||
|
@ -66,7 +66,7 @@ Windows Autopatch requires the following licenses:
|
|||||||
|
|
||||||
| Result | Meaning |
|
| Result | Meaning |
|
||||||
| ----- | ----- |
|
| ----- | ----- |
|
||||||
| Not ready | Windows Autopatch requires Windows 10/11 Enterprise E3 (or higher) to be assigned to your users. Additionally, Azure Active Directory Premium, Microsoft Intune and Windows 10/11 Enterprise are required. For more information, see [more about licenses](../prepare/windows-autopatch-prerequisites.md#more-about-licenses). |
|
| Not ready | Windows Autopatch requires Windows 10/11 Enterprise E3 (or higher) to be assigned to your users. Additionally, Azure Active Directory Premium, and Microsoft Intune are required. For more information, see [more about licenses](../prepare/windows-autopatch-prerequisites.md#more-about-licenses). |
|
||||||
|
|
||||||
### Windows Autopatch service accounts
|
### Windows Autopatch service accounts
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user