Merge pull request #7649 from MicrosoftDocs/main

publish main to live 10:30 Monday (late)
This commit is contained in:
Jeff Borsecnik 2022-12-12 11:41:17 -08:00 committed by GitHub
commit 57dd59fe7b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
46 changed files with 126 additions and 32 deletions

View File

@ -4,7 +4,7 @@ description: Learn more about the CloudDesktop Area in Policy CSP
author: vinaypamnani-msft
manager: aaroncz
ms.author: vinpa
ms.date: 11/22/2022
ms.date: 12/09/2022
ms.localizationpriority: medium
ms.prod: windows-client
ms.technology: itpro-manage
@ -36,7 +36,13 @@ ms.topic: reference
<!-- BootToCloudMode-OmaUri-End -->
<!-- BootToCloudMode-Description-Begin -->
This policy is used by IT admin to set the configuration mode of cloud PC.
<!-- Description-Source-DDF -->
This policy allows the user to configure the boot to cloud mode. Boot to Cloud mode enables users to seamlessly sign-in to a Cloud PC that is provisioned for them by an IT Admin. For using boot to cloud mode, users need to install and configure a Cloud Provider application (eg: Win365) on their PC and need to have a Cloud PC provisioned to them. For successful use of this policy, OverrideShellProgram policy needs to be configured as well.
This policy supports the below options:
1. Not Configured: Machine will not trigger the Cloud PC connection automatically.
2. Enable Boot to Cloud Desktop: The user will see that configured Cloud PC Provider application launches automatically. Once the sign-in operation finishes, the user is seamlessly connected to a provisioned Cloud PC.
<!-- BootToCloudMode-Description-End -->
<!-- BootToCloudMode-Editable-Begin -->
@ -51,7 +57,6 @@ This policy is used by IT admin to set the configuration mode of cloud PC.
| Format | int |
| Access Type | Add, Delete, Get, Replace |
| Default Value | 0 |
| Dependency [OverrideShellProgramDependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/WindowsLogon/OverrideShellProgram` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
<!-- BootToCloudMode-DFProperties-End -->
<!-- BootToCloudMode-AllowedValues-Begin -->

View File

@ -4,7 +4,7 @@ description: Learn more about the WindowsLogon Area in Policy CSP
author: vinaypamnani-msft
manager: aaroncz
ms.author: vinpa
ms.date: 11/29/2022
ms.date: 12/09/2022
ms.localizationpriority: medium
ms.prod: windows-client
ms.technology: itpro-manage
@ -43,6 +43,7 @@ ms.topic: reference
<!-- AllowAutomaticRestartSignOn-OmaUri-End -->
<!-- AllowAutomaticRestartSignOn-Description-Begin -->
<!-- Description-Source-ADMX -->
This policy setting controls whether a device will automatically sign in and lock the last interactive user after the system restarts or after a shutdown and cold boot.
This only occurs if the last interactive user didnt sign out before the restart or shutdown.
@ -70,6 +71,9 @@ If you disable this policy setting, the device does not configure automatic sign
<!-- AllowAutomaticRestartSignOn-DFProperties-End -->
<!-- AllowAutomaticRestartSignOn-AdmxBacked-Begin -->
> [!TIP]
> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
**ADMX mapping**:
| Name | Value |
@ -105,6 +109,7 @@ If you disable this policy setting, the device does not configure automatic sign
<!-- ConfigAutomaticRestartSignOn-OmaUri-End -->
<!-- ConfigAutomaticRestartSignOn-Description-Begin -->
<!-- Description-Source-ADMX -->
This policy setting controls the configuration under which an automatic restart and sign on and lock occurs after a restart or cold boot. If you chose “Disabled” in the “Sign-in and lock last interactive user automatically after a restart” policy, then automatic sign on will not occur and this policy does not need to be configured.
If you enable this policy setting, you can choose one of the following two options:
@ -132,6 +137,9 @@ If you disable or dont configure this setting, automatic sign on will default
<!-- ConfigAutomaticRestartSignOn-DFProperties-End -->
<!-- ConfigAutomaticRestartSignOn-AdmxBacked-Begin -->
> [!TIP]
> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
**ADMX mapping**:
| Name | Value |
@ -166,6 +174,7 @@ If you disable or dont configure this setting, automatic sign on will default
<!-- DisableLockScreenAppNotifications-OmaUri-End -->
<!-- DisableLockScreenAppNotifications-Description-Begin -->
<!-- Description-Source-ADMX -->
This policy setting allows you to prevent app notifications from appearing on the lock screen.
If you enable this policy setting, no app notifications are displayed on the lock screen.
@ -187,6 +196,9 @@ If you disable or do not configure this policy setting, users can choose which a
<!-- DisableLockScreenAppNotifications-DFProperties-End -->
<!-- DisableLockScreenAppNotifications-AdmxBacked-Begin -->
> [!TIP]
> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
**ADMX mapping**:
| Name | Value |
@ -222,6 +234,7 @@ If you disable or do not configure this policy setting, users can choose which a
<!-- DontDisplayNetworkSelectionUI-OmaUri-End -->
<!-- DontDisplayNetworkSelectionUI-Description-Begin -->
<!-- Description-Source-ADMX -->
This policy setting allows you to control whether anyone can interact with available networks UI on the logon screen.
If you enable this policy setting, the PC's network connectivity state cannot be changed without signing into Windows.
@ -243,6 +256,9 @@ If you disable or don't configure this policy setting, any user can disconnect t
<!-- DontDisplayNetworkSelectionUI-DFProperties-End -->
<!-- DontDisplayNetworkSelectionUI-AdmxBacked-Begin -->
> [!TIP]
> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
**ADMX mapping**:
| Name | Value |
@ -304,7 +320,8 @@ Here's an example to enable this policy:
<!-- EnableFirstLogonAnimation-OmaUri-End -->
<!-- EnableFirstLogonAnimation-Description-Begin -->
This policy setting allows you to control whether users see the first sign-in animation when signing in to the computer for the first time. This applies to both the first user of the computer who completes the initial setup and users who are added to the computer later. It also controls if Microsoft account users will be offered the opt-in prompt for services during their first sign-in.
<!-- Description-Source-ADMX -->
This policy setting allows you to control whether users see the first sign-in animation when signing in to the computer for the first time. This applies to both the first user of the computer who completes the initial setup and users who are added to the computer later. It also controls if Microsoft account users will be offered the opt-in prompt for services during their first sign-in.
If you enable this policy setting, Microsoft account users will see the opt-in prompt for services, and users with other accounts will see the sign-in animation.
@ -374,6 +391,7 @@ Note: The first sign-in animation will not be shown on Server, so this policy wi
<!-- EnableMPRNotifications-OmaUri-End -->
<!-- EnableMPRNotifications-Description-Begin -->
<!-- Description-Source-ADMX -->
This policy controls the configuration under which winlogon sends MPR notifications in the system.
If you enable this setting or do not configure it, winlogon sends MPR notifications if a credential manager is configured.
@ -395,6 +413,9 @@ If you disable this setting, winlogon does not send MPR notifications.
<!-- EnableMPRNotifications-DFProperties-End -->
<!-- EnableMPRNotifications-AdmxBacked-Begin -->
> [!TIP]
> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
**ADMX mapping**:
| Name | Value |
@ -430,6 +451,7 @@ If you disable this setting, winlogon does not send MPR notifications.
<!-- EnumerateLocalUsersOnDomainJoinedComputers-OmaUri-End -->
<!-- EnumerateLocalUsersOnDomainJoinedComputers-Description-Begin -->
<!-- Description-Source-ADMX -->
This policy setting allows local users to be enumerated on domain-joined computers.
If you enable this policy setting, Logon UI will enumerate all local users on domain-joined computers.
@ -451,6 +473,9 @@ If you disable or do not configure this policy setting, the Logon UI will not en
<!-- EnumerateLocalUsersOnDomainJoinedComputers-DFProperties-End -->
<!-- EnumerateLocalUsersOnDomainJoinedComputers-AdmxBacked-Begin -->
> [!TIP]
> This is an ADMX-backed policy and requires SyncML format for configuration. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
**ADMX mapping**:
| Name | Value |
@ -486,6 +511,7 @@ If you disable or do not configure this policy setting, the Logon UI will not en
<!-- HideFastUserSwitching-OmaUri-End -->
<!-- HideFastUserSwitching-Description-Begin -->
<!-- Description-Source-ADMX -->
This policy setting allows you to hide the Switch User interface in the Logon UI, the Start menu and the Task Manager.
If you enable this policy setting, the Switch User interface is hidden from the user who is attempting to log on or is logged on to the computer that has this policy applied.
@ -554,7 +580,15 @@ If you disable or do not configure this policy setting, the Switch User interfac
<!-- OverrideShellProgram-OmaUri-End -->
<!-- OverrideShellProgram-Description-Begin -->
This policy is used by IT admin to override the registry based shell program.
<!-- Description-Source-DDF -->
OverrideShellProgram policy allows IT admin to configure the shell program for Windows OS on a device. This policy has the highest precedence over other ways of configuring the shell program.
The policy currently supports below options:
1. Not Configured: Default shell will be launched.
2. Apply Lightweight Shell: Lightweight shell does not have a user interface and helps the device to achieve better performance as the shell consumes limited resources over default shell. Lightweight shell contains a limited set of features which could be consumed by applications. This configuration can be useful if the device needs to have a continuous running user interface application which would consume features offered by Lightweight shell.
If you disable or do not configure this policy setting, then the default shell will be launched.
<!-- OverrideShellProgram-Description-End -->
<!-- OverrideShellProgram-Editable-Begin -->
@ -569,6 +603,7 @@ This policy is used by IT admin to override the registry based shell program.
| Format | int |
| Access Type | Add, Delete, Get, Replace |
| Default Value | 0 |
| Dependency [BootToCloudModeDependencyGroup] | Dependency Type: `DependsOn` <br> Dependency URI: `Device/Vendor/MSFT/Policy/Config/CloudDesktop/BootToCloudMode` <br> Dependency Allowed Value: `[1]` <br> Dependency Allowed Value Type: `Range` <br> |
<!-- OverrideShellProgram-DFProperties-End -->
<!-- OverrideShellProgram-AllowedValues-Begin -->

View File

@ -2,6 +2,7 @@
title: Activate by Proxy an Active Directory Forest (Windows 10)
description: Learn how to use the Volume Activation Management Tool (VAMT) Active Directory-Based Activation (ADBA) function to activate by proxy an Active Directory (AD) forest.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Activate an Active Directory Forest Online (Windows 10)
description: Use the Volume Activation Management Tool (VAMT) Active Directory-Based Activation (ADBA) function to activate an Active Directory (AD) forest online.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -1,6 +1,8 @@
---
title: Activate using Active Directory-based activation
description: Learn how active directory-based activation is implemented as a role service that relies on AD DS to store activation objects.
ms.reviewer:
- nganguly
manager: aaroncz
author: frankroj
ms.author: frankroj
@ -14,7 +16,7 @@ ms.collection: highpri
# Activate using Active Directory-based activation
*Applies to:*
**Applies to:**
- Windows
- Windows Server

View File

@ -1,8 +1,10 @@
---
title: Activate using Key Management Service (Windows 10)
description: Learn how to use Key Management Service (KMS) to activate Windows.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
description: How to activate using Key Management Service in Windows 10.
ms.prod: windows-client
author: frankroj
ms.localizationpriority: medium
@ -14,7 +16,7 @@ ms.technology: itpro-fundamentals
# Activate using Key Management Service
*Applies to:*
**Applies to:**
- Windows 10
- Windows 8.1

View File

@ -2,6 +2,7 @@
title: Activate clients running Windows 10 (Windows 10)
description: After you have configured Key Management Service (KMS) or Active Directory-based activation on your network, activating a client running Windows 10 is easy.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client
@ -14,7 +15,7 @@ ms.technology: itpro-fundamentals
# Activate clients running Windows 10
*Applies to:*
**Applies to:**
- Windows 10
- Windows 8.1

View File

@ -2,6 +2,7 @@
title: Active Directory-Based Activation Overview (Windows 10)
description: Enable your enterprise to activate its computers through a connection to their domain using Active Directory-Based Activation (ADBA).
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Add and Manage Products (Windows 10)
description: Add client computers into the Volume Activation Management Tool (VAMT). After you add the computers, you can manage the products that are installed on your network.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Add and Remove Computers (Windows 10)
description: The Discover products function on the Volume Activation Management Tool (VAMT) allows you to search the Active Directory domain or a general LDAP query.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Add and Remove a Product Key (Windows 10)
description: Add a product key to the Volume Activation Management Tool (VAMT) database. Also, learn how to remove the key from the database.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Appendix Information sent to Microsoft during activation (Windows 10)
description: Learn about the information sent to Microsoft during activation.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
author: frankroj
@ -14,7 +15,7 @@ ms.topic: article
# Appendix: Information sent to Microsoft during activation
*Applies to:*
**Applies to:**
- Windows 10
- Windows 8.1

View File

@ -2,6 +2,7 @@
title: Configure Client Computers (Windows 10)
description: Learn how to configure client computers to enable the Volume Activation Management Tool (VAMT) to function correctly.
ms.reviewer:
- nganguly
manager: aaroncz
author: frankroj
ms.author: frankroj

View File

@ -2,6 +2,7 @@
title: Import and export VAMT data
description: Learn how to use the VAMT to import product-activation data from a file into SQL Server.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Install and Configure VAMT (Windows 10)
description: Learn how to install and configure the Volume Activation Management Tool (VAMT), and learn where to find information about the process.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Install a KMS Client Key (Windows 10)
description: Learn to use the Volume Activation Management Tool (VAMT) to install Generic Volume License Key (GVLK), or KMS client, product keys.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Install a Product Key (Windows 10)
description: Learn to use the Volume Activation Management Tool (VAMT) to install retail, Multiple Activation Key (MAK), and KMS Host key (CSVLK).
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -1,6 +1,8 @@
---
title: Install VAMT (Windows 10)
description: Learn how to install Volume Activation Management Tool (VAMT) as part of the Windows Assessment and Deployment Kit (ADK) for Windows 10.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Introduction to VAMT (Windows 10)
description: VAMT enables administrators to automate and centrally manage the Windows, Microsoft Office, and select other Microsoft products volume and retail activation process.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Perform KMS Activation (Windows 10)
description: The Volume Activation Management Tool (VAMT) can be used to perform volume activation using the Key Management Service (KMS).
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Perform Local Reactivation (Windows 10)
description: An initially activated a computer using scenarios like MAK, retail, or CSLVK (KMS host), can be reactivated with Volume Activation Management Tool (VAMT).
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Manage Activations (Windows 10)
description: Learn how to manage activations and how to activate a client computer by using various activation methods.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Manage Product Keys (Windows 10)
description: In this article, learn how to add and remove a product key from the Volume Activation Management Tool (VAMT).
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Manage VAMT Data (Windows 10)
description: Learn how to save, import, export, and merge a Computer Information List (CILX) file using the Volume Activation Management Tool (VAMT).
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -1,6 +1,7 @@
---
title: Monitor activation (Windows 10)
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
description: Understand the most common methods to monitor the success of the activation process for a computer running Windows.
@ -14,7 +15,7 @@ ms.date: 11/07/2022
# Monitor activation
*Applies to:*
**Applies to:**
- Windows 10
- Windows 8.1

View File

@ -2,6 +2,7 @@
title: Perform Online Activation (Windows 10)
description: Learn how to use the Volume Activation Management Tool (VAMT) to enable client products to be activated online.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Plan for volume activation (Windows 10)
description: Product activation is the process of validating software with the manufacturer after it has been installed on a specific computer.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client
@ -14,7 +15,7 @@ ms.date: 11/07/2022
# Plan for volume activation
*Applies to:*
**Applies to:**
- Windows 10
- Windows 8.1

View File

@ -2,6 +2,7 @@
title: Perform Proxy Activation (Windows 10)
description: Perform proxy activation by using the Volume Activation Management Tool (VAMT) to activate client computers that don't have Internet access.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Remove Products (Windows 10)
description: Learn how you must delete products from the product list view so you can remove products from the Volume Activation Management Tool (VAMT).
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Scenario 3 KMS Client Activation (Windows 10)
description: Learn how to use the Volume Activation Management Tool (VAMT) to activate Key Management Service (KMS) client keys or Generic Volume License Keys (GVLKs).
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Scenario 1 Online Activation (Windows 10)
description: Achieve network access by deploying the Volume Activation Management Tool (VAMT) in a Core Network environment.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Scenario 2 Proxy Activation (Windows 10)
description: Use the Volume Activation Management Tool (VAMT) to activate products that are installed on workgroup computers in an isolated lab environment.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Update Product Status (Windows 10)
description: Learn how to use the Update license status function to add the products that are installed on the computers.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Use the Volume Activation Management Tool (Windows 10)
description: The Volume Activation Management Tool (VAMT) provides several useful features, including the ability to track and monitor several types of product keys.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client
@ -14,7 +15,7 @@ ms.technology: itpro-fundamentals
# Use the Volume Activation Management Tool
*Applies to:*
**Applies to:**
- Windows 10
- Windows 8.1

View File

@ -2,6 +2,7 @@
title: Use VAMT in Windows PowerShell (Windows 10)
description: Learn how to use Volume Activation Management Tool (VAMT) PowerShell cmdlets to perform the same functions as the Vamt.exe command-line tool.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: VAMT known issues (Windows 10)
description: Find out the current known issues with the Volume Activation Management Tool (VAMT), versions 3.0. and 3.1.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: VAMT Requirements (Windows 10)
description: In this article, learn about the product key and system requierements for Volume Activation Management Tool (VAMT).
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: VAMT Step-by-Step Scenarios (Windows 10)
description: Learn step-by-step instructions on implementing the Volume Activation Management Tool (VAMT) in typical environments.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -1,6 +1,8 @@
---
title: VAMT technical reference
description: The Volume Activation Management Tool (VAMT) enables network administrators to automate and centrally manage volume activation and retail activation.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client

View File

@ -2,6 +2,7 @@
title: Volume Activation for Windows 10
description: Learn how to use volume activation to deploy & activate Windows 10. Includes details for orgs that have used volume activation for earlier versions of Windows.
ms.reviewer:
- nganguly
manager: aaroncz
ms.author: frankroj
ms.prod: windows-client
@ -14,7 +15,7 @@ ms.technology: itpro-fundamentals
# Volume Activation for Windows 10
*Applies to:*
**Applies to:**
- Windows 10
- Windows 8.1

View File

@ -98,9 +98,9 @@ Within each 24-hour reporting period, devices that are ineligible are updated wi
| Low Connectivity | Devices must have a steady internet connection, and access to [Windows update endpoints](../prepare/windows-autopatch-configure-network.md). |
| Out of Disk Space | Devices must have more than one GB (GigaBytes) of free storage space. |
| Not Deployed | Windows Autopatch doesn't update devices that haven't yet been deployed. |
| Not On Supported on Windows Edition | Devices must be on a Windows edition supported by Windows Autopatch. For more information, see[prerequisites](../prepare/windows-autopatch-prerequisites.md). |
| Not On Supported Windows Edition | Devices must be on a Windows edition supported by Windows Autopatch. For more information, see[prerequisites](../prepare/windows-autopatch-prerequisites.md). |
| Not On Supported Windows Build | Devices must be on a Windows build supported by Windows Autopatch. For more information, see[prerequisites](../prepare/windows-autopatch-prerequisites.md). |
| Intune Sync Older Than 5 Days | Devices must have checked with Intune within the last five days. |
| Intune Sync Older Than 5 Days | Devices must have checked in with Intune within the last five days. |
## Data export

View File

@ -1,7 +1,7 @@
---
title: Roles and responsibilities
description: This article describes the roles and responsibilities provided by Windows Autopatch and what the customer must do
ms.date: 12/09/2022
ms.date: 12/12/2022
ms.prod: windows-client
ms.technology: itpro-updates
ms.topic: conceptual
@ -14,7 +14,7 @@ msreviewer: hathind
# Roles and responsibilities
This article outlines your and Windows Autopatch's responsibilities when:
This article outlines your responsibilities and Windows Autopatch's responsibilities when:
- [Preparing to enroll into the Windows Autopatch service](#prepare)
- [Deploying the service](#deploy)
@ -25,8 +25,10 @@ This article outlines your and Windows Autopatch's responsibilities when:
| Task | Your responsibility | Windows Autopatch |
| ----- | :-----: | :-----: |
| Review the [prerequisites](../prepare/windows-autopatch-prerequisites.md) | :heavy_check_mark: | :x: |
| [Review the service data platform and privacy compliance details](../references/windows-autopatch-privacy.md) | :heavy_check_mark: | :x: |
| Ensure device [prerequisites](../prepare/windows-autopatch-prerequisites.md) are met and in place prior to enrollment | :heavy_check_mark: | :x: |
| Ensure [infrastructure and environment prerequisites](../prepare/windows-autopatch-configure-network.md) are met and in place prior to enrollment | :heavy_check_mark: | :x: |
| Prepare to remove your devices from existing unsupported [Windows update](../references/windows-autopatch-wqu-unsupported-policies.md) and [Microsoft 365](../references/windows-autopatch-microsoft-365-policies.md) policies | :heavy_check_mark: | :x: |
| [Configure required network endpoints](../prepare/windows-autopatch-configure-network.md#required-microsoft-product-endpoints) | :heavy_check_mark: | :x: |
| [Fix issues identified by the Readiness assessment tool](../prepare/windows-autopatch-fix-issues.md) | :heavy_check_mark: | :x: |
| [Enroll tenant into the Windows Autopatch service](../prepare/windows-autopatch-enroll-tenant.md) | :heavy_check_mark: | :x: |
@ -38,14 +40,12 @@ This article outlines your and Windows Autopatch's responsibilities when:
| ----- | :-----: | :-----: |
| [Add and verify admin contacts](../deploy/windows-autopatch-admin-contacts.md) in Microsoft Endpoint Manager | :heavy_check_mark: | :x: |
| [Deploy and configure Windows Autopatch service configuration](../references/windows-autopatch-changes-to-tenant.md) | :x: | :heavy_check_mark: |
| [Run the pre-registration device readiness checks](../deploy/windows-autopatch-register-devices.md#about-the-ready-not-ready-and-not-registered-tabs) | :x: | :heavy_check_mark: |
| [Maintain and manage the Windows Autopatch service configuration](../operate/windows-autopatch-maintain-environment.md) | :x: | :heavy_check_mark: |
| [Maintain customer configuration to align with the Windows Autopatch service configuration](../operate/windows-autopatch-maintain-environment.md) | :heavy_check_mark: | :x: |
| Resolve any conflicting and [unsupported Windows update](../references/windows-autopatch-wqu-unsupported-policies.md) and [Microsoft 365 policies](../references/windows-autopatch-microsoft-365-policies.md) | :heavy_check_mark: | :x: |
| Educate users on the Windows Autopatch end user update experience<ul><li>[Windows quality update end user experience](../operate/windows-autopatch-wqu-end-user-exp.md)</li><li>[Windows feature update end user experience](../operate/windows-autopatch-fu-end-user-exp.md)</li><li>[Microsoft 365 Apps for enterprise end user experience](../operate/windows-autopatch-microsoft-365-apps-enterprise.md#end-user-experience)</li><li>[Microsoft Teams end user experience](../operate/windows-autopatch-teams.md#end-user-experience)</li></ul> | :heavy_check_mark: | :x: |
| Remove your devices from existing unsupported [Windows update](../references/windows-autopatch-wqu-unsupported-policies.md) and [Microsoft 365](../references/windows-autopatch-microsoft-365-policies.md) policies | :heavy_check_mark: | :x: |
| [Register devices/add devices to the Windows Autopatch Device Registration group](../deploy/windows-autopatch-register-devices.md#steps-to-register-devices) | :heavy_check_mark: | :x: |
| [Run the pre-registration device readiness checks](../deploy/windows-autopatch-register-devices.md#about-the-ready-not-ready-and-not-registered-tabs) | :x: | :heavy_check_mark: |
| [Automatically assign devices to First, Fast & Broad deployment rings at device registration](../operate/windows-autopatch-update-management.md#deployment-ring-calculation-logic) | :x: | :heavy_check_mark: |
| [Manually override device assignments to First, Fast & Broad deployment rings](../operate/windows-autopatch-update-management.md#moving-devices-in-between-deployment-rings) | :heavy_check_mark: | :x: |
| [Run on-going post-registration device readiness checks](../deploy/windows-autopatch-post-reg-readiness-checks.md) | :x: | :heavy_check_mark: |
| [Remediate devices displayed in the **Not ready** tab](../deploy/windows-autopatch-post-reg-readiness-checks.md#about-the-three-tabs-in-the-devices-blade) | :heavy_check_mark: | :x: |
| [Remediate devices displayed in the **Not registered** tab](../deploy/windows-autopatch-post-reg-readiness-checks.md#about-the-three-tabs-in-the-devices-blade) | :heavy_check_mark: | :x: |
| [Populate the Test deployment ring membership](../operate/windows-autopatch-update-management.md#deployment-ring-calculation-logic) | :heavy_check_mark: | :x: |
@ -57,9 +57,14 @@ This article outlines your and Windows Autopatch's responsibilities when:
| Task | Your responsibility | Windows Autopatch |
| ----- | :-----: | :-----: |
| [Maintain contacts in the Microsoft Endpoint Manager admin center](../deploy/windows-autopatch-admin-contacts.md) | :heavy_check_mark: | :x: |
| [Maintain and manage the Windows Autopatch service configuration](../operate/windows-autopatch-maintain-environment.md) | :x: | :heavy_check_mark: |
| [Maintain customer configuration to align with the Windows Autopatch service configuration](../operate/windows-autopatch-maintain-environment.md) | :heavy_check_mark: | :x: |
| [Run on-going checks to ensure devices are only present in one deployment ring](../operate/windows-autopatch-update-management.md#automated-deployment-ring-remediation-functions) | :x: | :heavy_check_mark: |
| [Maintain the Test deployment ring membership](../operate/windows-autopatch-update-management.md#deployment-ring-calculation-logic) | :heavy_check_mark: | :x: |
| [Evaluate updates](../operate/windows-autopatch-wqu-signals.md) | :x: | :heavy_check_mark: |
| Monitor [Windows update signals](../operate/windows-autopatch-wqu-signals.md) for safe update release | :x: | :heavy_check_mark: |
| Test specific [business update scenarios](../operate/windows-autopatch-wqu-signals.md) | :heavy_check_mark: | :x: |
| [Define and implement release schedule](../operate/windows-autopatch-wqu-overview.md) | :x: | :heavy_check_mark: |
| Communicate the update [release schedule](../operate/windows-autopatch-wqu-communications.md) | :x: | :heavy_check_mark: |
| Release updates (as scheduled)<ul><li>[Windows quality updates](../operate/windows-autopatch-wqu-overview.md#windows-quality-update-releases)</li><li>[Microsoft 365 Apps for enterprise](../operate/windows-autopatch-microsoft-365-apps-enterprise.md#update-release-schedule)</li><li>[Microsoft Edge](../operate/windows-autopatch-edge.md#update-release-schedule)</li><li>[Microsoft Teams](../operate/windows-autopatch-teams.md#update-release-schedule)</li><ul>| :x: | :heavy_check_mark: |
| [Release updates (expedited)](../operate/windows-autopatch-wqu-overview.md#expedited-releases) | :x: | :heavy_check_mark: |
| [Deploy updates to devices](../operate/windows-autopatch-update-management.md) | :x: | :heavy_check_mark: |
@ -67,10 +72,12 @@ This article outlines your and Windows Autopatch's responsibilities when:
| Review [update reports](../operate/windows-autopatch-wqu-reports-overview.md) | :heavy_check_mark: | :x: |
| [Pause updates (Windows Autopatch initiated)](../operate/windows-autopatch-wqu-signals.md) | :x: | :heavy_check_mark: |
| [Pause updates (initiated by you)](../operate/windows-autopatch-wqu-overview.md#pausing-and-resuming-a-release) | :heavy_check_mark: | :x: |
| Educate users on the Windows Autopatch end user update experience<ul><li>[Windows quality update end user experience](../operate/windows-autopatch-wqu-end-user-exp.md)</li><li>[Windows feature update end user experience](../operate/windows-autopatch-fu-end-user-exp.md)</li><li>[Microsoft 365 Apps for enterprise end user experience](../operate/windows-autopatch-microsoft-365-apps-enterprise.md#end-user-experience)</li><li>[Microsoft Teams end user experience](../operate/windows-autopatch-teams.md#end-user-experience)</li></ul> | :heavy_check_mark: | :x: |
| [Device not up to date (Microsoft action)](../operate/windows-autopatch-wqu-reports-overview.md#not-up-to-date-microsoft-action) | :x: | :heavy_check_mark: |
| [Ineligible Devices (Customer action)](../operate/windows-autopatch-wqu-reports-overview.md#ineligible-devices-customer-action) | :heavy_check_mark: | :x: |
| [Raise, manage and resolve an incident if devices aren't meeting the Service Level Objective](windows-autopatch-overview.md#update-management) | :x: | :heavy_check_mark: |
| Run [on-going post-registration device readiness checks](../deploy/windows-autopatch-post-reg-readiness-checks.md) | :x: | :heavy_check_mark: |
| [Remediate devices displayed in the **Not ready** tab](../deploy/windows-autopatch-post-reg-readiness-checks.md#about-the-three-tabs-in-the-devices-blade) | :heavy_check_mark: | :x: |
| Resolve any conflicting and unsupported [Windows update](../references/windows-autopatch-wqu-unsupported-policies.md) and [Microsoft 365](../references/windows-autopatch-microsoft-365-policies.md) policies | :heavy_check_mark: | :x: |
| [Investigate devices that aren't up to date within the service level objective (Microsoft action)](../operate/windows-autopatch-wqu-reports-overview.md#not-up-to-date-microsoft-action) | :x: | :heavy_check_mark: |
| [Investigate and remediate devices that are marked as ineligible (Customer action)](../operate/windows-autopatch-wqu-reports-overview.md#ineligible-devices-customer-action) | :heavy_check_mark: | :x: |
| [Raise, manage and resolve a service incident if an update management area isn't meeting the service level objective](windows-autopatch-overview.md#update-management) | :x: | :heavy_check_mark: |
| [Deregister devices](../operate/windows-autopatch-deregister-devices.md) | :heavy_check_mark: | :x: |
| [Register a device that was previously deregistered (upon customers request)](../operate/windows-autopatch-deregister-devices.md#excluded-devices) | :x: | :heavy_check_mark: |
| [Request unenrollment from Windows Autopatch](../operate/windows-autopatch-unenroll-tenant.md) | :heavy_check_mark: | :x: |
@ -81,3 +88,4 @@ This article outlines your and Windows Autopatch's responsibilities when:
| [Review and respond to Windows Autopatch Tenant management alerts](../operate/windows-autopatch-maintain-environment.md#windows-autopatch-tenant-actions) | :heavy_check_mark: | :x: |
| [Raise and respond to support requests](../operate/windows-autopatch-support-request.md) | :heavy_check_mark: | :x: |
| [Manage and respond to support requests](../operate/windows-autopatch-support-request.md#manage-an-active-support-request) | :x: | :heavy_check_mark: |
| Review the [Whats new](../whats-new/windows-autopatch-whats-new-2022.md) section to stay up to date with updated feature and service releases | :heavy_check_mark: | :x: |

View File

@ -30,6 +30,8 @@ In Windows 10, version 1903 and later, you'll see taxonomy updates in both the *
Additionally, starting in Windows 11 and Windows Server 2022, were simplifying your diagnostic data controls by moving from four diagnostic data controls to three: **Diagnostic data off**, **Required**, and **Optional**. Were also clarifying the Security diagnostic data level to reflect its behavior more accurately by changing it to **Diagnostic data off**. All these changes are explained in the section named **Behavioral changes**.
Prior to December 13 2022, the default setting for Windows Server 2022 Datacenter: Azure Edition images deployed using Azure Marketplace was **Diagnostic data off**. Beginning December 13 2022, all newly deployed images are set to **Required diagnostic data** to align with all other Windows releases. All other Windows releases and existing installations remain unchanged.
## Taxonomy changes
Starting in Windows 10, version 1903 and later, both the **Out-of-Box-Experience** (OOBE) and the **Diagnostics & feedback** privacy setting pages will reflect the following changes:

View File

@ -164,6 +164,8 @@ Heres a summary of the types of data that is included with each setting:
This setting was previously labeled as **Security**. When you configure this setting, no Windows diagnostic data is sent from your device. This is only available on Windows Server, Windows Enterprise, and Windows Education editions. If you choose this setting, devices in your organization will still be secure.
This was the default setting for Windows Server 2022 Datacenter: Azure Edition prior to December 13, 2022.
>[!NOTE]
> If your organization relies on Windows Update, the minimum recommended setting is **Required diagnostic data**. Because no Windows Update information is collected when diagnostic data is off, important information about update failures is not sent. Microsoft uses this information to fix the causes of those failures and improve the quality of our updates.
@ -171,7 +173,7 @@ This setting was previously labeled as **Security**. When you configure this set
Required diagnostic data, previously labeled as **Basic**, gathers a limited set of data thats critical for understanding the device and its configuration. This data helps to identify problems that can occur on a specific hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a specific driver version.
This is the default setting for current releases of Windows, Windows 10, version 1903.
This is the default setting for current releases of Windows, Windows 10, version 1903. Beginning December 13, 2022, it is also the default setting for Windows Server 2022 Datacenter: Azure Edition.
Required diagnostic data includes: