mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
Merge branch 'main' into aljupudi-6027362-improperacronyms-03
This commit is contained in:
commit
678ecadd52
@ -28,7 +28,7 @@ To take advantage of this offering, make sure you meet the [requirements for cha
|
||||
## Requirements for changing
|
||||
Before you change to Windows 10 Pro Education, make sure you meet these requirements:
|
||||
- Devices must be running Windows 10 Pro, version 1607 or higher.
|
||||
- Devices must be Azure Active Directory joined, or domain joined with Azure AD Connect. Customers who are federated with Azure AD are also eligible. For more information, see [Review requirements on devices](#review-requirements-on-devices).
|
||||
- Devices must be Azure Active Directory-joined, or domain joined with Azure AD Connect. Customers who are federated with Azure AD are also eligible. For more information, see [Review requirements on devices](#review-requirements-on-devices).
|
||||
|
||||
If you haven't domain joined your devices already, [prepare for deployment of Windows 10 Pro Education licenses](#preparing-for-deployment-of-windows-10-pro-education-licenses).
|
||||
|
||||
@ -47,7 +47,7 @@ For schools that want to standardize all their Windows 10 Pro devices to Windows
|
||||
|
||||
In this scenario:
|
||||
|
||||
- The IT admin of the tenant chooses to turn on the change for all Azure AD joined devices.
|
||||
- The IT admin of the tenant chooses to turn on the change for all Azure AD-joined devices.
|
||||
- Any device that joins the Azure AD will change automatically to Windows 10 Pro Education.
|
||||
- The IT admin has the option to automatically roll back to Windows 10 Pro, if desired. See [Roll back Windows 10 Pro Education to Windows 10 Pro](#roll-back-windows-10-pro-education-to-windows-10-pro).
|
||||
|
||||
@ -92,7 +92,7 @@ You can use Windows Configuration Designer to create a provisioning package that
|
||||
3. In the **Enter a product key** window, enter the MAK key for Windows 10 Pro Education and click **Next**.
|
||||
|
||||
|
||||
## Education customers with Azure AD joined devices
|
||||
## Education customers with Azure AD-joined devices
|
||||
|
||||
Academic institutions can easily move from Windows 10 Pro to Windows 10 Pro Education without using activation keys or reboots. When one of your users enters their Azure AD credentials associated with a Windows 10 Pro Education license, the operating system changes to Windows 10 Pro Education and all the appropriate Windows 10 Pro Education features are unlocked. Previously, only schools or organizations purchasing devices as part of the Shape the Future K-12 program or with a Microsoft Volume Licensing Agreement could deploy Windows 10 Pro Education to their users. Now, if you have an Azure AD for your organization, you can take advantage of the Windows 10 Pro Education features.
|
||||
|
||||
@ -145,7 +145,7 @@ Enabling the automatic change also triggers an email message notifying all globa
|
||||
|
||||
So what will users experience? How will they change their devices?
|
||||
|
||||
### For existing Azure AD joined devices
|
||||
### For existing Azure AD-joined devices
|
||||
Existing Azure AD domain joined devices will be changed to Windows 10 Pro Education the next time the user logs in. That's it! No other steps are needed.
|
||||
|
||||
### For new devices that are not Azure AD joined
|
||||
@ -251,7 +251,7 @@ Devices must be running Windows 10 Pro, version 1607 or higher, or domain joined
|
||||
dsregcmd /status
|
||||
```
|
||||
|
||||
2. Review the output under Device State. If the **AzureAdJoined** status is YES, the device is Azure Active Directory joined.
|
||||
2. Review the output under Device State. If the **AzureAdJoined** status is YES, the device is Azure Active Directory-joined.
|
||||
|
||||
**To determine the version of Windows 10**
|
||||
|
||||
|
@ -59,7 +59,7 @@ The following table describes each setting within **Device Settings**.
|
||||
| Setting | Description |
|
||||
|------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Users may join devices to Azure AD | Choose the scope of people in your organization that are allowed to join devices to Azure AD. **All** allows all users and groups within your tenant to join devices. **Selected** prompts you to choose specific users or groups to allow. **None** allows no one in your tenant to join devices to Azure AD. |
|
||||
| More local administrators on Azure AD joined devices | Only applicable to Azure AD Premium tenants. Grant extra local administrator rights on devices, to selected users. Global administrators and the device owner are granted local administrator rights by default. |
|
||||
| More local administrators on Azure AD-joined devices | Only applicable to Azure AD Premium tenants. Grant extra local administrator rights on devices, to selected users. Global administrators and the device owner are granted local administrator rights by default. |
|
||||
| Users may register their devices with Azure AD | Allow all or none of your users to register their devices with Azure AD (Workplace Join). If you're enrolled in Microsoft Intune or Mobile Device Management for Office 365, your devices are required to be registered. In this case, **All** is automatically selected for you. |
|
||||
| Require Multi-Factor Authentication to join devices | Recommended when adding devices to Azure AD. When set to **Yes**, users that are setting up devices must enter a second method of authentication. |
|
||||
| Maximum number of devices per user | Set the maximum number of devices a user is allowed to have in Azure AD. If the maximum is exceeded, the user must remove one or more existing devices before more devices are added. |
|
||||
|
@ -34,7 +34,7 @@ You can now give devices running Windows 10, version 2004 and later a name that'
|
||||
### Resumed support for Windows 10, version 1903 and later
|
||||
The previously mentioned provisioning problem was resolved, so the Set up School PCs app once again supports Windows 10, version 1903 and later. The Windows 10 settings that were removed are now back in the app.
|
||||
|
||||
### Device rename made optional for Azure AD joined devices
|
||||
### Device rename made optional for Azure AD-joined devices
|
||||
When you set up your Azure AD join devices in the app, you no longer need to rename your devices. You can keep existing device names.
|
||||
|
||||
## Week of May 23, 2019
|
||||
@ -42,7 +42,7 @@ When you set up your Azure AD join devices in the app, you no longer need to ren
|
||||
### Suspended support for Windows 10, version 1903 and later
|
||||
Due to a provisioning problem, Set up School PCs has temporarily stopped support for Windows 10, version 1903 and later. All settings in the app that were for Windows 10, version 1903 and later have been removed. When the problem is resolved, support will resume again.
|
||||
|
||||
### Mandatory device rename for Azure AD joined devices
|
||||
### Mandatory device rename for Azure AD-joined devices
|
||||
If you configure Azure AD Join, you're now required to rename your devices during setup. You can't keep existing device names.
|
||||
|
||||
## Week of April 15, 2019
|
||||
|
@ -62,7 +62,7 @@ Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-gu
|
||||
|
||||
- Adding users using policy
|
||||
|
||||
Starting in Windows 10, version 2004, you can add users to the Remote Desktop Users using MDM policies as described in [How to manage the local administrators group on Azure AD joined devices](/azure/active-directory/devices/assign-local-admin#manage-administrator-privileges-using-azure-ad-groups-preview).
|
||||
Starting in Windows 10, version 2004, you can add users to the Remote Desktop Users using MDM policies as described in [How to manage the local administrators group on Azure AD-joined devices](/azure/active-directory/devices/assign-local-admin#manage-administrator-privileges-using-azure-ad-groups-preview).
|
||||
|
||||
> [!TIP]
|
||||
> When you connect to the remote PC, enter your account name in this format: AzureAD\yourloginid@domain.com.
|
||||
|
@ -358,7 +358,7 @@ With Azure integrated MDM enrollment, there's no discovery phase and the discove
|
||||
|
||||
There are two different MDM enrollment types that integrate with Azure AD, and use Azure AD user and device identities. Depending on the enrollment type, the MDM service may need to manage a single user or multiple users.
|
||||
|
||||
<a href="" id="multiple-user-management-for-azure-ad-joined-devices"></a>**Multiple user management for Azure AD joined devices**
|
||||
<a href="" id="multiple-user-management-for-azure-ad-joined-devices"></a>**Multiple user management for Azure AD-joined devices**
|
||||
In this scenario the MDM enrollment applies to every Azure AD user who signs in to the Azure AD joined device - call this enrollment type a device enrollment or a multi-user enrollment. The management server can determine the user identity, determine what policies are targeted for this user, and send corresponding policies to the device. To allow management server to identify current user that is logged on to the device, the OMA DM client uses the Azure AD user tokens. Each management session contains an extra HTTP header that contains an Azure AD user token. This information is provided in the DM package sent to the management server. However, in some circumstances Azure AD user token isn't sent over to the management server. One such scenario happens immediately after MDM enrollments completes during Azure AD join process. Until Azure AD join process is finished and Azure AD user signs on to the machine, Azure AD user token isn't available to OMA-DM process. Typically, MDM enrollment completes before Azure AD user sign in to machine and the initial management session doesn't contain an Azure AD user token. The management server should check if the token is missing and only send device policies in such case. Another possible reason for a missing Azure AD token in the OMA-DM payload is when a guest user is logged on to the device.
|
||||
|
||||
<a href="" id="adding-a-work-account-and-mdm-enrollment-to-a-device"></a>**Adding a work account and MDM enrollment to a device**
|
||||
|
@ -1179,7 +1179,7 @@ If you don't configure this policy setting, users can use BitLocker on removable
|
||||
Allows the admin to disable the warning prompt for other disk encryption on the user machines that are targeted when the RequireDeviceEncryption policy is set to 1.
|
||||
<!--/Description-->
|
||||
> [!IMPORTANT]
|
||||
> Starting in Windows 10, version 1803, the value 0 can only be set for Azure Active Directory joined devices. When RequireDeviceEncryption is set to 1 and AllowWarningForOtherDiskEncryption is set to 0, Windows will attempt to silently enable [BitLocker](/windows/device-security/bitlocker/bitlocker-overview).
|
||||
> Starting in Windows 10, version 1803, the value 0 can only be set for Azure Active Directory-joined devices. When RequireDeviceEncryption is set to 1 and AllowWarningForOtherDiskEncryption is set to 0, Windows will attempt to silently enable [BitLocker](/windows/device-security/bitlocker/bitlocker-overview).
|
||||
|
||||
> [!Warning]
|
||||
> When you enable BitLocker on a device with third-party encryption, it may render the device unusable and require you to reinstall Windows.
|
||||
@ -1198,7 +1198,7 @@ Allows the admin to disable the warning prompt for other disk encryption on the
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disables the warning prompt. Starting in Windows 10, version 1803, the value 0 can only be set for Azure Active Directory joined devices. Windows will attempt to silently enable BitLocker for value 0.
|
||||
- 0 – Disables the warning prompt. Starting in Windows 10, version 1803, the value 0 can only be set for Azure Active Directory-joined devices. Windows will attempt to silently enable BitLocker for value 0.
|
||||
- 1 (default) – Warning prompt allowed.
|
||||
<!--/SupportedValues-->
|
||||
```xml
|
||||
|
@ -646,7 +646,7 @@ The XML below is the current version for this CSP.
|
||||
|
||||
1 = This is the default, when the policy is not set. Warning prompt and encryption notification is allowed.
|
||||
0 = Disables the warning prompt and encryption notification. Starting in Windows 10, next major update,
|
||||
the value 0 only takes affect on Azure Active Directory joined devices.
|
||||
the value 0 only takes affect on Azure Active Directory-joined devices.
|
||||
Windows will attempt to silently enable BitLocker for value 0.
|
||||
|
||||
If you want to disable this policy use the following SyncML:
|
||||
@ -744,15 +744,15 @@ The XML below is the current version for this CSP.
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description> Allows Admin to configure Numeric Recovery Password Rotation upon use for OS and fixed drives on AAD and Hybrid domain joined devices.
|
||||
When not configured, Rotation is turned on by default for AAD only and off on Hybrid. The Policy will be effective only when
|
||||
<Description> Allows Admin to configure Numeric Recovery Password Rotation upon use for OS and fixed drives on Azure Active Directory and Hybrid domain joined devices.
|
||||
When not configured, Rotation is turned on by default for Azure AD only and off on Hybrid. The Policy will be effective only when
|
||||
Active Directory back up for recovery password is configured to required.
|
||||
For OS drive: Turn on "Do not enable Bitlocker until recovery information is stored to AD DS for operating system drives"
|
||||
For Fixed drives: Turn on "Do not enable Bitlocker until recovery information is stored to AD DS for fixed data drives"
|
||||
|
||||
Supported Values: 0 - Numeric Recovery Passwords rotation OFF.
|
||||
1 - Numeric Recovery Passwords Rotation upon use ON for AAD joined devices. Default value
|
||||
2 - Numeric Recovery Passwords Rotation upon use ON for both AAD and Hybrid devices
|
||||
1 - Numeric Recovery Passwords Rotation upon use ON for Azure Active Directory-joined devices. Default value
|
||||
2 - Numeric Recovery Passwords Rotation upon use ON for both Azure AD and Hybrid devices
|
||||
|
||||
If you want to disable this policy use the following SyncML:
|
||||
|
||||
@ -783,7 +783,7 @@ The XML below is the current version for this CSP.
|
||||
</DFType>
|
||||
<MSFT:SupportedValues low="0" high="2">
|
||||
<MSFT:SupportedValue value="0" description="Numeric Recovery Passwords Key rotation OFF"/>
|
||||
<MSFT:SupportedValue value="1" description="Default Value. Numeric Recovery Passwords Key Rotation ON for AAD joined devices."/>
|
||||
<MSFT:SupportedValue value="1" description="Default Value. Numeric Recovery Passwords Key Rotation ON for AAD-joined devices."/>
|
||||
<MSFT:SupportedValue value="2" description="Numeric Recovery Passwords Key Rotation ON for both AAD and Hybrid devices"/>
|
||||
</MSFT:SupportedValues>
|
||||
</DFProperties>
|
||||
|
@ -376,7 +376,7 @@ The date type format is Null, meaning this node doesn’t contain a value.
|
||||
The only supported operation is Execute.
|
||||
|
||||
<a href="" id="clientcertificateinstall-scep-uniqueid-install-aadkeyidentifierlist"></a>**ClientCertificateInstall/SCEP/*UniqueID*/Install/AADKeyIdentifierList**
|
||||
Optional. Specify the Azure AD Key Identifier List as a list of semicolon separated values. On Enroll, the values in this list are validated against the Azure AD Key present on the device. If no match is found, enrollment will fail.
|
||||
Optional. Specify the Azure Active Directory Key Identifier List as a list of semicolon separated values. On Enroll, the values in this list are validated against the Azure AD Key present on the device. If no match is found, enrollment will fail.
|
||||
|
||||
Data type is string.
|
||||
|
||||
|
@ -929,7 +929,7 @@ Supported operation is Exec.</Description>
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Optional. Specify the AAD Key Identifier List as a semicolon separated values. On Enroll, the values in this list are validated against the AAD Key present on the device. If no match is found, enrollment will fail.</Description>
|
||||
<Description>Optional. Specify the Azure Active Directory Key Identifier List as a semicolon separated values. On Enroll, the values in this list are validated against the Azure AD Key present on the device. If no match is found, enrollment will fail.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
|
@ -123,7 +123,7 @@ When the server initiates disconnection, all undergoing sessions for the enrollm
|
||||
<a href="" id="work-access"></a>
|
||||
## Unenrollment from Work Access settings page
|
||||
|
||||
If the user is enrolled into MDM using an Azure Active Directory (AAD Join or by adding a Microsoft work account), the MDM account will show up under the Work Access page. However, the **Disconnect** button is greyed out and not accessible. Users can remove that MDM account by removing the AAD association to the device.
|
||||
If the user is enrolled into MDM using an Azure Active Directory (AAD Join or by adding a Microsoft work account), the MDM account will show up under the Work Access page. However, the **Disconnect** button is greyed out and not accessible. Users can remove that MDM account by removing the Azure AD association to the device.
|
||||
|
||||
You can only use the Work Access page to unenroll under the following conditions:
|
||||
|
||||
|
@ -345,7 +345,7 @@ Value type is bool.
|
||||
<a href="" id="provider-providerid-forceaadtoken"></a>**Provider/*ProviderID*/ForceAadToken**
|
||||
The value type is integer/enum.
|
||||
|
||||
The value is "1" and it means client should always send AAD device token during check-in/sync.
|
||||
The value is "1" and it means client should always send Azure Active Directory device token during check-in/sync.
|
||||
|
||||
<a href="" id="provider-providerid-poll"></a>**Provider/*ProviderID*/Poll**
|
||||
Optional. Polling schedules must use the DMClient CSP. The Registry paths previously associated with polling using the Registry CSP are now deprecated.
|
||||
@ -516,7 +516,7 @@ This node tracks the status of a Recovery request from the InitiateRecovery node
|
||||
1 - Recovery is in Process.
|
||||
2 - Recovery has finished successfully.
|
||||
3 - Recovery has failed to start because TPM is not available.
|
||||
4 - Recovery has failed to start because AAD keys are not protected by the TPM.
|
||||
4 - Recovery has failed to start because Azure Active Directory keys are not protected by the TPM.
|
||||
5 - Recovery has failed to start because the MDM keys are already protected by the TPM.
|
||||
6 - Recovery has failed to start because the TPM is not ready for attestation.
|
||||
7 - Recovery has failed because the client cannot authenticate to the server.
|
||||
|
@ -980,7 +980,7 @@ The XML below is for Windows 10, version 1803.
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Send the device AAD token, if the user one can't be returned</Description>
|
||||
<Description>Send the device Azure Active Directory token, if the user one can't be returned</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
|
@ -127,7 +127,7 @@ Requirements:
|
||||
> In Windows 10, version 1903, the MDM.admx file was updated to include an option to select which credential is used to enroll the device. **Device Credential** is a new option that will only have an effect on clients that have installed Windows 10, version 1903 or later. The default behavior for older releases is to revert to **User Credential**.
|
||||
> **Device Credential** is only supported for Microsoft Intune enrollment in scenarios with Co-management or Azure Virtual Desktop because the Intune subscription is user centric.
|
||||
|
||||
When a group policy refresh occurs on the client, a task is created and scheduled to run every 5 minutes for the duration of one day. The task is called "Schedule created by enrollment client for automatically enrolling in MDM from AAD."
|
||||
When a group policy refresh occurs on the client, a task is created and scheduled to run every 5 minutes for the duration of one day. The task is called "Schedule created by enrollment client for automatically enrolling in MDM from Azure Active Directory."
|
||||
|
||||
To see the scheduled task, launch the [Task Scheduler app](#task-scheduler-app).
|
||||
|
||||
@ -270,7 +270,7 @@ To collect Event Viewer logs:
|
||||
> This task isn't visible to standard users, run Scheduled Tasks with administrative credentials to find the task.
|
||||
|
||||
This task runs every 5 minutes for the duration of one day. To confirm if the task succeeded, check the task scheduler event logs:
|
||||
**Applications and Services Logs > Microsoft > Windows > Task Scheduler > Operational**. Look for an entry where the task scheduler created by enrollment client for automatically enrolling in MDM from AAD is triggered by event ID 107.
|
||||
**Applications and Services Logs > Microsoft > Windows > Task Scheduler > Operational**. Look for an entry where the task scheduler created by enrollment client for automatically enrolling in MDM from Azure Active Directory is triggered by event ID 107.
|
||||
|
||||
:::image type="content" alt-text="Event ID 107." source="images/auto-enrollment-event-id-107.png" lightbox="images/auto-enrollment-event-id-107.png":::
|
||||
|
||||
|
@ -138,7 +138,7 @@ Data fields:
|
||||
- rpID (Relying Party Identifier): This field contains an identifier that can be used to help determine the caller.
|
||||
- serviceEndpoint : This field contains the complete URL of the Microsoft Azure Attestation provider instance to be used for evaluation.
|
||||
- nonce: This field contains an arbitrary number that can be used only once in a cryptographic communication. It's often a random or pseudo-random number issued in an authentication protocol to ensure that old communications can't be reused in replay attacks.
|
||||
- aadToken: The AAD token to be used for authentication against the Microsoft Azure Attestation service.
|
||||
- aadToken: The Azure Active Directory token to be used for authentication against the Microsoft Azure Attestation service.
|
||||
- cv: This field contains an identifier(Correlation Vector) that will be passed in to the service call, and that can be used for diagnostics purposes.
|
||||
|
||||
Sample Data:
|
||||
@ -407,7 +407,7 @@ calls between client and MAA and for each call the GUID is separated by semicolo
|
||||
};
|
||||
```
|
||||
|
||||
3. Call TriggerAttestation with your rpid, AAD token and the attestURI: Use the Attestation URL generated in step 1, and append the appropriate api version you want to hit. For more information about the api version, see [Attestation - Attest Tpm - REST API](/rest/api/attestation/attestation/attest-tpm).
|
||||
3. Call TriggerAttestation with your rpid, Azure Active Directory token and the attestURI: Use the Attestation URL generated in step 1, and append the appropriate api version you want to hit. For more information about the api version, see [Attestation - Attest Tpm - REST API](/rest/api/attestation/attestation/attest-tpm).
|
||||
|
||||
4. Call GetAttestReport and decode and parse the report to ensure the attested report contains the required properties: GetAttestReport return the signed attestation token as a JWT. The JWT can be decoded to parse the information per the attestation policy.
|
||||
|
||||
|
@ -249,7 +249,7 @@ Alternatively you can use the following procedure to create an EAP Configuration
|
||||
|
||||
After the MDM client automatically renews the WNS channel URI, the MDM client will immediately check-in with the MDM server. Henceforth, for every MDM client check-in, the MDM server should send a GET request for "ProviderID/Push/ChannelURI" to retrieve the latest channel URI and compare it with the existing channel URI; then update the channel URI if necessary.
|
||||
|
||||
### User provisioning failure in Azure Active Directory joined Windows 10 and Windows 11 devices
|
||||
### User provisioning failure in Azure Active Directory-joined Windows 10 and Windows 11 devices
|
||||
|
||||
In Azure AD joined Windows 10 and Windows 11, provisioning /.User resources fails when the user isn't logged in as an Azure AD user. If you attempt to join Azure AD from **Settings** > **System** > **About** user interface, ensure to sign out and sign in with Azure AD credentials to get your organizational configuration from your MDM server. This behavior is by design.
|
||||
|
||||
@ -269,7 +269,7 @@ The DM agent for [push-button reset](/windows-hardware/manufacture/desktop/push-
|
||||
|
||||
No. Only one MDM is allowed.
|
||||
|
||||
### How do I set the maximum number of Azure Active Directory joined devices per user?
|
||||
### How do I set the maximum number of Azure Active Directory-joined devices per user?
|
||||
|
||||
1. Sign in to the portal as tenant admin: https://portal.azure.com.
|
||||
2. Select Active Directory on the left pane.
|
||||
|
@ -2305,10 +2305,10 @@ ADMX Info:
|
||||
<!--Description-->
|
||||
This policy setting allows you to specify the type of Remote Desktop Services client access license (RDS CAL) that is required to connect to this RD Session Host server.
|
||||
|
||||
You can use this policy setting to select one of three licensing modes: Per User, Per Device, and AAD Per User.
|
||||
You can use this policy setting to select one of three licensing modes: Per User, Per Device, and Azure Active Directory Per User.
|
||||
- Per User licensing mode requires that each user account connecting to this RD Session Host server have an RDS Per User CAL issued from an RD Licensing server.
|
||||
- Per Device licensing mode requires that each device connecting to this RD Session Host server have an RDS Per Device CAL issued from an RD Licensing server.
|
||||
- AAD Per User licensing mode requires that each user account connecting to this RD Session Host server have a service plan that supports RDS licenses assigned in AAD.
|
||||
- Azure AD Per User licensing mode requires that each user account connecting to this RD Session Host server have a service plan that supports RDS licenses assigned in Azure AD.
|
||||
|
||||
If you enable this policy setting, the Remote Desktop licensing mode that you specify is honored by the Remote Desktop license server and RD Session Host.
|
||||
|
||||
|
@ -312,7 +312,7 @@ The following list shows the supported values:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Specifies the list of domains that are allowed to be navigated to in AAD PIN reset and Web Sign-in Windows device scenarios where authentication is handled by AD FS or a third-party federated identity provider. Note this policy is required in federated environments as a mitigation to the vulnerability described in [CVE-2021-27092](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27092).
|
||||
Specifies the list of domains that are allowed to be navigated to in Azure Active Directory PIN reset and Web Sign-in Windows device scenarios where authentication is handled by AD FS or a third-party federated identity provider. Note this policy is required in federated environments as a mitigation to the vulnerability described in [CVE-2021-27092](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27092).
|
||||
|
||||
**Example**: If your organization's PIN reset or Web Sign-in authentication flow is expected to navigate to two domains, accounts.contoso.com and signin.contoso.com, the policy value should be "accounts.contoso.com;signin.contoso.com".
|
||||
|
||||
|
@ -700,7 +700,7 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Set this policy to restrict peer selection to a specific source. Available options are: 1 = AD Site, 2 = Authenticated domain SID, 3 = DHCP Option ID, 4 = DNS Suffix, 5 = AAD.
|
||||
Set this policy to restrict peer selection to a specific source. Available options are: 1 = Active Directory Site, 2 = Authenticated domain SID, 3 = DHCP Option ID, 4 = DNS Suffix, 5 = Azure Active Directory.
|
||||
|
||||
When set, the Group ID will be assigned automatically from the selected source.
|
||||
|
||||
@ -725,11 +725,11 @@ ADMX Info:
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 1 - AD site
|
||||
- 1 - Active Directory site
|
||||
- 2 - Authenticated domain SID
|
||||
- 3 - DHCP user option
|
||||
- 4 - DNS suffix
|
||||
- 5 - AAD
|
||||
- 5 - Azure Active Directory
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
|
@ -337,7 +337,7 @@ The following list shows the supported values:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Specifies whether to allow the user to delete the workplace account using the workplace control panel. If the device is Azure Active Directory joined and MDM enrolled (for example, auto-enrolled), then disabling the MDM unenrollment has no effect.
|
||||
Specifies whether to allow the user to delete the workplace account using the workplace control panel. If the device is Azure Active Directory-joined and MDM enrolled (for example, auto-enrolled), then disabling the MDM unenrollment has no effect.
|
||||
|
||||
> [!NOTE]
|
||||
> The MDM server can always remotely delete the account.
|
||||
|
@ -435,7 +435,7 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Adds a list of domains that an Azure Active Directory joined device can attempt to contact, when it can't resolve a UPN to a principal.
|
||||
Adds a list of domains that an Azure Active Directory-joined device can attempt to contact when it can't resolve a UPN to a principal.
|
||||
|
||||
Devices joined to Azure Active Directory in a hybrid environment need to interact with Active Directory Domain Controllers, but they lack the built-in ability to find a Domain Controller that a domain-joined device has. This limitation can cause failures, when such a device needs to resolve an Azure Active Directory UPN into an Active Directory Principal. You can use this policy to avoid those failures.
|
||||
|
||||
|
@ -57,7 +57,7 @@ manager: dansimp
|
||||
This policy setting allows IT admins to add, remove, or replace members of local groups on a managed device.
|
||||
|
||||
> [!NOTE]
|
||||
> The [RestrictedGroups/ConfigureGroupMembership](./policy-csp-restrictedgroups.md#restrictedgroups-configuregroupmembership) policy setting also allows you to configure members (users or AAD groups) to a Windows 10 local group. However, it allows only for a full replace of the existing groups with the new members and does not allow selective add or remove.
|
||||
> The [RestrictedGroups/ConfigureGroupMembership](./policy-csp-restrictedgroups.md#restrictedgroups-configuregroupmembership) policy setting also allows you to configure members (users or Azure Active Directory groups) to a Windows 10 local group. However, it allows only for a full replace of the existing groups with the new members and does not allow selective add or remove.
|
||||
>
|
||||
> Starting from Windows 10, version 20H2, it is recommended to use the LocalUsersandGroups policy instead of the RestrictedGroups policy. Applying both the policies to the same device is unsupported and may yield unpredictable results.
|
||||
|
||||
@ -102,9 +102,9 @@ See [Use custom settings for Windows 10 devices in Intune](/mem/intune/configura
|
||||
|
||||
**Examples**
|
||||
|
||||
Example 1: AAD focused.
|
||||
Example 1: Azure Active Directory focused.
|
||||
|
||||
The following example updates the built-in administrators group with AAD account "bob@contoso.com" and an Azure AD group with the SID **S-1-12-1-111111111-22222222222-3333333333-4444444444** on an AAD-joined machine.
|
||||
The following example updates the built-in administrators group with Azure AD account "bob@contoso.com" and an Azure AD group with the SID **S-1-12-1-111111111-22222222222-3333333333-4444444444** on an AAD-joined machine.
|
||||
|
||||
```xml
|
||||
<GroupConfiguration>
|
||||
@ -116,7 +116,7 @@ The following example updates the built-in administrators group with AAD account
|
||||
</GroupConfiguration>
|
||||
```
|
||||
|
||||
Example 2: Replace / Restrict the built-in administrators group with an AAD user account.
|
||||
Example 2: Replace / Restrict the built-in administrators group with an Azure AD user account.
|
||||
|
||||
> [!NOTE]
|
||||
> When using ‘R’ replace option to configure the built-in ‘Administrators’ group. It is required to always specify the administrator as a member + any other custom members. This is because the built-in administrator must always be a member of the administrators group.
|
||||
@ -134,7 +134,7 @@ Example:
|
||||
|
||||
Example 3: Update action for adding and removing group members on a hybrid joined machine.
|
||||
|
||||
The following example shows how you can update a local group (**Administrators**)—add an AD domain group as a member using its name (**Contoso\ITAdmins**), add a AAD group by its SID (**S-1-12-1-111111111-22222222222-3333333333-4444444444**), and remove a local account (**Guest**) if it exists.
|
||||
The following example shows how you can update a local group (**Administrators**)—add an AD domain group as a member using its name (**Contoso\ITAdmins**), add a Azure Active Directory group by its SID (**S-1-12-1-111111111-22222222222-3333333333-4444444444**), and remove a local account (**Guest**) if it exists.
|
||||
|
||||
```xml
|
||||
<GroupConfiguration>
|
||||
@ -156,7 +156,7 @@ The following example shows how you can update a local group (**Administrators**
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> When AAD group SID’s are added to local groups, AAD account logon privileges are evaluated only for the following well-known groups on a Windows 10 device:
|
||||
> When Azure Active Directory group SID’s are added to local groups, Azure AD account logon privileges are evaluated only for the following well-known groups on a Windows 10 device:
|
||||
>
|
||||
> - Administrators
|
||||
> - Users
|
||||
|
@ -106,7 +106,7 @@ On a device where this policy is configured, the user specified in the policy wi
|
||||
> [!NOTE]
|
||||
>
|
||||
> - Some events such as major OS updates may require the specified user to logon to the device again to resume auto-logon behavior.
|
||||
> - Auto-logon is only supported for Microsoft account and AAD users.
|
||||
> - Auto-logon is only supported for Microsoft account and Azure Active Directory users.
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<hr/>
|
||||
|
@ -15,7 +15,7 @@ manager: dansimp
|
||||
# Policy CSP - RestrictedGroups
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Starting from Windows 10, version 20H2, it is recommended to use the [LocalUsersandGroups](policy-csp-localusersandgroups.md) policy instead of the RestrictedGroups policy, to configure members (users or AAD groups) to a Windows 10 local group. Applying both the policies to the same device is unsupported and may yield unpredictable results.
|
||||
> Starting from Windows 10, version 20H2, it is recommended to use the [LocalUsersandGroups](policy-csp-localusersandgroups.md) policy instead of the RestrictedGroups policy, to configure members (users or Azure Active Directory groups) to a Windows 10 local group. Applying both the policies to the same device is unsupported and may yield unpredictable results.
|
||||
|
||||
|
||||
<hr/>
|
||||
|
@ -162,7 +162,7 @@ ADMX Info:
|
||||
<!--/ADMXMapped-->
|
||||
<!--SupportedValues-->
|
||||
|
||||
This value is a simple boolean value, default false, that can be set by MDM policy to allow the Cortana Page in OOBE when logged in with an AAD account.
|
||||
This value is a simple boolean value, default false, that can be set by MDM policy to allow the Cortana Page in OOBE when logged in with an Azure Active Directory account.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
|
||||
|
@ -194,7 +194,7 @@ The table below shows the applicability of Windows:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting configures an Azure Active Directory joined device, so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the [Product Terms](https://www.microsoft.com/licensing/terms/productoffering).
|
||||
This policy setting configures an Azure Active Directory-joined device, so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the [Product Terms](https://www.microsoft.com/licensing/terms/productoffering).
|
||||
|
||||
To enable this behavior, you must complete two steps:
|
||||
|
||||
@ -537,7 +537,7 @@ The following list shows the supported values:
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
This policy setting configures an Azure Active Directory joined device so that Microsoft is the processor of the Windows diagnostic data.
|
||||
This policy setting configures an Azure Active Directory-joined device so that Microsoft is the processor of the Windows diagnostic data.
|
||||
|
||||
For customers who enroll into the Microsoft Managed Desktop service, this policy will be enabled by default to allow Microsoft to process data for operational and analytic needs. For more information, see [Privacy and personal data](/microsoft-365/managed-desktop/service-description/privacy-personal-data).
|
||||
|
||||
@ -778,7 +778,7 @@ The following list shows the supported values:
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
This policy setting configures an Azure Active Directory joined device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the [Product Terms](https://www.microsoft.com/licensing/terms/productoffering).
|
||||
This policy setting configures an Azure Active Directory-joined device so that Microsoft is the processor of the Windows diagnostic data collected from the device, subject to the [Product Terms](https://www.microsoft.com/licensing/terms/productoffering).
|
||||
|
||||
To enable this behavior, you must complete three steps:
|
||||
|
||||
|
@ -47,7 +47,7 @@ The supported operations are Add, Delete, Get, and Replace.
|
||||
The user name of the test taking account.
|
||||
|
||||
- To specify a domain account, use domain\\user.
|
||||
- To specify an AAD account, use username@tenant.com.
|
||||
- To specify an Azure Active Directory account, use username@tenant.com.
|
||||
- To specify a local account, use the username.
|
||||
|
||||
The supported operations are Add, Delete, Get, and Replace.
|
||||
|
@ -83,7 +83,7 @@ The XML below is the current version for this CSP.
|
||||
<Delete />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>The user name of the test taking account. To specify a domain account, use domain\user. To specify an AAD account, use username@tenant.com. To specify a local account, use the username.</Description>
|
||||
<Description>The user name of the test taking account. To specify a domain account, use domain\user. To specify an Azure Active Directory account, use username@tenant.com. To specify a local account, use the username.</Description>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
|
@ -658,10 +658,10 @@ Reserved for future use.
|
||||
Reserved for future use.
|
||||
|
||||
<a href="" id="vpnv2-profilename-devicecompliance"></a>**VPNv2/**<em>ProfileName</em>**/DeviceCompliance**
|
||||
Added in Windows 10, version 1607. Nodes under DeviceCompliance can be used to enable AAD-based Conditional Access for VPN.
|
||||
Added in Windows 10, version 1607. Nodes under DeviceCompliance can be used to enable Azure Active Directory-based Conditional Access for VPN.
|
||||
|
||||
<a href="" id="vpnv2-profilename-devicecompliance-enabled"></a>**VPNv2/**<em>ProfileName</em>**/DeviceCompliance/Enabled**
|
||||
Added in Windows 10, version 1607. Enables the Device Compliance flow from the client. If marked as True, the VPN Client will attempt to communicate with AAD to get a certificate to use for authentication. The VPN should be set up to use Certificate Auth and the VPN Server must trust the Server returned by Azure Active Directory (AAD).
|
||||
Added in Windows 10, version 1607. Enables the Device Compliance flow from the client. If marked as True, the VPN Client will attempt to communicate with Azure Active Directory to get a certificate to use for authentication. The VPN should be set up to use Certificate Auth and the VPN Server must trust the Server returned by Azure Active Directory (AAD).
|
||||
|
||||
Value type is bool. Supported operations include Get, Add, Replace, and Delete.
|
||||
|
||||
|
@ -1402,7 +1402,7 @@ The XML below is for Windows 10, version 2004.
|
||||
<Add />
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Nodes under DeviceCompliance can be used to enable AAD based Conditional Access for VPN</Description>
|
||||
<Description>Nodes under DeviceCompliance can be used to enable Azure Active Directory based Conditional Access for VPN</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -1425,7 +1425,7 @@ The XML below is for Windows 10, version 2004.
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Enables the Device Compliance flow from the client. If marked as True, the VPN Client will attempt to communicate with AAD to get a certificate to use for authentication. The VPN should be set up to use Certificate Auth and the VPN Server must trust the Server returned by Azure Active Directory</Description>
|
||||
<Description>Enables the Device Compliance flow from the client. If marked as True, the VPN Client will attempt to communicate with Azure Active Directory to get a certificate to use for authentication. The VPN should be set up to use Certificate Auth and the VPN Server must trust the Server returned by Azure Active Directory</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
@ -3592,7 +3592,7 @@ The XML below is for Windows 10, version 2004.
|
||||
<Add />
|
||||
<Get />
|
||||
</AccessType>
|
||||
<Description>Nodes under DeviceCompliance can be used to enable AAD based Conditional Access for VPN</Description>
|
||||
<Description>Nodes under DeviceCompliance can be used to enable Azure Active Directory based Conditional Access for VPN</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -3615,7 +3615,7 @@ The XML below is for Windows 10, version 2004.
|
||||
<Get />
|
||||
<Replace />
|
||||
</AccessType>
|
||||
<Description>Enables the Device Compliance flow from the client. If marked as True, the VPN Client will attempt to communicate with AAD to get a certificate to use for authentication. The VPN should be set up to use Certificate Auth and the VPN Server must trust the Server returned by Azure Active Directory</Description>
|
||||
<Description>Enables the Device Compliance flow from the client. If marked as True, the VPN Client will attempt to communicate with Azure Active Directory to get a certificate to use for authentication. The VPN should be set up to use Certificate Auth and the VPN Server must trust the Server returned by Azure Active Directory</Description>
|
||||
<DFFormat>
|
||||
<bool />
|
||||
</DFFormat>
|
||||
|
@ -266,7 +266,7 @@ The following Group Policy settings were added in Windows 10, version 1803:
|
||||
- Windows Components\IME\Turn on Live Sticker
|
||||
- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection\Do not allow video capture redirection
|
||||
- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Remote Session Environment\Use hardware graphics adapters for all Remote Desktop Services sessions
|
||||
- Windows Components\Search\Allow Cortana Page in OOBE on an AAD account
|
||||
- Windows Components\Search\Allow Cortana Page in OOBE on an Azure Active Directory account
|
||||
- Windows Components\Store\Disable all apps from Microsoft Store
|
||||
- Windows Components\Text Input\Allow Uninstallation of Language Features
|
||||
- Windows Components\Text Input\Improve inking and typing recognition
|
||||
@ -307,7 +307,7 @@ The following Group Policy settings were added in Windows 10, version 1709:
|
||||
- Windows Components\Data Collection and Preview Builds\Limit Enhanced diagnostic data to the minimum required by Windows Analytics
|
||||
- Windows Components\Handwriting\Handwriting Panel Default Mode Docked
|
||||
- Windows Components\Internet Explorer\Internet Settings\Advanced settings\Browsing\Hide the button (next to the New Tab button) that opens Microsoft Edge
|
||||
- Windows Components\MDM\Auto MDM Enrollment with AAD Token
|
||||
- Windows Components\MDM\Auto MDM Enrollment with Azure Active Directory Token
|
||||
- Windows Components\Messaging\Allow Message Service Cloud Sync
|
||||
- Windows Components\Microsoft Edge\Always show the Books Library in Microsoft Edge
|
||||
- Windows Components\Microsoft Edge\Provision Favorites
|
||||
|
@ -44,4 +44,4 @@ When a user enters a search query (by speech or text), Cortana evaluates if the
|
||||
Bing Answers is enabled by default for all users. However, admins can configure and change this for specific users and user groups in their organization.
|
||||
|
||||
## How the Bing Answer policy configuration is applied
|
||||
Before a query is sent to Bing for a search of public results from Bing.com, the Bing Answers service checks with the Office Cloud Policy Service to see if there are any policy configurations that pertain to the user for allowing Bing Answers to respond to questions users ask Cortana. If the user is a member of an AAD group that is assigned that policy configuration, then the appropriate policy settings are applied and a check is made again in 10 minutes.
|
||||
Before a query is sent to Bing for a search of public results from Bing.com, the Bing Answers service checks with the Office Cloud Policy Service to see if there are any policy configurations that pertain to the user for allowing Bing Answers to respond to questions users ask Cortana. If the user is a member of an Azure Active Directory group that is assigned that policy configuration, then the appropriate policy settings are applied and a check is made again in 10 minutes.
|
||||
|
@ -1,13 +1,8 @@
|
||||
---
|
||||
title: Add Microsoft Store for Business applications to a Windows 10 image
|
||||
description: This article describes the correct way to add Microsoft Store for Business applications to a Windows 10 image.
|
||||
keywords: upgrade, update, windows, windows 10, deploy, store, image, wim
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
ms.reviewer:
|
||||
|
@ -1,13 +1,8 @@
|
||||
---
|
||||
title: Configure a PXE server to load Windows PE (Windows 10)
|
||||
description: This topic describes how to configure a PXE server to load Windows PE so that it can be used with an image file to install Windows 10 from the network.
|
||||
keywords: upgrade, update, windows, windows 10, pxe, WinPE, image, wim
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
|
@ -1,16 +1,10 @@
|
||||
---
|
||||
title: Deploy Windows 10/11 Enterprise licenses
|
||||
manager: dougeby
|
||||
ms.audience: itpro
|
||||
ms.author: aaroncz
|
||||
description: Steps to deploy Windows 10 Enterprise or Windows 11 Enterprise licenses for Windows 10/11 Enterprise E3 or E5 Subscription Activation, or for Windows 10/11 Enterprise E3 in CSP
|
||||
keywords: upgrade, update, task sequence, deploy
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.collection: highpri
|
||||
@ -89,7 +83,7 @@ For more information about integrating on-premises AD DS domains with Azure AD,
|
||||
|
||||
## Preparing for deployment: reviewing requirements
|
||||
|
||||
Devices must be running Windows 10 Pro, version 1703, or later and be Azure Active Directory joined, or hybrid domain joined with Azure AD Connect. Customers who are federated with Azure Active Directory are also eligible. For more information, see [Review requirements on devices](#review-requirements-on-devices), later in this topic.
|
||||
Devices must be running Windows 10 Pro, version 1703, or later and be Azure Active Directory-joined, or hybrid domain joined with Azure AD Connect. Customers who are federated with Azure Active Directory are also eligible. For more information, see [Review requirements on devices](#review-requirements-on-devices), later in this topic.
|
||||
|
||||
## Assigning licenses to users
|
||||
|
||||
@ -241,12 +235,12 @@ Use the following figures to help you troubleshoot when users experience these c
|
||||
|
||||
### Review requirements on devices
|
||||
|
||||
Devices must be running Windows 10 Pro, version 1703 (or later), and be Azure Active Directory joined, or hybrid domain joined with Azure AD Connect. Customers who are federated with Azure Active Directory are also eligible. You can use the following procedures to review whether a particular device meets requirements.
|
||||
Devices must be running Windows 10 Pro, version 1703 (or later), and be Azure Active Directory-joined, or hybrid domain joined with Azure AD Connect. Customers who are federated with Azure Active Directory are also eligible. You can use the following procedures to review whether a particular device meets requirements.
|
||||
|
||||
**To determine if a device is Azure Active Directory joined:**
|
||||
**To determine if a device is Azure Active Directory-joined:**
|
||||
|
||||
1. Open a command prompt and type **dsregcmd /status**.
|
||||
2. Review the output under Device State. If the **AzureAdJoined** status is YES, the device is Azure Active Directory joined.
|
||||
2. Review the output under Device State. If the **AzureAdJoined** status is YES, the device is Azure Active Directory-joined.
|
||||
|
||||
**To determine the version of Windows 10:**
|
||||
|
||||
|
@ -5,12 +5,7 @@ manager: dougeby
|
||||
ms.author: aaroncz
|
||||
description: Learn about deploying Windows 10 with Microsoft 365 and how to use a free 90-day trial account to review some of the benefits of Microsoft 365.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
keywords: deployment, automate, tools, configure, mdt, sccm, M365
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.collection: M365-modern-desktop
|
||||
|
@ -3,13 +3,8 @@ title: What's new in Windows client deployment
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
description: Use this article to learn about new solutions and online content related to deploying Windows in your organization.
|
||||
keywords: deployment, automate, tools, configure, news
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.prod: w10
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Add a Windows 10 operating system image using Configuration Manager
|
||||
description: Operating system images are typically the production image used for deployment throughout the organization.
|
||||
ms.assetid: 77f769cc-1a47-4f36-8082-201cd77b8d3b
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: image, deploy, distribute
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager
|
||||
description: Learn how to configure the Windows Preinstallation Environment (Windows PE) to include required network and storage drivers.
|
||||
ms.assetid: 97b3ea46-28d9-407e-8c42-ded2e45e8d5c
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deploy, task sequence
|
||||
ms.prod: w10
|
||||
ms.localizationpriority: medium
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Create a custom Windows PE boot image with Configuration Manager (Windows 10)
|
||||
description: Learn how to create custom Windows Preinstallation Environment (Windows PE) boot images in Microsoft Endpoint Configuration Manager.
|
||||
ms.assetid: b9e96974-324d-4fa4-b0ce-33cfc49c4809
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: tool, customize, deploy, boot image
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Create a task sequence with Configuration Manager (Windows 10)
|
||||
description: Create a Configuration Manager task sequence with Microsoft Deployment Toolkit (MDT) integration using the MDT wizard.
|
||||
ms.assetid: 0b069bec-5be8-47c6-bf64-7a630f41ac98
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deploy, upgrade, task sequence, install
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.pagetype: mdt
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Create an app to deploy with Windows 10 using Configuration Manager
|
||||
description: Microsoft Microsoft Endpoint Manager supports deploying applications as part of the Windows 10 deployment process.
|
||||
ms.assetid: 2dfb2f39-1597-4999-b4ec-b063e8a8c90c
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deployment, task sequence, custom, customize
|
||||
ms.prod: w10
|
||||
ms.localizationpriority: medium
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Deploy Windows 10 using PXE and Configuration Manager (Windows 10)
|
||||
description: In this topic, you will learn how to deploy Windows 10 using Microsoft Endpoint Manager deployment packages and task sequences.
|
||||
ms.assetid: fb93f514-5b30-4f4b-99dc-58e6860009fa
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deployment, image, UEFI, task sequence
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.collection: highpri
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Finalize operating system configuration for Windows 10 deployment
|
||||
description: This article provides a walk-through to finalize the configuration of your Windows 10 operating deployment.
|
||||
ms.assetid: 38b55fa8-e717-4689-bd43-8348751d493e
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: configure, deploy, upgrade
|
||||
ms.prod: w10
|
||||
ms.localizationpriority: medium
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Prepare for Zero Touch Installation of Windows 10 with Configuration Manager
|
||||
description: Learn how to prepare a Zero Touch Installation of Windows 10 with Configuration Manager, by integrating Configuration Manager with Microsoft Deployment Toolkit.
|
||||
ms.assetid: 06e3a221-31ef-47a5-b4da-3b927cb50d08
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: install, configure, deploy, deployment
|
||||
ms.prod: w10
|
||||
ms.localizationpriority: medium
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager
|
||||
description: Learn how to use Configuration Manager and Microsoft Deployment Toolkit (MDT) to refresh a Windows 7 SP1 client with Windows 10.
|
||||
ms.assetid: 57c81667-1019-4711-b3de-15ae9c5387c7
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: upgrade, install, installation, computer refresh
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,16 +1,11 @@
|
||||
---
|
||||
title: Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager
|
||||
description: In this topic, you will learn how to replacing a Windows 7 SP1 computer using Microsoft Endpoint Configuration Manager.
|
||||
ms.assetid: 3c8a2d53-8f08-475f-923a-bca79ca8ac36
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: upgrade, install, installation, replace computer, setup
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,15 +1,11 @@
|
||||
---
|
||||
title: Perform in-place upgrade to Windows 10 via Configuration Manager
|
||||
description: Learn how to perform an in-place upgrade to Windows 10 by automating the process with a Microsoft Endpoint Manager task sequence.
|
||||
ms.assetid: F8DF6191-0DB0-4EF5-A9B1-6A11D5DE4878
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: upgrade, update, task sequence, deploy
|
||||
ms.prod: w10
|
||||
ms.localizationpriority: medium
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Assign applications using roles in MDT (Windows 10)
|
||||
description: This topic will show you how to add applications to a role in the MDT database and then assign that role to a computer.
|
||||
ms.assetid: d82902e4-de9c-4bc4-afe0-41d649b83ce7
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: settings, database, deploy
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Build a distributed environment for Windows 10 deployment (Windows 10)
|
||||
description: In this topic, you will learn how to replicate your Windows 10 deployment shares to facilitate the deployment of Windows 10 in remote or branch locations.
|
||||
ms.assetid: a6cd5657-6a16-4fff-bfb4-44760902d00c
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: replication, replicate, deploy, configure, remote
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Configure MDT deployment share rules (Windows 10)
|
||||
description: Learn how to configure the MDT rules engine to reach out to other resources for additional information instead of storing settings directly in the rules engine.
|
||||
ms.assetid: b5ce2360-33cc-4b14-b291-16f75797391b
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: rules, configuration, automate, deploy
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Configure MDT for UserExit scripts (Windows 10)
|
||||
description: In this topic, you will learn how to configure the MDT rules engine to use a UserExit script to generate computer names based on a prefix and the computer MAC Address.
|
||||
ms.assetid: 29a421d1-12d2-414e-86dc-25b62f5238a7
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: rules, script
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Configure MDT settings (Windows 10)
|
||||
description: One of the most powerful features in Microsoft Deployment Toolkit (MDT) is its extension capabilities; there is virtually no limitation to what you can do in terms of customization.
|
||||
ms.assetid: d3e1280c-3d1b-4fad-8ac4-b65dc711f122
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: customize, customization, deploy, features, tools
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Create a Windows 10 reference image (Windows 10)
|
||||
description: Creating a reference image is important because that image serves as the foundation for the devices in your organization.
|
||||
ms.assetid: 9da2fb57-f2ff-4fce-a858-4ae4c237b5aa
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deploy, deployment, configure, customize, install, installation
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Deploy a Windows 10 image using MDT (Windows 10)
|
||||
description: This topic will show you how to take your reference image for Windows 10, and deploy that image to your environment using the Microsoft Deployment Toolkit (MDT).
|
||||
ms.assetid: 1d70a3d8-1b1d-4051-b656-c0393a93f83c
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deployment, automate, tools, configure
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Get started with the Microsoft Deployment Toolkit (MDT) (Windows 10)
|
||||
description: This topic will help you gain a better understanding of how to use the Microsoft Deployment Toolkit (MDT), as part of a Windows operating system deployment.
|
||||
ms.assetid: a256442c-be47-4bb9-a105-c831f58ce3ee
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deploy, image, feature, install, tools
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Prepare for deployment with MDT (Windows 10)
|
||||
description: This topic will walk you through the steps necessary to create the server structure required to deploy the Windows 10 operating system using the Microsoft Deployment Toolkit (MDT).
|
||||
ms.assetid: 5103c418-0c61-414b-b93c-a8e8207d1226
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deploy, system requirements
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Refresh a Windows 7 computer with Windows 10 (Windows 10)
|
||||
description: This topic will show you how to use MDT Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the computer refresh process.
|
||||
ms.assetid: 2866fb3c-4909-4c25-b083-6fc1f7869f6f
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: reinstallation, customize, template, script, restore
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
@ -23,12 +17,12 @@ ms.topic: article
|
||||
|
||||
This topic will show you how to use MDT Lite Touch Installation (LTI) to upgrade a Windows 7 computer to a Windows 10 computer using the online computer refresh process. The computer refresh scenario is a reinstallation of an updated operating system on the same computer. You can also use this procedure to reinstall the same OS version. In this article, the computer refresh will be done while the computer is online. MDT also supports an offline computer refresh. For more info on that scenario, see the USMTOfflineMigration property on the [MDT resource page](/mem/configmgr/mdt/).
|
||||
|
||||
For the purposes of this topic, we will use three computers: DC01, MDT01, and PC0001.
|
||||
For the purposes of this topic, we'll use three computers: DC01, MDT01, and PC0001.
|
||||
- DC01 is a domain controller for the contoso.com domain.
|
||||
- MDT01 is domain member server that hosts your deployment share.
|
||||
- PC0001 is a domain member computer running a previous version of Windows that is going to be refreshed to a new version of Windows 10, with data and settings restored. The example used here is a computer running Windows 7 SP1.
|
||||
|
||||
Both DC01 and MDT01 are running Windows Server 2019; however any supported version of Windows Server can be used. For more details on the setup for this topic, please see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
Both DC01 and MDT01 are running Windows Server 2019; however any supported version of Windows Server can be used. For more details on the setup for this topic, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||

|
||||
|
||||
@ -36,9 +30,9 @@ The computers used in this topic.
|
||||
|
||||
## The computer refresh process
|
||||
|
||||
A computer refresh is not the same as an in-place upgrade because a computer refresh involves exporting user data and settings then wiping the device before installing a fresh OS and restoring the user's data and settings.
|
||||
A computer refresh isn't the same as an in-place upgrade because a computer refresh involves exporting user data and settings then wiping the device before installing a fresh OS and restoring the user's data and settings.
|
||||
|
||||
For a computer refresh with MDT, you use the User State Migration Tool (USMT), which is part of the Windows Assessment and Deployment Kit (ADK) for Windows 10, to migrate user data and settings. To complete a computer refresh you will:
|
||||
For a computer refresh with MDT, you use the User State Migration Tool (USMT), which is part of the Windows Assessment and Deployment Kit (ADK) for Windows 10, to migrate user data and settings. To complete a computer refresh, you will:
|
||||
|
||||
1. Back up data and settings locally, in a backup folder.
|
||||
2. Wipe the partition, except for the backup folder.
|
||||
@ -46,7 +40,7 @@ For a computer refresh with MDT, you use the User State Migration Tool (USMT), w
|
||||
4. Install other applications.
|
||||
5. Restore data and settings.
|
||||
|
||||
During the computer refresh, USMT uses a feature called Hard-Link Migration Store. When you use this feature, the files are simply linked in the file system, which allows for fast migration, even when there is a lot of data.
|
||||
During the computer refresh, USMT uses a feature called Hard-Link Migration Store. When you use this feature, the files are linked in the file system, which allows for fast migration, even when there's a lot of data.
|
||||
|
||||
>[!NOTE]
|
||||
>In addition to the USMT backup, you can enable an optional full Windows Imaging (WIM) backup of the machine by configuring the MDT rules. If you do this, a .wim file is created in addition to the USMT backup. The .wim file contains the entire volume from the computer and helpdesk personnel can extract content from it if needed. Please note that this is a data WIM backup only. Using this backup to restore the entire computer is not a supported scenario.
|
||||
@ -66,17 +60,17 @@ In addition to the command-line switches that control which profiles to migrate,
|
||||
|
||||
### Multicast
|
||||
|
||||
Multicast is a technology designed to optimize simultaneous deployment to multiple devices. If you have a limited number of simultaneous deployments, you should disable multicast which was [configured in a previous procedure](deploy-a-windows-10-image-using-mdt.md#set-up-mdt-for-multicast) in this guide. Disabling multicast will speed up deployment for a small number of computers. You will need to update the deployment share after changing this setting.
|
||||
Multicast is a technology designed to optimize simultaneous deployment to multiple devices. If you have a limited number of simultaneous deployments, you should disable multicast which was [configured in a previous procedure](deploy-a-windows-10-image-using-mdt.md#set-up-mdt-for-multicast) in this guide. Disabling multicast will speed up deployment for a small number of computers. You'll need to update the deployment share after changing this setting.
|
||||
|
||||
## Refresh a Windows 7 SP1 client
|
||||
|
||||
In these section, we assume that you have already performed the prerequisite procedures in the following topics, so that you have a deployment share named **MDTProduction$** on MDT01:
|
||||
In this section, we assume that you've already performed the prerequisite procedures in the following topics, so that you have a deployment share named **MDTProduction$** on MDT01:
|
||||
|
||||
- [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md)
|
||||
- [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
- [Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||
|
||||
It is also assumed that you have a domain member client computer named PC0001 in your environment running Windows 7, 8.1 or 10 that is ready for a refresh to the latest version of Windows 10. For demonstration purposes, we will refreshing a Windows 7 SP1 PC to Windows 10, version 1909.
|
||||
It is also assumed that you have a domain member client computer named PC0001 in your environment running Windows 7, 8.1 or 10 that is ready for a refresh to the latest version of Windows 10. For demonstration purposes, we'll be refreshing a Windows 7 SP1 PC to Windows 10, version 1909.
|
||||
|
||||
### Upgrade (refresh) a Windows 7 SP1 client
|
||||
|
||||
|
@ -1,18 +1,12 @@
|
||||
---
|
||||
title: Replace a Windows 7 computer with a Windows 10 computer (Windows 10)
|
||||
description: In this article, you will learn how to replace a Windows 7 device with a Windows 10 device.
|
||||
description: In this article, you'll learn how to replace a Windows 7 device with a Windows 10 device.
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.assetid: acf091c9-f8f4-4131-9845-625691c09a2a
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deploy, deployment, replace
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
@ -22,15 +16,15 @@ ms.topic: article
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
|
||||
A computer replace scenario for Windows 10 is quite similar to a computer refresh for Windows 10. However, because you are replacing a device, you cannot store the backup on the old computer. Instead you need to store the backup to a location where the new computer can read it. The User State Migration Tool (USMT) will be used to back up and restore data and settings.
|
||||
A computer replace scenario for Windows 10 is similar to a computer refresh for Windows 10. However, because you're replacing a device, you can't store the backup on the old computer. Instead you need to store the backup to a location where the new computer can read it. The User State Migration Tool (USMT) will be used to back up and restore data and settings.
|
||||
|
||||
For the purposes of this topic, we will use four computers: DC01, MDT01, PC0002, and PC0007.
|
||||
For the purposes of this topic, we'll use four computers: DC01, MDT01, PC0002, and PC0007.
|
||||
- DC01 is a domain controller for the contoso.com domain.
|
||||
- MDT01 is domain member server that hosts your deployment share.
|
||||
- PC0002 is an old computer running Windows 7 SP1 that will be replaced by PC0007.
|
||||
- PC0007 is a new computer will have the Windows 10 OS installed prior to data from PC0002 being migrated. Both PC0002 and PC0007 are members of the contoso.com domain.
|
||||
|
||||
For more details on the setup for this topic, please see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
For more details on the setup for this topic, see [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md).
|
||||
|
||||

|
||||
|
||||
@ -46,9 +40,9 @@ The computers used in this topic.
|
||||
|
||||
On **MDT01**:
|
||||
|
||||
1. Open the Deployment Workbench, under **Deployment Shares** right-click **MDT Production**, click **Properties**, and then click the **Rules** tab.
|
||||
2. Change the **SkipUserData=YES** option to **NO**, and click **OK**.
|
||||
3. Right-click **MDT Production** and click **Update Deployment Share**. Click **Next**, **Next**, and **Finish** to complete the Update Deployment Share Wizard with the default settings.
|
||||
1. Open the Deployment Workbench, under **Deployment Shares** right-click **MDT Production**, select **Properties**, and then select the **Rules** tab.
|
||||
2. Change the **SkipUserData=YES** option to **NO**, and select **OK**.
|
||||
3. Right-click on **MDT Production** and select **Update Deployment Share**. Then select **Next**, **Next**, and **Finish** to complete the Update Deployment Share Wizard with the default settings.
|
||||
|
||||
### Create and share the MigData folder
|
||||
|
||||
@ -81,7 +75,7 @@ On **MDT01**:
|
||||
|
||||
During a computer replace, these are the high-level steps that occur:
|
||||
|
||||
1. On the computer you are replacing, a special replace task sequence runs the USMT backup and, if you configured it, runs the optional full Windows Imaging (WIM) backup.
|
||||
1. On the computer you're replacing, a special replace task sequence runs the USMT backup and, if you configured it, runs the optional full Windows Imaging (WIM) backup.
|
||||
2. On the new computer, you perform a standard bare-metal deployment. At the end of the bare-metal deployment, the USMT backup from the old computer is restored.
|
||||
|
||||
### Run the replace task sequence
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Set up MDT for BitLocker (Windows 10)
|
||||
ms.assetid: 386e6713-5c20-4d2a-a220-a38d94671a38
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
description: Learn how to configure your environment for BitLocker, the disk volume encryption built into Windows 10 Enterprise and Windows 10 Pro, using MDT.
|
||||
keywords: disk, encryption, TPM, configure, secure, script
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-mar2020
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Simulate a Windows 10 deployment in a test environment (Windows 10)
|
||||
description: This topic will walk you through the process of creating a simulated environment on which to test your Windows 10 deployment using MDT.
|
||||
ms.assetid: 2de86c55-ced9-4078-b280-35e0329aea9c
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deploy, script
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Perform an in-place upgrade to Windows 10 with MDT (Windows 10)
|
||||
description: The simplest path to upgrade PCs that are currently running Windows 7, Windows 8, or Windows 8.1 to Windows 10 is through an in-place upgrade.
|
||||
ms.assetid: B8993151-3C1E-4F22-93F4-2C5F2771A460
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: upgrade, update, task sequence, deploy
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Use Orchestrator runbooks with MDT (Windows 10)
|
||||
description: Learn how to integrate Microsoft System Center 2012 R2 Orchestrator with MDT to replace the existing web services that are used in deployment solutions.
|
||||
ms.assetid: 68302780-1f6f-4a9c-9407-b14371fdce3f
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: web services, database
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mdt
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Use MDT database to stage Windows 10 deployment info (Windows 10)
|
||||
description: Learn how to use the MDT database to pre-stage information on your Windows 10 deployment in a Microsoft SQL Server 2012 SP1 Express database.
|
||||
ms.assetid: 8956ab54-90ba-45d3-a384-4fdec72c4d46
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.pagetype: mdt
|
||||
keywords: database, permissions, settings, configure, deploy
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: Use web services in MDT (Windows 10)
|
||||
description: Learn how to create a simple web service that generates computer names and then configure MDT to use that service during your Windows 10 deployment.
|
||||
ms.assetid: 8f47535e-0551-4ccb-8f02-bb97539c6522
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deploy, web apps
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.pagetype: mdt
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,18 +1,11 @@
|
||||
---
|
||||
title: Deploy Windows To Go in your organization (Windows 10)
|
||||
description: Learn how to deploy Windows To Go in your organization through a wizard in the user interface as well as programatically with Windows PowerShell.
|
||||
ms.assetid: cfe550be-ffbd-42d1-ab4d-80efae49b07f
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.audience: itpro
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
keywords: deployment, USB, device, BitLocker, workspace, security, data
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: mobility
|
||||
audience: itpro
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
---
|
||||
|
@ -1,17 +1,12 @@
|
||||
---
|
||||
title: Deploy Windows 10 (Windows 10)
|
||||
description: Learn about Windows 10 upgrade options for planning, testing, and managing your production deployment.
|
||||
ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.audience: itpro
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
audience: itpro
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
---
|
||||
|
@ -2,10 +2,7 @@
|
||||
title: Using a proxy with Delivery Optimization
|
||||
manager: dansimp
|
||||
description: Settings to use with various proxy configurations to allow Delivery Optimization to work
|
||||
keywords: updates, downloads, network, bandwidth
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
|
@ -2,10 +2,7 @@
|
||||
title: Delivery Optimization client-service communication explained
|
||||
manager: dougeby
|
||||
description: Details of how Delivery Optimization communicates with the server when content is requested to download.
|
||||
keywords: updates, downloads, network, bandwidth
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
|
@ -4,8 +4,6 @@ ms.author: mstewart
|
||||
manager: dougeby
|
||||
ms.prod: w10
|
||||
ms.collection: M365-modern-desktop
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
ms.topic: include
|
||||
ms.date: 04/06/2022
|
||||
ms.localizationpriority: medium
|
||||
|
@ -2,10 +2,7 @@
|
||||
title: Microsoft Connected Cache for Enterprise and Education (private preview)
|
||||
manager: dougeby
|
||||
description: Details on Microsoft Connected Cache (MCC) for Enterprise and Education.
|
||||
keywords: updates, downloads, network, bandwidth
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
|
@ -3,10 +3,7 @@ title: Delivery Optimization reference
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
description: This article provides a summary of references and descriptions for all of the Delivery Optimization settings.
|
||||
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
@ -124,7 +121,7 @@ Download mode dictates which download sources clients are allowed to use when do
|
||||
> Starting in Windows 11, the Bypass option of Download Mode is no longer used.
|
||||
>
|
||||
> [!NOTE]
|
||||
> When you use AAD tenant, AD Site, or AD Domain as the source of group IDs, the association of devices participating in the group should not be relied on for an authentication of identity of those devices.
|
||||
> When you use Azure Active Directory tenant, AD Site, or AD Domain as the source of group IDs, the association of devices participating in the group should not be relied on for an authentication of identity of those devices.
|
||||
|
||||
### Group ID
|
||||
|
||||
|
@ -3,10 +3,7 @@ title: Set up Delivery Optimization
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
description: In this article, learn how to set up Delivery Optimization.
|
||||
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
|
@ -2,10 +2,7 @@
|
||||
title: What is Delivery Optimization?
|
||||
manager: dougeby
|
||||
description: This article provides information about Delivery Optimization, a peer-to-peer distribution method in Windows 10 and Windows 11.
|
||||
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
|
@ -2,10 +2,7 @@
|
||||
title: Microsoft Connected Cache overview
|
||||
manager: dougeby
|
||||
description: This article provides information about Microsoft Connected Cache (MCC), a software-only caching solution.
|
||||
keywords: oms, operations management suite, wdav, updates, downloads, log analytics
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
|
@ -2,9 +2,8 @@
|
||||
title: Optimize Windows update delivery
|
||||
description: Two methods of peer-to-peer content distribution are available, Delivery Optimization and BranchCache.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
author: aczechowski
|
||||
ms.localizationpriority: medium
|
||||
author: aaroncz
|
||||
ms.author: aaroncz
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
|
@ -2,10 +2,7 @@
|
||||
title: What's new in Delivery Optimization
|
||||
manager: dougeby
|
||||
description: What's new in Delivery Optimization, a peer-to-peer distribution method in Windows 10 and Windows 11.
|
||||
keywords: oms, operations management suite, wdav, updates, downloads, log analytics, mcc, do, delivery, connected cache
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
audience: itpro
|
||||
author: carmenf
|
||||
ms.localizationpriority: medium
|
||||
ms.author: carmenf
|
||||
|
@ -1,17 +1,11 @@
|
||||
---
|
||||
title: MBR2GPT
|
||||
description: Use MBR2GPT.EXE to convert a disk from the Master Boot Record (MBR) to the GUID Partition Table (GPT) partition style without modifying or deleting data on the disk.
|
||||
keywords: deploy, troubleshoot, windows, 10, upgrade, partition, mbr, gpt
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
ms.date: 02/13/2018
|
||||
manager: dougeby
|
||||
ms.audience: itpro
|
||||
ms.localizationpriority: high
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Application Compatibility Toolkit (ACT) Technical Reference (Windows 10)
|
||||
description: The Microsoft Application Compatibility Toolkit (ACT) helps you see if the apps and devices in your org are compatible with different versions of Windows.
|
||||
ms.assetid: d90d38b2-2718-4481-90eb-4480719627ba
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Applying Filters to Data in the SUA Tool (Windows 10)
|
||||
description: Learn how to apply filters to results from the Standard User Analyzer (SUA) tool while testing your application.
|
||||
ms.assetid: 48c39919-3501-405d-bcf5-d2784cbb011f
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Available Data Types and Operators in Compatibility Administrator (Windows 10)
|
||||
description: The Compatibility Administrator tool provides a way to query your custom-compatibility databases.
|
||||
ms.assetid: 67d9c03e-ab9d-4fda-8a55-8c5b90266d3b
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,16 +1,10 @@
|
||||
---
|
||||
title: Best practice recommendations for Windows To Go (Windows 10)
|
||||
description: Learn about best practice recommendations for using Windows To Go, like using a USB 3.0 port with Windows to Go if it's available.
|
||||
ms.assetid: 05e6e0ab-94ed-4c0c-a195-0abd006f0a86
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: best practices, USB, device, boot
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: mobility
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Compatibility Administrator User's Guide (Windows 10)
|
||||
ms.assetid: 0ce05f66-9009-4739-a789-60f3ce380e76
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
description: The Compatibility Administrator tool helps you resolve potential application-compatibility issues before deploying a new version of Windows.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-mar2020
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Compatibility Fix Database Management Strategies and Deployment (Windows 10)
|
||||
ms.assetid: fdfbf02f-c4c4-4739-a400-782204fd3c6c
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
description: Learn how to deploy your compatibility fixes into an application-installation package or through a centralized compatibility-fix database.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Compatibility Fixes for Windows 10, Windows 8, Windows 7, & Windows Vista
|
||||
description: Find compatibility fixes for all Windows operating systems that have been released from Windows Vista through Windows 10.
|
||||
ms.assetid: cd51c824-557f-462a-83bb-54b0771b7dff
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Creating a Custom Compatibility Fix in Compatibility Administrator (Windows 10)
|
||||
description: The Compatibility Administrator tool uses the term fix to describe the combination of compatibility information added to a customized database for a specific application.
|
||||
ms.assetid: e4f2853a-0e46-49c5-afd7-0ed12f1fe0c2
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Create a Custom Compatibility Mode (Windows 10)
|
||||
description: Windows® provides several compatibility modes, groups of compatibility fixes found to resolve many common application-compatibility issues.
|
||||
ms.assetid: 661a1c0d-267f-4a79-8445-62a9a98d09b0
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Create AppHelp Message in Compatibility Administrator (Windows 10)
|
||||
description: Create an AppHelp text message with Compatibility Administrator; a message that appears upon starting an app with major issues on the Windows® operating system.
|
||||
ms.assetid: 5c6e89f5-1942-4aa4-8439-ccf0ecd02848
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,16 +1,10 @@
|
||||
---
|
||||
title: Deployment considerations for Windows To Go (Windows 10)
|
||||
description: Learn about deployment considerations for Windows To Go, such as the boot experience, deployment methods, and tools that you can use with Windows To Go.
|
||||
ms.assetid: dcfc5d96-b96b-44cd-ab65-416b5611c65e
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: deploy, mobile, device, USB, boot, image, workspace, driver
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: mobility
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Enabling and Disabling Compatibility Fixes in Compatibility Administrator
|
||||
description: You can disable and enable individual compatibility fixes in your customized databases for testing and troubleshooting purposes.
|
||||
ms.assetid: 6bd4a7c5-0ed9-4a35-948c-c438aa4d6cb6
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -2,10 +2,7 @@
|
||||
title: Windows client features lifecycle
|
||||
description: Learn about the lifecycle of Windows 10 features, as well as features that are no longer developed, removed features, and terminology assigned to a feature.
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Fixing Applications by Using the SUA Tool (Windows 10)
|
||||
description: On the user interface for the Standard User Analyzer (SUA) tool, you can apply fixes to an application.
|
||||
ms.assetid: 7f5947b1-977b-4d7e-bb52-fbe8e76f6b8b
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,11 +1,7 @@
|
||||
---
|
||||
title: Plan for Windows 10 deployment (Windows 10)
|
||||
description: Find resources for your Windows 10 deployment. Windows 10 provides new deployment capabilities and tools, and introduces new ways to keep the OS up to date.
|
||||
ms.assetid: 002F9B79-B50F-40C5-A7A5-0B4770E6EC15
|
||||
keywords: deploy, upgrade, update, configure
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.sitesec: library
|
||||
ms.localizationpriority: medium
|
||||
author: aczechowski
|
||||
ms.author: aaroncz
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Install/Uninstall Custom Databases (Windows 10)
|
||||
description: The Compatibility Administrator tool enables the creation and the use of custom-compatibility and standard-compatibility databases.
|
||||
ms.assetid: 659c9d62-5f32-433d-94aa-12141c01368f
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Managing Application-Compatibility Fixes and Custom Fix Databases (Windows 10)
|
||||
description: Learn why you should use compatibility fixes, and how to deploy and manage custom-compatibility fix databases.
|
||||
ms.assetid: 9c2e9396-908e-4a36-ad67-2e40452ce017
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,16 +1,10 @@
|
||||
---
|
||||
title: Prepare your organization for Windows To Go (Windows 10)
|
||||
description: Though Windows To Go is no longer being developed, you can find info here about the the “what”, “why”, and “when” of deployment.
|
||||
ms.assetid: f3f3c160-90ad-40a8-aeba-2aedee18f7ff
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: ["mobile, device, USB, deploy"]
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: mobility
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
ms.custom: seo-marvel-apr2020
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Searching for Fixed Applications in Compatibility Administrator (Windows 10)
|
||||
description: Compatibility Administrator can locate specific executable (.exe) files with previously applied compatibility fixes, compatibility modes, or AppHelp messages.
|
||||
ms.assetid: 1051a2dc-0362-43a4-8ae8-07dae39b1cb8
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Searching for Installed Compatibility Fixes with the Query Tool in Compatibility Administrator (Windows 10)
|
||||
description: You can access the Query tool from within Compatibility Administrator. The Query tool provides the same functionality as using the Search feature.
|
||||
ms.assetid: dd213b55-c71c-407a-ad49-33db54f82f22
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,16 +1,10 @@
|
||||
---
|
||||
title: Security and data protection considerations for Windows To Go (Windows 10)
|
||||
description: Ensure that the data, content, and resources you work with in the Windows To Go workspace are protected and secure.
|
||||
ms.assetid: 5f27339f-6761-44f4-8c29-9a25cf8e75fe
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
keywords: mobile, device, USB, secure, BitLocker
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: mobility, security
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.topic: article
|
||||
---
|
||||
|
@ -1,15 +1,10 @@
|
||||
---
|
||||
title: Showing Messages Generated by the SUA Tool (Windows 10)
|
||||
description: On the user interface for the Standard User Analyzer (SUA) tool, you can show the messages that the tool has generated.
|
||||
ms.assetid: 767eb7f2-d6c4-414c-a7b3-a997337d904a
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
@ -2,15 +2,10 @@
|
||||
title: SUA User's Guide (Windows 10)
|
||||
description: Learn how to use Standard User Analyzer (SUA). SUA can test your apps and monitor API calls to detect compatibility issues related to the Windows User Account Control (UAC) feature.
|
||||
ms.custom: seo-marvel-apr2020
|
||||
ms.assetid: ea525c25-b557-4ed4-b042-3e4d0e543e10
|
||||
ms.reviewer:
|
||||
manager: dougeby
|
||||
ms.author: aaroncz
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.pagetype: appcompat
|
||||
ms.sitesec: library
|
||||
audience: itpro
|
||||
author: aczechowski
|
||||
ms.date: 04/19/2017
|
||||
ms.topic: article
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user