new build 4/14/16

This commit is contained in:
Brian Lich
2016-04-14 09:54:57 -07:00
parent 665412bb59
commit 6f17d24ebd
31 changed files with 85 additions and 62 deletions

View File

@ -11,6 +11,7 @@
### [What's New in AGPM 4.0 SP1](whats-new-in-agpm-40-sp1.md)
### [Release Notes for Microsoft Advanced Group Policy Management 4.0 SP1](release-notes-for-microsoft-advanced-group-policy-management-40-sp1.md)
## [AGPM 4 [NavEngl]](agpm-4-navengl.md)
### [Advanced Group Policy Management 4.0](advanced-group-policy-management-40.md)
### [What's New in AGPM 4.0](whats-new-in-agpm-40.md)
### [Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0](step-by-step-guide-for-microsoft-advanced-group-policy-management-40.md)
### [Operations Guide for Microsoft Advanced Group Policy Management 4.0](operations-guide-for-microsoft-advanced-group-policy-management-40.md)

View File

@ -0,0 +1,64 @@
---
title: Advanced Group Policy Management 4.0
description: Advanced Group Policy Management 4.0
ms.assetid: 9873a1f7-97fc-4546-9538-b4c0308529c0
author: MaggiePucciEvans
---
# Advanced Group Policy Management 4.0
You can use Microsoft Advanced Group Policy Management (AGPM) to extend the capabilities of the Group Policy Management Console (GPMC). AGPM provides comprehensive change control and improved management of Group Policy Objects (GPOs).
Using AGPM, you can do these tasks:
- Perform offline editing of GPOs so that you can create and test them before you deploy them to a production environment.
- Maintain multiple versions of a GPO in a central archive so that you can roll back if a problem occurs.
- Share the responsibility for editing, approving, and reviewing GPOs among multiple people by using role-based delegation.
- Eliminate the danger of multiple Group Policy administrators overwriting one another's work by using the check-in and check-out capability for GPOs.
- Analyze changes to a GPO, comparing it to another GPO or another version of the same GPO by using difference reporting.
- Simplify creating new GPOs by using GPO templates, storing common policy settings and preference settings to use as starting points for new GPOs.
- Delegate access to the production environment.
- Search for GPOs with specific attributes and filter the list of GPOs displayed.
- Export a GPO to a file so that you can copy it from a domain in a test forest to a domain in a production forest.
AGPM adds a **Change Control** folder under each domain displayed in the GPMC, in addition to a **History** tab for each GPO and Group Policy link displayed in the GPMC.
- [Overview of Advanced Group Policy Management](overview-of-advanced-group-policy-management-agpm40.md)
- [Best Practices for Version Control](best-practices-for-version-control-agpm40.md)
- [Checklist: Administer the AGPM Server and Archive](checklist-administer-the-agpm-server-and-archive-agpm40.md)
- [Checklist: Create, Edit, and Deploy a GPO](checklist-create-edit-and-deploy-a-gpo-agpm40.md)
- [Search and Filter the List of GPOs](search-and-filter-the-list-of-gpos.md)
- [Performing AGPM Administrator Tasks](performing-agpm-administrator-tasks-agpm40.md)
- [Performing Editor Tasks](performing-editor-tasks-agpm40.md)
- [Performing Approver Tasks](performing-approver-tasks-agpm40.md)
- [Performing Reviewer Tasks](performing-reviewer-tasks-agpm40.md)
- [Troubleshooting AGPM](troubleshooting-agpm-agpm40.md)
- [User Interface: Advanced Group Policy Management](user-interface-advanced-group-policy-management-agpm40.md)
 
 

View File

@ -24,7 +24,7 @@ Microsoft Advanced Group Policy Management (AGPM) provides version control for G
### Additional references
- [Advanced Group Policy Management 4.0](../agpm/advanced-group-policy-management-40.md)
- [Advanced Group Policy Management 4.0](advanced-group-policy-management-40.md)
 

View File

@ -72,7 +72,7 @@ In Advanced Group Policy Management (AGPM), both the AGPM Service and the archiv
### Additional references
- [Advanced Group Policy Management 4.0](../agpm/advanced-group-policy-management-40.md)
- [Advanced Group Policy Management 4.0](advanced-group-policy-management-40.md)
 

View File

@ -58,7 +58,7 @@ In an environment where multiple people change Group Policy Objects (GPOs) by us
### Additional references
[Advanced Group Policy Management 4.0](../agpm/advanced-group-policy-management-40.md)
[Advanced Group Policy Management 4.0](advanced-group-policy-management-40.md)
 

View File

@ -47,7 +47,7 @@ In an environment where multiple people change GPOs, an AGPM Administrator deleg
### Additional references
- [Advanced Group Policy Management 4.0](../agpm/advanced-group-policy-management-40.md)
- [Advanced Group Policy Management 4.0](advanced-group-policy-management-40.md)
 

View File

@ -107,7 +107,7 @@ You can use the following special terms, which are not case-sensitive, when you
### Additional references
- [Advanced Group Policy Management 4.0](../agpm/advanced-group-policy-management-40.md)
- [Advanced Group Policy Management 4.0](advanced-group-policy-management-40.md)
 

View File

@ -60,8 +60,6 @@ Use the **Add Files to Virtual File System** page of the Application Virtualizat
[Sequencing Wizard](sequencing-wizard.md)
[Application Virtualization Sequencing Wizard Installation](4223587d-25f2-4a07-8807-97f9e60b01cd)
 
 

View File

@ -33,11 +33,6 @@ Use any of the following links for more information about the App-V Sequencer di
<a href="" id="antivirus-running-dialog-box--app-v-4-6-sp1-"></a>[Antivirus Running Dialog Box (App-V 4.6 SP1)](antivirus-running-dialog-box--app-v-46-sp1-.md)
## Related topics
[Application Virtualization Sequencer Online Help (App-V 4.6 SP1)](d916f3ae-ab76-4a0d-a7af-31ed4a7d90ae)
 
 

View File

@ -21,11 +21,6 @@ Use any of the following links for more information about the App-V wizards.
<a href="" id="sequencer-wizard---package-accelerator--appv-4-6-sp1-"></a>[Sequencer Wizard - Package Accelerator (AppV 4.6 SP1)](sequencer-wizard---package-accelerator--appv-46-sp1-.md)
## Related topics
[Application Virtualization Sequencer Online Help (App-V 4.6 SP1)](d916f3ae-ab76-4a0d-a7af-31ed4a7d90ae)
 
 

View File

@ -30,7 +30,7 @@ The following list displays the endto-end high-level workflow for reporting i
3. If you are not using an electronic software distribution system such as Configuration Manager to view reports then you can define reports in SQL Server Reporting Service. Download predefined appvshort Reports from the Download Center at <http://go.microsoft.com/fwlink/?LinkId=397255>.
**Note**  
If you are using the Configuration Manager integration with App-V 5.0, most reports are generated from Configuration Manager rather than from App-V 5.0. See [Introduction to Application Management in Configuration Manager](77641e23-45d0-41d9-88ff-cac253ba1e26) and the "Virtualized Application" section of [List of Reports Supplied with Microsoft System Center 2012 R2 Configuration Manager](e3fd6dd4-f036-4913-a378-241c952e9bdf) for more information.
If you are using the Configuration Manager integration with App-V 5.0, most reports are generated from Configuration Manager rather than from App-V 5.0.
 

View File

@ -30,7 +30,7 @@ The following list displays the endto-end high-level workflow for reporting i
3. If you are not using an electronic software distribution system such as Configuration Manager to view reports then you can define reports in SQL Server Reporting Service. Download predefined appvshort Reports from the Download Center at <http://go.microsoft.com/fwlink/?LinkId=397255>.
**Note**  
If you are using the Configuration Manager integration with App-V 5.1, most reports are generated from Configuration Manager rather than from App-V 5.1. See [Introduction to Application Management in Configuration Manager](77641e23-45d0-41d9-88ff-cac253ba1e26) and the "Virtualized Application" section of [List of Reports Supplied with Microsoft System Center 2012 R2 Configuration Manager](e3fd6dd4-f036-4913-a378-241c952e9bdf) for more information.
If you are using the Configuration Manager integration with App-V 5.1, most reports are generated from Configuration Manager rather than from App-V 5.1.
 

View File

@ -144,11 +144,6 @@ During App-V 5.0 Setup, setup log files are created in the **%temp%** folder of
Add or vote on suggestions [here](http://appv.uservoice.com/forums/280448-microsoft-application-virtualization). For App-V issues, use the [App-V TechNet Forum](https://social.technet.microsoft.com/Forums/home?forum=mdopappv).
## Related topics
[Security and Privacy for App-V 5.0](2544bb39-007c-404b-b3cf-4c37128183bd)
 
 

View File

@ -87,7 +87,7 @@ The Sequencer creates App-V packages and produces a virtualized application. The
 
For information about sequencing, see [Application Virtualization 5.0 Sequencing Guide](www.microsoft.com/download/details.aspx?id=27760).
For information about sequencing, see [Application Virtualization 5.0 Sequencing Guide](http://www.microsoft.com/download/details.aspx?id=27760).
## <a href="" id="bkmk-appv-file-contents"></a>Whats in the appv file?

View File

@ -58,8 +58,6 @@ You must configure the package converter to always save the package ingredients
[Operations for App-V 5.0](operations-for-app-v-50.md)
[How to Convert a Package Created in a Previous Version Using PowerShell \[Beta\]](b41d43f5-860e-476a-bd56-f37f25a78537)
 
 

View File

@ -10,7 +10,7 @@ author: MaggiePucciEvans
Use these steps to create a connection group by using the App-V Management Console. To use PowerShell to create connection groups, see [How to Manage Connection Groups on a Stand-alone Computer by Using PowerShell](how-to-manage-connection-groups-on-a-stand-alone-computer-by-using-powershell.md).
When you place packages in a connection group, their package root paths are merged. If you remove packages, only the remaining packages maintain the merged root. For more information, see [About Merged Root Paths for Packages in Connection Groups](97b35683-9caf-4ce9-8ca5-43452d329b98).
When you place packages in a connection group, their package root paths are merged. If you remove packages, only the remaining packages maintain the merged root.
**To create a connection group**

View File

@ -12,7 +12,7 @@ Use the following procedure to configure the App-V 5.0 client configuration.
**To modify App-V 5.0 client configuration using PowerShell**
1. To configure the client settings using PowerShell, use the **Set-AppvClientConfiguration** cmdlet. For more information about installing PowerShell, and a list of cmdlets see, [How to install PowerShell](be9fd867-8e37-467a-8a95-b421a1a49f39).
1. To configure the client settings using PowerShell, use the **Set-AppvClientConfiguration** cmdlet.
2. To modify the client configuration, open a PowerShell Command prompt and run the following cmdlet **Set-AppvClientConfiguration** with any required parameters. For example:

View File

@ -8,7 +8,7 @@ author: MaggiePucciEvans
# Deploying the DaRT 7.0 Recovery Image
After you have created the International Organization for Standardization (ISO) file that contains the Microsoft Diagnostics and Recovery Toolset (DaRT) 7 recovery image, you can deploy the DaRT recovery image throughout your enterprise so that it is available to end users and helpdesk agents. There are four supported methods that you can use to deploy the DaRT recovery image (for more information about each method and the advantages and disadvantages of each, see [Planning How to Save and Deploy the DaRT Recovery Image](bc550da2-485f-4c6a-a56a-2a446b88e58c#bkmk-determinehowtosavedartimage)).
After you have created the International Organization for Standardization (ISO) file that contains the Microsoft Diagnostics and Recovery Toolset (DaRT) 7 recovery image, you can deploy the DaRT recovery image throughout your enterprise so that it is available to end users and helpdesk agents. There are four supported methods that you can use to deploy the DaRT recovery image.
- Burn the ISO image file to a CD or DVD

View File

@ -23,7 +23,7 @@ The following is a list of options that are available for guaranteeing access to
- **Copy the dump file to another computer.** If the symbols cannot be downloaded because of a lack of an Internet connection, copy the crash dump file to a computer that does have an Internet connection and run the stand-alone **Crash Analyzer Wizard** on that computer.
- **Access the symbol files from another computer.** If the symbols cannot be downloaded because of a lack of an Internet connection, you can download the symbols from a computer that does have an Internet connection and then copy them to the computer that does not have an Internet connection, or you can map a network drive to a location where the symbols are available on the local network. If you run the **Crash Analyzer** in a Windows Recovery Environment (Windows RE), you can include the symbol files on the DaRT recovery image. For more information about how to create a recovery image, see [Creating the DaRT 7.0 Recovery Image](84d7df0c-b80b-4370-8ce2-9fd5a0065c17).
- **Access the symbol files from another computer.** If the symbols cannot be downloaded because of a lack of an Internet connection, you can download the symbols from a computer that does have an Internet connection and then copy them to the computer that does not have an Internet connection, or you can map a network drive to a location where the symbols are available on the local network. If you run the **Crash Analyzer** in a Windows Recovery Environment (Windows RE), you can include the symbol files on the DaRT recovery image. For more information about how to create a recovery image, see [Creating the DaRT 7.0 Recovery Image](creating-the-dart-70-recovery-image-dart-7.md).
- **Access symbol files through an HTTP proxy server.** If the symbols cannot be downloaded because an HTTP proxy server must be accessed, use the following steps to access an HTTP proxy server. In DaRT 7, the **Crash Analyzer Wizard** has a setting available on the **Specify Symbol Files Location** dialog page, marked with the label **Proxy server (optional, using the format "server:port")**. You can use this text box to specify a proxy server. Enter the proxy address in the form **&lt;hostname&gt;:&lt;port&gt;**, where the &lt;**hostname**&gt; is a DNS name or IP address, and the &lt;**port**&gt; is a TCP port number, usually 80. There are two modes in which the **Crash Analyzer** can be run. Following is how you use the proxy setting in each of these modes:

View File

@ -32,8 +32,6 @@ DaRT is an important part of the Microsoft Desktop Optimization Pack (MDOP), a d
<a href="" id="technical-reference-for-dart-7-0"></a>[Technical Reference for DaRT 7.0](technical-reference-for-dart-70-new-ia.md)
[Microsoft Diagnostics and Recovery Toolset (DaRT) users should use Windows Defender Offline (WDO) for malware detection](59678283-4b44-4d02-ba8f-0e7315efd5d1)
### More Information
<a href="" id="release-notes-for-dart-7-0"></a>[Release Notes for DaRT 7.0](release-notes-for-dart-70-new-ia.md)

View File

@ -112,7 +112,7 @@ The **Search** tool opens a **File Search** window that you can use to find docu
### Standalone System Sweeper
**Important**  
Environments with the Standalone System Sweeper deployed should instead use the Windows Defender Offline (WDO) protection image for malware detection. Because of how the Standalone System Sweeper tool integrates into DaRT, all supported DaRT version deployments cannot apply these anti-malware updates to their DaRT images. For more information, see [Microsoft Diagnostics and Recovery Toolset (DaRT) users should use Windows Defender Offline (WDO) for malware detection](59678283-4b44-4d02-ba8f-0e7315efd5d1).
Environments with the Standalone System Sweeper deployed should instead use the Windows Defender Offline (WDO) protection image for malware detection. Because of how the Standalone System Sweeper tool integrates into DaRT, all supported DaRT version deployments cannot apply these anti-malware updates to their DaRT images.
 

View File

@ -10,13 +10,6 @@ author: MaggiePucciEvans
This section includes technical reference information about Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0 that provide additional information an administrator.
## Technical reference
- [Microsoft Diagnostics and Recovery Toolset (DaRT) users should use Windows Defender Offline (WDO) for malware detection](59678283-4b44-4d02-ba8f-0e7315efd5d1)
Environments with the Microsoft Diagnostics and Recovery Toolset (DaRT) Defender tool deployed should instead use the Windows Defender Offline (WDO) protection image for malware detection.
## Other resources for DaRT operations

View File

@ -98,7 +98,7 @@ The following table provides links to the product documentation for the MDOP pro
<p><strong>MED-V 1.0 SP1</strong> - Windows 7, Windows Vista, Windows XP</p>
<p><strong>MED-V 1.0</strong> - Windows Vista, Windows XP</p></td>
<td align="left"><p>[Microsoft Enterprise Desktop Virtualization 2.0](medv-v2/index.md)</p>
<p>[About MED-V 1.0 SP1](p_mdop_medv_1/about-med-v-10-sp1.md)</p>
<p>[About MED-V 1.0 SP1](medv-v1/about-med-v-10-sp1.md)</p>
<p>[Microsoft Enterprise Desktop Virtualization 1.0](74a9483e-87a1-4394-a4d5-50cff5c07297)</p>
<p>[MED-V Whitepapers on the Microsoft Download Center](http://go.microsoft.com/fwlink/p/?LinkId=231903) (http://go.microsoft.com/fwlink/p/?LinkId=231903)</p></td>
</tr>

View File

@ -10,7 +10,7 @@ author: MaggiePucciEvans
The procedures in this topic describe the full installation of the Microsoft BitLocker Administration and Monitoring (MBAM) features on distributed servers.
Each server feature has certain prerequisites. To verify that you have met the prerequisites and hardware and software requirements, see [MBAM 1.0 Deployment Prerequisites](mbam-10-deployment-prerequisites.md) and [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). In addition, some features require that you provide certain information during the installation process to successfully deploy the feature. You should also review [Planning the Server Infrastructure for MBAM](962f2f48-e800-43f2-ab25-664a8a6298ee) before you begin the MBAM deployment.
Each server feature has certain prerequisites. To verify that you have met the prerequisites and hardware and software requirements, see [MBAM 1.0 Deployment Prerequisites](mbam-10-deployment-prerequisites.md) and [MBAM 1.0 Supported Configurations](mbam-10-supported-configurations.md). In addition, some features require that you provide certain information during the installation process to successfully deploy the feature.
**Note**  
To obtain the setup log files, you have to install MBAM by using the **msiexec** package and the **/l &lt;location&gt;** option. Log files are created in the location that you specify.

View File

@ -94,8 +94,6 @@ This technology is a part of the Microsoft Desktop Optimization Pack (MDOP). Ent
## Related topics
[Administrator's Guide for Microsoft BitLocker Administration and Monitoring 2](b5e62c77-f365-4492-8c30-95c55304b760)
[Getting Started with MBAM 2.0](getting-started-with-mbam-20-mbam-2.md)
 

View File

@ -47,7 +47,7 @@ We will occasionally update this privacy statement to reflect changes in our pro
### For More Information
Microsoft welcomes your comments regarding this privacy statement. If you have questions about this statement or believe that we have not adhered to it, please [contact us](contact us).
Microsoft welcomes your comments regarding this privacy statement. If you have questions about this statement or believe that we have not adhered to it, please contact us.
Microsoft Privacy Microsoft Corporation One Microsoft Way Redmond, Washington 98052 USA

View File

@ -8,7 +8,7 @@ author: MaggiePucciEvans
# Planning to Deploy MBAM 2.5
You should consider a number of different deployment configurations and prerequisites before you create your deployment plan for Microsoft BitLocker Administration and Monitoring (MBAM). This section includes information that can help you gather the necessary information to formulate a deployment plan that best meets your business requirements. If you are installing MBAM with the Configuration Manager topology, see [Planning to Deploy MBAM with Configuration Manager](68672830-e2c8-455b-971a-067c40c1333d) for additional planning information.
You should consider a number of different deployment configurations and prerequisites before you create your deployment plan for Microsoft BitLocker Administration and Monitoring (MBAM). This section includes information that can help you gather the necessary information to formulate a deployment plan that best meets your business requirements.
## Review the MBAM 2.5 supported configurations

View File

@ -132,7 +132,7 @@ Trim Transfer requires indexing the hard drive, which might take a considerable
## Related topics
[Creating a MED-V Image](86bd1301-0d0b-448a-a37c-b606d839aa0e)
[Creating a MED-V Image](creating-a-med-v-image.md)
[Using the MED-V Management Console User Interface](using-the-med-v-management-console-user-interface.md)

View File

@ -146,7 +146,7 @@ The two sample batch files must be placed in the same directory where the rest o
- Run the create schema.bat file from the directory where it was copied to. Syntax is: “Create\_schema.bat `SQLSERVERNAME`
![AppV46SQLcreatebat](images/AppV46SQLcreatebat.bmp)
![AppV46SQLcreatebat](images/appv46sqlcreatebat.bmp)
- If this script fails during the creation of the new “APPVIRTDB” database, check the log as indicated to correct the issue. It will be necessary to delete the database that was created with a partial running of the scripts in order to ensure that subsequent attempts will work properly.

View File

@ -50,8 +50,7 @@ Use this checklist to plan for preparing your computing environment for Microsof
<tr class="odd">
<td align="left"><p><strong>Custom settings templates only</strong> deploy the features that are required to create and store applications other than the UE-V default applications.</p></td>
<td align="left"><p>[Deploying the Settings Template Catalog for UE-V 1.0](deploying-the-settings-template-catalog-for-ue-v-10.md)</p>
<p>[Installing the UE-V Generator](installing-the-ue-v-generator.md)</p>
<p>[Using the UE-V Generator](4ee6e2f1-35ee-426e-9aaa-528c3f04a305)</p></td>
<p>[Installing the UE-V Generator](installing-the-ue-v-generator.md)</p></td>
</tr>
<tr class="even">
<td align="left"><p>Familiarize yourself with the administration and management tasks for UE-V.</p></td>

View File

@ -69,17 +69,6 @@ The Company Settings Center can include a hyperlink that users can click to get
3. Deploy settings to users computers by using the management tool.
## Other resources for Company Settings Center
Users can find the following links in the Company Settings Center:
- [What is settings synchronization?](../uev-v2/what-is-settings-synchronization-uevv2.md)
- [Why won't my application settings sync?](../uev-v2/why-wont-my-application-settings-sync-uevv2.md)
- [Why won't my Windows settings sync?](../uev-v2/why-wont-my-windows-settings-sync-uevv2.md)
## Got a suggestion for UE-V?