```
-netsh winhttp show proxy
-```
+For example: 10.0.0.6:8080
-For more information on how to use Netsh see, [Netsh Commands for Windows Hypertext Transfer Protocol (WINHTTP)](https://technet.microsoft.com/en-us/library/cc731131(v=ws.10).aspx)
+If the static proxy settings are configured after onboarding, then you must restart the PC to apply the proxy settings.
## Enable access to Windows Defender ATP service URLs in the proxy server
If a proxy or firewall is blocking all traffic by default and allowing only specific domains through, make sure that the following URLs are white-listed to permit communication with Windows Defender ATP service in port 80 and 443:
-- *.blob.core.windows.net
-- crl.microsoft.com
-- eu.vortex-win.data.microsoft.com
-- sevillegwcus.microsoft.com
-- sevillegweus.microsoft.com
-- sevillegwneu.microsoft.com
-- sevillegwweu.microsoft.com
-- us.vortex-win.data.microsoft.com
-- www.microsoft.com
+Primary Domain Controller | .Microsoft.com DNS record
+:---|:---
+ Central US | winatp-gw-cus.microsoft.com
us.vortex-win.data.microsoft.com
crl.microsoft.com
*.blob.core.windows.net
+ East US (2)| winatp-gw-eus.microsoft.com
us.vortex-win.data.microsoft.com
crl.microsoft.com
*.blob.core.windows.net
+ West Europe | winatp-gw-weu.microsoft.com
eu.vortex-win.data.microsoft.com
crl.microsoft.com
*.blob.core.windows.net
+ North Europe | winatp-gw-neu.microsoft.com
eu.vortex-win.data.microsoft.com
crl.microsoft.com
*.blob.core.windows.net
+
+ If a proxy or firewall is blocking anonymous traffic, as Windows Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted in the above listed URLs.
-If a proxy or firewall is blocking anonymous traffic, as Windows Defender ATP sensor is connecting from system context, make sure anonymous traffic is permitted to the above listed URLs.
## Verify client connectivity to Windows Defender ATP service URLs
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Windows Defender ATP service URLs.
-1. Download the connectivity verification tools to the PC where Windows Defender ATP sensor is running on:
+1. Download the [connectivity verification tool](https://go.microsoft.com/fwlink/p/?linkid=823683) to the PC where Windows Defender ATP sensor is running on.
- - [Download PsTools Suite](https://technet.microsoft.com/en-us/sysinternals/bb896649)
- - [Download PortQry Command Line Port Scanner Version 2.0 utility](https://www.microsoft.com/en-us/download/details.aspx?id=17148)
+2. Extract the contents of WDATPConnectivityAnalyzer on the endpoint.
-2. Extract the contents of **PsTools** and **PortQry** to a directory on the computer hard drive.
+3. Open an elevated command-line:
-3. Open an elevated command-line:
-
- a. Click **Start** and type **cmd**.
+ a. Go to **Start** and type **cmd**.
b. Right-click **Command prompt** and select **Run as administrator**.
4. Enter the following command and press **Enter**:
```
- HardDrivePath\PsExec.exe -s cmd.exe
+ HardDrivePath\WDATPConnectivityAnalyzer.cmd
```
- Replace *HardDrivePath* with the path where the PsTools Suite was extracted to:
- 
-
-5. Enter the following command and press **Enter**:
-
+ Replace *HardDrivePath* with the path where the WDATPConnectivityAnalyzer tool was downloaded to, for example
+ ```text
+ C:\Work\tools\WDATPConnectivityAnalyzer\WDATPConnectivityAnalyzer.cmd
```
- HardDrivePath\portqry.exe -n us.vortex-win.data.microsoft.com -e 443 -p tcp
- ```
- Replace *HardDrivePath* with the path where the PortQry utility was extracted to:
- 
-6. Verify that the output shows that the name is **resolved** and connection status is **listening**.
+5. Extract the *WDATPConnectivityAnalyzerResult.zip* file created by tool in the folder used in the *HardDrivePath*.
-7. Repeat the same steps for the remaining URLs with the following arguments:
+6. Open *WDATPConnectivityAnalyzer.txt* and verify that you have performed the proxy configuration steps to enable server discovery and access to the service URLs.
+The tool checks the connectivity of Windows Defender ATP service URLs that Windows Defender ATP client is configured to interact with. It then prints the results into the *WDATPConnectivityAnalyzer.txt* file for each URL that can potentially be used to communicate with the Windows Defender ATP services. For example:
+ ```text
+ Testing URL : https://xxx.microsoft.com/xxx
+ 1 - Default proxy: Succeeded (200)
+ 2 - Proxy auto discovery (WPAD): Succeeded (200)
+ 3 - Proxy disabled: Succeeded (200)
+ 4 - Named proxy: Doesn't exist
+ 5 - Command line proxy: Doesn't exist
+ ```
- - portqry.exe -n eu.vortex-win.data.microsoft.com -e 443 -p tcp
- - portqry.exe -n sevillegwcus.microsoft.com -e 443 -p tcp
- - portqry.exe -n sevillegweus.microsoft.com -e 443 -p tcp
- - portqry.exe -n sevillegwweu.microsoft.com -e 443 -p tcp
- - portqry.exe -n sevillegwneu.microsoft.com -e 443 -p tcp
- - portqry.exe -n www.microsoft.com -e 80 -p tcp
- - portqry.exe -n crl.microsoft.com -e 80 -p tcp
+If at least one of the connectivity options returns a (200) status, then the Windows Defender ATP client can communicate with the tested URL properly using this connectivity method.
-8. Verify that each URL shows that the name is **resolved** and the connection status is **listening**.
-
-If the any of the verification steps indicate a fail, then verify that you have performed the proxy configuration steps to enable server discovery and access to the service URLs.
+However, if the connectivity check results indicate a failure, an HTTP error is displayed (see HTTP Status Codes). You can then use the URLs in the table shown in [Enable access to Windows Defender ATP service URLs in the proxy server](#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server). The URLs you'll use will depend on the region selected during the onboarding procedure.
## Related topics
- [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
diff --git a/windows/keep-secure/configure-siem-windows-defender-advanced-threat-protection.md b/windows/keep-secure/configure-siem-windows-defender-advanced-threat-protection.md
new file mode 100644
index 0000000000..9811157abe
--- /dev/null
+++ b/windows/keep-secure/configure-siem-windows-defender-advanced-threat-protection.md
@@ -0,0 +1,43 @@
+---
+title: Configure security information and events management tools
+description: Configure supported security information and events management tools to receive and consume alerts.
+keywords: configure siem, security information and events management tools, splunk, arcsight
+search.product: eADQiWindows 10XVcnh
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: mjcaparas
+---
+
+# Configure security information and events management (SIEM) tools to consume alerts
+
+**Applies to:**
+
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
+- Windows Defender Advanced Threat Protection (Windows Defender ATP)
+
+Windows Defender ATP supports security information and events management (SIEM) tools to consume alerts. Windows Defender ATP exposes alerts through an HTTPS endpoint hosted in Azure. The endpoint can be configured to get alerts from your enterprise tenant in Azure Active Directory (AAD) using the OAuth 2.0 authentication protocol for an AAD application that represents the specific SIEM connector installed in your environment.
+
+Windows Defender ATP currently supports the following SIEM tools:
+
+- Splunk
+- HP ArcSight
+
+To use either of these supported SIEM tools you'll need to:
+
+- [Configure an Azure Active Directory application for SIEM integration in your tenant](configure-aad-windows-defender-advanced-threat-protection.md)
+- Configure the supported SIEM tool:
+ - [Configure Splunk to consume alerts](configure-splunk-windows-defender-advanced-threat-protection.md)
+ - [Configure HP ArcSight to consume alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)
+
+## In this section
+
+Topic | Description
+:---|:---
+[Configure an Azure Active Directory application](configure-aad-windows-defender-advanced-threat-protection.md)| Learn about configuring an Azure Active Directory application to integrate with supported security information and events management (SIEM) tools.
+ [Configure Splunk](configure-splunk-windows-defender-advanced-threat-protection.md)| Learn about installing the REST API Modular Input app and other configuration settings to enable Splunk to consume Windows Defender ATP alerts.
+ [Configure ArcSight](configure-arcsight-windows-defender-advanced-threat-protection.md)| Learn about installing the HP ArcSight REST FlexConnector package and the files you need to configure ArcSight to consume Windows Defender ATP alerts.
diff --git a/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md b/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md
new file mode 100644
index 0000000000..fc3fe7916f
--- /dev/null
+++ b/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md
@@ -0,0 +1,110 @@
+---
+title: Configure Splunk to consume Windows Defender ATP alerts
+description: Configure Splunk to receive and consume alerts from the Windows Defender ATP portal.
+keywords: configure splunk, security information and events management tools, splunk
+search.product: eADQiWindows 10XVcnh
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: mjcaparas
+---
+
+# Configure Splunk to consume Windows Defender ATP alerts
+
+**Applies to:**
+
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
+- Windows Defender Advanced Threat Protection (Windows Defender ATP)
+
+You'll need to configure Splunk so that it can consume Windows Defender ATP alerts.
+
+## Before you begin
+
+- Install the [REST API Modular Input app](https://splunkbase.splunk.com/app/1546/) in Splunk
+- Contact the Windows Defender ATP team to get your refresh token
+- Get the following information from your Azure Active Directory (AAD) application by selecting the **View Endpoint** on the application configuration page:
+ - OAuth 2 Token refresh URL
+ - OAuth 2 Client ID
+ - OAuth 2 Client secret
+
+## Configure Splunk
+
+1. Login in to Splunk.
+
+2. Click **Search & Reporting**, then **Settings** > **Data inputs**.
+
+3. Click **REST** under **Local inputs**.
+> [!NOTE]
+> This input will only appear after you install the [REST API Modular Input app](https://splunkbase.splunk.com/app/1546/).
+
+4. Click **New**.
+
+5. Type the following values in the required fields, then click **Save**:
+> [!NOTE]
+>All other values in the form are optional and can be left blank.
+
+
+
+
+ Field |
+ Value |
+
+
+ Endpoint URL |
+ https://DataAccess-PRD.trafficmanager.net:444/api/alerts |
+
+
+ HTTP Method |
+ GET |
+
+ Authentication Type |
+ oauth2 |
+
+ OAuth 2 Token Refresh URL |
+ Value taken from AAD application |
+
+
+ OAuth 2 Client ID |
+ Value taken from AAD application |
+
+
+ OAuth 2 Client Secret |
+ Value taken from AAD application |
+
+
+ Response type |
+ Json |
+
+
+ Response Handler |
+ JSONArrayHandler |
+
+
+ Polling Interval |
+ Number of seconds that Splunk will ping the Windows Defender ATP endpoint. Accepted values are in seconds. |
+
+
+ Set sourcetype |
+ From list |
+
+
+ Source type |
+ \_json |
+
+
+
+
+After completing these configuration steps, you can go to the Splunk dashboard and run queries.
+
+You can use the following query as an example in Splunk:
+```source="rest://windows atp alerts"|spath|table*```
+
+
+## Related topics
+- [Configure security information and events management (SIEM) tools to consume alerts](configure-siem-windows-defender-advanced-threat-protection.md)
+- [Configure Azure Active Directory application for SIEM integration](configure-aad-windows-defender-advanced-threat-protection.md)
+- [Configure HP ArcSight to consume alerts](configure-arcsight-windows-defender-advanced-threat-protection.md)
diff --git a/windows/keep-secure/credential-guard.md b/windows/keep-secure/credential-guard.md
index c8f96612a3..b0c15689da 100644
--- a/windows/keep-secure/credential-guard.md
+++ b/windows/keep-secure/credential-guard.md
@@ -12,7 +12,7 @@ author: brianlic-msft
**Applies to**
- Windows 10
-- Windows Server 2016 Technical Preview
+- Windows Server 2016
Introduced in Windows 10 Enterprise, Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Unauthorized access to these secrets can lead to credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket. Credential Guard prevents these attacks by protecting NTLM password hashes and Kerberos Ticket Granting Tickets.
@@ -290,7 +290,7 @@ Some ways to store credentials are not protected by Credential Guard, including:
- Software that manages credentials outside of Windows feature protection
- Local accounts and Microsoft Accounts
-- Credential Guard does not protect the Active Directory database running on Windows Server 2016 Technical Preview domain controllers. It also does not protect credential input pipelines, such as Windows Server 2016 Technical Preview servers running Remote Desktop Gateway. If you're using a Windows Server 2016 Technical Preview server as a client PC, it will get the same protection as it would be running Windows 10 Enterprise.
+- Credential Guard does not protect the Active Directory database running on Windows Server 2016 domain controllers. It also does not protect credential input pipelines, such as Windows Server 2016 servers running Remote Desktop Gateway. If you're using a Windows Server 2016 server as a client PC, it will get the same protection as it would be running Windows 10 Enterprise.
- Key loggers
- Physical attacks
- Does not prevent an attacker with malware on the PC from using the privileges associated with any credential. We recommend using dedicated PCs for high value accounts, such as IT Pros and users with access high value assets in your organization.
@@ -328,7 +328,7 @@ Enabling compound authentication also enables Kerberos armoring, which provides
### Deploying machine certificates
-If the domain controllers in your organization are running Windows Server 2016 Technical Preview, devices running Windows 10 will automatically enroll a machine certificate when Credential Guard is enabled and the PC is joined to the domain.
+If the domain controllers in your organization are running Windows Server 2016, devices running Windows 10 will automatically enroll a machine certificate when Credential Guard is enabled and the PC is joined to the domain.
If the domain controllers are running Windows Server 2012 R2, the machine certificates must be provisioned manually on each device. You can do this by creating a certificate template on the domain controller or certificate authority and deploying the machine certificates to each device.
The same security procedures used for issuing smart cards to users should be applied to machine certificates.
diff --git a/windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md b/windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md
index 024ddab8e2..e68df885fb 100644
--- a/windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/dashboard-windows-defender-advanced-threat-protection.md
@@ -14,11 +14,12 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
The **Dashboard** displays a snapshot of:
- The latest active alerts on your network
@@ -40,18 +41,18 @@ You can view the overall number of active ATP alerts from the last 30 days in yo
Each group is further sub-categorized into their corresponding alert severity levels. Click the number of alerts inside each alert ring to see a sorted view of that category's queue (**New** or **In progress**).
-See the [View and organize the Windows Defender Advanced Threat Protection Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md) topic for more information.
+For more information see, [View and organize the Windows Defender Advanced Threat Protection Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md).
-The **Latest ATP alerts** section includes the latest active alerts in your network. Each row includes an alert severity category and a short description of the alert. Click an alert to see its detailed view, or **Alerts queue** at the top of the list to go directly to the Alerts queue. See the [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) and [View and organize the Windows Defender Advanced Threat Protection Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md) topics for more information.
+The **Latest ATP alerts** section includes the latest active alerts in your network. Each row includes an alert severity category and a short description of the alert. Click an alert to see its detailed view, or **Alerts queue** at the top of the list to go directly to the Alerts queue. For more information see, [Investigate Windows Defender Advanced Threat Protection alerts](investigate-alerts-windows-defender-advanced-threat-protection.md) and [View and organize the Windows Defender Advanced Threat Protection Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md).
## Machines at risk
This tile shows you a list of machines with the highest number of active alerts. The total number of alerts for each machine is shown in a circle next to the machine name, and then further categorized by severity levels at the far end of the tile (hover over each severity bar to see its label).

-Click the name of the machine to see details about that machine. See the [Investigate Windows Defender ATP alerts](investigate-alerts-windows-defender-advanced-threat-protection.md#investigate-a-machine) topic for more information.
+Click the name of the machine to see details about that machine. For more information see, [Investigate Windows Defender ATP alerts](investigate-alerts-windows-defender-advanced-threat-protection.md#investigate-a-machine).
-You can also click **Machines view** at the top of the tile to go directly to the **Machines view**, sorted by the number of active alerts. See the [Investigate machines in the Windows Defender Advanced Threat Protection Machines view](investigate-machines-windows-defender-advanced-threat-protection.md) topic for more information.
+You can also click **Machines view** at the top of the tile to go directly to the **Machines view**, sorted by the number of active alerts. For more information see, [Investigate machines in the Windows Defender Advanced Threat Protection Machines view](investigate-machines-windows-defender-advanced-threat-protection.md).
## Status
The **Status** tile informs you if the service is active and running and the unique number of machines (endpoints) reporting over the past 30 days.
@@ -84,7 +85,8 @@ Threats are considered "active" if there is a very high probability that the mal
Clicking on any of these categories will navigate to the [Machines view](investigate-machines-windows-defender-advanced-threat-protection.md), filtered by the appropriate category. This lets you see a detailed breakdown of which machines have active malware detections, and how many threats were detected per machine.
-> **Note** The **Machines with active malware detections** tile will only appear if your endpoints are using [Windows Defender](https://technet.microsoft.com/en-us/library/mt622091(v=vs.85).aspx) as the default real-time protection antimalware product.
+> [!NOTE]
+> The **Machines with active malware detections** tile will only appear if your endpoints are using [Windows Defender](https://technet.microsoft.com/en-us/library/mt622091(v=vs.85).aspx) as the default real-time protection antimalware product.
### Related topics
- [View and organize the Windows Defender Advanced Threat Protection Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md)
diff --git a/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md b/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md
index a5d2bec8ce..4a509cf46a 100644
--- a/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/data-storage-privacy-windows-defender-advanced-threat-protection.md
@@ -14,13 +14,15 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
This section covers some of the most frequently asked questions regarding privacy and data handling for Windows Defender ATP.
-> **Note** This document covers the information specific to the Windows Defender ATP service. Other data shared and stored by Windows Defender and Windows 10 is covered under the [Microsoft Privacy Statement](https://privacy.microsoft.com/en-us/privacystatement). See the [Windows 10 privacy FAQ for more information](http://windows.microsoft.com/en-au/windows-10/windows-privacy-faq).
+> [!NOTE]
+> This document explains the data storage and privacy details related to Windows Defender ATP. For more information related to Windows Defender ATP and other products and services like Windows Defender and Windows 10, see [Microsoft Privacy Statement](https://privacy.microsoft.com/en-us/privacystatement). See also [Windows 10 privacy FAQ](http://windows.microsoft.com/en-au/windows-10/windows-privacy-faq) for more information.
## What data does Windows Defender ATP collect?
@@ -28,7 +30,7 @@ Microsoft will collect and store information from your configured endpoints in a
Information collected includes code file data (such as file names, sizes, and hashes), process data (running processes, hashes), registry data, network connection data (host IPs and ports), and machine details (such as GUIDs, names, and the operating system version).
-Microsoft stores this data in a Microsoft Azure security-specific data store, and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://azure.microsoft.com/en-us/support/trust-center/).
+Microsoft stores this data securely in Microsoft Azure and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://azure.microsoft.com/en-us/support/trust-center/).
Microsoft uses this data to:
- Proactively identify indicators of attack (IOAs) in your organization
@@ -39,10 +41,10 @@ Microsoft does not mine your data for advertising or for any other purpose other
## Do I have the flexibility to select where to store my data?
-Data for this new service is stored in Microsoft Azure datacenters in the United States and European Union based on the geolocation properties. Subject to the relevant preview program you may be able to specify your preferred geolocation when you onboard to the service. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations in which your data will reside. Microsoft will not transfer the data from the specified geolocation except in specific circumstances during the preview stage.
+When onboarding the service for the first time, you can choose to store your data in Microsoft Azure datacenters in Europe or United States. Once configured, you cannot change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside. Microsoft will not transfer the data from the specified geolocation.
## Is my data isolated from other customer data?
-Yes. The new cloud service provides appropriate segregation at a number of levels, such as isolation of files, configurations, and telemetry data. Aside from data access authentication, simply keeping different data appropriately segregated provides well-recognized protection.
+Yes, your data is isolated through access authentication and logical segregation based on customer identifier. Each customer can only access data collected from its own organization and generic data that Microsoft provides.
## How does Microsoft prevent malicious insider activities and abuse of high privilege roles?
@@ -58,18 +60,14 @@ Additionally, Microsoft conducts background verification checks of certain opera
No. Customer data is isolated from other customers and is not shared. However, insights on the data resulting from Microsoft processing, and which don’t contain any customer specific data, might be shared with other customers. Each customer can only access data collected from its own organization and generic data that Microsoft provides.
## How long will Microsoft store my data? What is Microsoft’s data retention policy?
-Your data privacy is one of Microsoft's key commitments for the cloud. For this service, at contract termination or expiration, your data will be erased from Microsoft’s systems to make it unrecoverable after 90 days (from contract termination or expiration).
+**At service onboarding**
+You can choose the data retention policy for your data. This determines how long Window Defender ATP will store your data. There’s a flexibility of choosing in the range of 1 month to six months to meet your company’s regulatory compliance needs.
+
+**At contract termination or expiration**
+Your data will be kept for a period of at least 90 days, during which it will be available to you. At the end of this period, that data will be erased from Microsoft’s systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
+
## Can Microsoft help us maintain regulatory compliance?
Microsoft provides customers with detailed information about Microsoft's security and compliance programs, including audit reports and compliance packages, to help customers assess Windows Defender ATP services against their own legal and regulatory requirements. Windows Defender ATP has a roadmap for obtaining national, regional and industry-specific certifications, starting with ISO 27001. The service is designed, implemented, and maintained according to the compliance and privacy principles of ISO 27001, as well as Microsoft’s compliance standards.
By providing customers with compliant, independently-verified services, Microsoft makes it easier for customers to achieve compliance for the infrastructure and applications they run, including this new Microsoft cloud service.
-## Is there a difference between how Microsoft handles data for the preview programs and for General Availability?
-Subject to the preview program you are in, you could be asked to choose to store your data in a datacenter either in Europe or United States. Your data will not be copied or moved outside of the datacenter you choose, except in the following specific circumstance:
-
-1. You choose Europe as your datacenter, and
-2. You [submit a file for deep analysis](investigate-files-windows-defender-advanced-threat-protection.md#submit-files-for-analysis).
-
-In this circumstance, the submitted file will be sent to the US deep analysis laboratory. The results of the analysis will be stored in the European datacenter, and the file and data will be deleted from the US deep analysis laboratory and datacenter.
-
-This is a temporary measure as we work to integrate our deep analysis capabilities into the European datacenter. If you have any concerns or questions about submitting files for deep analysis and you are using a European datacenter, or if you’d like to be updated as to when the European deep analysis lab is online, email [winatp@microsoft.com](mailto:winatp@microsoft.com).
diff --git a/windows/keep-secure/defender-compatibility-windows-defender-advanced-threat-protection.md b/windows/keep-secure/defender-compatibility-windows-defender-advanced-threat-protection.md
new file mode 100644
index 0000000000..2ad4b75d16
--- /dev/null
+++ b/windows/keep-secure/defender-compatibility-windows-defender-advanced-threat-protection.md
@@ -0,0 +1,32 @@
+---
+title: Windows Defender compatibility
+description: Learn about how Windows Defender works with Windows Defender ATP.
+keywords: windows defender compatibility, defender, windows defender atp
+search.product: eADQiWindows 10XVcnh
+ms.prod: w10
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.pagetype: security
+author: mjcaparas
+---
+
+# Windows Defender compatibility
+
+**Applies to:**
+
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
+- Windows Defender
+- Windows Defender Advanced Threat Protection (Windows Defender ATP)
+
+The Windows Defender Advanced Threat Protection agent depends on Windows Defender for some capabilities such as file scanning.
+
+If an onboarded endpoint is protected by a third-party antimalware client, Windows Defender on that endpoint will enter into passive mode.
+
+Windows Defender will continue to receive updates, and the *mspeng.exe* process will be listed as a running a service, but it will not perform scans and will not replace the running third-party antimalware client.
+
+The Windows Defender interface will be disabled, and users on the endpoint will not be able to use Windows Defender to perform on-demand scans or configure most options.
+
+For more information, see the **Compatibility** section in the [Windows Defender in Windows 10 topic](windows-defender-in-windows-10.md# compatibility-with-windows-defender-advanced-threat-protection).
diff --git a/windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md b/windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md
index f019d14fdf..3dd165c68a 100644
--- a/windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/event-error-codes-windows-defender-advanced-threat-protection.md
@@ -1,7 +1,7 @@
---
title: Review events and errors on endpoints with Event Viewer
description: Get descriptions and further troubleshooting steps (if required) for all events reported by the Windows Defender ATP service.
-keywords: troubleshoot, event viewer, log summary, failure code, failed, Windows Advanced Threat Protection service, cannot start, broken, can't start
+keywords: troubleshoot, event viewer, log summary, failure code, failed, Windows Defender Advanced Threat Protection service, cannot start, broken, can't start
search.product: eADQiWindows 10XVcnh
ms.prod: w10
ms.mktglfcycl: deploy
@@ -15,16 +15,19 @@ author: iaanw
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Event Viewer
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
You can review event IDs in the [Event Viewer](https://msdn.microsoft.com/en-US/library/aa745633(v=bts.10).aspx) on individual endpoints.
For example, if endpoints are not appearing in the **Machines view** list, you might need to look for event IDs on the endpoints. You can then use this table to determine further troubleshooting steps.
-> **Note** It can take several days for endpoints to begin reporting to the Windows Defender ATP service.
+> [!NOTE]
+> It can take several days for endpoints to begin reporting to the Windows Defender ATP service.
**Open Event Viewer and find the Windows Defender ATP service event log:**
@@ -35,7 +38,8 @@ For example, if endpoints are not appearing in the **Machines view** list, you m
a. You can also access the log by expanding **Applications and Services Logs** > **Microsoft** > **Windows** > **SENSE** and click on **Operational**.
- > **Note** SENSE is the internal name used to refer to the behavioral sensor that powers Windows Defender ATP.
+ > [!NOTE]
+ > SENSE is the internal name used to refer to the behavioral sensor that powers Windows Defender ATP.
3. Events recorded by the service will appear in the log. See the following table for a list of events recorded by the service.
@@ -49,39 +53,39 @@ For example, if endpoints are not appearing in the **Machines view** list, you m
1 |
-Windows Advanced Threat Protection service started (Version ```variable```). |
+Windows Defender Advanced Threat Protection service started (Version ```variable```). |
Occurs during system start up, shut down, and during onbboarding. |
Normal operating notification; no action required. |
2 |
-Windows Advanced Threat Protection service shutdown. |
+Windows Defender Advanced Threat Protection service shutdown. |
Occurs when the endpoint is shut down or offboarded. |
Normal operating notification; no action required. |
3 |
-Windows Advanced Threat Protection service failed to start. Failure code: ```variable``` |
+Windows Defender Advanced Threat Protection service failed to start. Failure code: ```variable```. |
Service did not start. |
Review other messages to determine possible cause and troubleshooting steps. |
4 |
-Windows Advanced Threat Protection service contacted the server at ```variable```. |
-variable = URL of the Windows Defender ATP processing servers.
+ | Windows Defender Advanced Threat Protection service contacted the server at ```variable```. |
+Variable = URL of the Windows Defender ATP processing servers.
This URL will match that seen in the Firewall or network activity. |
Normal operating notification; no action required. |
5 |
-Windows Advanced Threat Protection service failed to connect to the server at ```variable```. |
-variable = URL of the Windows Defender ATP processing servers.
+ | Windows Defender Advanced Threat Protection service failed to connect to the server at ```variable```. |
+Variable = URL of the Windows Defender ATP processing servers.
The service could not contact the external processing servers at that URL. |
Check the connection to the URL. See [Configure proxy and Internet connectivity](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#configure-proxy-and-Internet-connectivity). |
6 |
-Windows Advanced Threat Protection service is not onboarded and no onboarding parameters were found. |
+Windows Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. |
The endpoint did not onboard correctly and will not be reporting to the portal. |
Onboarding must be run before starting the service.
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
@@ -89,72 +93,66 @@ See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defen
|
7 |
-Windows Advanced Threat Protection service failed to read the onboarding parameters. Failure code: ```variable``` |
-The endpoint did not onboard correctly and will not be reporting to the portal. |
+Windows Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure: ```variable```. |
+Variable = detailed error description. The endpoint did not onboard correctly and will not be reporting to the portal. |
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md).
8 |
-Windows Advanced Threat Protection service failed to clean its configuration. Failure code: ```variable``` |
-The endpoint did not onboard correctly and will not be reporting to the portal. |
-Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
+Windows Defender Advanced Threat Protection service failed to clean its configuration. Failure code: ```variable```. |
+**During onboarding:** The service failed to clean its configuration during the onboarding. The onboarding process continues.
**During offboarding:** The service failed to clean its configuration during the offboarding. The offboarding process finished but the service keeps running.
+ |
+**Onboarding:** No action required.
**Offboarding:** Reboot the system.
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md). |
9 |
-Windows Advanced Threat Protection service failed to change its start type. Failure code: ```variable``` |
-The endpoint did not onboard correctly and will not be reporting to the portal. |
+Windows Defender Advanced Threat Protection service failed to change its start type. Failure code: ```variable```. |
+**During onboarding:** The endpoint did not onboard correctly and will not be reporting to the portal.
**During offboarding:** Failed to change the service start type. The offboarding process continues. |
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md).
10 |
-Windows Advanced Threat Protection service failed to persist the onboarding information. Failure code: ```variable``` |
+Windows Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: ```variable```. |
The endpoint did not onboard correctly and will not be reporting to the portal. |
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md).
11 |
-Windows Advanced Threat Protection service completed. |
+Onboarding or re-onboarding of Windows Defender Advanced Threat Protection service completed. |
The endpoint onboarded correctly. |
Normal operating notification; no action required.
It may take several hours for the endpoint to appear in the portal. |
12 |
-Windows Advanced Threat Protection failed to apply the default configuration. |
-Service was unable to apply configuration from the processing servers. |
-This is a server error and should resolve after a short period. |
+Windows Defender Advanced Threat Protection failed to apply the default configuration. |
+Service was unable to apply the default configuration. |
+This error should resolve after a short period of time. |
13 |
-Service machine ID calculated: ```variable``` |
+Windows Defender Advanced Threat Protection machine ID calculated: ```variable```. |
Normal operating process. |
Normal operating notification; no action required. |
-14 |
-Service cannot calculate machine ID. Failure code: ```variable``` |
-Internal error. |
-Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
-
-
15 |
-Windows Advanced Threat Protection cannot start command channel with URL: ```variable``` |
-variable = URL of the Windows Defender ATP processing servers.
+ | Windows Defender Advanced Threat Protection cannot start command channel with URL: ```variable```. |
+Variable = URL of the Windows Defender ATP processing servers.
The service could not contact the external processing servers at that URL. |
Check the connection to the URL. See [Configure proxy and Internet connectivity](#configure-proxy-and-Internet-connectivity). |
17 |
-Windows Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: ```variable``` |
+Windows Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: ```variable```. |
An error occurred with the Windows telemetry service. |
-[Ensure the telemetry service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-the-telemetry-and-diagnostics-service-is-enabled)
+ | [Ensure the telemetry service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-the-telemetry-and-diagnostics-service-is-enabled).
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md).
18 |
@@ -171,44 +169,45 @@ If this error persists after a system restart, ensure all Windows updates have f
20 |
-Cannot wait for OOBE (Windows Welcome) to complete. Failure code: ```variable``` |
+Cannot wait for OOBE (Windows Welcome) to complete. Failure code: ```variable```. |
Internal error. |
If this error persists after a system restart, ensure all Windows updates have full installed. |
25 |
-Windows Advanced Threat Protection service failed to reset health status in the registry, causing the onboarding process to fail. Failure code: ```variable``` |
-The endpoint did not onboard correctly and will not be reporting to the portal. |
+Windows Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: ```variable```. |
+The endpoint did not onboard correctly.
+It will report to the portal, however the service may not appear as registered in SCCM or the registry. |
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md).
26 |
-Windows Advanced Threat Protection service failed to set the onboarding status in the registry. Failure code: ```variable``` |
+Windows Defender Advanced Threat Protection service failed to set the onboarding status in the registry. Failure code: ```variable```. |
The endpoint did not onboard correctly.
It will report to the portal, however the service may not appear as registered in SCCM or the registry. |
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md).
27 |
-Windows Advanced Threat Protection service failed to enable SENSE aware mode in Windows Defender. Onboarding process failed. Failure code: ```variable``` |
+Windows Defender Advanced Threat Protection service failed to enable SENSE aware mode in Windows Defender. Onboarding process failed. Failure code: ```variable```. |
Normally, Windows Defender will enter a special passive state if another real-time antimalware product is running properly on the endpoint, and the endpoint is reporting to Windows Defender ATP. |
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md).
Ensure real-time antimalware protection is running properly. |
28 |
-Windows Advanced Threat Protection Connected User Experiences and Telemetry service registration failed. Failure code: ```variable``` |
+Windows Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration failed. Failure code: ```variable```. |
An error occurred with the Windows telemetry service. |
[Ensure the telemetry service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-the-telemetry-and-diagnostics-service-is-enabled).
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md).
30 |
-Windows Advanced Threat Protection service failed to disable SENSE aware mode in Windows Defender. Failure code: ```variable``` |
+Windows Defender Advanced Threat Protection service failed to disable SENSE aware mode in Windows Defender. Failure code: ```variable```. |
Normally, Windows Defender will enter a special passive state if another real-time antimalware product is running properly on the endpoint, and the endpoint is reporting to Windows Defender ATP. |
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
@@ -216,24 +215,115 @@ Ensure real-time antimalware protection is running properly. |
31 |
-Windows Advanced Threat Protection Connected User Experiences and Telemetry service unregistration failed. Failure code: ```variable``` |
-An error occurred with the Windows telemetry service. |
+Windows Defender Advanced Threat Protection Connected User Experiences and Telemetry service unregistration failed. Failure code: ```variable```. |
+An error occurred with the Windows telemetry service during onboarding. The offboarding process continues. |
[Check for errors with the Windows telemetry service](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-the-telemetry-and-diagnostics-service-is-enabled). |
+32 |
+Windows Defender Advanced Threat Protection service failed to request to stop itself after offboarding process. Failure code: %1 |
+An error occurred during offboarding. |
+Reboot the machine. |
+
+
33 |
-Windows Advanced Threat Protection service failed to persist SENSE GUID. Failure code: ```variable``` |
+Windows Defender Advanced Threat Protection service failed to persist SENSE GUID. Failure code: ```variable```. |
A unique identifier is used to represent each endpoint that is reporting to the portal.
If the identifier does not persist, the same machine might appear twice in the portal. |
Check registry permissions on the endpoint to ensure the service can update the registry. |
34 |
-Windows Advanced Threat Protection service failed to add itself as a dependency on the Connected User Experiences and Telemetry service, causing onboarding process to fail. Failure code: ```variable``` |
+Windows Defender Advanced Threat Protection service failed to add itself as a dependency on the Connected User Experiences and Telemetry service, causing onboarding process to fail. Failure code: ```variable```. |
An error occurred with the Windows telemetry service. |
[Ensure the telemetry service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-the-telemetry-and-diagnostics-service-is-enabled).
Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
-See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md) |
+See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md).
+
+
+35 |
+Windows Defender Advanced Threat Protection service failed to remove itself as a dependency on the Connected User Experiences and Telemetry service. Failure code: ```variable```. |
+An error occurred with the Windows telemetry service during offboarding. The offboarding process continues.
+ |
+Check for errors with the Windows telemetry service. |
+
+
+36 |
+Windows Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration succeeded. Completion code: ```variable```. |
+Registering Windows Defender Advanced Threat Protection with the Connected User Experiences and Telemetry service completed successfully. |
+Normal operating notification; no action required. |
+
+
+37 |
+Windows Defender Advanced Threat Protection A module is about to exceed its quota. Module: %1, Quota: {%2} {%3}, Percentage of quota utilization: %4. |
+The machine has almost used its allocated quota of the current 24-hour window. It’s about to be throttled. |
+Normal operating notification; no action required. |
+
+
+38 |
+Network connection is identified as low. Windows Defender Advanced Threat Protection will contact the server every %1 minutes. Metered connection: %2, internet available: %3, free network available: %4. |
+The machine is using a metered/paid network and will be contacting the server less frequently. |
+Normal operating notification; no action required. |
+
+
+39 |
+Network connection is identified as normal. Windows Defender Advanced Threat Protection will contact the server every %1 minutes. Metered connection: %2, internet available: %3, free network available: %4. |
+The machine is not using a metered/paid connection and will contact the server as usual. |
+Normal operating notification; no action required. |
+
+
+40 |
+Battery state is identified as low. Windows Defender Advanced Threat Protection will contact the server every %1 minutes. Battery state: %2. |
+The machine has low battery level and will contact the server less frequently. |
+Normal operating notification; no action required. |
+
+
+41 |
+Battery state is identified as normal. Windows Defender Advanced Threat Protection will contact the server every %1 minutes. Battery state: %2. |
+The machine doesn’t have low battery level and will contact the server as usual. |
+Normal operating notification; no action required. |
+
+
+42 |
+Windows Defender Advanced Threat Protection WDATP component failed to perform action. Component: %1, Action: %2, Exception Type: %3, Exception message: %4 |
+Internal error. The service failed to start. |
+If this error persists, contact Support. |
+
+
+43 |
+Windows Defender Advanced Threat Protection WDATP component failed to perform action. Component: %1, Action: %2, Exception Type: %3, Exception Error: %4, Exception message: %5 |
+Internal error. The service failed to start. |
+If this error persists, contact Support. |
+
+
+44 |
+Offboarding of Windows Defender Advanced Threat Protection service completed. |
+The service was offboarded. |
+Normal operating notification; no action required. |
+
+
+45 |
+Failed to register and to start the event trace session [%1]. Error code: %2 |
+An error occurred on service startup while creating ETW session. This caused service start-up failure. |
+If this error persists, contact Support. |
+
+
+46 |
+Failed to register and start the event trace session [%1] due to lack of resources. Error code: %2. This is most likely because there are too many active event trace sessions. The service will retry in 1 minute. |
+An error occurred on service startup while creating ETW session due to lack of resources. The service started and is running, but will not report any sensor event until the ETW session is started. |
+Normal operating notification; no action required. The service will try to start the session every minute. |
+
+
+47 |
+Successfully registered and started the event trace session - recovered after previous failed attempts. |
+This event follows the previous event after successfully starting of the ETW session. |
+Normal operating notification; no action required. |
+
+
+48 |
+Failed to add a provider [%1] to event trace session [%2]. Error code: %3. This means that events from this provider will not be reported. |
+Failed to add a provider to ETW session. As a result, the provider events aren’t reported. |
+Check the error code. If the error persists contact Support. |
diff --git a/windows/keep-secure/images/alert-details.png b/windows/keep-secure/images/alert-details.png
index 7d23ae0374..e2f5a387b0 100644
Binary files a/windows/keep-secure/images/alert-details.png and b/windows/keep-secure/images/alert-details.png differ
diff --git a/windows/keep-secure/images/alertsq2.png b/windows/keep-secure/images/alertsq2.png
index a11b5ba76b..8e823cd9c7 100644
Binary files a/windows/keep-secure/images/alertsq2.png and b/windows/keep-secure/images/alertsq2.png differ
diff --git a/windows/keep-secure/images/machines-view.png b/windows/keep-secure/images/machines-view.png
index 3baf15a05f..f1d00f4035 100644
Binary files a/windows/keep-secure/images/machines-view.png and b/windows/keep-secure/images/machines-view.png differ
diff --git a/windows/keep-secure/images/onboardingstate.png b/windows/keep-secure/images/onboardingstate.png
index 0606e2b2c6..ab49c49e17 100644
Binary files a/windows/keep-secure/images/onboardingstate.png and b/windows/keep-secure/images/onboardingstate.png differ
diff --git a/windows/keep-secure/images/portal-image.png b/windows/keep-secure/images/portal-image.png
index be59f06fa5..c038da30de 100644
Binary files a/windows/keep-secure/images/portal-image.png and b/windows/keep-secure/images/portal-image.png differ
diff --git a/windows/keep-secure/implement-microsoft-passport-in-your-organization.md b/windows/keep-secure/implement-microsoft-passport-in-your-organization.md
index 813a67705d..2dc4c2628a 100644
--- a/windows/keep-secure/implement-microsoft-passport-in-your-organization.md
+++ b/windows/keep-secure/implement-microsoft-passport-in-your-organization.md
@@ -340,6 +340,7 @@ You’ll need this software to set Windows Hello for Business policies in your e
Azure AD subscription
[Azure AD Connect](http://go.microsoft.com/fwlink/p/?LinkId=616792)
AD CS with NDES
+<<<<<<< HEAD
Configuration Manager for domain-joined certificate enrollment, or InTune for non-domain-joined devices, or a non-Microsoft MDM service that supports Passport for Work
diff --git a/windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md b/windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md
index d724b1862d..8bd01c944f 100644
--- a/windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/investigate-alerts-windows-defender-advanced-threat-protection.md
@@ -14,11 +14,12 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
Alerts in Windows Defender ATP indicate possible security breaches on endpoints in your organization.
There are three alert severity levels, described in the following table.
@@ -43,17 +44,39 @@ Details displayed about the alert include:
- When the alert was last observed
- Alert description
- Recommended actions
-- The potential scope of breach
+- The incident graph
- The indicators that triggered the alert
-
-
Alerts attributed to an adversary or actor display a colored tile with the actor name.
Click on the actor's name to see a threat intelligence profile of the actor, including a brief overview of the actor, their interests or targets, tools, tactics, and processes (TTPs) as well as areas where it's active worldwide. You will also see a set of recommended actions to take.
Some actor profiles include a link to download a more comprehensive threat intelligence report.
+
+
+## Incident graph
+The incident graph provides a visual representation of where an alert was seen, events that triggered the alert, and which other machines are affected by the event. It provides an illustrated alert footprint on the original machine and expands to show the footprint of each alert event on other machines.
+
+You can click the circles on the incident graph to expand the nodes and view the associated events or files related to the alert.
+
+## Alert spotlight
+The alert spotlight feature helps ease investigations by highlighting alerts related to a specific machine and events. You can highlight an alert and its related events in the machine timeline to increase your focus during an investigation.
+
+You can click on the machine link from the alert view to see the alerts related to the machine.
+
+
+ > [!NOTE]
+ > This shortcut is not available from the Incident graph machine links.
+
+Alerts related to the machine are displayed under the **Alerts related to this machine** section.
+Clicking on an alert row takes you the to the date in which the alert was flagged on **Machine timeline**. This eliminates the need to manually filter and drag the machine timeline marker to when the alert was seen on that machine.
+
+You can also choose to highlight an alert from the **Alerts related to this machine** or from the **Machine timeline** section to see the correlation between the alert and other events that occurred on the machine. Right-click on any alert from either section and select **Mark related events**. This highlights alerts and events that are related and helps differentiate between the other alerts listed in the timeline. Highlighted events are displayed in all filtering modes whether you choose to view the timeline by **Detections**, **Behaviours**, or **Verbose**.
+
+You can also remove the highlight by right-clicking a highlighted alert and selecting **Unmark related events**.
+
+
### Related topics
- [View the Windows Defender Advanced Threat Protection Dashboard](dashboard-windows-defender-advanced-threat-protection.md)
- [View and organize the Windows Defender Advanced Threat Protection Alerts queue](alerts-queue-windows-defender-advanced-threat-protection.md)
diff --git a/windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md b/windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md
index fd75059fff..d138e36e1f 100644
--- a/windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/investigate-domain-windows-defender-advanced-threat-protection.md
@@ -13,11 +13,12 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
Investigate a domain to see if machines and servers in your enterprise network have been communicating with a known malicious domain.
You can see information from the following sections in the URL view:
diff --git a/windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md b/windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md
index 5dfb3959f9..6c1309102d 100644
--- a/windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/investigate-files-windows-defender-advanced-threat-protection.md
@@ -13,11 +13,12 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
Investigate the details of a file associated with a specific alert, behavior, or event to help determine if the file exhibits malicious activities, identify the attack motivation, and understand the potential scope of the breach.
You can get information from the following sections in the file view:
@@ -62,11 +63,13 @@ Use the deep analysis feature to investigate the details of any file, usually du
In the file's page, **Submit for deep analysis** is enabled when the file is available in the Windows Defender ATP backend sample collection or if it was observed on a Windows 10 machine that supports submitting to deep analysis.
-> **Note** Only files from Windows 10 can be automatically collected.
+> [!NOTE]
+> Only files from Windows 10 can be automatically collected.
You can also manually submit a sample through the [Malware Protection Center Portal](https://www.microsoft.com/en-us/security/portal/submission/submit.aspx) if the file was not observed on a Windows 10 machine, and wait for **Submit for deep analysis** button to become available.
-> **Note** Due to backend processing flows in the Malware Protection Center Portal, there could be up to 10 minutes of latency between file submission and availability of the deep analysis feature in Windows Defender ATP.
+> [!NOTE]
+> Due to backend processing flows in the Malware Protection Center Portal, there could be up to 10 minutes of latency between file submission and availability of the deep analysis feature in Windows Defender ATP.
When the sample is collected, Windows Defender ATP runs the file in is a secure environment and creates a detailed report of observed behaviors and associated artifacts, such as files dropped on machines, communication to IPs, and registry modifications.
@@ -84,7 +87,8 @@ When the sample is collected, Windows Defender ATP runs the file in is a secure
A progress bar is displayed and provides information on the different stages of the analysis. You can then view the report when the analysis is done.
-> **Note** Depending on machine availability, sample collection time can vary. There is a 3-hour timeout for sample collection. The collection will fail and the operation will abort if there is no online Windows 10 machine reporting at that time. You can re-submit files for deep analysis to get fresh data on the file.
+> [!NOTE]
+> Depending on machine availability, sample collection time can vary. There is a 1-hour timeout for sample collection. The collection will fail and the operation will abort if there is no online Windows 10 machine reporting at that time. You can re-submit files for deep analysis to get fresh data on the file.
## View deep analysis report
@@ -121,10 +125,11 @@ HKLM\SOFTWARE\Policies\Microsoft\Sense\AllowSampleCollection
Value = 0 - block sample collection
Value = 1 - allow sample collection
```
-5. Change the organizational unit through the Group Policy. See [Configure endpoints using Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md).
+5. Change the organizational unit through the Group Policy. For more information, see [Configure with Group Policy](configure-endpoints-gp-windows-defender-advanced-threat-protection.md).
6. If these steps do not resolve the issue, contact [winatp@microsoft.com](mailto:winatp@microsoft.com).
-> **Note** If the value *AllowSampleCollection* is not available, the client will allow sample collection by default.
+> [!NOTE]
+> If the value *AllowSampleCollection* is not available, the client will allow sample collection by default.
### Related topics
- [View the Windows Defender Advanced Threat Protection Dashboard](dashboard-windows-defender-advanced-threat-protection.md)
diff --git a/windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md b/windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md
index e1427b0400..dd72b28bc9 100644
--- a/windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/investigate-ip-windows-defender-advanced-threat-protection.md
@@ -13,12 +13,12 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
-
Examine possible communication between your machines and external internet protocol (IP) addresses.
Identifying all machines in the organization that communicated with a suspected or known malicious IP address, such as Command and Control (C2) servers, helps determine the potential scope of breach, associated files, and infected machines.
@@ -43,7 +43,8 @@ The **Communication with IP in organization** section provides a chronological v
Details about the IP address are displayed, including: registration details (if available), reverse IPs (for example, domains), prevalence of machines in the organization that communicated with this IP Address (during selectable time period), and the machines in the organization that were observed communicating with this IP address.
-> **Note** Search results will only be returned for IP addresses observed in communication with machines in the organization.
+> [!NOTE]
+> Search results will only be returned for IP addresses observed in communication with machines in the organization.
Use the search filters to define the search criteria. You can also use the timeline search box to filter the displayed results of all machines in the organization observed communicating with the IP address, the file associated with the communication and the last date observed.
diff --git a/windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md b/windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md
index 0a7f63c71b..7eae125102 100644
--- a/windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/investigate-machines-windows-defender-advanced-threat-protection.md
@@ -14,11 +14,12 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
The **Machines view** shows a list of the machines in your network, the corresponding number of active alerts for each machine categorized by alert severity levels, and the number of active malware detections. This view allows you to identify machines with the highest risk at a glance, and keep track of all the machines that are reporting telemetry in your network.
Use the Machines view in these two main scenarios:
@@ -37,7 +38,8 @@ The Machines view contains the following columns:
- **Active Alerts** - the number of alerts reported by the machine by severity
- **Active malware detections** - the number of active malware detections reported by the machine
-> **Note** The **Active alerts** and **Active malware detections** filter column will only appear if your endpoints are using [Windows Defender](https://technet.microsoft.com/en-us/library/mt622091(v=vs.85).aspx) as the default real-time protection antimalware product.
+> [!NOTE]
+> The **Active alerts** and **Active malware detections** filter column will only appear if your endpoints are using [Windows Defender](https://technet.microsoft.com/en-us/library/mt622091(v=vs.85).aspx) as the default real-time protection antimalware product.
Click any column header to sort the view in ascending or descending order.
@@ -55,7 +57,8 @@ You can filter the view by the following time periods:
- 30 days
- 6 months
-> **Note** When you select a time period, the list will only display machines that reported within the selected time period. For example, selecting 1 day will only display a list of machines that reported telemetry within the last 24-hour period.
+> [!NOTE]
+> When you select a time period, the list will only display machines that reported within the selected time period. For example, selecting 1 day will only display a list of machines that reported telemetry within the last 24-hour period.
The threat category filter lets you filter the view by the following categories:
@@ -65,7 +68,7 @@ The threat category filter lets you filter the view by the following categories:
- Threat
- Low severity
-See the [Investigate machines with active alerts](dashboard-windows-defender-advanced-threat-protection.md#investigate-machines-with-active-malware-detections) topic for a description of each category.
+For more information on the description of each category see, [Investigate machines with active alerts](dashboard-windows-defender-advanced-threat-protection.md#investigate-machines-with-active-malware-detections).
You can also download a full list of all the machines in your organization, in CSV format. Click the **Manage Alert** menu icon  to download the entire list as a CSV file.
@@ -100,6 +103,8 @@ You'll see an aggregated view of alerts, a short description of the alert, detai
This feature also enables you to selectively drill down into a behavior or event that occurred within a given time period. You can view the temporal sequence of events that occurred on a machine over a specified time period.
+You can also use the [Alerts spotlight](investigate-alerts-windows-defender-advanced-threat-protection.md#alerts-spotlight) feature to see the correlation between alerts and events on a specific machine.
+

Use the search bar to look for specific alerts or files associated with the machine.
diff --git a/windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md b/windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md
index 718b2e22ce..ef1ab6abe0 100644
--- a/windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/manage-alerts-windows-defender-advanced-threat-protection.md
@@ -14,14 +14,15 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
Windows Defender ATP notifies you of detected, possible attacks or breaches through alerts. A summary of new alerts is displayed in the **Dashboard**, and you can access all alerts in the **Alerts queue** menu.
-See the [Investigate Windows Defender ATP alerts](investigate-alerts-windows-defender-advanced-threat-protection.md#investigate-windows-defender-advanced-threat-protection-alerts) topic for more details on how to investigate alerts.
+For more information on how to investigate alerts see, [Investigate Windows Defender ATP alerts](investigate-alerts-windows-defender-advanced-threat-protection.md#investigate-windows-defender-advanced-threat-protection-alerts).
Click the **Manage Alert** menu icon  on the top of the alert to access the Manage Alert menu and manage alerts.
@@ -55,7 +56,7 @@ You can resolve an alert by changing the status of the alert to **Resolved**. Th

-The comments and change of status are recorded in the [Comments and history window](#view-history-and-comments).
+The comments and change of status are recorded in the Comments and history window.

@@ -86,7 +87,8 @@ The context of the rule lets you tailor the queue to ensure that only alerts you
1. Click the **Manage Alert** menu icon  on the heading of an existing alert.
2. Choose the context for suppressing the alert.
-> **Note** You cannot create a custom or blank suppression rule. You must start from an existing alert.
+> [!NOTE]
+> You cannot create a custom or blank suppression rule. You must start from an existing alert.
**See the list of suppression rules:**
@@ -95,7 +97,8 @@ The context of the rule lets you tailor the queue to ensure that only alerts you

-> **Note** You can also click **See rules** in the confirmation window that appears when you suppress an alert.
+> [!NOTE]
+> You can also click **See rules** in the confirmation window that appears when you suppress an alert.
The list of suppression rules shows all the rules that users in your organization have created.
Each rule shows:
diff --git a/windows/keep-secure/manage-identity-verification-using-microsoft-passport.md b/windows/keep-secure/manage-identity-verification-using-microsoft-passport.md
index 78dcd69fae..5422f94366 100644
--- a/windows/keep-secure/manage-identity-verification-using-microsoft-passport.md
+++ b/windows/keep-secure/manage-identity-verification-using-microsoft-passport.md
@@ -76,7 +76,7 @@ Hello also enables Windows 10 Mobile devices to be used as [a remote credential
- Private key never leaves a device. The authenticating server has a public key that is mapped to the user account during the registration process.
- PIN entry and biometric gesture both trigger Windows 10 to verify the user's identity and authenticate using Hello keys or certificates.
- Personal (Microsoft account) and corporate (Active Directory or Azure AD) accounts use a single container for keys. All keys are separated by identity providers' domains to help ensure user privacy.
-- Certificates are added to the Hello container and are protected by the Hello gesture.
+- Certificate private keys can be protected by the Hello container and the Hello gesture.
## Comparing key-based and certificate-based authentication
diff --git a/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md
index 1bc9344b78..85249ee5d8 100644
--- a/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/minimum-requirements-windows-defender-advanced-threat-protection.md
@@ -14,33 +14,102 @@ author: iaanw
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
There are some minimum requirements for onboarding your network and endpoints.
## Minimum requirements
### Network and data storage and configuration requirements
-
-
-
-
-When you run the onboarding wizard for the first time, you must choose where your Windows Defender Advanced Threat Protection-related information is stored: in either a European or United States datacenter.
+When you run the onboarding wizard for the first time, you must choose where your Windows Defender Advanced Threat Protection-related information is stored: either in a European or United States datacenter.
> **Notes**
- You cannot change your data storage location after the first-time setup.
- Review the [Windows Defender ATP data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) for more information on where and how Microsoft stores your data.
### Endpoint hardware and software requirements
-Endpoints on your network must be running Windows 10 Insider Preview Build 14332 or later. The hardware requirements for Windows Defender ATP on endpoints is the same as those for Windows 10 Insider Preview Build 14332 or later.
+The Windows Defender ATP agent only supports the following editions of Windows 10:
-> **Note** Endpoints that are running Windows Server and mobile versions of Windows are not supported.
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
-Internet connectivity on endpoints is also required. See [Configure Windows Defender ATP endpoint proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) for additional proxy configuration settings.
+Endpoints on your network must be running one of these editions.
+
+The hardware requirements for Windows Defender ATP on endpoints is the same as those for the supported editions.
+
+> [!NOTE]
+> Endpoints that are running Windows Server and mobile versions of Windows are not supported.
+
+#### Internet connectivity
+Internet connectivity on endpoints is required.
+
+SENSE can utilize up to 5MB daily of bandwidth to communicate with the Windows Defender ATP cloud service and report cyber data.
+
+> [!NOTE]
+> SENSE is the internal name used to refer to the behavioral sensor that powers Windows Defender ATP.
+
+For more information on additional proxy configuration settings see, [Configure Windows Defender ATP endpoint proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) .
Before you configure endpoints, the telemetry and diagnostics service must be enabled. The service is enabled by default in Windows 10, but if it has been disabled you can turn it on by following the instructions in the [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md) section.
+### Telemetry and diagnostics settings
+You must ensure that the telemetry and diagnostics service is enabled on all the endpoints in your organization.
+By default, this service is enabled, but it's good practice to check to ensure that you'll get telemetry from them.
+**Use the command line to check the Windows 10 telemetry and diagnostics service startup type**:
+
+1. Open an elevated command-line prompt on the endpoint:
+
+ a. Go to **Start** and type **cmd**.
+
+ b. Right-click **Command prompt** and select **Run as administrator**.
+
+2. Enter the following command, and press **Enter**:
+
+ ```text
+ sc qc diagtrack
+ ```
+
+If the service is enabled, then the result should look like the following screenshot:
+
+
+
+If the **START_TYPE** is not set to **AUTO_START**, then you'll need to set the service to automatically start.
+
+
+
+**Use the command line to set the Windows 10 telemetry and diagnostics service to automatically start:**
+
+1. Open an elevated command-line prompt on the endpoint:
+
+ a. Go to **Start** and type **cmd**.
+
+ b. Right-click **Command prompt** and select **Run as administrator**.
+
+2. Enter the following command, and press **Enter**:
+
+ ```text
+ sc config diagtrack start=auto
+ ```
+
+3. A success message is displayed. Verify the change by entering the following command, and press **Enter**:
+
+ ```text
+ sc qc diagtrack
+ ```
+
+## Windows Defender signature updates are configured
+The Windows Defender ATP agent depends on Windows Defender’s ability to scan files and provide information about them. If Windows Defender is not the active antimalware in your organization, you may need to configure the signature updates. For more information see [Configure Windows Defender in Windows 10](windows-defender-in-windows-10.md).
+
+When Windows Defender is not the active antimalware in your organization and you use the Windows Defender ATP service, Windows Defender goes on passive mode. For more information, see the **Compatibility** section in the [Windows Defender in Windows 10 topic](windows-defender-in-windows-10.md# compatibility-with-windows-defender-advanced-threat-protection).
+
+## Windows Defender Early Launch Antimalware (ELAM) driver is enabled
+If you're running Windows Defender as the primary antimalware product on your endpoints, the Windows Defender ATP agent will successfully onboard.
+
+If you're running a third-party antimalware client and use Mobile Device Management solutions or System Center Configuration Manager (current branch) version 1606, you'll need to ensure that the Windows Defender ELAM driver is enabled. For more information on how to validate and enable the Windows Defender ELAM driver see, [Ensure the Windows Defender ELAM driver is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-windows-defender-elam-driver-is-enabled).
diff --git a/windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md b/windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md
index 942dfa02ee..1c962bc1ec 100644
--- a/windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/onboard-configure-windows-defender-advanced-threat-protection.md
@@ -14,13 +14,15 @@ author: iaanw
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
You need to onboard to Windows Defender ATP before you can use the service.
+
## In this section
Topic | Description
:---|:---
diff --git a/windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md b/windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md
index 6363ce613d..177d0998d6 100644
--- a/windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/portal-overview-windows-defender-advanced-threat-protection.md
@@ -14,12 +14,12 @@ author: DulceMV
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
-
Enterprise security teams can use the Windows Defender ATP portal to monitor and assist in responding to alerts of potential advanced persistent threat (APT) activity or data breaches.
You can use the [Windows Defender ATP portal](https://securitycenter.windows.com/) to:
@@ -37,19 +37,20 @@ When you open the portal, you’ll see the main areas of the application:

-> **Note** Malware related detections will only appear if your endpoints are using [Windows Defender](https://technet.microsoft.com/en-us/library/mt622091(v=vs.85).aspx) as the default real-time protection antimalware product.
+> [!NOTE]
+> Malware related detections will only appear if your endpoints are using [Windows Defender](https://technet.microsoft.com/en-us/library/mt622091(v=vs.85).aspx) as the default real-time protection antimalware product.
You can navigate through the portal using the menu options available in all sections. Refer to the following table for a description of each section.
Area | Description
:---|:---
(1) Settings | Provides access to configuration settings such as time zone, alert suppression rules, and license information.
-(2) Navigation pane | Use the navigation pane to move between the **Dashboard**, **Alerts queue**, **Machines view**, **Preferences setup**, and **Endpoint Management**.
+(2) Navigation pane | Use the navigation pane to move between the **Dashboard**, **Alerts queue**, **Machines view**, **Preferences setup**, and **Enpoint Management**.
**Dashboard** | Provides clickable tiles that open detailed information on various alerts that have been detected in your organization.
**Alerts queue** | Enables you to view separate queues of new, in progress, and resolved alerts.
**Machines view**| Displays the list of machines that are onboarded to Windows Defender ATP, some information about them, and the corresponding number of alerts.
-**Preferences setup**| Shows the settings you selected and lets you update your industry preferences and retention policy period.
-**Endpoint Management**| Allows you to download the onboarding configuration package.
+**Preferences setup**| Shows the settings you selected and lets you update your industry preferences and retention policy period.
+**Enpoint Management**| Allows you to download the onboarding configuration package.
(3) Main portal| Main area where you will see the different views such as the Dashboard, Alerts queue, and Machines view.
(4) Search | Search for machines, files, external IP Addresses, or domains across endpoints. The drop-down combo box allows you to select the entity type.
diff --git a/windows/keep-secure/prepare-people-to-use-microsoft-passport.md b/windows/keep-secure/prepare-people-to-use-microsoft-passport.md
index 72a30d320b..81f36a3d4e 100644
--- a/windows/keep-secure/prepare-people-to-use-microsoft-passport.md
+++ b/windows/keep-secure/prepare-people-to-use-microsoft-passport.md
@@ -83,10 +83,15 @@ If your enterprise enables phone sign-in, users can pair a phone running Windows
**Sign in to PC using the phone**
+<<<<<<< HEAD
1. Open the **Microsoft Authenticator** app, choose your account, and tap the name of the PC to sign in to.
> **Note: ** The first time that you run the **Microsoft Authenticator** app, you must add an account.

+=======
+1. Open the **Microsoft Authenticator** app and tap the name of the PC to sign in to.
+ > **Note: ** The first time that you run the **Microsoft Authenticator** app, you must add an account.
+>>>>>>> parent of 9891b67... from master
2. Enter the work PIN that you set up when you joined the phone to the cloud domain or added a work account.
diff --git a/windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md b/windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md
index 61313be105..d74bdf6189 100644
--- a/windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md
+++ b/windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md
@@ -216,7 +216,7 @@ The following Windows 10 services are protected with virtualization-based secur
- **Credential Guard** (LSA Credential Isolation): prevents pass-the-hash attacks and enterprise credential theft that happens by reading and dumping the content of lsass memory
- **Device Guard** (Hyper-V Code Integrity): Device Guard uses the new virtualization-based security in Windows 10 to isolate the Code Integrity service from the Windows kernel itself, which lets the service use signatures defined by your enterprise-controlled policy to help determine what is trustworthy. In effect, the Code Integrity service runs alongside the kernel in a Windows hypervisor-protected container.
-- **Other isolated services**: for example, on Windows Server Technical Preview 2016, there is the vTPM feature that allows you to have encrypted virtual machines (VMs) on servers.
+- **Other isolated services**: for example, on Windows Server 2016, there is the vTPM feature that allows you to have encrypted virtual machines (VMs) on servers.
>**Note:** Virtualization-based security is only available with Windows 10 Enterprise. Virtualization-based security requires devices with UEFI (2.3.1 or higher) with Secure Boot enabled, x64 processor with Virtualization Extensions and SLAT enabled. IOMMU, TPM 2.0. and support for Secure Memory overwritten are optional, but recommended.
@@ -747,7 +747,7 @@ For more information about conditional access, see [Azure Conditional Access Pre
For on-premises applications there are two options to enable conditional access control based on a device's compliance state:
- For on-premises applications that are published through the Azure AD Application Proxy, you can configure conditional access control policies as you would for cloud applications. For more details, see the [Azure AD Conditional Access preview updated: Now supports On-Premises and Custom LOB apps](http://go.microsoft.com/fwlink/p/?LinkId=691618) blog post.
-- Additionally, Azure AD Connect will sync device compliance information from Azure AD to on-premises AD. ADFS on Windows Server Technical Preview 2016 will support conditional access control based on a device's compliance state. IT pros will configure conditional access control policies in ADFS that use the device's compliance state reported by a compatible MDM solution to secure on-premises applications.
+- Additionally, Azure AD Connect will sync device compliance information from Azure AD to on-premises AD. ADFS on Windows Server 2016 will support conditional access control based on a device's compliance state. IT pros will configure conditional access control policies in ADFS that use the device's compliance state reported by a compatible MDM solution to secure on-premises applications.

diff --git a/windows/keep-secure/requirements-to-use-applocker.md b/windows/keep-secure/requirements-to-use-applocker.md
index 6389eb2755..2f9e009bd2 100644
--- a/windows/keep-secure/requirements-to-use-applocker.md
+++ b/windows/keep-secure/requirements-to-use-applocker.md
@@ -32,7 +32,7 @@ The following table show the on which operating systems AppLocker features are s
| Version | Can be configured | Can be enforced | Available rules | Notes |
| - | - | - | - | - |
-| Windows 10| Yes| Yes| Packaged apps
Executable
Windows Installer
Script
DLL| You can use the [AppLocker CSP](http://msdn.microsoft.com/library/windows/hardware/dn920019.aspx) to configure AppLocker policies on any edition of Windows 10. You can only manage AppLocker with Group Policy on devices running Windows 10 Enterprise and Windows Server 2016 Technical Preview. |
+| Windows 10| Yes| Yes| Packaged apps
Executable
Windows Installer
Script
DLL| You can use the [AppLocker CSP](http://msdn.microsoft.com/library/windows/hardware/dn920019.aspx) to configure AppLocker policies on any edition of Windows 10. You can only manage AppLocker with Group Policy on devices running Windows 10 Enterprise and Windows Server 2016. |
| Windows Server 2012 R2| Yes| Yes| Packaged apps
Executable
Windows Installer
Script
DLL| |
| Windows 8.1| Yes| Yes| Packaged apps
Executable
Windows Installer
Script
DLL| Only the Enterprise edition supports AppLocker|
| Windows RT 8.1| No| No| N/A||
diff --git a/windows/keep-secure/settings-windows-defender-advanced-threat-protection.md b/windows/keep-secure/settings-windows-defender-advanced-threat-protection.md
index 81d0358abb..e45619b0a3 100644
--- a/windows/keep-secure/settings-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/settings-windows-defender-advanced-threat-protection.md
@@ -14,11 +14,12 @@ author: DulceMV
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
Use the **Settings** menu  to configure the time zone, suppression rules, and view license information.
## Time zone settings
@@ -52,7 +53,7 @@ To set the time zone:
3. The time zone indicator changes to **Timezone:Local**. Click it again to change back to **Timezone:UTC**.
## Suppression rules
-The suppression rules control what alerts are suppressed. You can suppress alerts so that certain activities are not flagged as suspicious. See [Suppress alerts](manage-alerts-windows-defender-advanced-threat-protection.md#suppress-alerts).
+The suppression rules control what alerts are suppressed. You can suppress alerts so that certain activities are not flagged as suspicious. For more information see, [Suppress alerts](manage-alerts-windows-defender-advanced-threat-protection.md#suppress-alerts).
## License
Click the license link in the **Settings** menu to view the license agreement information for Windows Defender ATP.
diff --git a/windows/keep-secure/tpm-recommendations.md b/windows/keep-secure/tpm-recommendations.md
index 81b6385faf..049685cef2 100644
--- a/windows/keep-secure/tpm-recommendations.md
+++ b/windows/keep-secure/tpm-recommendations.md
@@ -14,7 +14,7 @@ author: brianlic-msft
**Applies to**
- Windows 10
- Windows 10 Mobile
-- Windows Server 2016 Technical Preview
+- Windows Server 2016
- Windows 10 IoT Core (IoT Core)
This topic provides recommendations for Trusted Platform Module (TPM) technology for Windows 10.
@@ -104,7 +104,7 @@ For end consumers, TPM is behind the scenes but still very relevant for Hello, P
- TPM is optional on IoT Core.
-### Windows Server 2016 Technical Preview
+### Windows Server 2016
- TPM is optional for Windows Server SKUs unless the SKU meets the additional qualification (AQ) criteria for the Host Guardian Services scenario in which case TPM 2.0 is required.
diff --git a/windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md b/windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md
index 6cbed263b3..2025b51e99 100644
--- a/windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md
@@ -7,58 +7,48 @@ ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
-author: iaanw
+author: mjcaparas
---
# Troubleshoot Windows Defender Advanced Threat Protection onboarding issues
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
+You might need to troubleshoot the Windows Defender ATP onboarding process if you encounter issues.
+This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the endpoints.
-You might need to troubleshoot the Windows Defender Advanced Threat Protection onboarding process if you encounter issues.
-This page provides detailed steps for troubleshooting endpoints that aren't reporting correctly, and common error codes encountered during onboarding.
+If you have completed the endpoint onboarding process and don't see endpoints in the [Machines view](investigate-machines-windows-defender-advanced-threat-protection.md) after an hour, it might indicate an endpoint onboarding or connectivity problem.
-## Endpoints are not reporting to the service correctly
+## Troubleshoot onboarding when deploying with Group Policy
+Deployment with Group Policy is done by running the onboarding script on the endpoints. The Group Policy console does not indicate if the deployment has succeeded or not.
-If you have completed the endpoint onboarding process and don't see endpoints in the [Machines view](investigate-machines-windows-defender-advanced-threat-protection.md) after 20 minutes, it might indicate an endpoint onboarding or connectivity problem.
+If you have completed the endpoint onboarding process and don't see endpoints in the [Machines view](investigate-machines-windows-defender-advanced-threat-protection.md) after an hour, you can check the output of the script on the endpoints. For more information, see [Troubleshoot onboarding when deploying with a script on the endpoint](#troubleshoot-onboarding-when-deploying-with-a-script-on-the-endpoint).
-Go through the following verification topics to address this issue:
+If the script completes successfully, see [Troubleshoot onboarding issues on the endpoint](#troubleshoot-onboarding-issues-on-the-endpoint) for additional errors that might occur.
-- [Ensure the endpoint is onboarded successfully](#Ensure-that-the-endpoint-is-onboarded-successfully)
-- [Ensure the Windows Defender ATP service is enabled](#Ensure-that-the-Windows-Defender-ATP-service-is-enabled)
-- [Ensure the telemetry and diagnostics service is enabled](#Ensure-that-telemetry-and-diagnostics-service-is-enabled)
-- [Ensure the endpoint has an Internet connection](#Ensure-that-the-Windows-Defender-ATP-endpoint-has-internet-connection)
+## Troubleshoot onboarding issues when deploying with System Center Configuration Manager
+When onboarding endpoints using the following versions of System Center Configuration Manager:
+- System Center 2012 Configuration Manager
+- System Center 2012 R2 Configuration Manager
+- System Center Configuration Manager (current branch) version 1511
+- System Center Configuration Manager (current branch) version 1602
-### Ensure the endpoint is onboarded successfully
-If the endpoints aren't reporting correctly, you might need to check that the Windows Defender ATP service was successfully onboarded onto the endpoint.
+Deployment with the above-mentioned versions of System Center Configuration Manager is done by running the onboarding script on the endpoints. You can track the deployment in the Configuration Manager Console.
-**Check the onboarding state in Registry**:
+If the deployment fails, you can check the output of the script on the endpoints. For more information, see [Troubleshoot onboarding when deploying with a script on the endpoint](#troubleshoot-onboarding-when-deploying-with-a-script-on-the-endpoint).
-1. Click **Start**, type **Run**, and press **Enter**.
+If the onboarding completed successfully but the endpoints are not showing up in the **Machines view** after an hour, see [Troubleshoot onboarding issues on the endpoint](#troubleshoot-onboarding-issues-on-the-endpoint) for additional errors that might occur.
-2. From the **Run** dialog box, type **regedit** and press **Enter**.
-
-4. In the **Registry Editor** navigate to the Status key under:
-
- ```text
-HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Advanced Threat Protection
-```
-
-5. Check the **OnboardingState** value is set to **1**.
-
- 
-
-If the **OnboardingState** value is not set to **1**, you can use Event Viewer to review errors on the endpoint.
-
-If you configured your endpoints with a deployment tool that required a script, you can check the event viewer for the onboarding script results.
-
-**Check the result of the script**:
+## Troubleshoot onboarding when deploying with a script on the endpoint
+**Check the result of the script on the endpoint**:
1. Click **Start**, type **Event Viewer**, and press **Enter**.
2. Go to **Windows Logs** > **Application**.
@@ -66,25 +56,82 @@ If you configured your endpoints with a deployment tool that required a script,
3. Look for an event from **WDATPOnboarding** event source.
If the script fails and the event is an error, you can check the event ID in the following table to help you troubleshoot the issue.
-> **Note** The following event IDs are specific to the onboarding script only.
+> [!NOTE]
+> The following event IDs are specific to the onboarding script only.
Event ID | Error Type | Resolution steps
:---|:---|:---
-5 | Offboarding data was found but couldn't be deleted | Check the permissions on the registry, specifically ```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```
-10 | Onboarding data couldn't be written to registry | Check the permissions on the registry, specifically ```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat```. Verify that the script was ran as an administrator.
-15 | Failed to start SENSE service |Check the service status (```sc query sense``` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights).
+5 | Offboarding data was found but couldn't be deleted | Check the permissions on the registry, specifically ```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```.
+10 | Onboarding data couldn't be written to registry | Check the permissions on the registry, specifically
```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat```.
Verify that the script was ran as an administrator.
+15 | Failed to start SENSE service |Check the service status (```sc query sense``` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights).
+15 | Failed to start SENSE service | If the message of the error is: System error 577 has occurred. You need to enable the Windows Defender ELAM driver, see [Ensure the Windows Defender ELAM driver is enabled](#ensure-the-windows-defender-elam-driver-is-enabled) for instructions.
30 | The script failed to wait for the service to start running | The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors on endpoints with Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md).
-35 | The script failed to find needed onboarding status registry value | When the SENSE service starts for the first time, it writes onboarding status to the registry location ```HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status```. The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors on endpoints with Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md).
-40 | SENSE service onboarding status is not set to **1** | The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors on endpoints with Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md).
+35 | The script failed to find needed onboarding status registry value | When the SENSE service starts for the first time, it writes onboarding status to the registry location
```HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status```.
The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors on endpoints with Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md).
+40 | SENSE service onboarding status is not set to **1** | The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors on endpoints with Event viewer](event-error-codes-windows-defender-advanced-threat-protection.md).
+65 | Insufficient privileges| Run the script again with administrator privileges.
+
+## Troubleshoot onboarding issues using Microsoft Intune
+You can use Microsoft Intune to check error codes and attempt to troubleshoot the cause of the issue.
+
+Use the following tables to understand the possible causes of issues while onboarding:
+
+- Microsoft Intune error codes and OMA-URIs table
+- Known issues with non-compliance table
+- Mobile Device Management (MDM) event logs table
+
+If none of the event logs and troubleshooting steps work, download the Local script from the **Endpoint Management** section of the portal, and run it in an elevated command prompt.
+
+**Microsoft Intune error codes and OMA-URIs**:
+
+Error Code Hex | Error Code Dec | Error Description | OMA-URI | Possible cause and troubleshooting steps
+:---|:---|:---|:---|:---
+0x87D1FDE8 | -2016281112 | Remediation failed | Onboarding
Offboarding | **Possible cause:** Onboarding or offboarding failed on a wrong blob: wrong signature or missing PreviousOrgIds fields.
**Troubleshooting steps:**
Check the event IDs in the [View agent onboarding errors in the endpoint event log](#view-agent-onboarding-errors-in-the-endpoint-event-log) section.
Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/en-us/library/windows/hardware/mt632120%28v=vs.85%29.aspx).
+ | | | Onboarding
Offboarding
SampleSharing | **Possible cause:** Windows Defender ATP Policy registry key does not exist or the OMA DM client doesn't have permissions to write to it.
**Troubleshooting steps:** Ensure that the following registry key exists: ```HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```.
If it doesn't exist, open an elevated command and add the key.
+ | | | SenseIsRunning
OnboardingState
OrgId | **Possible cause:** An attempt to remediate by read-only property. Onboarding has failed.
**Troubleshooting steps:** Check the troubleshooting steps in [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](#troubleshoot-windows-defender-advanced-threat-protection-onboarding-issues).
Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/en-us/library/windows/hardware/mt632120%28v=vs.85%29.aspx).
+ | | | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.
Currently is supported platforms: Enterprise, Education, and Professional.
Server is not supported.
+ 0x87D101A9 | -2016345687 |Syncml(425): The requested command failed because the sender does not have adequate access control permissions (ACL) on the recipient. | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.
Currently is supported platforms: Enterprise, Education, and Professional.
-**Use Event Viewer to identify and adress onboarding errors**:
+**Known issues with non-compliance**
+
+The following table provides information on issues with non-compliance and how you can address the issues.
+
+Case | Symptoms | Possible cause and troubleshooting steps
+:---|:---|:---
+1 | Machine is compliant by SenseIsRunning OMA-URI. But is non-compliant by OrgId, Onboarding and OnboardingState OMA-URIs. | **Possible cause:** Check that user passed OOBE after Windows installation or upgrade. During OOBE onboarding couldn't be completed but SENSE is running already.
**Troubleshooting steps:** Wait for OOBE to complete.
+2 | Machine is compliant by OrgId, Onboarding, and OnboardingState OMA-URIs, but is non-compliant by SenseIsRunning OMA-URI. | **Possible cause:** Sense service's startup type is set as "Delayed Start". Sometimes this causes the Microsoft Intune server to report the machine as non-compliant by SenseIsRunning when DM session occurs on system start.
**Troubleshooting steps:** The issue should automatically be fixed within 24 hours.
+3 | Machine is non-compliant | **Troubleshooting steps:** Ensure that Onboarding and Offboarding policies are not deployed on the same machine at same time.
+
+
+**Mobile Device Management (MDM) event logs**
+
+View the MDM event logs to troubleshoot issues that might arise during onboarding:
+
+Log name: Microsoft\Windows\DeviceManagement-EnterpriseDiagnostics-Provider
+
+Channel name: Admin
+
+ID | Severity | Event description | Troubleshooting steps
+:---|:---|:---|:---
+1819 | Error | Windows Defender Advanced Threat Protection CSP: Failed to Set Node's Value. NodeId: (%1), TokenName: (%2), Result: (%3). | Windows Defender ELAM driver needs to be enabled see, [Ensure the Windows Defender ELAM driver is enabled](#ensure-the-windows-defender-elam-driver-is-enabled) for instructions.
+
+## Troubleshoot onboarding issues on the endpoint
+If the deployment tools used does not indicate an error in the onboarding process, but endpoints are still not appearing in the machines view an hour, go through the following verification topics to check if an error occurred with the Windows Defender ATP agent:
+- [View agent onboarding errors in the endpoint event log](#view-agent-onboarding-errors-in-the-endpoint-event-log)
+- [Ensure the telemetry and diagnostics service is enabled](#ensure-the-telemetry-and-diagnostics-service-is-enabled)
+- [Ensure the service is set to start](#ensure-the-service-is-set-to-start)
+- [Ensure the endpoint has an Internet connection](#ensure-the-endpoint-has-an-internet-connection)
+- [Ensure the Windows Defender ELAM driver is enabled](#ensure-the-windows-defender-elam-driver-is-enabled)
+
+
+### View agent onboarding errors in the endpoint event log
1. Click **Start**, type **Event Viewer**, and press **Enter**.
2. In the **Event Viewer (Local)** pane, expand **Applications and Services Logs** > **Microsoft** > **Windows** > **SENSE**.
- > **Note** SENSE is the internal name used to refer to the behavioral sensor that powers Windows Defender ATP.
+ > [!NOTE]
+ > SENSE is the internal name used to refer to the behavioral sensor that powers Windows Defender ATP.
3. Select **Operational** to load the log.
@@ -98,101 +145,16 @@ Event ID | Error Type | Resolution steps
Event ID | Message | Resolution steps
:---|:---|:---
-5 | Windows Advanced Threat Protection service failed to connect to the server at _variable_ | [Ensure the endpoint has Internet access](#ensure-the-endpoint-has-an-internet-connection).
-6 | Windows Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-windows-defender-advanced-threat-protection.md#manual).
-7 | Windows Advanced Threat Protection service failed to read the onboarding parameters. Failure code: _variable_ | [Ensure the endpoint has Internet access](#ensure-the-endpoint-has-an-internet-connection), then run the entire onboarding process again.
-15 | Windows Advanced Threat Protection cannot start command channel with URL: _variable_ | [Ensure the endpoint has Internet access](#ensure-the-endpoint-has-an-internet-connection).
+5 | Windows Defender Advanced Threat Protection service failed to connect to the server at _variable_ | [Ensure the endpoint has Internet access](#ensure-the-endpoint-has-an-internet-connection).
+6 | Windows Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-windows-defender-advanced-threat-protection.md#manual).
+7 | Windows Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure code: _variable_ | [Ensure the endpoint has Internet access](#ensure-the-endpoint-has-an-internet-connection), then run the entire onboarding process again.
+15 | Windows Defender Advanced Threat Protection cannot start command channel with URL: _variable_ | [Ensure the endpoint has Internet access](#ensure-the-endpoint-has-an-internet-connection).
25 | Windows Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: _variable_ | Contact support.
-
-
-### Ensure the Windows Defender ATP service is enabled
-If the endpoints aren't reporting correctly, you might need to check that the Windows Defender ATP service is set to automatically start and is running on the endpoint.
-
-You can use the SC command line program for checking and managing the startup type and running state of the service.
-
-**Check the Windows Defender ATP service startup type from the command line:**
-
-1. Open an elevated command-line prompt on the endpoint:
-
- a. Click **Start**, type **cmd**, and press **Enter**.
-
- b. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command, and press **Enter**:
-
- ```text
- sc qc sense
- ```
-
-If the the service is running, then the result should look like the following screenshot:
-
- 
-
-If the service ```START_TYPE``` is not set to ```AUTO_START```, then you'll need to set the service to automatically start.
-
-**Change the Windows Defender ATP service startup type from the command line:**
-
-1. Open an elevated command-line prompt on the endpoint:
-
- a. Click **Start**, type **cmd**, and press **Enter**.
-
- b. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command, and press **Enter**:
-
- ```text
- sc config sense start=auto
- ```
-
-3. A success message is displayed. Verify the change by entering the following command and press **Enter**:
-
- ```text
- sc qc sense
- ```
-
-**Check the Windows Defender ATP service is running from the command line:**
-
-1. Open an elevated command-line prompt on the endpoint:
-
- a. Click **Start**, type **cmd**, and press **Enter**.
-
- b. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command, and press **Enter**:
-
- ```text
- sc query sense
- ```
-
-If the service is running, the result should look like the following screenshot:
-
-
-
-If the service **STATE** is not set to **RUNNING**, then you'll need to start it.
-
-**Start the Windows Defender ATP service from the command line:**
-
-1. Open an elevated command-line prompt on the endpoint:
-
- a. Click **Start**, type **cmd**, and press **Enter**.
-
- b. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command, and press **Enter**:
-
- ```text
- sc start sense
- ```
-
-3. A success message is displayed. Verify the change by entering the following command and press **Enter**:
-
- ```text
- sc qc sense
- ```
+
+There are additional components on the endpoint that the Windows Defender ATP agent depends on to function properly. If there are no onboarding related errors in the Windows Defender ATP agent event log, proceed with the following steps to ensure that the additional components are configured correctly.
### Ensure the telemetry and diagnostics service is enabled
-If the endpoints aren't reporting correctly, you might need to check that the Windows 10 telemetry and diagnostics service is set to automatically start and is running on the endpoint. The service may have been disabled by other programs or user configuration changes.
-
+If the endpoints aren't reporting correctly, you might need to check that the Windows 10 telemetry and diagnostics service is set to automatically start and is running on the endpoint. The service might have been disabled by other programs or user configuration changes.
First, you should check that the service is set to start automatically when Windows starts, then you should check that the service is currently running (and start it if it isn't).
@@ -212,12 +174,11 @@ First, you should check that the service is set to start automatically when Wind
sc qc diagtrack
```
-If the service is enabled, then the result should look like the following screenshot:
+ If the service is enabled, then the result should look like the following screenshot:
-
-
-If the ```START_TYPE``` is not set to ```AUTO_START```, then you'll need to set the service to automatically start.
+ 
+ If the `START_TYPE` is not set to `AUTO_START`, then you'll need to set the service to automatically start.
**Use the command line to set the Windows 10 telemetry and diagnostics service to automatically start:**
@@ -240,109 +201,13 @@ If the ```START_TYPE``` is not set to ```AUTO_START```, then you'll need to set
sc qc diagtrack
```
-**Use the Windows Services console to check the Windows 10 telemetry and diagnostics service startup type**:
+4. Start the service.
-1. Open the services console:
-
- a. Click **Start** and type **services**.
-
- b. Press **Enter** to open the console.
-
-2. Scroll through the list of services until you find **Connected User Experiences and Telemetry**.
-
-3. Check the **Startup type** column - the service should be set as **Automatic**.
-
-If the startup type is not set to **Automatic**, you'll need to change it so the service starts when the endpoint does.
-
-
-**Use the Windows Services console to set the Windows 10 telemetry and diagnostics service to automatically start:**
-
-1. Open the services console:
-
- a. Click **Start** and type **services**.
-
- b. Press **Enter** to open the console.
-
-2. Scroll through the list of services until you find **Connected User Experiences and Telemetry**.
-
-3. Right-click on the entry and click **Properties**.
-
-4. On the **General** tab, change the **Startup type:** to **Automatic**, as shown in the following image. Click OK.
-
- 
-
-### Ensure the service is running
-
-**Use the command line to check the Windows 10 telemetry and diagnostics service is running**:
-
-1. Open an elevated command-line prompt on the endpoint:
-
- a. **Click **Start** and type **cmd**.**
-
- b. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command, and press **Enter**:
-
- ```text
- sc query diagtrack
- ```
-
-If the service is running, the result should look like the following screenshot:
-
-
-
-If the service **STATE** is not set to **RUNNING**, then you'll need to start it.
-
-
-**Use the command line to start the Windows 10 telemetry and diagnostics service:**
-
-1. Open an elevated command-line prompt on the endpoint:
-
- a. **Click **Start** and type **cmd**.**
-
- b. Right-click **Command prompt** and select **Run as administrator**.
-
-2. Enter the following command, and press **Enter**:
-
- ```text
- sc start diagtrack
- ```
-
-3. A success message is displayed. Verify the change by entering the following command, and press **Enter**:
-
- ```text
- sc query diagtrack
- ```
-
-**Use the Windows Services console to check the Windows 10 telemetry and diagnostics service is running**:
-
-1. Open the services console:
-
- a. Click **Start** and type **services**.
-
- b. Press **Enter** to open the console.
-
-2. Scroll through the list of services until you find **Connected User Experiences and Telemetry**.
-
-3. Check the **Status** column - the service should be marked as **Running**.
-
-If the service is not running, you'll need to start it.
-
-
-**Use the Windows Services console to start the Windows 10 telemetry and diagnostics service:**
-
-1. Open the services console:
-
- a. Click **Start** and type **services**.
-
- b. Press **Enter** to open the console.
-
-2. Scroll through the list of services until you find **Connected User Experiences and Telemetry**.
-
-3. Right-click on the entry and click **Start**, as shown in the following image.
-
-
+ a. In the command prompt, type the following command and press **Enter**:
+ ```text
+ sc start diagtrack
+ ```
### Ensure the endpoint has an Internet connection
@@ -352,90 +217,103 @@ WinHTTP is independent of the Internet browsing proxy settings and other user co
To ensure that sensor has service connectivity, follow the steps described in the [Verify client connectivity to Windows Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls) topic.
-If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) topic.
+If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) topic.
-## Troubleshoot onboarding issues using Microsoft Intune
-You can use Microsoft Intune to check error codes and attempt to troubleshoot the cause of the issue.
+### Ensure the Windows Defender ELAM driver is enabled
+If your endpoints are running a third-party antimalware client, the Windows Defender ATP agent needs the Windows Defender Early Launch Antimalware (ELAM) driver to be enabled.
-Use the following tables to understand the possible causes of issues while onboarding:
+**Check the ELAM driver status:**
-- Microsoft Intune error codes and OMA-URIs table
-- Known issues with non-compliance table
-- Mobile Device Management (MDM) event logs table
+1. Open a command-line prompt on the endpoint:
-If none of the event logs and troubleshooting steps work, download the Local script from the **Endpoint Management** section of the portal, and run it in an elevated command prompt.
+ a. Click **Start**, type **cmd**, and select **Command prompt**.
-**Microsoft Intune error codes and OMA-URIs**:
+2. Enter the following command, and press Enter:
+ ```
+ sc qc WdBoot
+ ```
+ If the ELAM driver is enabled, the output will be:
-Error Code Hex | Error Code Dec | Error Description | OMA-URI | Possible cause and troubleshooting steps
-:---|:---|:---|:---|:---
-0x87D1FDE8 | -2016281112 | Remediation failed | Onboarding
Offboarding | **Possible cause:** Onboarding or offboarding failed on a wrong blob: wrong signature or missing PreviousOrgIds fields.
**Troubleshooting steps:**
Check the event IDs in the [Ensure the endpoint is onboarded successfully](#ensure-the-endpoint-is-onboarded-successfully) section.
Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/en-us/library/windows/hardware/mt632120%28v=vs.85%29.aspx).
- | | | Onboarding
Offboarding
SampleSharing | **Possible cause:** Windows Defender ATP Policy registry key does not exist or the OMA DM client doesn't have permissions to write to it.
**Troubleshooting steps:** Ensure that the following registry key exists: ```HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```.
If it doesn't exist, open an elevated command and add the key.
- | | | SenseIsRunning
OnboardingState
OrgId | **Possible cause:** An attempt to remediate by read-only property. Onboarding has failed.
**Troubleshooting steps:** Check the troubleshooting steps in [Troubleshoot Windows Defender Advanced Threat Protection onboarding issues](#troubleshoot-windows-defender-advanced-threat-protection-onboarding-issues).
Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/en-us/library/windows/hardware/mt632120%28v=vs.85%29.aspx).
- | | | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.
Currently is supported platforms: Enterprise, Education, and Professional.
Server is not supported.
- 0x87D101A9 | -2016345687 |Syncml(425): The requested command failed because the sender does not have adequate access control permissions (ACL) on the recipient. | All | **Possible cause:** Attempt to deploy Windows Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.
Currently is supported platforms: Enterprise, Education, and Professional.
+ ```
+ [SC] QueryServiceConfig SUCCESS
-
-**Known issues with non-compliance**
+ SERVICE_NAME: WdBoot
+ TYPE : 1 KERNEL_DRIVER
+ START_TYPE : 0 BOOT_START
+ ERROR_CONTROL : 1 NORMAL
+ BINARY_PATH_NAME : \SystemRoot\system32\drivers\WdBoot.sys
+ LOAD_ORDER_GROUP : Early-Launch
+ TAG : 0
+ DISPLAY_NAME : Windows Defender Boot Driver
+ DEPENDENCIES :
+ SERVICE_START_NAME :
+ ```
+ If the ELAM driver is disabled the output will be:
+ ```
+ [SC] QueryServiceConfig SUCCESS
-The following table provides information on issues with non-compliance and how you can address the issues.
+ SERVICE_NAME: WdBoot
+ TYPE : 1 KERNEL_DRIVER
+ START_TYPE : 0 DEMAND_START
+ ERROR_CONTROL : 1 NORMAL
+ BINARY_PATH_NAME : \SystemRoot\system32\drivers\WdBoot.sys
+ LOAD_ORDER_GROUP : _Early-Launch
+ TAG : 0
+ DISPLAY_NAME : Windows Defender Boot Driver
+ DEPENDENCIES :
+ SERVICE_START_NAME :
+ ```
-Case | Symptoms | Possible cause and troubleshooting steps
-:---|:---|:---
-1 | Machine is compliant by SenseIsRunning OMA-URI. But is non-compliant by OrgId, Onboarding and OnboardingState OMA-URIs. | **Possible cause:** Check that user passed OOBE after Windows installation or upgrade. During OOBE onboarding couldn't be completed but SENSE is running already.
**Troubleshooting steps:** Wait for OOBE to complete.
-2 | Machine is compliant by OrgId, Onboarding, and OnboardingState OMA-URIs, but is non-compliant by SenseIsRunning OMA-URI. | **Possible cause:** Sense service's startup type is set as "Delayed Start". Sometimes this causes the Microsoft Intune server to report the machine as non-compliant by SenseIsRunning when DM session occurs on system start.
**Troubleshooting steps:** The issue should automatically be fixed within 24 hours.
-3 | Machine is non-compliant | **Troubleshooting steps:** Ensure that Onboarding and Offboarding policies are not deployed on the same machine at same time.
+#### Enable the ELAM driver
-
-**Mobile Device Management (MDM) event logs**
+1. Open an elevated PowerShell console on the endpoint:
-View the MDM event logs to troubleshoot issues that might arise during onboarding:
+ a. Click **Start**, type **powershell**.
-Log name: Microsoft\Windows\DeviceManagement-EnterpriseDiagnostics-Provider
+ b. Right-click **Command prompt** and select **Run as administrator**.
-Channel name: Admin
+2. Run the following PowerShell cmdlet:
-ID | Severity | Event description | Description
-:---|:---|:---|:---
-1801 | Error | Windows Defender Advanced Threat Protection CSP: Failed to Get Node's Value. NodeId: (%1), TokenName: (%2), Result: (%3) | Windows Defender ATP has failed to get specific node's value.
TokenName: Contains node name that caused the error.
Result: Error details.
-1802 | Information | Windows Defender Advanced Threat Protection CSP: Get Node's Value complete. NodeId: (%1), TokenName: (%2), Result: (%3) | Windows Defender ATP has completed to get specific node's value.
TokenName: Contains node name
Result: Error details or succeeded.
-1819 | Error | Windows Defender Advanced Threat Protection CSP: Failed to Set Node's Value. NodeId: (%1), TokenName: (%2), Result: (%3). | Windows Defender ATP has completed to get specific node's value.
TokenName: Contains node name that caused the error
Result: Error details.
-1820 | Information | Windows Defender Advanced Threat Protection CSP: Set Nod's Value complete. NodeId: (%1), TokenName: (%2), Result: (%3). | Windows Defender ATP has completed to get specific node's value.
TokenName: Contains node name
Result: Error details or succeeded.
+ ```text
+ 'Set-ExecutionPolicy -ExecutionPolicy Bypass’
+ ```
+3. Run the following PowerShell script:
+
+ ```text
+ Add-Type @'
+ using System;
+ using System.IO;
+ using System.Runtime.InteropServices;
+ using Microsoft.Win32.SafeHandles;
+ using System.ComponentModel;
+
+ public static class Elam{
+ [DllImport("Kernel32", CharSet=CharSet.Auto, SetLastError=true)]
+ public static extern bool InstallELAMCertificateInfo(SafeFileHandle handle);
+
+ public static void InstallWdBoot(string path)
+ {
+ Console.Out.WriteLine("About to call create file on {0}", path);
+ var stream = File.Open(path, FileMode.Open, FileAccess.Read, FileShare.Read);
+ var handle = stream.SafeFileHandle;
+
+ Console.Out.WriteLine("About to call InstallELAMCertificateInfo on handle {0}", handle.DangerousGetHandle());
+ if (!InstallELAMCertificateInfo(handle))
+ {
+ Console.Out.WriteLine("Call failed.");
+ throw new Win32Exception(Marshal.GetLastWin32Error());
+ }
+ Console.Out.WriteLine("Call successful.");
+ }
+ }
+ '@
+
+ $driverPath = $env:SystemRoot + "\System32\Drivers\WdBoot.sys"
+ [Elam]::InstallWdBoot($driverPath)
+ ```
-
## Related topics
- [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md)
- [Configure endpoint proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md)
-
diff --git a/windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md b/windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md
index 8340e9dcc0..5ed6bf4bc5 100644
--- a/windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/troubleshoot-windows-defender-advanced-threat-protection.md
@@ -13,11 +13,12 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
This section addresses issues that might arise as you use the Windows Defender Advanced Threat service.
### Server error - Access is denied due to invalid credentials
@@ -39,9 +40,11 @@ U.S. region:
- sevillefeedback-prd.trafficmanager.net
- sevillesettings-prd.trafficmanager.net
- threatintel-cus-prd.cloudapp.net
-- threatintel-eus-prd.cloudapp.net
-
-
+- threatintel-eus-prd.cloudapp.net
+- winatpauthorization.windows.com
+- winatpfeedback.windows.com
+- winatpmanagement.windows.com
+- winatponboarding.windows.com
EU region:
@@ -52,7 +55,10 @@ EU region:
- sevillesettings-prd.trafficmanager.net
- threatintel-neu-prd.cloudapp.net
- threatintel-weu-prd.cloudapp.net
-
+- winatpauthorization.windows.com
+- winatpfeedback.windows.com
+- winatpmanagement.windows.com
+- winatponboarding.windows.com
### Windows Defender ATP service shows event or error logs in the Event Viewer
diff --git a/windows/keep-secure/use-windows-defender-advanced-threat-protection.md b/windows/keep-secure/use-windows-defender-advanced-threat-protection.md
index 717abdaec8..cadbd4c872 100644
--- a/windows/keep-secure/use-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/use-windows-defender-advanced-threat-protection.md
@@ -14,11 +14,12 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
A typical security breach investigation requires a member of a security operations team to:
1. View an alert on the **Dashboard** or **Alerts queue**
@@ -41,6 +42,6 @@ Topic | Description
[Investigate alerts](investigate-alerts-windows-defender-advanced-threat-protection.md)| Investigate alerts in Windows Defender ATP which might indicate possible security breaches on endpoints in your organization.
[Investigate machines](investigate-machines-windows-defender-advanced-threat-protection.md) | The **Machines view** shows a list of the machines in your network, the corresponding number of active alerts for each machine categorized by alert severity levels, as well as the number of threats.
[Investigate files](investigate-files-windows-defender-advanced-threat-protection.md) | Investigate the details of a file associated with a specific alert, behavior, or event to help determine if the file exhibits malicious activities, identify the attack motivation, and understand the potential scope of the breach.
-[Investigate an IP address](investigate-ip-windows-defender-advanced-threat-protection.md) | Examine possible communication between your machines and external internet protocol (IP) addresses.
+[Investigate an IP address](investigate-ip-windows-defender-advanced-threat-protection.md) | Examine possible communication between your machines and external Internet protocol (IP) addresses.
[Investigate a domain](investigate-domain-windows-defender-advanced-threat-protection.md) | Investigate a domain to see if machines and servers in your enterprise network have been communicating with a known malicious domain.
[Manage alerts](manage-alerts-windows-defender-advanced-threat-protection.md) | The **Manage Alert** menu on every alert lets you change an alert's status, resolve it, suppress it, or contribute comments about the alert.
diff --git a/windows/keep-secure/windows-10-mobile-security-guide.md b/windows/keep-secure/windows-10-mobile-security-guide.md
index 16389caf95..0cb9c52700 100644
--- a/windows/keep-secure/windows-10-mobile-security-guide.md
+++ b/windows/keep-secure/windows-10-mobile-security-guide.md
@@ -166,7 +166,7 @@ Table 2. Windows 10 cryptography policies
-For a complete list of policies available, see [Policy CSP](http://go.microsoft.com/fwlink/p/?LinkId=733963).
+For a complete list of policies available, see [Policy CSP](https://technet.microsoft.com/library/dn904962.aspx).
### Enterprise data protection
@@ -174,7 +174,7 @@ Enterprises have seen huge growth in the convergence of personal and corporate d
One growing risk is authorized users’ accidental disclosure of sensitive data—a risk that is rapidly becoming the biggest source of confidential data leakage as organizations allow personal devices to access corporate resources. One example is common among organizations: an employee connects his or her personal phone to the company’s Microsoft Exchange Server instance for email. He or she uses the phone to work on email that includes attachments with sensitive data. When sending the email, the user accidentally copies a supplier. Content protection is only as strong as the weakest link, and in this example, the unintended sharing of sensitive data with unauthorized people might not have been prevented with standard data encryption.
-In Windows 10 Mobile, enterprise data protection (EDP) helps separate personal and enterprise data and prevent data leakage. Key features include its ability to:
+In Windows 10 Mobile, Windows Information Protection (WIP) helps separate personal and enterprise data and prevent data leakage. Key features include its ability to:
- Automatically tag personal and corporate data.
- Protect data while it’s at rest on local or removable storage.
@@ -182,21 +182,21 @@ In Windows 10 Mobile, enterprise data protection (EDP) helps separate personal
- Control which apps can access a virtual private network (VPN) connection.
- Prevent users from copying corporate data to public locations.
-> **Note:** EDP is currently being tested in select customer evaluation programs. For more information about EDP, see [Enterprise data protection overview](../whats-new/edp-whats-new-overview.md).
+> **Note:** WIP is currently being tested in select customer evaluation programs. For more information about WIP, see [Protect your enterprise data using Windows Information Protection (WIP)](https://technet.microsoft.com/itpro/windows/keep-secure/protect-enterprise-data-using-wip).
### Enlightenment
-Third-party data loss protection solutions usually require developers to wrap their apps. In contrast, EDP puts the intelligence in Windows 10 Mobile so that it doesn’t require wrappers. As a result, most apps require nothing extra to work with EDP.
+Third-party data loss protection solutions usually require developers to wrap their apps. In contrast, WIP puts the intelligence in Windows 10 Mobile so that it doesn’t require wrappers. As a result, most apps require nothing extra to work with WIP.
-EDP can enforce policy without the need for an app to change. This means that an app that always handles business data (such as an LOB app) can be added to the allowed list and will always encrypt all data that it handles. However, if the app does not use common controls, cut and paste operations from this app to a non-enterprise app will silently fail. In addition, if the app needs to handle personal data, this data will also be encrypted.
-Therefore, to improve the user experience, in some cases, developers should enlighten their apps by adding code to and compiling them to use the EDP application programming interfaces. Those cases include apps that:
+WIP can enforce policy without the need for an app to change. This means that an app that always handles business data (such as an LOB app) can be added to the allowed list and will always encrypt all data that it handles. However, if the app does not use common controls, cut and paste operations from this app to a non-enterprise app will silently fail. In addition, if the app needs to handle personal data, this data will also be encrypted.
+Therefore, to improve the user experience, in some cases, developers should enlighten their apps by adding code to and compiling them to use the WIP application programming interfaces. Those cases include apps that:
- Don’t use common controls for saving files.
- Don’t use common controls for text boxes.
- Work on personal and enterprise data simultaneously (for example, contact apps that display personal and enterprise data in a single view; a browser that displays personal and enterprise web pages on tabs within a single instance).
-Figure 1 summarizes when an app might require enlightenment to work with EDP. Microsoft Word is a good example. Not only can Word access personal and enterprise data simultaneously, but it can also transmit enterprise data (for example, email attachments containing enterprise data).
+Figure 1 summarizes when an app might require enlightenment to work with WIP. Microsoft Word is a good example. Not only can Word access personal and enterprise data simultaneously, but it can also transmit enterprise data (for example, email attachments containing enterprise data).
-In any case, most apps don’t require enlightenment for them to use EDP protection. Simply adding them to the EDP allow list is all you must do. Because unenlightened apps cannot automatically tag data as personal or enterprise, if they are in an EDP policy, they treat all data as enterprise data. An LOB app is a good example. Adding an LOB app to an EDP policy protects all data that the app handles. Another example is a legacy app that cannot be updated, which you can add to an EDP policy and use without even being aware that EDP exists.
+In any case, most apps don’t require enlightenment for them to use WIP protection. Simply adding them to the WIP allow list is all you must do. Because unenlightened apps cannot automatically tag data as personal or enterprise, if they are in a WIP policy, they treat all data as enterprise data. An LOB app is a good example. Adding an LOB app to a WIP policy protects all data that the app handles. Another example is a legacy app that cannot be updated, which you can add to a WIP policy and use without even being aware that WIP exists.

@@ -204,32 +204,32 @@ Figure 1. When is enlightenment required?
### Data leakage control
-To configure EDP in an MDM solution that supports it, add authorized apps to the EDP allow list. When a device running Windows 10 Mobile enrolls in the MDM solution, apps that this policy doesn’t authorize won’t have access to enterprise data.
+To configure WIP in an MDM solution that supports it, add authorized apps to the WIP allow list. When a device running Windows 10 Mobile enrolls in the MDM solution, apps that this policy doesn’t authorize won’t have access to enterprise data.
-EDP works seamlessly until users try to access enterprise data with or try to paste enterprise data into unauthorized apps or locations on the web. For example, copying enterprise data from an authorized app to another authorized app works as usual, but EDP blocks users from copying enterprise data from an authorized app to an unauthorized app. Likewise, EDP blocks users from using an unauthorized app to open a file that contains enterprise data.
-In addition, users cannot copy and paste data from authorized apps to unauthorized apps or locations on the Web without triggering one of the EDP protection levels:
-- **Block.** EDP blocks users from completing the operation.
-- **Override.** EDP notifies users that the operation is inappropriate but allows them to override the policy, although it logs the operation in the audit log.
-- **Audit.** EDP does not block or notify users but logs the operation in the audit log.
-- **Off.** EDP does not block or notify users and does not log operations in the audit log.
+WIP works seamlessly until users try to access enterprise data with or try to paste enterprise data into unauthorized apps or locations on the web. For example, copying enterprise data from an authorized app to another authorized app works as usual, but WIP blocks users from copying enterprise data from an authorized app to an unauthorized app. Likewise, WIP blocks users from using an unauthorized app to open a file that contains enterprise data.
+In addition, users cannot copy and paste data from authorized apps to unauthorized apps or locations on the Web without triggering one of the WIP protection levels:
+- **Block.** WIP blocks users from completing the operation.
+- **Override.** WIP notifies users that the operation is inappropriate but allows them to override the policy, although it logs the operation in the audit log.
+- **Audit.** WIP does not block or notify users but logs the operation in the audit log.
+- **Off.** WIP does not block or notify users and does not log operations in the audit log.
### Data separation
As the name suggests, data separation separates personal from enterprise data. Most third-party solutions require an app wrapper, and from here, enterprise data goes in a container while personal data is outside the container. Often, people must use two different apps for the same purpose: one for personal data and another for enterprise data.
-EDP provides the same data separation but neither uses containers nor requires a special version of an app to access business data, and then a second instance of it to access personal data. There are no containers, partitions, or special folders to physically separate personal and business data. Instead, Windows 10 Mobile is the access control broker, identifying enterprise data because it’s encrypted to the enterprise. Therefore, EDP provides data separation by virtue of encrypting enterprise data.
+WIP provides the same data separation but neither uses containers nor requires a special version of an app to access business data, and then a second instance of it to access personal data. There are no containers, partitions, or special folders to physically separate personal and business data. Instead, Windows 10 Mobile is the access control broker, identifying enterprise data because it’s encrypted to the enterprise. Therefore, WIP provides data separation by virtue of encrypting enterprise data.
### Visual cues
-In Windows 10 Mobile, visual cues indicate the status of EDP to users (see Figure 2):
+In Windows 10 Mobile, visual cues indicate the status of WIP to users (see Figure 2):
-- **Start screen.** On the Start screen, apps that an EDP policy manages display a visual cue.
+- **Start screen.** On the Start screen, apps that a WIP policy manages display a visual cue.
- **Files.** In File Explorer, a visual cue indicates whether a file or folder contains enterprise data and is therefore encrypted.
-For example, Erwin is an employee at Fabrikam. He opens Microsoft Edge from the Start screen and sees that the tile indicates that an EDP policy manages the browser. Erwin opens the Fabrikam sales website and downloads a spreadsheet. In File Explorer, Erwin sees that the file he downloaded has a visual cue which indicates that it’s encrypted and contains enterprise data. When Erwin tries to paste data from that spreadsheet into an app that no EDP policy manages (for example, his Twitter app), Erwin might see a message that allows him to override protection while logging the action, depending on the protection level configured in the EDP policy.
+For example, Erwin is an employee at Fabrikam. He opens Microsoft Edge from the Start screen and sees that the tile indicates that a WIP policy manages the browser. Erwin opens the Fabrikam sales website and downloads a spreadsheet. In File Explorer, Erwin sees that the file he downloaded has a visual cue which indicates that it’s encrypted and contains enterprise data. When Erwin tries to paste data from that spreadsheet into an app that no WIP policy manages (for example, his Twitter app), Erwin might see a message that allows him to override protection while logging the action, depending on the protection level configured in the WIP policy.

-Figure 2. Visual cues in EDP
+Figure 2. Visual cues in WIP
## Malware resistance
diff --git a/windows/keep-secure/windows-defender-advanced-threat-protection.md b/windows/keep-secure/windows-defender-advanced-threat-protection.md
index bae239bf1c..16a3332352 100644
--- a/windows/keep-secure/windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/windows-defender-advanced-threat-protection.md
@@ -14,12 +14,13 @@ author: mjcaparas
**Applies to:**
-- Windows 10 Insider Preview Build 14332 or later
+- Windows 10 Enterprise
+- Windows 10 Enterprise for Education
+- Windows 10 Pro
+- Windows 10 Pro Education
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
-[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.]
-
-Windows Defender Advanced Threat Protection (Windows Defender ATP) is a security service, built into Windows 10 that enables enterprise customers detect, investigate, and respond to advanced threats on their networks.
+Windows Defender Advanced Threat Protection (Windows Defender ATP) is a security service, built into Windows 10 that enables enterprise customers to detect, investigate, and respond to advanced threats on their networks.
Windows Defender ATP uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service:
@@ -63,7 +64,7 @@ detect sophisticated cyber-attacks, providing:
- Behavior-based, cloud-powered, advanced attack detection
- Finds the attacks that made it past all other defenses (post breach detection),provides actionable, correlated alerts for known and unknown adversaries trying to hide their activities on endpoints.
+ Finds the attacks that made it past all other defenses (post breach detection), provides actionable, correlated alerts for known and unknown adversaries trying to hide their activities on endpoints.
- Rich timeline for forensic investigation and mitigation
@@ -78,10 +79,12 @@ detect sophisticated cyber-attacks, providing:
Topic | Description
:---|:---
[Minimum requirements](minimum-requirements-windows-defender-advanced-threat-protection.md) | This overview topic for IT professionals provides information on the minimum requirements to use Windows Defender ATP such as network and data storage configuration, and endpoint hardware and software requirements, and deployment channels.
-[Onboard endpoints and set up access](onboard-configure-windows-defender-advanced-threat-protection.md) | You'll need to onboard and configure the Windows Defender ATP service and the endpoints in your network before you can use the service. Learn about how you can assign users to the Windows Defender ATP service in Azure Active Directory (AAD) and using a configuration package to configure endpoints.
[Data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md)| Learn about how Windows Defender ATP collects and handles information and where data is stored.
+[Assign user access to the Windows Defender ATP portal](assign-portal-access-windows-defender-advanced-threat-protection.md)| Before users can access the portal, they'll need to be granted specific roles in Azure Active Directory.
+[Onboard endpoints and set up access](onboard-configure-windows-defender-advanced-threat-protection.md) | You'll need to onboard and configure the Windows Defender ATP service and the endpoints in your network before you can use the service. Learn about how you can assign users to the Windows Defender ATP service in Azure Active Directory (AAD) and using a configuration package to configure endpoints.
[Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) | Understand the main features of the service and how it leverages Microsoft technology to protect enterprise endpoints from sophisticated cyber attacks.
[Use the Windows Defender Advanced Threat Protection portal](use-windows-defender-advanced-threat-protection.md) | Learn about the capabilities of Windows Defender ATP to help you investigate alerts that might be indicators of possible breaches in your enterprise.
[Windows Defender Advanced Threat Protection settings](settings-windows-defender-advanced-threat-protection.md) | Learn about setting the time zone and configuring the suppression rules to configure the service to your requirements.
[Troubleshoot Windows Defender Advanced Threat Protection](troubleshoot-windows-defender-advanced-threat-protection.md) | This topic contains information to help IT Pros find workarounds for the known issues and troubleshoot issues in Windows Defender ATP.
[Review events and errors on endpoints with Event Viewer](event-error-codes-windows-defender-advanced-threat-protection.md)| Review events and errors associated with event IDs to determine if further troubleshooting steps are required.
+[Windows Defender compatibility](defender-compatibility-windows-defender-advanced-threat-protection.md) | Learn about how Windows Defender works in conjunction with Windows Defender ATP.
\ No newline at end of file
diff --git a/windows/keep-secure/windows-defender-in-windows-10.md b/windows/keep-secure/windows-defender-in-windows-10.md
index 07242d64f4..d962b39947 100644
--- a/windows/keep-secure/windows-defender-in-windows-10.md
+++ b/windows/keep-secure/windows-defender-in-windows-10.md
@@ -1,76 +1,76 @@
----
-title: Windows Defender in Windows 10 (Windows 10)
-description: This topic provides an overview of Windows Defender, including a list of system requirements and new features.
-ms.assetid: 6A9EB85E-1F3A-40AC-9A47-F44C4A2B55E2
-ms.prod: w10
-ms.mktglfcycl: manage
-ms.sitesec: library
-ms.pagetype: security
-author: jasesso
----
-
-# Windows Defender in Windows 10
-
-**Applies to**
-- Windows 10
-
-Windows Defender in Windows 10 is a built-in antimalware solution that provides security and antimalware management for desktops, portable computers, and servers.
-This topic provides an overview of Windows Defender, including a list of system requirements and new features.
-
-For more important information about running Windows Defender on a server platform, see [Windows Defender Overview for Windows Server Technical Preview](https://technet.microsoft.com/library/dn765478.aspx).
-
-Take advantage of Windows Defender by configuring settings and definitions using the following tools:
-- Microsoft Active Directory *Group Policy* for settings
-- Windows Server Update Services (WSUS) for definitions
-
-Windows Defender provides the most protection when cloud-based protection is enabled. Learn how to enable cloud-based protection in [Configure Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md).
-> **Note:** System Center 2012 R2 Configuration Manager SP1, System Center 2012 Configuration Manager SP2, and Microsoft Intune can provide centralized management of Windows Defender, including:
-- Settings management
-- Definition update management
-- Alerts and alert management
-- Reports and report management
-
-When you enable endpoint protection for your clients, it will install an additional management layer on Windows Defender to manage the in-box Windows Defender agent. While the client user interface will still appear as Windows Defender, the management layer for Endpoint Protection will be listed in the **Add/Remove Programs** control panel, though it will appear as if the full product is installed.
-
-
-### Compatibility with Windows Defender Advanced Threat Protection
-
-Windows Defender Advanced Threat Protection (ATP) is an additional service that helps enterprises to detect, investigate, and respond to advanced persistent threats on their network.
-
-See the [Windows Defender Advanced Threat Protection](windows-defender-advanced-threat-protection.md) topics for more information about the service.
-
-If you are enrolled in Windows Defender ATP, and you are not using Windows Defender as your real-time protection service on your endpoints, Windows Defender will automatically enter into a passive mode.
-
-In passive mode, Windows Defender will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won’t run, and Windows Defender will not provide real-time protection from malware.
-
-You can [configure updates for Windows Defender](configure-windows-defender-in-windows-10.md), however you can't move Windows Defender into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware.
-
-If you uninstall the other product, and choose to use Windows Defender to provide protection to your endpoints, Windows Defender will automatically return to its normal active mode.
-
-
-
-### Minimum system requirements
-
-Windows Defender has the same hardware requirements as Windows 10. For more information, see:
-- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx)
-- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx)
-
-### New and changed functionality
-
-- **Improved detection for unwanted applications and emerging threats using cloud-based protection.** Use the Microsoft Active Protection Service to improve protection against unwanted applications and advanced persistent threats in your enterprise.
-- **Windows 10 integration.** All Windows Defender in Windows 10 endpoints will show the Windows Defender user interface, even when the endpoint is managed.
-- **Operating system, enterprise-level management, and bring your own device (BYOD) integration.** Windows 10 introduces a mobile device management (MDM) interface for devices running Windows 10. Administrators can use MDM-capable products, such as Intune, to manage Windows Defender on Windows 10 devices.
-
-For more information about what's new in Windows Defender in Windows 10, see [Windows Defender in Windows 10: System integration](https://www.microsoft.com/security/portal/enterprise/threatreports_august_2015.aspx) on the Microsoft Active Protection Service website.
-
-## In this section
-
-Topic | Description
-:---|:---
-[Update and manage Windows Defender in Windows 10](get-started-with-windows-defender-for-windows-10.md)|Use Active Directory or Windows Server Update Services to manage and deploy updates to endpoints on your network. Configure and run special scans, including archive and email scans.
-[Configure updates for Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md)|Configure definition updates and cloud-based protection with Active Directory and Windows Server Update Services.
-[Windows Defender Offline in Windows 10](windows-defender-offline.md)|Manually run an offline scan directly from winthin Windows without having to download and create bootable media.
-[Use PowerShell cmdlets for Windows Defender](use-powershell-cmdlets-windows-defender-for-windows-10.md)|Run scans and configure Windows Defender options with Windows PowerShell cmdlets in Windows 10.
-[Enable the Black at First Sight feature in Windows 10](windows-defender-block-at-first-sight.md)|Use the Block at First Sight feature to leverage the Windows Defender cloud.
-[Configure enhanced notifications for Windows Defender in Windows 10](windows-defender-enhanced-notifications.md)|Enable or disable enhanced notifications on endpoints running Windows Defender for greater details about threat detections and removal.
-[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-in-windows-10.md)|Review event IDs in Windows Defender for Windows 10 and take the appropriate actions.
+---
+title: Windows Defender in Windows 10 (Windows 10)
+description: This topic provides an overview of Windows Defender, including a list of system requirements and new features.
+ms.assetid: 6A9EB85E-1F3A-40AC-9A47-F44C4A2B55E2
+ms.prod: w10
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.pagetype: security
+author: jasesso
+---
+
+# Windows Defender in Windows 10
+
+**Applies to**
+- Windows 10
+
+Windows Defender in Windows 10 is a built-in antimalware solution that provides security and antimalware management for desktops, portable computers, and servers.
+This topic provides an overview of Windows Defender, including a list of system requirements and new features.
+
+For more important information about running Windows Defender on a server platform, see [Windows Defender Overview for Windows Server Technical Preview](https://technet.microsoft.com/library/dn765478.aspx).
+
+Take advantage of Windows Defender by configuring settings and definitions using the following tools:
+- Microsoft Active Directory *Group Policy* for settings
+- Windows Server Update Services (WSUS) for definitions
+
+Windows Defender provides the most protection when cloud-based protection is enabled. Learn how to enable cloud-based protection in [Configure Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md).
+> **Note:** System Center 2012 R2 Configuration Manager SP1, System Center 2012 Configuration Manager SP2, and Microsoft Intune can provide centralized management of Windows Defender, including:
+- Settings management
+- Definition update management
+- Alerts and alert management
+- Reports and report management
+
+When you enable endpoint protection for your clients, it will install an additional management layer on Windows Defender to manage the in-box Windows Defender agent. While the client user interface will still appear as Windows Defender, the management layer for Endpoint Protection will be listed in the **Add/Remove Programs** control panel, though it will appear as if the full product is installed.
+
+
+### Compatibility with Windows Defender Advanced Threat Protection
+
+Windows Defender Advanced Threat Protection (ATP) is an additional service that helps enterprises to detect, investigate, and respond to advanced persistent threats on their network.
+
+See the [Windows Defender Advanced Threat Protection](windows-defender-advanced-threat-protection.md) topics for more information about the service.
+
+If you are enrolled in Windows Defender ATP, and you are not using Windows Defender as your real-time protection service on your endpoints, Windows Defender will automatically enter into a passive mode.
+
+In passive mode, Windows Defender will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won’t run, and Windows Defender will not provide real-time protection from malware.
+
+You can [configure updates for Windows Defender](configure-windows-defender-in-windows-10.md), however you can't move Windows Defender into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware.
+
+If you uninstall the other product, and choose to use Windows Defender to provide protection to your endpoints, Windows Defender will automatically return to its normal active mode.
+
+
+
+### Minimum system requirements
+
+Windows Defender has the same hardware requirements as Windows 10. For more information, see:
+- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx)
+- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx)
+
+### New and changed functionality
+
+- **Improved detection for unwanted applications and emerging threats using cloud-based protection.** Use the Microsoft Active Protection Service to improve protection against unwanted applications and advanced persistent threats in your enterprise.
+- **Windows 10 integration.** All Windows Defender in Windows 10 endpoints will show the Windows Defender user interface, even when the endpoint is managed.
+- **Operating system, enterprise-level management, and bring your own device (BYOD) integration.** Windows 10 introduces a mobile device management (MDM) interface for devices running Windows 10. Administrators can use MDM-capable products, such as Intune, to manage Windows Defender on Windows 10 devices.
+
+For more information about what's new in Windows Defender in Windows 10, see [Windows Defender in Windows 10: System integration](https://www.microsoft.com/security/portal/enterprise/threatreports_august_2015.aspx) on the Microsoft Active Protection Service website.
+
+## In this section
+
+Topic | Description
+:---|:---
+[Update and manage Windows Defender in Windows 10](get-started-with-windows-defender-for-windows-10.md)|Use Active Directory or Windows Server Update Services to manage and deploy updates to endpoints on your network. Configure and run special scans, including archive and email scans.
+[Configure updates for Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md)|Configure definition updates and cloud-based protection with Active Directory and Windows Server Update Services.
+[Windows Defender Offline in Windows 10](windows-defender-offline.md)|Manually run an offline scan directly from winthin Windows without having to download and create bootable media.
+[Use PowerShell cmdlets for Windows Defender](use-powershell-cmdlets-windows-defender-for-windows-10.md)|Run scans and configure Windows Defender options with Windows PowerShell cmdlets in Windows 10.
+[Enable the Black at First Sight feature in Windows 10](windows-defender-block-at-first-sight.md)|Use the Block at First Sight feature to leverage the Windows Defender cloud.
+[Configure enhanced notifications for Windows Defender in Windows 10](windows-defender-enhanced-notifications.md)|Enable or disable enhanced notifications on endpoints running Windows Defender for greater details about threat detections and removal.
+[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-in-windows-10.md)|Review event IDs in Windows Defender for Windows 10 and take the appropriate actions.
diff --git a/windows/keep-secure/windows-defender-offline.md b/windows/keep-secure/windows-defender-offline.md
index d861493653..bdd1e45d8b 100644
--- a/windows/keep-secure/windows-defender-offline.md
+++ b/windows/keep-secure/windows-defender-offline.md
@@ -1,181 +1,181 @@
----
-title: Windows Defender Offline in Windows 10
-description: You can use Windows Defender Offline straight from the Windows Defender client. You can also manage how it is deployed in your network.
-keywords: scan, defender, offline
-search.product: eADQiWindows 10XVcnh
-ms.pagetype: security
-ms.prod: w10
-ms.mktglfcycl: manage
-ms.sitesec: library
-ms.pagetype: security
-author: iaanw
----
-
-# Windows Defender Offline in Windows 10
-
-**Applies to:**
-
-- Windows 10, version 1607
-
-Windows Defender Offline is an antimalware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR).
-
-In Windows 10, Windows Defender Offline can be run with one click directly from the Windows Defender client. In previous versions of Windows, a user had to install Windows Defender Offline to bootable media, restart the endpoint, and load the bootable media.
-
-## Pre-requisites and requirements
-
-Windows Defender Offline in Windows 10 has the same hardware requirements as Windows 10.
-
-For more information about Windows 10 requirements, see the following topics:
-
-- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086(v=vs.85).aspx)
-
-- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049(v=vs.85).aspx)
-
-> [!NOTE]
-> Windows Defender Offline is not supported on machines with ARM processors, or on Windows Server Stock Keeping Units.
-
-To run Windows Defender Offline from the endpoint, the user must be logged in with administrator privileges.
-
-## Windows Defender Offline updates
-
-Windows Defender Offline uses the most up-to-date signature definitions available on the endpoint; it's updated whenever Windows Defender is updated with new signature definitions. Depending on your setup, this is usually though Microsoft Update or through the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
-
-> [!NOTE]
-> Before running an offline scan, you should attempt to update the definitions on the endpoint. You can either force an update via Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
-
-For information on setting up Windows Defender updates, see the [Configure Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md) topic.
-
-## Usage scenarios
-
-In Windows 10, version 1607, you can manually force an offline scan. Alternatively, if Windows Defender determines that Windows Defender Offline needs to run, it will prompt the user on the endpoint. The need to perform an offline scan will also be revealed in System Center Configuration Manager, if you're using it to manage your endpoints.
-
-The prompt can occur via a notification, similar to the following:
-
-
-
-The user will also be notified within the Windows Defender client:
-
-
-
-In Configuration Manager, you can identify the status of endpoints by navigating to **Monitoring > Overview > Security > Endpoint Protection Status > System Center Endpoint Protection Status**. Windows Defender Offline scans are indicated under **Malware remediation status** as **Offline scan required**.
-
-
-
-## Manage notifications
-
-
-You can suppress Windows Defender Offline notifications with Group Policy.
-
-> [!NOTE]
-> Changing these settings will affect *all* notifications from Windows Defender. Disabling notifications will mean the endpoint user will not see any messages about any threats detected, removed, or if additional steps are required.
-
-**Use Group Policy to suppress Windows Defender notifications:**
-
-1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
-
-3. In the **Group Policy Management Editor** go to **Computer configuration**.
-
-4. Click **Policies** then **Administrative templates**.
-
-5. Expand the tree to **Windows components > Windows Defender > Client Interface**.
-
-1. Double-click the **Suppress all notifications** setting and set the option to **Enabled**. Click **OK**. This will disable all notifications shown by the Windows Defender client.
-
-## Configure Windows Defender Offline settings
-
-You can use Windows Management Instrumentation to enable and disable certain features in Windows Defender Offline. For example, you can use `Set-MpPreference` to change the `UILockdown` setting to disable and enable notifications.
-
-For more information about using Windows Management Instrumentation to configure Windows Defender Offline, including configuration parameters and options, see the following topics:
-
-- [Windows Defender WMIv2 APIs](https://msdn.microsoft.com/en-us/library/windows/desktop/dn439477(v=vs.85).aspx)
-
-- [Windows Defender MSFT_MpPreference class](https://msdn.microsoft.com/en-us/library/windows/desktop/dn455323(v=vs.85).aspx)
-
-For more information about notifications in Windows Defender, see the [Configure enhanced notifications in Windows Defender](windows-defender-enhanced-notifications.md)] topic.
-
-## Run a scan
-
-Windows Defender Offline uses up-to-date threat definitions to scan the endpoint for malware that might be hidden. In Windows 10, version 1607, you can manually force an offline scan using Windows Update and Security settings.
-
-> [!NOTE]
-> Before you use Windows Defender Offline, make sure you save any files and shut down running programs. The Windows Defender Offline scan takes about 15 minutes to run. It will restart the endpoint when the scan is complete.
-
-You can set up a Windows Defender Offline scan with the following:
-
-- Windows Update and Security settings
-
-- Windows Defender
-
-- Windows Management Instrumentation
-
-- Windows PowerShell
-
-- Group Policy
-
-> [!NOTE]
-> The scan is performed outside of the usual Windows operating environment. The user interface will appear different to a normal scan performed by Windows Defender. After the scan is completed, the endpoint will be restarted and Windows will load normally.
-
-**Run Windows Defender Offline from Windows Settings:**
-
-1. Open the **Start** menu and click or type **Settings**.
-
-1. Click **Update & Security** and then **Windows Defender**. Scroll to the bottom of the settings page until you see the **Windows Defender Offline** section.
-
-1. Click **Scan offline**.
-
- 
-
-1. Follow the prompts to continue with the scan. You might be warned that you'll be signed out of Windows and that the endpoint will restart.
-
-**Run Windows Defender Offline from Windows Defender:**
-
-1. Open the **Start** menu, type **windows defender**, and press **Enter** to open the Windows Defender client.
-
-1. On the **Home** tab click **Download and Run**.
-
- 
-
-1. Follow the prompts to continue with the scan. You might be warned that you'll be signed out of Windows and that the endpoint will restart.
-
-
-**Use Windows Management Instrumentation to configure and run Windows Defender Offline:**
-
-Use the `MSFT_MpWDOScan` class (part of the Windows Defender Windows Management Instrumentation provider) to run a Windows Defender Offline scan.
-
-The following Windows Management Instrumentation script snippet will immediately run a Windows Defender Offline scan, which will cause the endpoint to restart, run the offline scan, and then restart and boot into Windows.
-
-```WMI
-wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpWDOScan call Start
-```
-
-For more information about using Windows Management Instrumentation to run a scan in Windows Defender, including configuration parameters and options, see the following topics:
-
-- [Windows Defender WMIv2 APIs](https://msdn.microsoft.com/en-us/library/windows/desktop/dn439477(v=vs.85).aspx)
-
-- [MSFT_MpWDOScan class article](https://msdn.microsoft.com/library/windows/desktop/mt622458(v=vs.85).aspx)
-
-**Run Windows Defender Offline using PowerShell:**
-
-Use the PowerShell parameter `Start-MpWDOScan` to run a Windows Defender Offline scan.
-
-For more information on available cmdlets and optios, see the [Use PowerShell cmdlets to configure and run Windows Defender](use-powershell-cmdlets-windows-defender-for-windows-10.md) topic.
-
-## Review scan results
-
-Windows Defender Offline scan results will be listed in the main Windows Defender user interface after performing the scan.
-
-1. Open the **Start** menu, type **windows defender**, and press **Enter** to open the Windows Defender client.
-
-1. Go to the **History** tab.
-
-1. Select **All detected items**.
-
-1. Click **View details**.
-
-Any detected items will display. Items that are detected by Windows Defender Offline will be listed as **Offline** in the **Detection source**:
-
-
-
-## Related topics
-
+---
+title: Windows Defender Offline in Windows 10
+description: You can use Windows Defender Offline straight from the Windows Defender client. You can also manage how it is deployed in your network.
+keywords: scan, defender, offline
+search.product: eADQiWindows 10XVcnh
+ms.pagetype: security
+ms.prod: w10
+ms.mktglfcycl: manage
+ms.sitesec: library
+ms.pagetype: security
+author: iaanw
+---
+
+# Windows Defender Offline in Windows 10
+
+**Applies to:**
+
+- Windows 10, version 1607
+
+Windows Defender Offline is an antimalware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR).
+
+In Windows 10, Windows Defender Offline can be run with one click directly from the Windows Defender client. In previous versions of Windows, a user had to install Windows Defender Offline to bootable media, restart the endpoint, and load the bootable media.
+
+## Pre-requisites and requirements
+
+Windows Defender Offline in Windows 10 has the same hardware requirements as Windows 10.
+
+For more information about Windows 10 requirements, see the following topics:
+
+- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086(v=vs.85).aspx)
+
+- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049(v=vs.85).aspx)
+
+> [!NOTE]
+> Windows Defender Offline is not supported on machines with ARM processors, or on Windows Server Stock Keeping Units.
+
+To run Windows Defender Offline from the endpoint, the user must be logged in with administrator privileges.
+
+## Windows Defender Offline updates
+
+Windows Defender Offline uses the most up-to-date signature definitions available on the endpoint; it's updated whenever Windows Defender is updated with new signature definitions. Depending on your setup, this is usually though Microsoft Update or through the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
+
+> [!NOTE]
+> Before running an offline scan, you should attempt to update the definitions on the endpoint. You can either force an update via Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
+
+For information on setting up Windows Defender updates, see the [Configure Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md) topic.
+
+## Usage scenarios
+
+In Windows 10, version 1607, you can manually force an offline scan. Alternatively, if Windows Defender determines that Windows Defender Offline needs to run, it will prompt the user on the endpoint. The need to perform an offline scan will also be revealed in System Center Configuration Manager, if you're using it to manage your endpoints.
+
+The prompt can occur via a notification, similar to the following:
+
+
+
+The user will also be notified within the Windows Defender client:
+
+
+
+In Configuration Manager, you can identify the status of endpoints by navigating to **Monitoring > Overview > Security > Endpoint Protection Status > System Center Endpoint Protection Status**. Windows Defender Offline scans are indicated under **Malware remediation status** as **Offline scan required**.
+
+
+
+## Manage notifications
+
+
+You can suppress Windows Defender Offline notifications with Group Policy.
+
+> [!NOTE]
+> Changing these settings will affect *all* notifications from Windows Defender. Disabling notifications will mean the endpoint user will not see any messages about any threats detected, removed, or if additional steps are required.
+
+**Use Group Policy to suppress Windows Defender notifications:**
+
+1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
+
+3. In the **Group Policy Management Editor** go to **Computer configuration**.
+
+4. Click **Policies** then **Administrative templates**.
+
+5. Expand the tree to **Windows components > Windows Defender > Client Interface**.
+
+1. Double-click the **Suppress all notifications** setting and set the option to **Enabled**. Click **OK**. This will disable all notifications shown by the Windows Defender client.
+
+## Configure Windows Defender Offline settings
+
+You can use Windows Management Instrumentation to enable and disable certain features in Windows Defender Offline. For example, you can use `Set-MpPreference` to change the `UILockdown` setting to disable and enable notifications.
+
+For more information about using Windows Management Instrumentation to configure Windows Defender Offline, including configuration parameters and options, see the following topics:
+
+- [Windows Defender WMIv2 APIs](https://msdn.microsoft.com/en-us/library/windows/desktop/dn439477(v=vs.85).aspx)
+
+- [Windows Defender MSFT_MpPreference class](https://msdn.microsoft.com/en-us/library/windows/desktop/dn455323(v=vs.85).aspx)
+
+For more information about notifications in Windows Defender, see the [Configure enhanced notifications in Windows Defender](windows-defender-enhanced-notifications.md)] topic.
+
+## Run a scan
+
+Windows Defender Offline uses up-to-date threat definitions to scan the endpoint for malware that might be hidden. In Windows 10, version 1607, you can manually force an offline scan using Windows Update and Security settings.
+
+> [!NOTE]
+> Before you use Windows Defender Offline, make sure you save any files and shut down running programs. The Windows Defender Offline scan takes about 15 minutes to run. It will restart the endpoint when the scan is complete.
+
+You can set up a Windows Defender Offline scan with the following:
+
+- Windows Update and Security settings
+
+- Windows Defender
+
+- Windows Management Instrumentation
+
+- Windows PowerShell
+
+- Group Policy
+
+> [!NOTE]
+> The scan is performed outside of the usual Windows operating environment. The user interface will appear different to a normal scan performed by Windows Defender. After the scan is completed, the endpoint will be restarted and Windows will load normally.
+
+**Run Windows Defender Offline from Windows Settings:**
+
+1. Open the **Start** menu and click or type **Settings**.
+
+1. Click **Update & Security** and then **Windows Defender**. Scroll to the bottom of the settings page until you see the **Windows Defender Offline** section.
+
+1. Click **Scan offline**.
+
+ 
+
+1. Follow the prompts to continue with the scan. You might be warned that you'll be signed out of Windows and that the endpoint will restart.
+
+**Run Windows Defender Offline from Windows Defender:**
+
+1. Open the **Start** menu, type **windows defender**, and press **Enter** to open the Windows Defender client.
+
+1. On the **Home** tab click **Download and Run**.
+
+ 
+
+1. Follow the prompts to continue with the scan. You might be warned that you'll be signed out of Windows and that the endpoint will restart.
+
+
+**Use Windows Management Instrumentation to configure and run Windows Defender Offline:**
+
+Use the `MSFT_MpWDOScan` class (part of the Windows Defender Windows Management Instrumentation provider) to run a Windows Defender Offline scan.
+
+The following Windows Management Instrumentation script snippet will immediately run a Windows Defender Offline scan, which will cause the endpoint to restart, run the offline scan, and then restart and boot into Windows.
+
+```WMI
+wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpWDOScan call Start
+```
+
+For more information about using Windows Management Instrumentation to run a scan in Windows Defender, including configuration parameters and options, see the following topics:
+
+- [Windows Defender WMIv2 APIs](https://msdn.microsoft.com/en-us/library/windows/desktop/dn439477(v=vs.85).aspx)
+
+- [MSFT_MpWDOScan class article](https://msdn.microsoft.com/library/windows/desktop/mt622458(v=vs.85).aspx)
+
+**Run Windows Defender Offline using PowerShell:**
+
+Use the PowerShell parameter `Start-MpWDOScan` to run a Windows Defender Offline scan.
+
+For more information on available cmdlets and optios, see the [Use PowerShell cmdlets to configure and run Windows Defender](use-powershell-cmdlets-windows-defender-for-windows-10.md) topic.
+
+## Review scan results
+
+Windows Defender Offline scan results will be listed in the main Windows Defender user interface after performing the scan.
+
+1. Open the **Start** menu, type **windows defender**, and press **Enter** to open the Windows Defender client.
+
+1. Go to the **History** tab.
+
+1. Select **All detected items**.
+
+1. Click **View details**.
+
+Any detected items will display. Items that are detected by Windows Defender Offline will be listed as **Offline** in the **Detection source**:
+
+
+
+## Related topics
+
- [Windows Defender in Windows 10](windows-defender-in-windows-10.md)
\ No newline at end of file
diff --git a/windows/manage/TOC.md b/windows/manage/TOC.md
index b110a8fdcd..bf74983e5d 100644
--- a/windows/manage/TOC.md
+++ b/windows/manage/TOC.md
@@ -133,6 +133,34 @@
#### [Application Publishing and Client Interaction](appv-application-publishing-and-client-interaction.md)
#### [Viewing App-V Server Publishing Metadata](appv-viewing-appv-server-publishing-metadata.md)
#### [Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications](appv-running-locally-installed-applications-inside-a-virtual-environment.md)
+## [User Experience Virtualization (UE-V)](uev-for-windows.md)
+### [Get Started with UE-V](uev-getting-started.md)
+#### [What's New in UE-V for Windows 10, version 1607](uev-whats-new-in-uev-for-windows.md)
+#### [User Experience Virtualization Release Notes](uev-release-notes-1607.md)
+#### [Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md)
+### [Prepare a UE-V Deployment](uev-prepare-for-deployment.md)
+#### [Deploy Required UE-V Features](uev-deploy-required-features.md)
+#### [Deploy UE-V for use with Custom Applications](uev-deploy-uev-for-custom-applications.md)
+### [Administering UE-V](uev-administering-uev.md)
+#### [Manage Configurations for UE-V](uev-manage-configurations.md)
+##### [Configuring UE-V with Group Policy Objects](uev-configuring-uev-with-group-policy-objects.md)
+##### [Configuring UE-V with System Center Configuration Manager](uev-configuring-uev-with-system-center-configuration-manager.md)
+##### [Administering UE-V with Windows PowerShell and WMI](uev-administering-uev-with-windows-powershell-and-wmi.md)
+###### [Managing the UE-V Service and Packages with Windows PowerShell and WMI](uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md)
+###### [Managing UE-V Settings Location Templates Using Windows PowerShell and WMI](uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md)
+#### [Working with Custom UE-V Templates and the UE-V Template Generator](uev-working-with-custom-templates-and-the-uev-generator.md)
+#### [Manage Administrative Backup and Restore in UE-V](uev-manage-administrative-backup-and-restore.md)
+#### [Changing the Frequency of UE-V Scheduled Tasks](uev-changing-the-frequency-of-scheduled-tasks.md)
+#### [Migrating UE-V Settings Packages](uev-migrating-settings-packages.md)
+#### [Using UE-V with Application Virtualization Applications](uev-using-uev-with-application-virtualization-applications.md)
+### [Troubleshooting UE-V](uev-troubleshooting.md)
+### [Technical Reference for UE-V](uev-technical-reference.md)
+#### [Sync Methods for UE-V](uev-sync-methods.md)
+#### [Sync Trigger Events for UE-V](uev-sync-trigger-events.md)
+#### [Synchronizing Microsoft Office with UE-V](uev-synchronizing-microsoft-office-with-uev.md)
+#### [Application Template Schema Reference for UE-V](uev-application-template-schema-reference.md)
+#### [Accessibility for UE-V](uev-accessibility.md)
+#### [Security Considerations for UE-V](uev-security-considerations.md)
## [Windows Store for Business](windows-store-for-business.md)
### [Sign up and get started](sign-up-windows-store-for-business-overview.md)
####[Windows Store for Business overview](windows-store-for-business-overview.md)
diff --git a/windows/manage/configure-windows-telemetry-in-your-organization.md b/windows/manage/configure-windows-telemetry-in-your-organization.md
index 2642bdeb9e..9965ade8d5 100644
--- a/windows/manage/configure-windows-telemetry-in-your-organization.md
+++ b/windows/manage/configure-windows-telemetry-in-your-organization.md
@@ -16,7 +16,7 @@ author: brianlic-msft
- Windows 10
- Windows 10 Mobile
-- Windows Server 2016 Technical Preview
+- Windows Server 2016
At Microsoft, we use Windows telemetry to inform our decisions and focus our efforts in providing the most robust, most valuable platform for your business and the people who count on Windows to enable them to be as productive as possible. Telemetry gives users a voice in the operating system’s development. This guide describes the importance of Windows telemetry and how we protect that data. Additionally, it differentiates between telemetry and functional data. It also describes the telemetry levels that Windows supports. Of course, you can choose how much telemetry is shared with Microsoft, and this guide demonstrates how.
@@ -36,7 +36,7 @@ Use this article to make informed decisions about how you might configure teleme
## Overview
-In previous versions of Windows and Windows Server, Microsoft used telemetry to check for updated or new Windows Defender signatures, check whether Windows Update installations were successful, gather reliability information through the Reliability Analysis Component (RAC), and gather reliability information through the Windows Customer Experience Improvement Program (CEIP) on Windows. In Windows 10 and Windows Server 2016 Technical Preview, you can control telemetry streams by using the Privacy option in Settings, Group Policy, or MDM.
+In previous versions of Windows and Windows Server, Microsoft used telemetry to check for updated or new Windows Defender signatures, check whether Windows Update installations were successful, gather reliability information through the Reliability Analysis Component (RAC), and gather reliability information through the Windows Customer Experience Improvement Program (CEIP) on Windows. In Windows 10 and Windows Server 2016, you can control telemetry streams by using the Privacy option in Settings, Group Policy, or MDM.
For Windows 10, we invite IT pros to join the [Windows Insider Program](http://insider.windows.com) to give us feedback on what we can do to make Windows work better for your organization.
@@ -159,7 +159,7 @@ Microsoft believes in and practices information minimization. We strive to gathe
## Telemetry levels
-This section explains the different telemetry levels in Windows 10, Windows Server 2016 Technical Preview, and System Center. These levels are available on all desktop and mobile editions of Windows 10, with the exception of the **Security** level which is limited to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016 Technical Preview.
+This section explains the different telemetry levels in Windows 10, Windows Server 2016, and System Center. These levels are available on all desktop and mobile editions of Windows 10, with the exception of the **Security** level which is limited to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016.
The telemetry data is categorized into four levels:
@@ -171,7 +171,7 @@ The telemetry data is categorized into four levels:
- **Full**. All data necessary to identify and help to fix problems, plus data from the **Security**, **Basic**, and **Enhanced** levels.
-The levels are cumulative and are illustrated in the following diagram. Also, these levels apply to all editions of Windows Server 2016 Technical Preview.
+The levels are cumulative and are illustrated in the following diagram. Also, these levels apply to all editions of Windows Server 2016.

@@ -216,7 +216,7 @@ The Basic level gathers a limited set of data that’s critical for understandin
The data gathered at this level includes:
-- **Basic device data**. Helps provide an understanding about the types of Windows devices and the configurations and types of native and virtualized Windows Server 2016 Technical Preview in the ecosystem. Examples include:
+- **Basic device data**. Helps provide an understanding about the types of Windows devices and the configurations and types of native and virtualized Windows Server 2016 in the ecosystem. Examples include:
- Device attributes, such as camera resolution and display type
@@ -306,7 +306,7 @@ We do not recommend that you turn off telemetry in your organization as valuable
You can turn on or turn off System Center telemetry gathering. The default is on and the data gathered at this level represents what is gathered by default when System Center telemetry is turned on. However, setting the operating system telemetry level to **Basic** will turn off System Center telemetry, even if the System Center telemetry switch is turned on.
-The lowest telemetry setting level supported through management policies is **Security**. The lowest telemetry setting supported through the Settings UI is **Basic**. The default telemetry setting for Windows Server 2016 Technical Preview is **Enhanced**.
+The lowest telemetry setting level supported through management policies is **Security**. The lowest telemetry setting supported through the Settings UI is **Basic**. The default telemetry setting for Windows Server 2016 is **Enhanced**.
### Configure the operating system telemetry level
diff --git a/windows/manage/images/deploymentworkflow.png b/windows/manage/images/deploymentworkflow.png
new file mode 100644
index 0000000000..b665a0bfea
Binary files /dev/null and b/windows/manage/images/deploymentworkflow.png differ
diff --git a/windows/manage/images/uev-adk-select-uev-feature.png b/windows/manage/images/uev-adk-select-uev-feature.png
new file mode 100644
index 0000000000..1556f115c0
Binary files /dev/null and b/windows/manage/images/uev-adk-select-uev-feature.png differ
diff --git a/windows/manage/images/uev-archdiagram.png b/windows/manage/images/uev-archdiagram.png
new file mode 100644
index 0000000000..eae098e666
Binary files /dev/null and b/windows/manage/images/uev-archdiagram.png differ
diff --git a/windows/manage/images/uev-checklist-box.gif b/windows/manage/images/uev-checklist-box.gif
new file mode 100644
index 0000000000..8af13c51d1
Binary files /dev/null and b/windows/manage/images/uev-checklist-box.gif differ
diff --git a/windows/manage/images/uev-deployment-preparation.png b/windows/manage/images/uev-deployment-preparation.png
new file mode 100644
index 0000000000..b665a0bfea
Binary files /dev/null and b/windows/manage/images/uev-deployment-preparation.png differ
diff --git a/windows/manage/images/uev-generator-process.png b/windows/manage/images/uev-generator-process.png
new file mode 100644
index 0000000000..e16cedd0a7
Binary files /dev/null and b/windows/manage/images/uev-generator-process.png differ
diff --git a/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md
index 1a3ffc0c33..d1bedc3492 100644
--- a/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md
+++ b/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services.md
@@ -275,7 +275,7 @@ To turn off font streaming, create a REG\_DWORD registry setting called **Disabl
To turn off Insider Preview builds if you're running a released version of Windows 10. If you're running a preview version of Windows 10, you must roll back to a released version before you can turn off Insider Preview builds.
-- Turn off the feature in the UI: **Settings** > **Update & security** > **Windows Update** > **Advanced options** > **Stop Insider builds**.
+- Turn off the feature in the UI: **Settings** > **Update & security** > **Windows Insider Program** > **Stop Insider Preview builds**.
-or-
@@ -1181,7 +1181,10 @@ If you're not running Windows 10, version 1607 or later, you can use the other o
- Configure the following in **Settings**:
- - **Personalization** > **Lock screen** > **Background** > **Windows spotlight**, select a different background, and turn off **Show me tips, tricks, and more on the lock screen**.
+ - **Personalization** > **Lock screen** > **Background** > **Windows spotlight**, select a different background, and turn off **Get fun facts, tips, tricks and more on your lock screen**.
+
+ > [!NOTE]
+ > In Windows 10, version 1507 and Windows 10, version 1511, this setting was called **Show me tips, tricks, and more on the lock screen**.
- **Personalization** > **Start** > **Occasionally show suggestions in Start**.
diff --git a/windows/manage/uev-accessibility.md b/windows/manage/uev-accessibility.md
new file mode 100644
index 0000000000..e54c168813
--- /dev/null
+++ b/windows/manage/uev-accessibility.md
@@ -0,0 +1,88 @@
+---
+title: Accessibility for UE-V
+description: Accessibility for UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Accessibility for UE-V
+
+
+Microsoft is committed to making its products and services easier for everyone to use. This section provides information about features and services that make this product and its corresponding documentation more accessible for people with disabilities.
+
+## Access any command with a few keystrokes
+
+
+You can access most commands by using two keystrokes. To use an access key:
+
+1. Press Alt.
+
+ The keyboard shortcuts are displayed over each feature that is available in the current view.
+
+2. Press the letter that is shown in the keyboard shortcut over the feature that you want to use.
+
+### Documentation in alternative formats
+
+If you have difficulty reading or handling printed materials, you can obtain the documentation for many Microsoft products in more accessible formats. You can view an index of accessible product documentation on the Microsoft Accessibility website. In addition, you can obtain additional Microsoft publications from Learning Ally, formerly known as Recording for the Blind & Dyslexic, Inc. Learning Ally distributes these documents to registered, eligible members of their distribution service.
+
+For information about the availability of Microsoft product documentation and books from Microsoft Press, use the following contact.
+
+
+
+
+
+
+
+
+Learning Ally (formerly Recording for the Blind & Dyslexic, Inc.)
+20 Roszel Road
+Princeton, NJ 08540 |
+ |
+
+
+Telephone number from within the United States: |
+(800) 221-4792 |
+
+
+Telephone number from outside the United States and Canada: |
+(609) 452-0606 |
+
+
+Fax: |
+(609) 987-8116 |
+
+
+[http://www.learningally.org/](http://go.microsoft.com/fwlink/p/?linkid=239) |
+Web addresses can change, so you might be unable to connect to the website or sites that are mentioned here. |
+
+
+
+
+
+
+### Customer service for people with hearing impairments
+
+If you are deaf or hard-of-hearing, complete access to Microsoft product and customer services is available through a text telephone (TTY/TDD) service:
+
+- For customer service, contact Microsoft Sales Information Center at (800) 892-5234 between 6:30 AM and 5:30 PM Pacific Time, Monday through Friday, excluding holidays.
+
+- For technical assistance in the United States, contact Microsoft Product Support Services at (800) 892-5234 between 6:00 AM and 6:00 PM Pacific Time, Monday through Friday, excluding holidays. In Canada, dial (905) 568-9641 between 8:00 AM and 8:00 PM Eastern Time, Monday through Friday, excluding holidays.
+
+Microsoft Support Services are subject to the prices, terms, and conditions in place at the time that the service is used.
+
+## For more information
+
+
+For more information about how accessible technology for computers can help to improve the lives of people with disabilities, see the [Microsoft Accessibility website](https://www.microsoft.com/enable/default.aspx).
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Technical Reference for UE-V](uev-technical-reference.md)
diff --git a/windows/manage/uev-administering-uev-with-windows-powershell-and-wmi.md b/windows/manage/uev-administering-uev-with-windows-powershell-and-wmi.md
new file mode 100644
index 0000000000..081924a8c9
--- /dev/null
+++ b/windows/manage/uev-administering-uev-with-windows-powershell-and-wmi.md
@@ -0,0 +1,39 @@
+---
+title: Administering UE-V with Windows PowerShell and WMI
+description: Administering UE-V with Windows PowerShell and WMI
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Administering UE-V with Windows PowerShell and WMI
+
+
+User Experience Virtualization (UE-V) provides Windows PowerShell cmdlets to help administrators perform various UE-V tasks. The following sections provide more information about using Windows PowerShell in UE-V.
+
+**Note**
+Administering UE-V with Windows PowerShell requires PowerShell 3.0 or higher. For a complete list of UE-V PowerShell cmdlets, see [UE-V Cmdlet Reference](http://go.microsoft.com/fwlink/p/?LinkId=393495).
+
+## Managing the UE-V service and packages by using Windows PowerShell and WMI
+
+You can use Windows PowerShell and Windows Management Instrumentation (WMI) to manage UE-V service configuration and synchronization behavior. The following topic describes how to manage configuration and synchronization.
+
+[Managing the UE-V Service and Packages with Windows PowerShell and WMI](uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md)
+
+## Managing UE-V settings location templates by using Windows PowerShell and WMI
+
+
+After you create and deploy UE-V settings location templates, you can manage those templates by using Windows PowerShell or WMI. The following topic describes how to manage the settings location templates by using Windows PowerShell and WMI.
+
+[Managing UE-V Settings Location Templates Using Windows PowerShell and WMI](uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md)
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Administering UE-V](uev-administering-uev.md)
diff --git a/windows/manage/uev-administering-uev.md b/windows/manage/uev-administering-uev.md
new file mode 100644
index 0000000000..83f4e99a1b
--- /dev/null
+++ b/windows/manage/uev-administering-uev.md
@@ -0,0 +1,73 @@
+---
+title: Administering UE-V
+description: Administering UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Administering UE-V
+
+After you finish deploying User Experience Virtualization (UE-V), you'll perform ongoing administrative tasks, such as managing the configuration of the UE-V service and recovering lost settings. These tasks are explained in the following sections.
+
+## Managing UE-V configurations
+
+
+In the course of the UE-V lifecycle, you'll manage the configuration of the UE-V service and also manage storage locations for resources such as settings package files.
+
+[Manage Configurations for UE-V](uev-manage-configurations.md)
+
+## Working with custom UE-V templates and the UE-V template generator
+
+
+This topic explains how to use the UE-V template generator and manage custom settings location templates.
+
+[Working with Custom UE-V Templates and the UE-V Template Generator](uev-working-with-custom-templates-and-the-uev-generator.md)
+
+## Back up and restore application and Windows settings that are synchronized with UE-V
+
+
+Windows Management Instrumentation (WMI) and Windows PowerShell features of UE-V allow you to restore settings packages. By using WMI and Windows PowerShell commands, you can restore application and Windows settings to their original state and restore additional settings when a user adopts a new device.
+
+[Manage Administrative Backup and Restore in UE-V](uev-manage-administrative-backup-and-restore.md)
+
+## Changing the frequency of UE-V scheduled tasks
+
+
+You can configure the scheduled tasks that manage when UE-V checks for new or updated settings or for updated custom settings location templates in the settings template catalog.
+
+[Changing the Frequency of UE-V Scheduled Tasks](uev-changing-the-frequency-of-scheduled-tasks.md)
+
+## Migrating UE-V settings packages
+
+
+You can relocate the user settings packages either when they migrate to a new server or for backup purposes.
+
+[Migrating UE-V Settings Packages](uev-migrating-settings-packages.md)
+
+## Using UE-V with Application Virtualization applications
+
+
+You can use UE-V with Microsoft Application Virtualization (App-V) to share settings between virtual applications and installed applications across multiple computers.
+
+[Using UE-V with Application Virtualization Applications](uev-using-uev-with-application-virtualization-applications.md)
+
+## Other resources for this feature
+
+
+- [User Experience Virtualization for Windows overview](uev-for-windows.md)
+
+- [Get Started with UE-V](uev-getting-started.md)
+
+- [Prepare a UE-V Deployment](uev-prepare-for-deployment.md)
+
+- [Troubleshooting UE-V](uev-troubleshooting.md)
+
+- [Technical Reference for UE-V](uev-technical-reference.md)
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
diff --git a/windows/manage/uev-application-template-schema-reference.md b/windows/manage/uev-application-template-schema-reference.md
new file mode 100644
index 0000000000..c5c7a98379
--- /dev/null
+++ b/windows/manage/uev-application-template-schema-reference.md
@@ -0,0 +1,964 @@
+---
+title: Application Template Schema Reference for UE-V
+description: Application Template Schema Reference for UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Application Template Schema Reference for UE-V
+
+
+User Experience Virtualization (UE-V) uses XML settings location templates to define the desktop application settings and Windows settings that are captured and applied by UE-V. UE-V includes a set of default settings location templates. You can also create custom settings location templates with the UE-V template generator.
+
+An advanced user can customize the XML file for a settings location template. This topic details the XML structure of the UE-V settings location templates and provides guidance for editing these files.
+
+## UE-V Application Template Schema Reference
+
+
+This section details the XML structure of the UE-V settings location template and provides guidance for editing this file.
+
+### In This Section
+
+- [XML Declaration and Encoding Attribute](#xml21)
+
+- [Namespace and Root Element](#namespace21)
+
+- [Data types](#data21)
+
+- [Name Element](#name21)
+
+- [ID Element](#id21)
+
+- [Version Element](#version21)
+
+- [Author Element](#author21)
+
+- [Processes and Process Element](#processes21)
+
+- [Application Element](#application21)
+
+- [Common Element](#common21)
+
+- [SettingsLocationTemplate Element](#settingslocationtemplate21)
+
+- [Appendix: SettingsLocationTemplate.xsd](#appendix21)
+
+### XML Declaration and Encoding Attribute
+
+**Mandatory: True**
+
+**Type: String**
+
+The XML declaration must specify the XML version 1.0 attribute (<?xml version="1.0">). Settings location templates created by the UE-V template generator are saved in UTF-8 encoding, although the encoding is not explicitly specified. We recommend that you include the encoding="UTF-8" attribute in this element as a best practice. All templates included with the product specify this tag as well (see the documents in %ProgramFiles%\\Microsoft User Experience Virtualization\\Templates for reference). For example:
+
+``
+
+### Namespace and Root Element
+
+**Mandatory: True**
+
+**Type: String**
+
+UE-V uses the http://schemas.microsoft.com/UserExperienceVirtualization/2012/SettingsLocationTemplate namespace for all applications. SettingsLocationTemplate is the root element and contains all other elements. Reference SettingsLocationTemplate in all templates using this tag:
+
+``
+
+### Data types
+
+These are the data types for the UE-V application template schema.
+
+**GUID**
+GUID describes a standard globally unique identifier regular expression in the form "\\{\[a-fA-F0-9\]{8}-\[a-fA-F0-9\]{4}-\[a-fA-F0-9\]{4}-\[a-fA-F0-9\]{4}-\[a-fA-F0-9\]{12}\\}". This is used in the Filesetting\\Root\\KnownFolder element to verify the formatting of well-known folders.
+
+**FilenameString**
+FilenameString refers to the file name of a process to be monitored. Its values are restricted by the regex \[^\\\\\\?\\\*\\|<>/:\]+, (that is, they may not contain backslash characters, asterisk or question mark wild-card characters, the pipe character, the greater than or less than sign, forward slash, or colon characters).
+
+**IDString**
+IDString refers to the ID value of Application elements, SettingsLocationTemplate, and Common elements (used to describe application suites that share common settings). It is restricted by the same regex as FilenameString (\[^\\\\\\?\\\*\\|<>/:\]+).
+
+**TemplateVersion**
+TemplateVersion is an integer value used to describe the revision of the settings location template. Its value may range from 0 to 2147483647.
+
+**Empty**
+Empty refers to a null value. This is used in Process\\ShellProcess to indicate that there is no process to monitor. This value should not be used in any application templates.
+
+**Author**
+The Author data type is a complex type that identifies the author of a template. It contains two child elements: **Name** and **Email**. Within the Author data type, the Name element is mandatory while the Email element is optional. This type is described in more detail under the SettingsLocationTemplate element.
+
+**Range**
+Range defines an integer class consisting of two child elements: **Minimum** and **Maximum**. This data type is implemented in the ProcessVersion data type. If specified, both Minimum and Maximum values must be included.
+
+**ProcessVersion**
+ProcessVersion defines a type with four child elements: **Major**, **Minor**, **Build**, and **Patch**. This data type is used by the Process element to populate its ProductVersion and FileVersion values. The data for this type is a Range value. The Major child element is mandatory and the others are optional.
+
+**Architecture**
+Architecture enumerates two possible values: **Win32** and **Win64**. These values are used to specify process architecture.
+
+**Process**
+The Process data type is a container used to describe processes to be monitored by UE-V. It contains six child elements: **Filename**, **Architecture**, **ProductName**, **FileDescription**, **ProductVersion**, and **FileVersion**. This table details each element’s respective data type:
+
+
+
+
+
+
+
+
+
+Element |
+Data Type |
+Mandatory |
+
+
+Filename |
+FilenameString |
+True |
+
+
+Architecture |
+Architecture |
+False |
+
+
+ProductName |
+String |
+False |
+
+
+FileDescription |
+String |
+False |
+
+
+ProductVersion |
+ProcessVersion |
+False |
+
+
+FileVersion |
+ProcessVersion |
+False |
+
+
+
+
+
+
+**Processes**
+The Processes data type represents a container for a collection of one or more Process elements. Two child elements are supported in the Processes sequence type: **Process** and **ShellProcess**. Process is an element of type Process and ShellProcess is of data type Empty. At least one item must be identified in the sequence.
+
+**Path**
+Path is consumed by RegistrySetting and FileSetting to refer to registry and file paths. This element supports two optional attributes: **Recursive** and **DeleteIfNotFound**. Both values are set to default=”False”.
+
+Recursive indicates that the path and all subfolders are included for file settings or that all child registry keys are included for registry settings. In both cases, all items at the current level are included in the data captured. For a FileSettings object, all files within the specified folder are included in the data captured by UE-V but folders are not included. For registry paths, all values in the current path are captured but child registry keys are not captured. In both cases, care should be taken to avoid capturing large data sets or large numbers of items.
+
+The DeleteIfNotFound attribute removes the setting from the user’s settings storage path data. This may be desirable in cases where removing these settings from the package will save a large amount of disk space on the settings storage path file server.
+
+**FileMask**
+FileMask specifies only certain file types for the folder that is defined by Path. For example, Path might be `C:\users\username\files` and FileMask could be `*.txt` to include only text files.
+
+**RegistrySetting**
+RegistrySetting represents a container for registry keys and values and the associated desired behavior on the part of the UE-V service. Four child elements are defined within this type: **Path**, **Name**, **Exclude**, and a sequence of the values **Path** and **Name**.
+
+**FileSetting**
+FileSetting contains parameters associated with files and files paths. Four child elements are defined: **Root**, **Path**, **FileMask**, and **Exclude**. Root is mandatory and the others are optional.
+
+**Settings**
+Settings is a container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings described earlier. In addition, it can also contain the following child elements with behaviors described:
+
+
+
+
+
+
+
+
+Element |
+Description |
+
+
+Asynchronous |
+Asynchronous settings packages are applied without blocking the application startup so that the application start proceeds while the settings are still being applied. This is useful for settings that can be applied asynchronously, such as those get/set through an API, like SystemParameterSetting. |
+
+
+PreventOverlappingSynchronization |
+By default, UE-V only saves settings for an application when the last instance of an application using the template is closed. When this element is set to ‘false’, UE-V exports the settings even if other instances of an application are running. Suited templates – those that include a Common element section– that are shipped with UE-V use this flag to enable shared settings to always export on application close, while preventing application-specific settings from exporting until the last instance is closed. |
+
+
+AlwaysApplySettings |
+This parameter forces an imported settings package to be applied even if there are no differences between the package and the current state of the application. This parameter should be used only in special cases since it can slow down settings import. |
+
+
+
+
+
+
+### Name Element
+
+**Mandatory: True**
+
+**Type: String**
+
+Name specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. In general, avoid referencing version information, as this can be objected from the ProductVersion element. For example, specify `My Application` rather than `My Application 1.1`.
+
+**Note**
+UE-V does not reference external DTDs, so it is not possible to use named entities in a settings location template. For example, do not use ® to refer to the registered trade mark sign ®. Instead, use canonical numbered references to include these types of special characters, for example, &\#174 for the ® character. This rule applies to all string values in this document.
+
+See for a complete list of character entities. UTF-8-encoded documents may include the Unicode characters directly. Saving templates through the UE-V template generator converts character entities to their Unicode representations automatically.
+
+
+
+### ID Element
+
+**Mandatory: True**
+
+**Type: String**
+
+ID populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V service uses to reference the template at runtime (for example, see the output of the Get-UevTemplate and Get-UevTemplateProgram PowerShell cmdlets). By convention, this tag should not contain any spaces, which simplifies scripting. Version numbers of applications should be specified in this element to allow for easy identification of the template, such as `MicrosoftOffice2016Win64`.
+
+### Version Element
+
+**Mandatory: True**
+
+**Type: Integer**
+
+**Minimum Value: 0**
+
+**Maximum Value: 2147483647**
+
+Version identifies the version of the settings location template for administrative tracking of changes. The UE-V template generator automatically increments this number by one each time the template is saved. Notice that this field must be a whole number integer; fractional values, such as `2.5` are not allowed.
+
+**Hint:** You can save notes about version changes using XML comment tags ``, for example:
+
+``` syntax
+
+ 4
+```
+
+**Important**
+This value is queried to determine if a new version of a template should be applied to an existing template in these instances:
+
+- When the scheduled Template Auto Update task executes
+
+- When the Update-UevTemplate PowerShell cmdlet is executed
+
+- When the microsoft\\uev:SettingsLocationTemplate Update method is called through WMI
+
+
+
+### Author Element
+
+**Mandatory: False**
+
+**Type: String**
+
+Author identifies the creator of the settings location template. Two optional child elements are supported: **Name** and **Email**. Both attributes are optional, but, if the Email child element is specified, it must be accompanied by the Name element. Author refers to the full name of the contact for the settings location template, and email should refer to an email address for the author. We recommend that you include this information in templates published publicly, for example, on the [UE-V Template Gallery](http://gallery.technet.microsoft.com/site/search?f%5B0%5D.Type=RootCategory&f%5B0%5D.Value=UE-V).
+
+### Processes and Process Element
+
+**Mandatory: True**
+
+**Type: Element**
+
+Processes contains at least one `` element, which in turn contains the following child elements: **Filename**, **Architecture**, **ProductName**, **FileDescription**, **ProductVersion**, and **FileVersion**. The Filename child element is mandatory and the others are optional. A fully populated element contains tags similar to this example:
+
+``` syntax
+
+ MyApplication.exe
+ Win64
+ MyApplication
+ MyApplication.exe
+
+
+
+
+
+
+
+
+
+
+
+
+
+```
+
+### Filename
+
+**Mandatory: True**
+
+**Type: String**
+
+Filename refers to the actual file name of the executable as it appears in the file system. This element specifies the primary criterion that UE-V uses to evaluate whether a template applies to a process or not. This element must be specified in the settings location template XML.
+
+Valid filenames must not match the regular expression \[^\\\\\\?\\\*\\|<>/:\]+, that is, they may not contain backslash characters, asterisk or question mark wild-card characters, the pipe character, the greater than or less than sign, forward slash, or colon (the \\ ? \* | < > / or : characters.).
+
+**Hint:** To test a string against this regex, use a PowerShell command window and substitute your executable’s name for **YourFileName**:
+
+`"YourFileName.exe" -match "[\\\?\*\|<>/:]+"`
+
+A value of **True** indicates that the string contains illegal characters. Here are some examples of illegal values:
+
+- \\\\server\\share\\program.exe
+
+- Program\*.exe
+
+- Pro?ram.exe
+
+- Program<1>.exe
+
+**Note**
+The UE-V template generator encodes the greater than and less than characters as > and < respectively.
+
+
+
+In rare circumstances, the FileName value will not necessarily include the .exe extension, but it should be specified as part of the value. For example, `MyApplication.exe` should be specified instead of `MyApplication`. The second example will not apply the template to the process if the actual name of the executable file is “MyApplication.exe”.
+
+### Architecture
+
+**Mandatory: False**
+
+**Type: Architecture (String)**
+
+Architecture refers to the processor architecture for which the target executable was compiled. Valid values are Win32 for 32-bit applications or Win64 for 64-bit applications. If present, this tag limits the applicability of the settings location template to a particular application architecture. For an example of this, compare the %ProgramFiles%\\Microsoft User Experience Virtualization\\templates\\ MicrosoftOffice2016Win32.xml and MicrosoftOffice2016Win64.xml files included with UE-V. This is useful when relative paths change between different versions of an executable or if settings have been added or removed when moving from one processor architecture to another.
+
+If this element is absent, the settings location template ignores the process’ architecture and applies to both 32 and 64-bit processes if the file name and other attributes apply.
+
+**Note**
+UE-V does not support ARM processors in this version.
+
+
+
+### ProductName
+
+**Mandatory: False**
+
+**Type: String**
+
+ProductName is an optional element used to identify a product for administrative purposes or reporting. ProductName differs from Filename in that there are no regular expression restrictions on its value. This allows for more easily understood descriptions of a process where the executable name may not be obvious. For example:
+
+``` syntax
+
+ MyApplication.exe
+ My Application 6.x by Contoso.com
+
+
+
+
+```
+
+### FileDescription
+
+**Mandatory: False**
+
+**Type: String**
+
+FileDescription is an optional tag that allows for an administrative description of the executable file. This is a free text field and can be useful in distinguishing multiple executables within a software package where there is a need to identify the function of the executable.
+
+For example, in a suited application, it might be useful to provide reminders about the function of two executables (MyApplication.exe and MyApplicationHelper.exe), as shown here:
+
+``` syntax
+
+
+
+ MyApplication.exe
+ My Application Main Engine FileDescription>
+
+
+
+
+
+ MyApplicationHelper.exe
+ My Application Background Process Executable
+
+
+
+
+
+```
+
+### ProductVersion
+
+**Mandatory: False**
+
+**Type: String**
+
+ProductVersion refers to the major and minor product versions of a file, as well as a build and patch level. ProductVersion is an optional element, but if specified, it must contain at least the Major child element. The value must express a range in the form Minimum="X" Maximum="Y" where X and Y are integers. The Minimum and Maximum values can be identical.
+
+The product and file version elements may be left unspecified. Doing so makes the template “version agnostic”, meaning that the template will apply to all versions of the specified executable.
+
+**Example 1:**
+
+Product version: 1.0 specified in the UE-V template generator produces the following XML:
+
+``` syntax
+
+
+
+
+```
+
+**Example 2:**
+
+File version: 5.0.2.1000 specified in the UE-V template generator produces the following XML:
+
+``` syntax
+
+
+
+
+
+
+```
+
+**Incorrect Example 1 – incomplete range:**
+
+Only the Minimum attribute is present. Maximum must be included in a range as well.
+
+``` syntax
+
+
+
+```
+
+**Incorrect Example 2 – Minor specified without Major element:**
+
+Only the Minor element is present. Major must be included as well.
+
+``` syntax
+
+
+
+```
+
+### FileVersion
+
+**Mandatory: False**
+
+**Type: String**
+
+FileVersion differentiates between the release version of a published application and the internal build details of a component executable. For the majority of commercial applications, these numbers are identical. Where they vary, the product version of a file indicates a generic version identification of a file, while file version indicates a specific build of a file (as in the case of a hotfix or update). This uniquely identifies files without breaking detection logic.
+
+To determine the product version and file version of a particular executable, right-click on the file in Windows Explorer, select Properties, then click on the Details tab.
+
+Including a FileVersion element for an application allows for more granular fine-tuning detection logic, but is not necessary for most applications. The ProductVersion element settings are checked first, and then FileVersion is checked. The more restrictive setting will apply.
+
+The child elements and syntax rules for FileVersion are identical to those of ProductVersion.
+
+``` syntax
+
+ MSACCESS.EXE
+ Win32
+
+
+
+
+
+
+
+
+
+```
+
+### Application Element
+
+Application is a container for settings that apply to a particular application. It is a collection of the following fields/types.
+
+
+
+
+
+
+
+
+Field/Type |
+Description |
+
+
+Name |
+Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see [Name](#name21). |
+
+
+ID |
+Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V service uses to reference the template at runtime. For more information, see [ID](#id21). |
+
+
+Description |
+An optional description of the template. |
+
+
+LocalizedNames |
+An optional name displayed in the UI, localized by a language locale. |
+
+
+LocalizedDescriptions |
+An optional template description localized by a language locale. |
+
+
+Version |
+Identifies the version of the settings location template for administrative tracking of changes. For more information, see [Version](#version21). |
+
+
+DeferToMSAccount |
+Controls whether this template is enabled in conjunction with a Microsoft account or not. If MSA syncing is enabled for a user on a machine, then this template will automatically be disabled. |
+
+
+DeferToOffice365 |
+Similar to MSA, this controls whether this template is enabled in conjunction with Office365. If Office 365 is being used to sync settings, this template will automatically be disabled. |
+
+
+FixedProfile |
+Specifies that this template can only be associated with the profile specified within this element, and cannot be changed via WMI or PowerShell. |
+
+
+Processes |
+A container for a collection of one or more Process elements. For more information, see [Processes](#processes21). |
+
+
+Settings |
+A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in [Data types](#data21). |
+
+
+
+
+
+
+### Common Element
+
+Common is similar to an Application element, but it is always associated with two or more Application elements. The Common section represents the set of settings that are shared between those Application instances. It is a collection of the following fields/types.
+
+
+
+
+
+
+
+
+Field/Type |
+Description |
+
+
+Name |
+Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see [Name](#name21). |
+
+
+ID |
+Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V service uses to reference the template at runtime. For more information, see [ID](#id21). |
+
+
+Description |
+An optional description of the template. |
+
+
+LocalizedNames |
+An optional name displayed in the UI, localized by a language locale. |
+
+
+LocalizedDescriptions |
+An optional template description localized by a language locale. |
+
+
+Version |
+Identifies the version of the settings location template for administrative tracking of changes. For more information, see [Version](#version21). |
+
+
+DeferToMSAccount |
+Controls whether this template is enabled in conjunction with a Microsoft account or not. If MSA syncing is enabled for a user on a machine, then this template will automatically be disabled. |
+
+
+DeferToOffice365 |
+Similar to MSA, this controls whether this template is enabled in conjunction with Office365. If Office 365 is being used to sync settings, this template will automatically be disabled. |
+
+
+FixedProfile |
+Specifies that this template can only be associated with the profile specified within this element, and cannot be changed via WMI or PowerShell. |
+
+
+Settings |
+A container for all the settings that apply to a particular template. It contains instances of the Registry, File, SystemParameter, and CustomAction settings. For more information, see Settings in [Data types](#data21). |
+
+
+
+
+
+
+### SettingsLocationTemplate Element
+
+This element defines the settings for a single application or a suite of applications.
+
+
+
+
+
+
+
+
+Field/Type |
+Description |
+
+
+Name |
+Specifies a unique name for the settings location template. This is used for display purposes when referencing the template in WMI, PowerShell, Event Viewer and debug logs. For more information, see [Name](#name21). |
+
+
+ID |
+Populates a unique identifier for a particular template. This tag becomes the primary identifier that the UE-V service uses to reference the template at runtime. For more information, see [ID](#id21). |
+
+
+Description |
+An optional description of the template. |
+
+
+LocalizedNames |
+An optional name displayed in the UI, localized by a language locale. |
+
+
+LocalizedDescriptions |
+An optional template description localized by a language locale. |
+
+
+
+
+
+
+### Appendix: SettingsLocationTemplate.xsd
+
+Here is the SettingsLocationTemplate.xsd file showing its elements, child elements, attributes, and parameters:
+
+``` syntax
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+```
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Working with Custom UE-V Templates and the UE-V Template Generator](uev-working-with-custom-templates-and-the-uev-generator.md)
+
+[Technical Reference for UE-V](uev-technical-reference.md)
diff --git a/windows/manage/uev-changing-the-frequency-of-scheduled-tasks.md b/windows/manage/uev-changing-the-frequency-of-scheduled-tasks.md
new file mode 100644
index 0000000000..e05fa13e99
--- /dev/null
+++ b/windows/manage/uev-changing-the-frequency-of-scheduled-tasks.md
@@ -0,0 +1,247 @@
+---
+title: Changing the Frequency of UE-V Scheduled Tasks
+description: Changing the Frequency of UE-V Scheduled Tasks
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Changing the Frequency of UE-V Scheduled Tasks
+
+
+When the User Experience Virtualization (UE-V) service is enabled, it creates the following scheduled tasks:
+
+- **Monitor Application Settings**
+
+- **Sync Controller Application**
+
+- **Synchronize Settings at Logoff**
+
+- **Template Auto Update**
+
+**Note**
+These tasks must remain enabled as UE-V cannot function without them.
+
+These scheduled tasks are not configurable with the UE-V tools. Administrators who want to change the scheduled task for these items can create a script that uses the Schtasks.exe command-line options.
+
+For more information about Schtasks.exe, see [Schtasks](https://technet.microsoft.com/library/cc725744(v=ws.11).aspx).
+
+## UE-V Scheduled Tasks
+
+The following scheduled tasks are included in UE-V with sample scheduled task configuration commands.
+
+### Monitor Application Settings
+
+The **Monitor Application Settings** task is used to synchronize settings for Windows apps. It is runs at logon but is delayed by 30 seconds to not affect the logon detrimentally. The Monitor Application Status task runs the UevAppMonitor.exe file, which is located in the UE-V Agent installation directory.
+
+
+
+
+
+
+
+
+
+
+
+\Microsoft\UE-V\Monitor Application Status |
+Logon |
+
+
+
+
+
+
+### Sync Controller Application
+
+The **Sync Controller Application** task is used to start the Sync Controller to synchronize settings from the computer to the settings storage location. By default, the task runs every 30 minutes. At that time, local settings are synchronized to the settings storage location, and updated settings on the settings storage location are synchronized to the computer. The Sync Controller application runs the Microsoft.Uev.SyncController.exe, which is located in the UE-V Agent installation directory.
+
+
+
+
+
+
+
+
+
+
+
+\Microsoft\UE-V\Sync Controller Application |
+Logon, and every 30 minutes thereafter |
+
+
+
+
+
+
+For example, the following command configures the agent to synchronize settings every 15 minutes instead of the default 30 minutes.
+
+``` syntax
+Schtasks /change /tn “Microsoft\UE-V\Sync Controller Application” /ri 15
+```
+
+### Synchronize Settings at Logoff
+
+The **Synchronize Settings at Logoff** task is used to start an application at logon that controls the synchronization of applications at logoff for UE-V. The Synchronize Settings at Logoff task runs the Microsoft.Uev.SyncController.exe file, which is located in the UE-V Agent installation directory.
+
+
+
+
+
+
+
+
+
+
+
+\Microsoft\UE-V\Synchronize Settings at Logoff |
+Logon |
+
+
+
+
+
+
+### Template Auto Update
+
+The **Template Auto Update** task checks the settings template catalog for new, updated, or removed templates. This task only runs if the SettingsTemplateCatalog is configured. The **Template Auto Update** task runs the ApplySettingsCatalog.exe file, which is located in the UE-V Agent installation directory.
+
+
+
+
+
+
+
+
+
+
+
+\Microsoft\UE-V\Template Auto Update |
+System startup and at 3:30 AM every day, at a random time within a 1-hour window |
+
+
+
+
+
+
+**Example:** The following command configures the UE-V service to check the settings template catalog store every hour.
+
+``` syntax
+schtasks /change /tn "Microsoft\UE-V\Template Auto Update" /ri 60
+```
+
+
+## UE-V Scheduled Task Details
+
+
+The following chart provides additional information about scheduled tasks for UE-V 2:
+
+
+
+
+
+
+
+
+
+
+
+
+Task Name (file name) |
+Default Frequency |
+Power Toggle |
+Idle Only |
+Network Connection |
+Description |
+
+
+Monitor Application Settings (UevAppMonitor.exe) |
+Starts 30 seconds after logon and continues until logoff. |
+No |
+Yes |
+N/A |
+Synchronizes settings for Windows (AppX) apps. |
+
+
+Sync Controller Application (Microsoft.Uev.SyncController.exe) |
+At logon and every 30 min thereafter. |
+Yes |
+Yes |
+Only if Network is connected |
+Starts the Sync Controller which synchronizes local settings with the settings storage location. |
+
+
+Synchronize Settings at Logoff (Microsoft.Uev.SyncController.exe) |
+Runs at logon and then waits for Logoff to Synchronize settings. |
+No |
+Yes |
+N/A |
+Start an application at logon that controls the synchronization of applications at logoff. |
+
+
+Template Auto Update (ApplySettingsCatalog.exe) |
+Runs at initial logon and at 3:30 AM every day thereafter. |
+Yes |
+No |
+N/A |
+Checks the settings template catalog for new, updated, or removed templates. This task only runs if SettingsTemplateCatalog is configured. |
+
+
+
+
+
+
+**Legend**
+
+- **Power Toggle** – Task Scheduler will optimize power consumption when not connected to AC power. The task might stop running if the computer switches to battery power.
+
+- **Idle Only** – The task will stop running if the computer ceases to be idle. By default the task will not restart when the computer is idle again. Instead the task will begin again on the next task trigger.
+
+- **Network Connection** – Tasks marked “Yes” only run if the computer has a network connection available. Tasks marked “N/A” run regardless of network connectivity.
+
+### How to Manage Scheduled Tasks
+
+To find Scheduled Tasks, perform the following:
+
+1. Open “Schedule Tasks” on the user computer.
+
+2. Navigate to: Task Scheduler -> Task Scheduler Library -> Microsoft -> UE-V
+
+3. Select the scheduled task you wish to manage and configure in the details pane.
+
+### Additional information
+
+The following additional information applies to UE-V scheduled tasks:
+
+- All task sequence programs are located in the UE-V Agent installation folder, `%programFiles%\Microsoft User Experience Virtualization\Agent\[architecture]\`, by default.
+
+- The Sync Controller Application Scheduled task is the crucial component when the UE-V SyncMethod is set to “SyncProvider” (UE-V default configuration). This scheduled task keeps the SettingsSToragePath synchronized with the locally cached versions of the settings package files. If users complain that settings do not synchronize often enough, then you can reduce the scheduled task setting to as little as 1 minute. You can also increase the 30 min default to a higher amount if necessary.
+
+- You do not need to disable the Template Auto Update scheduled task if you use another method to keep the clients’ templates in sync (i.e. Group Policy or Configuration Manager Baselines). Leaving the SettingsTemplateCatalog property value blank prevents UE-V from checking the settings catalog for custom templates. This scheduled task runs ApplySettingsCatalog.exe and will essentially return immediately.
+
+- The Monitor Application Settings scheduled task will update Windows app (AppX) settings in real time, based on Windows app program setting triggers built into each app.
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Administering UE-V](uev-administering-uev.md)
+
+[Deploy UE-V for Custom Applications](uev-deploy-uev-for-custom-applications.md#deploycatalogue)
diff --git a/windows/manage/uev-configuring-uev-with-group-policy-objects.md b/windows/manage/uev-configuring-uev-with-group-policy-objects.md
new file mode 100644
index 0000000000..9bb13f98c6
--- /dev/null
+++ b/windows/manage/uev-configuring-uev-with-group-policy-objects.md
@@ -0,0 +1,199 @@
+---
+title: Configuring UE-V with Group Policy Objects
+description: Configuring UE-V with Group Policy Objects
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Configuring UE-V with Group Policy Objects
+
+
+Some User Experience Virtualization (UE-V) Group Policy settings can be defined for computers, and other Group Policy settings can be defined for users. The Group Policy administrative templates for these settings are included in Windows 10, version 1607.
+
+
+The following policy settings can be configured for UE-V.
+
+**Group Policy settings**
+
+
+
+
+
+
+
+
+
+
+
+
+
+Do not use the sync provider |
+Computers and Users |
+By using this Group Policy setting, you can configure whether UE-V uses the sync provider feature. This policy setting also lets you enable notification to appear when the import of user settings is delayed. |
+Enable this setting to configure the UE-V service not to use the sync provider. |
+
+
+First Use Notification |
+Computers Only |
+This Group Policy setting enables a notification in the notification area that appears when the UE-V service runs for the first time. |
+The default is enabled. |
+
+
+Roam Windows settings |
+Computers and Users |
+This Group Policy setting configures the synchronization of Windows settings. |
+Select which Windows settings synchronize between computers.
+By default, Windows themes, desktop settings, and Ease of Access settings synchronize settings between computers of the same operating system version. |
+
+
+Settings package size warning threshold |
+Computers and Users |
+This Group Policy setting lets you configure the UE-V service to report when a settings package file size reaches a defined threshold. |
+Specify the preferred threshold for settings package sizes in kilobytes (KB).
+By default, the UE-V service does not have a package file size threshold. |
+
+
+Settings storage path |
+Computers and Users |
+This Group Policy setting configures where the user settings are to be stored. |
+Enter a Universal Naming Convention (UNC) path and variables such as \\Server\SettingsShare\%username%. |
+
+
+Settings template catalog path |
+Computers Only |
+This Group Policy setting configures where custom settings location templates are stored. This policy setting also configures whether the catalog is to be used to replace the default Microsoft templates that are installed with the UE-V service. |
+Enter a Universal Naming Convention (UNC) path such as \\Server\TemplateShare or a folder location on the computer.
+Select the check box to replace the default Microsoft templates. |
+
+
+Sync settings over metered connections |
+Computers and Users |
+This Group Policy setting defines whether UE-V synchronizes settings over metered connections. |
+By default, the UE-V service does not synchronize settings over a metered connection. |
+
+
+Sync settings over metered connections even when roaming |
+Computers and Users |
+This Group Policy setting defines whether UE-V synchronizes settings over metered connections outside of the home provider network, for example, when the data connection is in roaming mode. |
+By default, UE-V does not synchronize settings over a metered connection when it is in roaming mode. |
+
+
+Synchronization timeout |
+Computers and Users |
+This Group Policy setting configures the number of milliseconds that the computer waits before a time-out when it retrieves user settings from the remote settings location. If the remote storage location is unavailable, and the user does not use the sync provider, the application start is delayed by this many milliseconds. |
+Specify the preferred synchronization time-out in milliseconds. The default value is 2000 milliseconds. |
+
+
+Tray Icon |
+Computers Only |
+This Group Policy setting enables the User Experience Virtualization (UE-V) tray icon. |
+This setting only has an effect for UE-V 2.x and earlier. It has no effect for UE-V in Windows 10, version 1607. |
+
+
+Use User Experience Virtualization (UE-V) |
+Computers and Users |
+This Group Policy setting lets you enable or disable User Experience Virtualization (UE-V). |
+This setting only has an effect for UE-V 2.x and earlier. For UE-V in Windows 10, version 1607, use the **Enable UE-V** setting. |
+
+
+Enable UE-V |
+Computers and Users |
+This policy setting allows you to enable or disable User Experience Virtualization (UE-V) feature. Reboot is needed for enable to take effect. |
+This setting only has an effect for UE-V in Windows 10, version 1607. For UE-V 2.x and earlier, choose the **Use User Experience Virtualization (UE-V)** setting. |
+
+
+
+
+
+
+**Note**
+In addition, Group Policy settings are available for many desktop applications and Windows apps. You can use these settings to enable or disable settings synchronization for specific applications.
+
+
+
+**Windows App Group Policy settings**
+
+
+
+
+
+
+
+
+
+
+
+
+
+Do not synchronize Windows Apps |
+Computers and Users |
+This Group Policy setting defines whether the UE-V service synchronizes settings for Windows apps. |
+The default is to synchronize Windows apps. |
+
+
+Windows App List |
+Computer and User |
+This setting lists the family package names of the Windows apps and states expressly whether UE-V synchronizes that app’s settings. |
+You can use this setting to specify that settings of an app are never synchronized by UE-V, even if the settings of all other Windows apps are synchronized. |
+
+
+Sync Unlisted Windows Apps |
+Computer and User |
+This Group Policy setting defines the default settings sync behavior of the UE-V service for Windows apps that are not explicitly listed in the Windows app list. |
+By default, the UE-V service only synchronizes settings of those Windows apps that are included in the Windows app list. |
+
+
+
+
+
+
+For more information about synchronizing Windows apps, see [Windows App List](http://technet.microsoft.com/library/dn458925.aspx#win8applist).
+
+**To configure computer-targeted Group Policy settings**
+
+1. Use the Group Policy Management Console (GPMC) or the Advanced Group Policy Management (AGPM) on the computer that acts as a domain controller to manage Group Policy settings for UE-V computers. Navigate to **Computer configuration**, select **Policies**, select **Administrative Templates**, click **Windows Components**, and then select **Microsoft User Experience Virtualization**.
+
+2. Select the Group Policy setting to be edited.
+
+**To configure user-targeted Group Policy settings**
+
+1. Use the Group Policy Management Console (GPMC) or the Advanced Group Policy Management (AGPM) tool in Microsoft Desktop Optimization Pack (MDOP) on the domain controller computer to manage Group Policy settings for UE-V. Navigate to **User configuration**, select **Policies**, select **Administrative Templates**, click **Windows Components**, and then select **Microsoft User Experience Virtualization**.
+
+2. Select the edited Group Policy setting.
+
+The UE-V service uses the following order of precedence to determine synchronization.
+
+**Order of precedence for UE-V settings**
+
+1. User-targeted settings that are managed by Group Policy settings - These configuration settings are stored in the registry key by Group Policy under `HKEY_CURRENT_USER\Software\Policies\Microsoft\Uev\Agent\Configuration`.
+
+2. Computer-targeted settings that are managed by Group Policy settings - These configuration settings are stored in the registry key by Group Policy under `HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Uev\Agent\Configuration`.
+
+3. Configuration settings that are defined by the current user by using Windows PowerShell or Windows management Instrumentation (WMI) - These configuration settings are stored by the UE-V service under this registry location: `HKEY_CURRENT_USER\Software\Microsoft\Uev\Agent\Configuration`.
+
+4. Configuration settings that are defined for the computer by using Windows PowerShell or WMI. These configuration settings are stored by the UE-V service under this registry location: `HKEY_LOCAL_MACHINE\Software\Microsoft\Uev\Agent\Configuration`.
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+
+[Administering UE-V](uev-administering-uev.md)
+
+[Manage Configurations for UE-V](uev-manage-configurations.md)
diff --git a/windows/manage/uev-configuring-uev-with-system-center-configuration-manager.md b/windows/manage/uev-configuring-uev-with-system-center-configuration-manager.md
new file mode 100644
index 0000000000..f6f6eb97fc
--- /dev/null
+++ b/windows/manage/uev-configuring-uev-with-system-center-configuration-manager.md
@@ -0,0 +1,247 @@
+---
+title: Configuring UE-V with System Center Configuration Manager
+description: Configuring UE-V with System Center Configuration Manager
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Configuring UE-V with System Center Configuration Manager
+
+
+After you deploy User Experience Virtualization (UE-V) and its required features, you can start to configure it to meet your organization's need. The UE-V Configuration Pack provides a way for administrators to use the Compliance Settings feature of System Center Configuration Manager (2012 SP1 or later) to apply consistent configurations across sites where UE-V and Configuration Manager are installed.
+
+## UE-V Configuration Pack supported features
+
+
+The UE-V Configuration Pack includes tools to:
+
+- Create or update UE-V settings location template distribution baselines
+
+ - Define UE-V templates to be registered or unregistered
+
+ - Update UE-V template configuration items and baselines as templates are added or updated
+
+ - Distribute and register UE-V templates using standard Configuration Item remediation
+
+- Create or update a UE-V Agent policy configuration item to set or clear these settings
+
+
+
+
+
+
+
+
+
+ Max package size |
+ Enable/disable Windows app sync |
+ Wait for sync on application start |
+
+
+ Setting import delay |
+ Sync unlisted Windows apps |
+ Wait for sync on logon |
+
+
+ Settings import notification |
+ IT contact URL |
+ Wait for sync timeout |
+
+
+ Settings storage path |
+ IT contact descriptive text |
+ Settings template catalog path |
+
+
+ Sync enablement |
+ Tray icon enabled |
+ Start/Stop UE-V agent service |
+
+
+ Sync method |
+ First use notification |
+ Define which Windows apps will roam settings |
+
+
+ Sync timeout |
+ |
+ |
+
+
+
+
+
+
+- Verify compliance by confirming that UE-V is running.
+
+## Generate a UE-V service policy configuration item
+
+
+All UE-V service policy and configuration is distributed through a single configuration item that is generated using the UevAgentPolicyGenerator.exe tool. This tool reads the desired configuration from an XML configuration file and creates a CI containing the discovery and remediation settings needed to bring the machine into compliance.
+
+The UE-V service policy configuration item CAB file is created using the UevTemplateBaselineGenerator.exe command line tool, which has these parameters:
+
+- Site <site code>
+
+- PolicyName <name> Optional: Defaults to “UE-V Agent Policy” if not present
+
+- PolicyDescription <description> Optional: A description is provided if not present
+
+- CabFilePath <full path to configuration item .CAB file>
+
+- ConfigurationFile <full path to agent configuration XML file>
+
+**Note**
+It might be necessary to change the PowerShell execution policy to allow these scripts to run in your environment. Perform these steps in the Configuration Manager console:
+
+1. Select **Administration > Client Settings > Properties**
+
+2. In the **User Agent** tab, set the **PowerShell Execution Policy** to **Bypass**
+
+
+
+**Create the first UE-V policy configuration item**
+
+1. Copy the default settings configuration file from the UE-V Config Pack installation directory to a location visible to your ConfigMgr Admin Console:
+
+ ``` syntax
+ C:\Program Files (x86)\Windows Kits\10\Microsoft User Experience Virtualization\Management\AgentConfiguration.xml
+ ```
+
+ The default configuration file contains five sections:
+
+ **Computer Policy**
+ All UE-V machine level settings. The DesiredState attribute can be
+
+ - **Set** to have the value assigned in the registry
+
+ - **Clear** to remove the setting
+
+ - **Unmanaged** to have the configuration item left at its current state
+
+ Do not remove lines from this section. Instead, set the DesiredState to ‘Unmanaged’ if you do not want Configuration Manager to alter current or default values.
+
+ **CurrentComputerUserPolicy**
+ All UE-V user level settings. These entries override the machine settings for a user. The DesiredState attribute can be
+
+ - **Set** to have the value assigned in the registry
+
+ - **Clear** to remove the setting
+
+ - **Unmanaged** to have the configuration item left at its current state
+
+ Do not remove lines from this section. Instead, set the DesiredState to ‘Unmanaged’ if you do not want Configuration Manager to alter current or default values.
+
+ **Services**
+ Entries in this section control service operation. The default configuration file contains a single entry for the UevAgentService. The DesiredState attribute can be set to **Running** or **Stopped**.
+
+ **Windows8AppsComputerPolicy**
+ All machine level Windows app synchronization settings. Each PackageFamilyName listed in this section can be assigned a DesiredState of
+
+ - **Enabled** to have settings roam
+
+ - **Disabled** to prevent settings from roaming
+
+ - **Cleared** to have the entry removed from UE-V control
+
+ Additional lines can be added to this section based on the list of installed Windows apps that can be viewed using the PowerShell cmdlet GetAppxPackage.
+
+ **Windows8AppsCurrentComputerUserPolicy**
+ Identical to the Windows8AppsComputerPolicy with settings that override machine settings for an individual user.
+
+2. Edit the configuration file by changing the desired state and value fields.
+
+3. Run this command on a machine running the ConfigMgr Admin Console:
+
+ ``` syntax
+ C:\Program Files (x86)\Microsoft User Experience Virtualization\ConfigPack\UevAgentPolicyGenerator.exe –Site ABC –CabFilePath “C:\MyCabFiles\UevPolicyItem.cab” –ConfigurationFile “c:\AgentConfiguration.xml”
+ ```
+
+4. Import the CAB file using ConfigMgr console or PowerShell Import-CMConfigurationItem
+
+**Update a UE-V Policy Configuration Item**
+
+1. Edit the configuration file by changing the desired state and value fields.
+
+2. Run the command from Step 3 in [Create the First UE-V Policy Configuration Item](#create). If you changed the name with the PolicyName parameter, make sure you enter the same name.
+
+3. Reimport the CAB file. The version in ConfigMgr will be updated.
+
+## Generate a UE-V Template Baseline
+
+
+UE-V templates are distributed using a baseline containing multiple configuration items. Each configuration item contains the discovery and remediation scripts needed to install one UE-V template. The actual UE-V template is embedded within the remediation script for distribution using standard Configuration Item functionality.
+
+The UE-V template baseline is created using the UevTemplateBaselineGenerator.exe command line tool, which has these parameters:
+
+- Site <site code>
+
+- BaselineName <name> (Optional: defaults to “UE-V Template Distribution Baseline” if not present)
+
+- BaselineDescription <description> (Optional: a description is provided if not present)
+
+- TemplateFolder <UE-V template folder>
+
+- Register <comma separated template file list>
+
+- Unregister <comma separated template list>
+
+- CabFilePath <Full path to baseline CAB file to generate>
+
+The result is a baseline CAB file that is ready for import into Configuration Manager. If at a future date, you update or add a template, you can rerun the command using the same baseline name. Importing the CAB results in CI version updates on the changed templates.
+
+### Create the First UE-V Template Baseline
+
+1. Create a “master” set of UE-V templates in a stable folder location visible to the machine running your ConfigMgr Admin Console. As templates are added or updated, this folder is where they are pulled for distribution. The initial list of templates can be copied from a machine with UE-V installed. The default template location is C:\\Program Files\\Microsoft User Experience Virtualization\\Templates.
+
+2. Create a text.bat file where you can add the template generator command. This is optional, but will make regeneration simpler if you save the command parameters.
+
+3. Add the command and parameters to the .bat file that will generate the baseline. The following example creates a baseline that distributes Notepad and Calculator:
+
+ ``` syntax
+ C:\Program Files (x86)\Microsoft User Experience Virtualization\ConfigPack\UevTemplateBaselineGenerator.exe –Site “ABC” –TemplateFolder “C:\ProductionUevTemplates” –Register “MicrosoftNotepad.xml, MicrosoftCalculator.xml” –CabFilePath “C:\MyCabFiles\UevTemplateBaseline.cab”
+ ```
+
+4. Run the .bat file to create UevTemplateBaseline.cab ready for import into Configuration Manager.
+
+### Update a UE-V Template Baseline
+
+The template generator uses the template version to determine if a template should be updated. If you make a template change and update the version, the baseline generator compares the template in your master folder with the template contained in the CI on the ConfigMgr server. If a difference is found, the generated baseline and modified CI versions are updated.
+
+To distribute a new Notepad template, you would perform these steps:
+
+1. Update the template and template version located in the <Version> element of the template.
+
+2. Copy the template to your master template directory.
+
+3. Run the command in the .bat file that you created in Step 3 in [Create the First UE-V Template Baseline](#create2).
+
+4. Import the generated CAB file into ConfigMgr using the console or PowerShell Import-CMBaseline.
+
+## Get the UE-V Configuration Pack
+
+
+The UE-V Configuration Pack for Configuration Manager 2012 SP1 or later can be downloaded [here](http://go.microsoft.com/fwlink/?LinkId=317263).
+
+## Have a suggestion for UE-V?
+
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+
+[Manage Configurations for UE-V](uev-manage-configurations.md)
+
+
+
+
+
+
+
+
+
diff --git a/windows/manage/uev-deploy-required-features.md b/windows/manage/uev-deploy-required-features.md
new file mode 100644
index 0000000000..c3324cab35
--- /dev/null
+++ b/windows/manage/uev-deploy-required-features.md
@@ -0,0 +1,156 @@
+---
+title: Deploy required UE-V features
+description: Deploy required UE-V features
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# Deploy required UE-V features
+
+To get up and running with User Experience Virtualization (UE-V), install and configure the following features.
+
+- [Deploy a settings storage location](#deploy-a-ue-v-settings-storage-location) that is accessible to end users.
+
+ This is a standard network share that stores and retrieves user settings.
+
+- [Choose the configuration method for UE-V](#choose-the-configuration-method-for-ue-v)
+
+ You can deploy and configure UE-V with common management tools including group policy, Configuration Manager, or Windows Management Infrastructure and PowerShell.
+
+- [Enable the UE-V service](#enable-the-ue-v-service) on user devices.
+
+ With Windows 10, version 1607, UE-V is installed automatically. You need to enable the UE-V service on each user device you want to include in your UE-V environment.
+
+The topics in this section describe how to deploy these features.
+
+## Deploy a UE-V Settings Storage Location
+
+UE-V requires a location in which to store user settings in settings package files. You can configure this settings storage location in one of these ways:
+
+- Create your own settings storage location
+
+- Use existing Active Directory for your settings storage location
+
+> **Note** As a matter of [performance and capacity planning](uev-prepare-for-deployment.md#performance-and-capacity-planning) and to reduce problems with network latency, create settings storage locations on the same local networks where the users’ devices reside. We recommend 20 MB of disk space per user for the settings storage location.
+
+### Create a UE-V Settings Storage Location
+
+Before you define the settings storage location, you must create a root directory with read/write permissions for users who store settings on the share. The UE-V service creates user-specific folders under this root directory.
+
+The settings storage location is defined by setting the SettingsStoragePath configuration option, which you can configure by using one of these methods:
+
+- Through [Group Policy](uev-configuring-uev-with-group-policy-objects.md) settings
+
+- With the [System Center Configuration Pack](uev-configuring-uev-with-system-center-configuration-manager.md) for UE-V
+
+- With [Windows PowerShell or Windows Management Instrumentation (WMI)](uev-administering-uev-with-windows-powershell-and-wmi.md)
+
+ The path must be in a universal naming convention (UNC) path of the server and share. For example, **\\\\Server\\Settingsshare\\**. This configuration option supports the use of variables to enable specific synchronization scenarios. For example, you can use the %username%\\%computername% variables to preserve the end user settings experience in these scenarios:
+
+- End users that use multiple physical devices in your enterprise
+
+- Enterprise computers that are used by multiple end users
+
+The UE-V service dynamically creates a user-specific settings storage path, with a hidden system folder named **SettingsPackages**, based on the configuration setting of **SettingsStoragePath**. The service reads and writes settings to this location as defined by the registered UE-V settings location templates.
+
+**UE-V settings are determined by a "Last write wins" rule:** If the settings storage location is the same for a user with multiple managed computers, one UE-V service reads and writes to the settings location independently of services running on other computers. The last written settings and values are the ones applied when the service next reads from the settings storage location.
+
+**Deploy the settings storage location:** Follow these steps to define the settings storage location rather than using your existing Active Directory agent. You should limit access to the settings storage share to those users that require it, as shown in the tables below.
+
+**To deploy the UE-V network share**
+
+1. Create a new security group for UE-V users.
+
+2. Create a new folder on the centrally located computer that stores the UE-V settings packages, and then grant UE-V users access with group permissions to the folder. The administrator who supports UE-V must have permissions to this shared folder.
+
+3. Set the following share-level Server Message Block (SMB) permissions for the settings storage location folder.
+
+ | **User account** | **Recommended permissions** |
+ |------------------------------|-----------------------------|
+ | Everyone | No permissions |
+ | Security group of UE-V users | Full control |
+
+4. Set the following NTFS file system permissions for the settings storage location folder.
+
+ | **User account** | **Recommended permissions** | **Folder** |
+ |------------------------------|---------------------------------------------------|---------------------------|
+ | Creator/owner | Full control | Subfolders and files only |
+ | Security group of UE-V users | List folder/read data, create folders/append data | This folder only |
+
+With this configuration, the UE-V service creates and secures a Settingspackage folder while it runs in the context of the user, and grants each user permission to create folders for settings storage. Users receive full control to their Settingspackage folder while other users cannot access it.
+
+**Note**
+If you create the settings storage share on a computer running a Windows Server operating system, configure UE-V to verify that either the local Administrators group or the current user is the owner of the folder where settings packages are stored. To enable this additional security, specify this setting in the Windows Server Registry Editor:
+
+1. Add a **REG\_DWORD** registry key named **"RepositoryOwnerCheckEnabled"** to **HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\UEV\\Agent\\Configuration**.
+
+2. Set the registry key value to *1*.
+
+### Use Active Directory with UE-V
+
+The UE-V service uses Active Directory (AD) by default if you don’t define a settings storage location. In these cases, the UE-V service dynamically creates the settings storage folder under the root of the AD home directory of each user. However, if a custom directory setting is configured in AD, then that directory is used instead.
+
+## Choose the Configuration Method for UE-V
+
+You’ll need to decide which configuration method you'll use to manage UE-V after deployment since this will be the configuration method you use to deploy the UE-V Agent. Typically, this is the configuration method that you already use in your environment, such as Windows PowerShell or Configuration Manager.
+
+You can configure UE-V before, during, or after you enable the UE-V service on user devices, depending on the configuration method that you use.
+
+- [**Group Policy**](uev-configuring-uev-with-group-policy-objects.md) You can use your existing Group Policy infrastructure to configure UE-V before or after you enable the UE-V service. The UE-V Group Policy ADMX template enables the central management of common UE-V service configuration options and includes settings to configure UE-V synchronization.
+
+ >**Note** Starting with Windows 10, version 1607, UE-V ADMX templates are installed automatically.
+
+ Group Policy ADMX templates configure the synchronization settings for the UE-V service and enable the central management of common UE-V service configuration settings by using an existing Group Policy infrastructure.
+
+ Supported operating systems for the domain controller that deploys the Group Policy Objects include:
+
+ Windows Server 2012 and Windows Server 2012 R2
+
+- [**Configuration Manager**](uev-configuring-uev-with-system-center-configuration-manager.md) The UE-V Configuration Pack lets you use the Compliance Settings feature of System Center Configuration Manager to apply consistent configurations across sites where UE-V and Configuration Manager are installed.
+
+- [**Windows PowerShell and WMI**](uev-administering-uev-with-windows-powershell-and-wmi.md) You can use scripted commands for Windows PowerShell and Windows Management Instrumentation (WMI) to modify the configuration of the UE-V service.
+
+>**Note**
+Registry modification can result in data loss, or the computer becomes unresponsive. We recommend that you use other configuration methods.
+
+## Enable the UE-V service
+
+The UE-V service is the client-side component that captures user-personalized application and Windows settings and saves them in settings packages. Settings packages are built, locally stored, and copied to the settings storage location.
+
+Before enabling the UE-V service, you need to register the UE-V templates for first time use. In a PowerShell window, type **register-<TemplateName>** where **TemplateName** is the name of the UE-V template you want to register, and press ENTER.
+
+With Windows 10, version 1607 and later, the UE-V service is installed on user devices. Enable the service to start using UE-V. You can enable the service with the Group Policy editor or with Windows PowerShell.
+
+**To enable the UE-V service with Group Policy**
+
+1. Open the device’s **Group Policy Editor**.
+
+2. Navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft** **User Experience Virtualization**.
+
+3. Run **Enable UEV**.
+
+4. Restart the device.
+
+**To enable the UE-V service with Windows PowerShell**
+
+1. In a PowerShell window, type **Enable-UEV** and press ENTER.
+
+2. Restart the device.
+
+3. In a PowerShell window, type **Get-UEVStatus** and press ENTER to verify that the UE-V service was successfully enabled.
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/forums/home?forum=mdopuev).
+
+## Related topics
+
+[Prepare a UE-V deployment](uev-prepare-for-deployment.md)
+
+[Deploy UE-V for use with custom applications](uev-deploy-uev-for-custom-applications.md)
+
+[Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md)
+
diff --git a/windows/manage/uev-deploy-uev-for-custom-applications.md b/windows/manage/uev-deploy-uev-for-custom-applications.md
new file mode 100644
index 0000000000..120b0b4602
--- /dev/null
+++ b/windows/manage/uev-deploy-uev-for-custom-applications.md
@@ -0,0 +1,248 @@
+---
+title: Use UE-V with custom applications
+description: Use UE-V with custom applications
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# Use UE-V with custom applications
+
+User Experience Virtualization (UE-V) uses XML files called ***settings location templates*** to monitor and synchronize application settings and Windows settings between user devices. By default, some settings location templates are included in UE-V. However, if you want to synchronize settings for desktop applications other than those included in the default templates, you can create your own custom settings location templates with the UE-V template generator.
+
+After you’ve reviewed [Prepare a UE-V Deployment](uev-prepare-for-deployment.md) and decided that you want to synchronize settings for custom applications (third-party, line-of-business, e.g.), you’ll need to deploy the features of UE-V described in this topic.
+
+To start, here are the main steps required to synchronize settings for custom applications:
+
+- [Install the UE-V template generator](#install-the-uev-template-generator)
+
+ Use the UEV template generator to create custom XML settings location templates.
+
+- [Configure a UE-V settings template catalog](#deploy-a-settings-template-catalog)
+
+ You can define this path where custom settings location templates are stored.
+
+- [Create custom settings location templates](#create-custom-settings-location-templates)
+
+ These custom templates let users sync settings for custom applications.
+
+- [Deploy the custom settings location templates](#deploy-the-custom-settings-location-templates)
+
+ After you test the custom template to ensure that settings are synced correctly, you can deploy these templates in one of these ways:
+
+ - With your existing electronic software distribution solution, such as Configuration Manager
+
+ - With Group Policy preferences
+
+ - With a UE-V settings template catalog
+
+>**Note**
+Templates that are deployed with electronic software distribution methods or Group Policy must be registered with UE-V Windows Management Instrumentation (WMI) or Windows PowerShell.
+
+## Prepare to deploy UE-V for custom applications
+
+Before you start deploying the UE-V features that handle custom applications, review the following important information.
+
+### The UE-V template generator
+
+Use the UE-V template generator to monitor, discover, and capture the locations where Win32 applications store settings. The template generator does not create settings location templates for the following types of applications:
+
+- Virtualized applications
+
+- Applications that are offered through Terminal Services
+
+- Java applications
+
+- Windows applications
+
+>**Note**
+UE-V settings location templates cannot be created from virtualized applications or Terminal Services applications. However, settings that are synchronized by using the templates can be applied to those applications. To create templates that support Virtual Desktop Infrastructure (VDI) and Terminal Services applications, open a version of the Windows Installer (.msi) package of the application by using the UE-V template generator. For more information about synchronizing settings for virtual applications, see [Using UE-V with virtual applications](uev-using-uev-with-application-virtualization-applications.md).
+
+**Excluded Locations:** The discovery process excludes locations that commonly store application software files that do not synchronize settings well between user computers or computing environments. By default, these are excluded:
+
+- HKEY\_CURRENT\_USER registry keys and files to which the logged-on user cannot write values
+
+- HKEY\_CURRENT\_USER registry keys and files that are associated with the core functionality of the Windows operating system
+
+- All registry keys that are located in the HKEY\_LOCAL\_MACHINE hive
+
+- Files that are located in Program Files directories
+
+- Files that are located in Users \\ \[User name\] \\ AppData \\ LocalLow
+
+- Windows operating system files that are located in %Systemroot%
+
+If registry keys and files that are stored in excluded locations are required to synchronize application settings, you can manually add the locations to the settings location template during the template creation process.
+
+### Replace the default Microsoft templates
+
+A default group of settings location templates for common Microsoft applications and Windows settings is included with Windows 10, version 1607. If you customize these templates, or create settings location templates to synchronize settings for custom applications, the UE-V service can be configured to use a settings template catalog to store the templates. In this case, you will need to include the default templates with the custom templates in the settings template catalog.
+
+>**Important**
+After you enable the UE-V service, you’ll need to register the settings location templates using the `Register-UevTemplate` cmdlet in Windows PowerShell.
+
+When you use Group Policy to configure the settings template catalog path, you can choose to replace the default Microsoft templates. If you configure the policy settings to replace the default Microsoft templates, all of the default Microsoft templates that are installed with Windows 10, version 1607 are deleted and only the templates that are located in the settings template catalog are used.
+
+**Note**
+If there are customized templates in the settings template catalog that use the same ID as the default Microsoft templates, the Microsoft templates are ignored.
+
+You can replace the default templates by using the UE-V Windows PowerShell features. To replace the default Microsoft template with Windows PowerShell, unregister all of the default Microsoft templates, and then register the customized templates.
+
+Old settings packages remain in the settings storage location even if you deploy new settings location templates for an application. These packages are not read by the UE-V service, but neither are they automatically deleted.
+
+### Install the UEV template generator
+
+Use the UE-V template generator to create custom settings location templates that you can then distribute to user devices. You can also use the template generator to edit an existing template or validate a template that was created with another XML editor.
+
+The UE-V template generator is included in the Windows Assessment and Deployment Kit (ADK) for Windows 10.
+
+Install the UE-V template generator on a computer that you can use to create a custom settings location template. This computer should have the applications installed for which custom settings location templates need to be generated.
+
+>**Important**
+UE-V for Windows 10, version 1607 includes a new template generator. If you are upgrading from an existing UE-V installation, you’ll need to use the new generator to create settings location templates. Templates created with previous versions of the UE-V template generator will continue to work.
+
+**To install the UE-V template generator**
+
+1. Go to [Download the Windows ADK](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) to access the ADK.
+
+2. Select the **Get Windows ADK for Windows 10** button on this page to start the ADK installer. On the window pictured below, select **Microsoft User Experience Virtualization (UE-V) Template Generator** and then select Install.
+
+
+
+
+
+3. To open the generator, select **Microsoft Application Virtualization Generator** from the **Start** menu.
+
+4. See [Working with Custom UE-V Templates and the UE-V Template Generator](uev-working-with-custom-templates-and-the-uev-generator.md) for information about how to use the template generator.
+
+### Deploy a settings template catalog
+
+The UE-V settings template catalog is a folder path on UE-V computers or a Server Message Block (SMB) network share that stores all the custom settings location templates. The UE-V service checks this location one time each day and updates its synchronization behavior, based on the templates in this folder.
+
+The UE-V service checks this folder for templates that were added, updated, or removed. It registers new and changed templates and unregisters removed templates. By default, templates are registered and unregistered one time per day at 3:30 A.M. local time by the Task Scheduler and at system startup. To customize the frequency of this scheduled task, see [Changing the frequency of UE-V scheduled tasks](uev-changing-the-frequency-of-scheduled-tasks.md).
+
+You can configure the settings template catalog path with command-line options, Group Policy, WMI, or Windows PowerShell. Templates stored at the settings template catalog path are automatically registered and unregistered by a scheduled task.
+
+**To configure the settings template catalog for UE-V**
+
+1. Create a new folder on the computer that stores the UE-V settings template catalog.
+
+2. Set the following share-level (SMB) permissions for the settings template catalog folder.
+
+ | **User account** | **Recommended permissions** |
+ |------------------|------------------------------|
+ | Everyone | No Permissions |
+ | Domain Computers | Read Permission Levels |
+ | Administrators | Read/Write Permission Levels |
+
+3. Set the following NTFS file system permissions for the settings template catalog folder.
+
+ | **User account** | **Recommended permissions** | **Apply to** |
+ |------------------|-------------------------------|-----------------------------------|
+ | Creator/Owner | Full Control | This Folder, Subfolders and Files |
+ | Domain Computers | List Folder Contents and Read | This Folder, Subfolders and Files |
+ | Everyone | No Permissions | No Permissions |
+ | Administrators | Full Control | This Folder, Subfolders and Files |
+
+4. Click **OK** to close the dialog boxes.
+
+At a minimum, the network share must grant permissions for the Domain Computers group. In addition, grant access permissions for the network share folder to administrators who are to manage the stored templates.
+
+### Create custom settings location templates
+
+Use the UE-V template generator to create settings location templates for line-of-business applications or other custom applications. After you create the template for an application, deploy it to computers to synchronize settings for that application.
+
+**To create a UE-V settings location template with the UE-V template generator**
+
+1. Click **Start** > **All Programs** > **Microsoft User Experience Virtualization** > **Microsoft User Experience Virtualization template generator**.
+
+2. Click **Create a settings location template**.
+
+3. Specify the application. Browse to the file path of the application (.exe) or the application shortcut (.lnk) for which you want to create a settings location template. Specify the command-line arguments, if any, and working directory, if any.
+
+4. Click **Next** to continue.
+
+ >**Note** Before the application is started, the system displays a prompt for **User Account Control**. Permission is required to monitor the registry and file locations that the application uses to store settings.
+
+5. After the application starts, close the application. The UE-V template generator records the locations where the application stores its settings.
+
+6. After the process is completed, click **Next** to continue.
+
+7. Review and select the appropriate registry settings locations and settings file locations to synchronize for this application. The list includes the following two categories for settings locations:
+
+ - **Standard**: Application settings that are stored in the registry under the HKEY\_CURRENT\_USER keys or in the file folders under \\ **Users** \\ \[User name\] \\ **AppData** \\ **Roaming**. The UE-V template generator includes these settings by default.
+
+ - **Nonstandard**: Application settings that are stored outside the locations are specified in the best practices for settings data storage (optional). These include files and folders under **Users** \\ \[User name\] \\ **AppData** \\ **Local**. Review these locations to determine whether to include them in the settings location template. Select the locations check boxes to include them.
+
+8. Click **Next** to continue.
+
+9. Review and edit any **Properties**, **Registry** locations, and **Files** locations for the settings location template.
+
+ - Edit the following properties on the **Properties** tab:
+
+ - **Application Name**: The application name that is written in the description of the program files properties.
+
+ - **Program name**: The name of the program that is taken from the program file properties. This name usually has the .exe file name extension.
+
+ - **Product version**: The product version number of the .exe file of the application. This property, in conjunction with the **File version**, helps determine which applications are targeted by the settings location template. This property accepts a major version number. If this property is empty, the settings location template applies to all versions of the product.
+
+ - **File version**: The file version number of the .exe file of the application. This property, in conjunction with the **Product version**, helps determine which applications are targeted by the settings location template. This property accepts a major version number. If this property is empty, the settings location template applies to all versions of the program.
+
+ - **template author name** (optional): The name of the settings location template author.
+
+ - **template author email** (optional): The email address of the settings location template author.
+
+ - The **Registry** tab lists the **Key** and **Scope** of the registry locations that are included in the settings location template. Edit the registry locations by using the **Tasks** drop-down menu. Tasks enable you to add new keys, edit the name or scope of existing keys, delete keys, and browse the registry where the keys are located. Use the **All Settings** scope to include all the registry settings under the specified key. Use the **All Settings and Subkeys** to include all the registry settings under the specified key, subkeys, and subkey settings.
+
+ - The **Files** tab lists the file path and file mask of the file locations that are included in the settings location template. Edit the file locations by use of the **Tasks** drop-down menu. Tasks for file locations enable you to add new files or folder locations, edit the scope of existing files or folders, delete files or folders, and open the selected location in Windows Explorer. Leave the file mask empty to include all files in the specified folder.
+
+10. Click **Create**, and then click **Save** to save the settings location template on the computer.
+
+11. Click **Close** to close the settings template wizard. Exit the UE-V template generator application.
+
+12. After you have created the settings location template for an application, test the template. Deploy the template in a lab environment before you put it into production in the enterprise.
+
+See [Application template schema reference for UE-V](uev-application-template-schema-reference.md) for details about the XML structure of the UE-V settings location template and for guidance about editing these files.
+
+### Deploy the Custom Settings Location templates
+
+After you create a settings location template with the UE-V template generator, you should test it to ensure that the application settings are synchronized correctly. You can then safely deploy the settings location template to user devices in the enterprise.
+
+You can deploy settings location templates using of these methods:
+
+- An electronic software distribution (ESD) system such as System Center Configuration Manager
+
+- Group Policy preferences
+
+- A UE-V settings template catalog
+
+Templates that are deployed by using an ESD system or Group Policy objects must be registered using UE-V Windows Management Instrumentation (WMI) or Windows PowerShell. Templates that are stored in the settings template catalog location are automatically registered by the UE-V service.
+
+**To deploy UE-V settings location templates with a settings template catalog path**
+
+1. Browse to the network share folder that you defined as the settings template catalog.
+
+2. Add, remove, or update settings location templates in the settings template catalog to reflect the UE-V service template configuration that you want for UE-V computers.
+
+ >**Note**
+ Templates on computers are updated daily. The update is based on changes to the settings template catalog.
+
+3. To manually update templates on a computer that runs the UE-V service, open an elevated command prompt, and browse to **Program Files\\Microsoft User Experience Virtualization \\ Agent \\ <x86 or x64 >**, and then run **ApplySettingstemplateCatalog.exe**.
+
+ >**Note**
+ This program runs automatically during computer startup and daily at 3:30 A. M. to gather any new templates that were recently added to the catalog.
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+- [Prepare a UE-V Deployment](uev-prepare-for-deployment.md)
+
+- [Deploy Required UE-V Features](uev-deploy-required-features.md)
+
diff --git a/windows/manage/uev-for-windows.md b/windows/manage/uev-for-windows.md
new file mode 100644
index 0000000000..ff241fa090
--- /dev/null
+++ b/windows/manage/uev-for-windows.md
@@ -0,0 +1,93 @@
+---
+title: User Experience Virtualization for Windows 10, version 1607
+description: Overview of User Experience Virtualization for Windows 10, version 1607
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# User Experience Virtualization overview
+
+Many users customize their settings for Windows and for specific applications. Customizable Windows settings include Windows Store appearance, language, background picture, font size, and accent colors. Customizable application settings include language, appearance, behavior, and user interface options.
+
+With User Experience Virtualization (UE-V), you can capture user-customized Windows and application settings and store them on a centrally managed network file share. When users log on, their personalized settings are applied to their work session, regardless of which device or virtual desktop infrastructure (VDI) sessions they log on to.
+
+**With UE-V you can…**
+
+- Specify which application and Windows settings synchronize across user devices
+
+- Deliver the settings anytime and anywhere users work throughout the enterprise
+
+- Create custom templates for your third-party or line-of-business applications
+
+- Recover settings after hardware replacement or upgrade, or after re-imaging a virtual machine to its initial state
+
+## Components of UE-V
+
+The diagram below illustrates how UE-V components work together to synchronize user settings.
+
+
+
+
+
+| **Component** | **Function** |
+|--------------------------|------------------|
+| **UE-V service** | Enabled on every device that needs to synchronize settings, the **UE-V service** monitors registered applications and Windows for any settings changes, then synchronizes those settings between devices. |
+| **Settings packages** | Application settings and Windows settings are stored in **settings packages** created by the UE-V service. Settings packages are built, locally stored, and copied to the settings storage location.
The setting values for **desktop applications** are stored when the user closes the application.
Values for **Windows settings** are stored when the user logs off, when the computer is locked, or when the user disconnects remotely from a computer.
The sync provider determines when the application or operating system settings are read from the **Settings Packages** and synchronized. |
+| **Settings storage location** | This is a standard network share that your users can access. The UE-V service verifies the location and creates a hidden system folder in which to store and retrieve user settings. |
+| **Settings location templates** | UE-V uses XML files as settings location templates to monitor and synchronize desktop application settings and Windows desktop settings between user computers. By default, some settings location templates are included in UE-V. You can also create, edit, or validate custom settings location templates by [managing settings synchronization for custom applications](#manage-settings-synchronization-for-custom-applications).
**Note** Settings location templates are not required for Windows applications. |
+| **Universal Windows applications list** | Settings for Windows applications are captured and applied dynamically. The app developer specifies the settings that are synchronized for each app. UE-V determines which Windows applications are enabled for settings synchronization using a managed list of applications. By default, this list includes most Windows applications.
You can add or remove applications in the Windows app list by following the procedures in [Managing UE-V Settings Location Templates Using Windows PowerShell and WMI](uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md). |
+
+## Manage settings synchronization for custom applications
+
+Use these UE-V components to create and manage custom templates for your third-party or line-of-business applications.
+
+| Component | Description |
+|-------------------------------|---------------|
+| **UE-V template generator** | Use the **UE-V template generator** to create custom settings location templates that you can then distribute to user computers. The UE-V template generator also lets you edit an existing template or validate a template that was created with a different XML editor.
With the Windows 10, version 1607 release, the UE-V template generator is installed with the [Windows 10 Assessment and Deployment kit](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) (Windows ADK).
If you are upgrading from an existing UE-V installation, you’ll need to use the new generator to create new settings location templates. Application templates created with previous versions of the UE-V template generator are still supported, however. |
+| **Settings template catalog** | The **settings template catalog** is a folder path on UE-V computers or a Server Message Block (SMB) network share that stores the custom settings location templates. The UE-V service checks this location once a day, retrieves new or updated templates, and updates its synchronization behavior.
If you use only the UE-V default settings location templates, then a settings template catalog is unnecessary. For more information about settings deployment catalogs, see [Deploy a UE-V settings template catalog](uev-deploy-uev-for-custom-applications.md#deploycatalogue). |
+
+
+
+
+
+## Settings synchronized by default
+
+UE-V synchronizes settings for these applications by default. For a complete list and more detailed information, see [Settings that are automatically synchronized in a UE-V deployment](uev-prepare-for-deployment.md#autosyncsettings).
+
+- Microsoft Office 2016, 2013, and 2010
+
+- Internet Explorer 11, 10, and 9
+
+- Many Windows applications, such as Xbox
+
+- Many Windows desktop applications, such as Notepad
+
+- Many Windows settings, such as desktop background or wallpaper
+
+**Note**
+You can also [customize UE-V to synchronize settings](uev-deploy-uev-for-custom-applications.md) for applications other than those synchronized by default.
+
+## Other resources for this feature
+
+- [Get Started with UE-V](uev-getting-started.md)
+
+- [UE-V Release Notes](uev-release-notes-1607.md)
+
+- [Prepare a UE-V Deployment](uev-prepare-for-deployment.md)
+
+- [Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md)
+
+- [Administer UE-V](uev-administering-uev.md)
+
+- [Technical Reference for UE-V](uev-technical-reference.md)
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
diff --git a/windows/manage/uev-getting-started.md b/windows/manage/uev-getting-started.md
new file mode 100644
index 0000000000..42fdafe047
--- /dev/null
+++ b/windows/manage/uev-getting-started.md
@@ -0,0 +1,139 @@
+---
+title: Get Started with UE-V
+description: Get Started with UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# Get Started with UE-V
+
+Applies to: Windows 10, version 1607
+
+Follow the steps in this topic to deploy User Experience Virtualization (UE-V) for the first time in a test environment. Evaluate UE-V to determine whether it’s the right solution to manage user settings across multiple devices within your enterprise.
+
+>**Note**
+The information in this section is explained in greater detail throughout the rest of the documentation. If you’ve already determined that UE-V is the right solution and you don’t need to further evaluate it, see [Prepare a UE-V deployment](uev-prepare-for-deployment.md).
+
+The standard installation of UE-V synchronizes the default Microsoft Windows and Office settings and many Windows applications settings. For best results, ensure that your test environment includes two or more user computers that share network access.
+
+- [Step 1: Confirm prerequisites](#step-1-confirm-prerequisites). Review the supported configurations in this section to verify that your environment is able to run UE-V.
+
+- [Step 2: Deploy the settings storage location](#step-2-deploy-the-settings-storage-location). Explains how to deploy a settings storage location. All UE-V deployments require a location to store settings packages that contain the synchronized setting values.
+
+- [Step 3: Enable the UE-V service](#step-3-enable-the-ue-v-service-on-user-devices). Explains how to enable to UE-V service on user devices. To synchronize settings using UE-V, devices must have the UE-V service enabled and running.
+
+- [Step 4: Test Your UE-V evaluation deployment](#step-4-test-your-ue-v-evaluation-deployment). Run a few tests on two computers with the UE-V service enabled to see how UE-V works and if it meets your organization’s needs.
+
+- Step 5: Deploy UE-V for custom applications (optional). If you want to evaluate how your third-party and line-of-business applications work with UE-V, follow the steps in [Use UE-V with custom applications](uev-deploy-uev-for-custom-applications.md). Following this link takes you to another topic. Use your browser’s **Back** button to return to this topic.
+
+## Step 1: Confirm prerequisites
+
+Before you proceed, ensure that your environment meets the following requirements for running UE-V.
+
+| **Operating system** | **Edition** | **Service pack** | **System architecture** | **Windows PowerShell** | **Microsoft .NET Framework** |
+|-------------------------|-------------|------------------|-------------------------|----------------------------------|------------------------------|
+| Windows 10, version 1607 | Windows 10 Enterprise | NA | 32-bit or 64-bit | Windows PowerShell 3.0 or higher | .NET Framework 4 or higher |
+| Windows 8 and Windows 8.1 | Enterprise or Pro | None | 32-bit or 64-bit | Windows PowerShell 3.0 or higher | .NET Framework 4.5 |
+| Windows Server 2012 or Windows Server 2012 R2 | Standard or Datacenter | None | 64-bit | Windows PowerShell 3.0 or higher | .NET Framework 4.5 |
+
+## Step 2: Deploy the settings storage location
+
+You’ll need to deploy a settings storage location, a standard network share where user settings are stored in a settings package file. When you create the settings storage share, you should limit access to users that require it. [Deploy a settings storage location](https://technet.microsoft.com/library/dn458891.aspx#ssl) provides more detailed information.
+
+**Create a network share**
+
+1. Create a new security group and add UE-V users to it.
+
+2. Create a new folder on the centrally located computer that stores the UE-V settings packages, and then grant the UE-V users access with group permissions to the folder. The administrator who supports UE-V must have permissions to this shared folder.
+
+3. Assign UE-V users permission to create a directory when they connect. Grant full permission to all subdirectories of that directory, but block access to anything above.
+
+4. Set the following share-level Server Message Block (SMB) permissions for the settings storage location folder.
+
+ | **User account** | **Recommended permissions** |
+ |------------------------------|-----------------------------|
+ | Everyone | No permissions |
+ | Security group of UE-V users | Full control |
+
+5. Set the following NTFS file system permissions for the settings storage location folder.
+
+ | **User account** | **Recommended permissions** | **Folder** |
+ |------------------------------|---------------------------------------------------|---------------------------|
+ | Creator/owner | Full control | Subfolders and files only |
+ | Security group of UE-V users | List folder/read data, create folders/append data | This folder only |
+
+**Security Note** If you create the settings storage share on a computer running a Windows Server operating system, configure UE-V to verify that either the local Administrators group or the current user is the owner of the folder where settings packages are stored. To enable this additional security, specify this setting in the Windows Server Registry Editor:
+
+1. Add a **REG\_DWORD** registry key named **"RepositoryOwnerCheckEnabled"** to **HKEY\_LOCAL\_MACHINE\\Software\\Microsoft\\UEV\\Agent\\Configuration**.
+
+2. Set the registry key value to *1*.
+
+## Step 3: Enable the UE-V service on user devices
+
+For evaluation purposes, enable the service on at least two devices that belong to the same user in your test environment.
+
+The UE-V service is the client-side component that captures user-personalized application and Windows settings and saves them in settings packages. Settings packages are built, locally stored, and copied to the settings storage location.
+
+Before enabling the UE-V service, you'll need to register the UE-V templates for first use. In a PowerShell window, type `register-TemplateName` where **TemplateName** is the name of the UE-V template you want to register, and press ENTER.
+
+With Windows 10, version 1607 and later, the UE-V service is installed on user devices when the operating system is installed. Enable the service to start using UE-V. You can enable the service with the Group Policy editor or with Windows PowerShell.
+
+**To enable the UE-V service with Group Policy**
+
+1. Open the device’s **Group Policy Editor**.
+
+2. Navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft** **User Experience Virtualization**.
+
+3. Run **Enable UEV**.
+
+4. Restart the device.
+
+**To enable the UE-V service with Windows PowerShell**
+
+1. In a PowerShell window, type **Enable-UEV** and press ENTER.
+
+2. Restart the device.
+
+3. In a PowerShell window, type **Get-UEVStatus** and press ENTER to verify that the UE-V service was successfully enabled.
+
+## Step 4: Test your UE-V evaluation deployment
+
+You’re ready to run a few tests on your UE-V evaluation deployment to see how UE-V works.
+
+1. On the first device (Computer A), make one or more of these changes:
+
+ - Open Windows Desktop and move the taskbar to a different location in the window.
+
+ - Change the default fonts.
+
+ - Open Notepad and set format -> word wrap **on**.
+
+ - Change the behavior of any Windows application, as detailed in [Managing UE-V settings location templates using Windows PowerShell and WMI](uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md).
+
+ - Disable Microsoft Account settings synchronization and roaming profiles.
+
+2. Log off Computer A. Settings are saved in a UE-V settings package when users lock, logoff, exit an application, or when the sync provider runs (every 30 minutes by default).
+
+3. Log in to the second device (Computer B) as the same user as Computer A.
+
+4. Open Windows Desktop and verify that the taskbar location matches that of Computer A. Verify that the default fonts match and that NotePad is set to **word wrap on**. Also verify the change you made to any Windows applications.
+
+5. You can change the settings in Computer B back to the original Computer A settings. Then log off Computer B and log in to Computer A to verify the changes.
+
+Other resources for this feature
+--------------------------------
+
+- [User Experience Virtualization overview](uev-for-windows.md)
+
+- [Prepare a UE-V Deployment](uev-prepare-for-deployment.md)
+
+- [Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md)
+
+- [Administering UE-V ](uev-administering-uev.md)
+
+- [Troubleshooting UE-V ](uev-troubleshooting.md)
+
+- [Technical Reference for UE-V](uev-technical-reference.md)
diff --git a/windows/manage/uev-manage-administrative-backup-and-restore.md b/windows/manage/uev-manage-administrative-backup-and-restore.md
new file mode 100644
index 0000000000..61f024d919
--- /dev/null
+++ b/windows/manage/uev-manage-administrative-backup-and-restore.md
@@ -0,0 +1,168 @@
+---
+title: Manage Administrative Backup and Restore in UE-V
+description: Manage Administrative Backup and Restore in UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Manage Administrative Backup and Restore in UE-V
+
+As an administrator of User Experience Virtualization (UE-V), you can restore application and Windows settings to their original state. You can also restore additional settings when a user adopts a new device.
+
+## Restore Settings in UE-V when a User Adopts a New Device
+
+
+To restore settings when a user adopts a new device, you can put a settings location template in **backup** or **roam (default)** profile using the Set-UevTemplateProfile PowerShell cmdlet. This lets computer settings sync to the new computer, in addition to user settings. Templates assigned to the backup profile are backed up for that device and configured on a per-device basis. To backup settings for a template, use the following cmdlet in Windows PowerShell:
+
+``` syntax
+Set-UevTemplateProfile -ID -Profile
+```
+
+- <TemplateID> is the UE-V Template ID
+
+- <backup> can either be Backup or Roaming
+
+When replacing a user’s device, UE-V automatically restores settings if the user’s domain, username, and device name all match. All synchronized and any backup data is restored on the device automatically.
+
+You can also use the Windows PowerShell cmdlet, Restore-UevBackup, to restore settings from a different device. To clone the settings packages for the new device, use the following cmdlet in Windows PowerShell:
+
+``` syntax
+Restore-UevBackup –Machine
+```
+
+where <MachineName> is the computer name of the device.
+
+Templates such as the Office 2013 template that include many applications can either all be included in the roamed (default) or backed up profile. Individual apps in a template suite follow the group. Office 2013 in-box templates include both roaming and backup-only settings. Backup-only settings cannot be included in a roaming profile.
+
+As part of the Backup/Restore feature, UE-V added **last known good (LKG)** to the options for rolling back to settings. In this release, you can roll back to either the original settings or LKG settings. The LKG settings let users roll back to an intermediate and stable point ahead of the pre-UE-V state of the settings.
+
+### How to Backup/Restore Templates with UE-V
+
+These are the key backup and restore components of UE-V:
+
+- Template profiles
+
+- Settings packages location within the Settings Storage Location template
+
+- Backup trigger
+
+- How settings are restored
+
+**Template Profiles**
+
+A UE-V template profile is defined when the template is registered on the device or post registration through the PowerShell/WMI configuration utility. The profile types include:
+
+- Roaming (default)
+
+- Backup
+
+- BackupOnly
+
+All templates are included in the roaming profile when registered unless otherwise specified. These templates synchronize settings to all UE-V enabled devices with the corresponding template enabled.
+
+Templates can be added to the Backup Profile with PowerShell or WMI using the Set-UevTemplateProfile cmdlet. Templates in the Backup Profile back up these settings to the Settings Storage Location in a special Device name directory. Specified settings are backed up to this location.
+
+Templates designated BackupOnly include settings specific to that device that should not be synchronized unless explicitly restored. These settings are stored in the same device-specific settings package location on the settings storage location as the Backedup Settings. These templates have a special identifier embedded in the template that specifies they should be part of this profile.
+
+**Settings packages location within the Settings Storage Location template**
+
+Roaming Profile settings are stored on the settings storage location. Templates assigned to the Backup or the BackupOnly profile store their settings to the Settings Storage Location in a special Device name directory. Each device with templates in these profiles has its own device name. UE-V does not clean up these directories.
+
+**Backup trigger**
+
+Backup is triggered by the same events that trigger a UE-V synchronization.
+
+**How settings are restored**
+
+Restoring a user’s device restores the currently registered Template’s settings from another device’s backup folder and all synchronized settings to the current machine. Settings are restored in these two ways:
+
+- **Automatic restore**
+
+ If the user’s UE-V settings storage path, domain, and Computer name match the current user then all of the settings for that user are synchronized, with only the latest settings applied. If a user logs on to a new device for the first time and these criteria are met, the settings data is applied to that device.
+
+ **Note**
+ Accessibility and Windows Desktop settings require the user to re-logon to Windows to be applied.
+
+
+
+- **Manual Restore**
+
+ If you want to assist users by restoring a device during a refresh, you can choose to use the Restore-UevBackup cmdlet. This command ensures that the user’s current settings become the current state on the Settings Storage Location.
+
+## Restore Application and Windows Settings to Original State
+
+
+WMI and Windows PowerShell commands let you restore application and Windows settings to the settings values that were on the computer the first time that the application started after the UE-V service was enabled. This restoring action is performed on a per-application or Windows settings basis. The settings are restored the next time that the application runs, or the settings are restored when the user logs on to the operating system.
+
+**To restore application settings and Windows settings with Windows PowerShell for UE-V**
+
+1. Open the Windows PowerShell window.
+
+2. Enter the following Windows PowerShell cmdlet to restore the application settings and Windows settings.
+
+
+
+
+
+
+
+
+
+
+
+ Restore-UevUserSetting -<TemplateID>
|
+ Restores the user settings for an application or restores a group of Windows settings. |
+
+
+
+
+
+
+**To restore application settings and Windows settings with WMI**
+
+1. Open a Windows PowerShell window.
+
+2. Enter the following WMI command to restore application settings and Windows settings.
+
+
+
+
+
+
+
+
+
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class UserSettings -Name RestoreByTemplateId -ArgumentList <template_ID>
|
+ Restores the user settings for an application or restores a group of Windows settings. |
+
+
+
+
+
+
+ **Note**
+ UE-V does not provide a settings rollback for Windows apps.
+
+
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Administering UE-V with Windows PowerShell and WMI](uev-administering-uev-with-windows-powershell-and-wmi.md)
+
+[Administering UE-V](uev-administering-uev.md)
diff --git a/windows/manage/uev-manage-configurations.md b/windows/manage/uev-manage-configurations.md
new file mode 100644
index 0000000000..bfcb65c039
--- /dev/null
+++ b/windows/manage/uev-manage-configurations.md
@@ -0,0 +1,67 @@
+---
+title: Manage Configurations for UE-V
+description: Manage Configurations for UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Manage Configurations for UE-V
+
+
+In the course of the User Experience Virtualization (UE-V) lifecycle, you have to manage the configuration of the UE-V service and also manage storage locations for resources such as settings package files. The following topics provide guidance for managing these UE-V resources.
+
+## Configuring UE-V by using Group Policy Objects
+
+You can use Group Policy Objects to modify the settings that define how UE-V synchronizes settings on computers.
+
+[Configuring UE-V with Group Policy Objects](uev-configuring-uev-with-group-policy-objects.md)
+
+## Configuring UE-V with System Center Configuration Manager
+
+You can use System Center Configuration Manager to manage the UE-V service by using the UE-V Configuration Pack.
+
+[Configuring UE-V with System Center Configuration Manager](uev-configuring-uev-with-system-center-configuration-manager.md)
+
+## Administering UE-V with PowerShell and WMI
+
+UE-V provides Windows PowerShell cmdlets, which can help administrators perform various UE-V tasks.
+
+[Administering UE-V with Windows PowerShell and WMI](uev-administering-uev-with-windows-powershell-and-wmi.md)
+
+## Examples of configuration settings for UE-V
+
+Here are some examples of UE-V configuration settings:
+
+- **Settings Storage Path:** Specifies the location of the file share that stores the UE-V settings.
+
+- **Settings Template Catalog Path:** Specifies the Universal Naming Convention (UNC) path that defines the location that was checked for new settings location templates.
+
+- **Register Microsoft Templates:** Specifies whether the default Microsoft templates should be registered during installation.
+
+- **Synchronization Method:** Specifies whether UE-V uses the sync provider or "none". The "SyncProvider" supports computers that are disconnected from the network. "None" applies when the computer is always connected to the network. For more information about the Sync Method, see [Sync Methods for UE-V](uev-sync-methods.md).
+
+- **Synchronization Timeout:** Specifies the number of milliseconds that the computer waits before time-out when it retrieves the user settings from the settings storage location.
+
+- **Synchronization Enable:** Specifies whether the UE-V settings synchronization is enabled or disabled.
+
+- **Maximum Package Size:** Specifies a settings package file threshold size in bytes at which the UE-V service reports a warning.
+
+- **Don’t Sync Windows App Settings:** Specifies that UE-V should not synchronize Windows apps.
+
+- **Enable/Disable First Use Notification:** Specifies whether UE-V displays a dialog box the first time that the UE-V service runs on a user’s computer.
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Administering UE-V](uev-administering-uev.md)
+
+[Deploy Required UE-V Features](uev-deploy-required-features.md)
+
+[Use UE-V with custom applications](uev-deploy-uev-for-custom-applications.md)
diff --git a/windows/manage/uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md b/windows/manage/uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md
new file mode 100644
index 0000000000..e28ebdbf9e
--- /dev/null
+++ b/windows/manage/uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md
@@ -0,0 +1,337 @@
+---
+title: Managing UE-V Settings Location Templates Using Windows PowerShell and WMI
+description: Managing UE-V Settings Location Templates Using Windows PowerShell and WMI
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Managing UE-V Settings Location Templates Using Windows PowerShell and WMI
+
+
+User Experience Virtualization (UE-V) uses XML settings location templates to define the settings that User Experience Virtualization captures and applies. UE-V includes a set of standard settings location templates. It also includes the UE-V template generator tool that enables you to create custom settings location templates. After you create and deploy settings location templates, you can manage those templates by using Windows PowerShell and the Windows Management Instrumentation (WMI). For a complete list of UE-V PowerShell cmdlets, see [UE-V 2 Cmdlet Reference](https://technet.microsoft.com/library/dn520275.aspx).
+
+## Manage UE-V settings location templates by using Windows PowerShell
+
+
+The WMI and Windows PowerShell features of UE-V include the ability to enable, disable, register, update, and unregister settings location templates. By using these features, you can automate the process of registering, updating, or unregistering templates with the UE-V service. You can also manually register templates by using WMI and Windows PowerShell commands. By using these features in conjunction with an electronic software distribution solution, Group Policy, or another automated deployment method such as a script, you can further automate that process.
+
+You must have administrator permissions to update, register, or unregister a settings location template. Administrator permissions are not required to enable, disable, or list templates.
+
+****To manage settings location templates by using Windows PowerShell****
+
+1. Use an account with administrator rights to open a Windows PowerShell command prompt.
+
+2. Use the following Windows PowerShell cmdlets to register and manage the UE-V settings location templates.
+
+
+
+
+
+
+
+
+
+
+
+ Get-UevTemplate
|
+ Lists all the settings location templates that are registered on the computer. |
+
+
+ Get-UevTemplate –Application <string>
|
+ Lists all the settings location templates that are registered on the computer where the application name or template name contains <string>. |
+
+
+ Get-UevTemplate –TemplateID <string>
|
+ Lists all the settings location templates that are registered on the computer where the template ID contains <string>. |
+
+
+ Get-UevTemplate [-ApplicationOrTemplateID] <string>
|
+ Lists all the settings location templates that are registered on the computer where the application or template name, or template ID contains <string>. |
+
+
+ Get-UevTemplateProgram [-ID] <template ID>
|
+ Gets the name of the program and version information, which depend on the template ID. |
+
+
+ Get-UevAppXPackage
|
+ Gets the effective list of Windows apps. |
+
+
+ Get-UevAppXPackage -Computer
|
+ Gets the list of Windows apps that are configured for the computer. |
+
+
+ Get-UevAppXPackage -CurrentComputerUser
|
+ Gets the list of Windows apps that are configured for the current user. |
+
+
+ Register-UevTemplate [-Path] <template file path>[,<template file path>]
|
+ Registers one or more settings location template with UE-V by using relative paths and/or wildcard characters in file paths. After a template is registered, UE-V synchronizes the settings that are defined in the template between computers that have the template registered. |
+
+
+ Register-UevTemplate –LiteralPath <template file path>[,<template file path>]
|
+ Registers one or more settings location template with UE-V by using literal paths, where no characters can be interpreted as wildcard characters. After a template is registered, UE-V synchronizes the settings that are defined in the template between computers that have the template registered. |
+
+
+ Unregister-UevTemplate [-ID] <template ID>
|
+ Unregisters a settings location template with UE-V. When a template is unregistered, UE-V no longer synchronizes the settings that are defined in the template between computers. |
+
+
+ Unregister-UevTemplate -All
|
+ Unregisters all settings location templates with UE-V. When a template is unregistered, UE-V no longer synchronizes the settings that are defined in the template between computers. |
+
+
+ Update-UevTemplate [-Path] <template file path>[,<template file path>]
|
+ Updates one or more settings location templates with a more recent version of the template. Use relative paths and/or wildcard characters in the file paths. The new template should be a newer version than the existing template. |
+
+
+ Update-UevTemplate –LiteralPath <template file path>[,<template file path>]
|
+ Updates one or more settings location templates with a more recent version of the template. Use full paths to template files, where no characters can be interpreted as wildcard characters. The new template should be a newer version than the existing template. |
+
+
+ Clear-UevAppXPackage –Computer [-PackageFamilyName] <package family name>[,<package family name>]
|
+ Removes one or more Windows apps from the computer Windows app list. |
+
+
+ Clear-UevAppXPackage -CurrentComputerUser
|
+ Removes Windows app from the current user Windows app list. |
+
+
+ Clear-UevAppXPackage –Computer -All
|
+ Removes all Windows apps from the computer Windows app list. |
+
+
+ Clear-UevAppXPackage [–CurrentComputerUser] [-PackageFamilyName] <package family name>[,<package family name>]
|
+ Removes one or more Windows apps from the current user Windows app list. |
+
+
+ Clear-UevAppXPackage [–CurrentComputerUser] -All
|
+ Removes all Windows apps from the current user Windows app list. |
+
+
+ Disable-UevTemplate [-ID] <template ID>
|
+ Disables a settings location template for the current user of the computer. |
+
+
+ Disable-UevAppXPackage –Computer [-PackageFamilyName] <package family name>[,<package family name>]
|
+ Disables one or more Windows apps in the computer Windows app list. |
+
+
+ Disable-UevAppXPackage [–CurrentComputerUser] [-PackageFamilyName] <package family name>[,<package family name>]
|
+ Disables one or more Windows apps in the current user Windows app list. |
+
+
+ Enable-UevTemplate [-ID] <template ID>
|
+ Enables a settings location template for the current user of the computer. |
+
+
+ Enable-UevAppXPackage –Computer [-PackageFamilyName] <package family name>[,<package family name>]
|
+ Enables one or more Windows apps in the computer Windows app list. |
+
+
+ Enable-UevAppXPackage [–CurrentComputerUser] [-PackageFamilyName] <package family name>[,<package family name>]
|
+ Enables one or more Windows apps in the current user Windows app list. |
+
+
+ Test-UevTemplate [-Path] <template file path>[,<template file path>]
|
+ Determines whether one or more settings location templates comply with its XML schema. Can use relative paths and wildcard characters. |
+
+
+ Test-UevTemplate –LiteralPath <template file path>[,<template file path>]
|
+ Determines whether one or more settings location templates comply with its XML schema. The path must be a full path to the template file, but does not include wildcard characters. |
+
+
+
+
+
+
+The UE-V Windows PowerShell features enable you to manage a group of settings templates that are deployed in your enterprise. Use the following procedure to manage a group of templates by using Windows PowerShell.
+
+**To manage a group of settings location templates by using Windows PowerShell**
+
+1. Modify or update the desired settings location templates.
+
+2. If you want to modify or update the settings location templates, deploy those settings location templates to a folder that is accessible to the local computer.
+
+3. On the local computer, open a Windows PowerShell window with administrator rights.
+
+4. Unregister all the previously registered versions of the templates by typing the following command.
+
+ ``` syntax
+ Unregister-UevTemplate -All
+ ```
+
+ This command unregisters all active templates on the computer.
+
+5. Register the updated templates by typing the following command.
+
+ ``` syntax
+ Register-UevTemplate \*.xml
+ ```
+
+ This command registers all of the settings location templates that are located in the specified template folder.
+
+### Windows app list
+
+By listing a Windows app in the Windows app list, you specify whether that app is enabled or disabled for settings synchronization. Apps are identified in the list by their Package Family name and whether settings synchronization should be enabled or disabled for that app. When you use these settings along with the Unlisted Default Sync Behavior setting, you can control whether Windows apps are synchronized.
+
+To display the Package Family Name of installed Windows apps, at a Windows PowerShell command prompt, enter:
+
+``` syntax
+Get-AppxPackage | Sort-Object PackageFamilyName | Format-Table PackageFamilyName
+```
+
+To display a list of Windows apps that can synchronize settings on a computer with their package family name, enabled status, and enabled source, at a Windows PowerShell command prompt, enter: `Get-UevAppxPackage`
+
+**Definitions of Get-UevAppxPackage properties**
+
+**PackageFamilyName**
+The name of the package that is installed for the current user.
+
+**Enabled**
+Defines whether the settings for the app are configured to synchronize.
+
+**EnabledSource**
+The location where the configuration that enables or disables the app is set. Possible values are: *NotSet*, *LocalMachine*, *LocalUser*, *PolicyMachine*, and *PolicyUser*.
+
+**NotSet**
+The policy is not configured to synchronize this app.
+
+**LocalMachine**
+The enabled state is set in the local computer section of the registry.
+
+**LocalUser**
+The enabled state is set in the current user section of the registry.
+
+**PolicyMachine**
+The enabled state is set in the policy section of the local computer section of the registry.
+
+To get the user-configured list of Windows apps, at the Windows PowerShell command prompt, enter: `Get-UevAppxPackage –CurrentComputerUser`
+
+To get the computer-configured list of Windows apps, at the Windows PowerShell command prompt, enter: `Get-UevAppxPackage –Computer`
+
+For either parameter, CurrentComputerUser or Computer, the cmdlet returns a list of the Windows apps that are configured at the user or at the computer level.
+
+**Definitions of properties**
+
+**PackageFamilyName**
+The name of the package that is installed for the current user.
+
+**Enabled**
+Defines whether the settings for the app are configured to synchronize for the specified switch, that is, **user** or **computer**.
+
+**Installed**
+True if the app, that is, the PackageFamilyName is installed for the current user.
+
+### Manage UE-V settings location templates by using WMI
+
+User Experience Virtualization provides the following set of WMI commands. Administrators can use these interfaces to manage settings location templates from Windows PowerShell and automate template administrative tasks.
+
+**To manage settings location templates by using WMI**
+
+1. Use an account with administrator rights to open a Windows PowerShell window.
+
+2. Use the following WMI commands to register and manage the UE-V settings location templates.
+
+
+
+
+
+
+
+
+
+
+
+ Get-WmiObject -Namespace root\Microsoft\UEV SettingsLocationTemplate | Select-Object TemplateId,TemplateName, TemplateVersion,Enabled | Format-Table -Autosize
|
+ Lists all the settings location templates that are registered for the computer. |
+
+
+ Invoke-WmiMethod –Namespace root\Microsoft\UEV –Class SettingsLocationTemplate –Name GetProcessInfoByTemplateId <template Id>
|
+ Gets the name of the program and version information, which depends on the template name. |
+
+
+ Get-WmiObject -Namespace root\Microsoft\UEV EffectiveWindows8App
|
+ Gets the effective list of Windows apps. |
+
+
+ Get-WmiObject -Namespace root\Microsoft\UEV MachineConfiguredWindows8App |
+ Gets the list of Windows apps that are configured for the computer. |
+
+
+ Get-WmiObject -Namespace root\Microsoft\UEV UserConfiguredWindows8App
|
+ Gets the list of Windows apps that are configured for the current user. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class SettingsLocationTemplate -Name Register -ArgumentList <template path >
|
+ Registers a settings location template with UE-V. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class SettingsLocationTemplate -Name UnregisterByTemplateId -ArgumentList <template ID>
|
+ Unregisters a settings location template with UE-V. As soon as a template is unregistered, UE-V no longer synchronizes the settings that are defined in the template between computers. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class SettingsLocationTemplate -Name Update -ArgumentList <template path>
|
+ Updates a settings location template with UE-V. The new template should be a newer version than the existing one. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class MachineConfiguredWindows8App -Name RemoveApp -ArgumentList <package family name | package family name>
|
+ Removes one or more Windows apps from the computer Windows app list. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class UserConfiguredWindows8App -Name RemoveApp -ArgumentList <package family name | package family name>
|
+ Removes one or more Windows apps from the current user Windows app list. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class SettingsLocationTemplate -Name DisableByTemplateId -ArgumentList <template ID>
|
+ Disables one or more settings location templates with UE-V. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class MachineConfiguredWindows8App -Name DisableApp -ArgumentList <package family name | package family name>
|
+ Disables one or more Windows apps in the computer Windows app list. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class UserConfiguredWindows8App -Name DisableApp -ArgumentList <package family name | package family name>
|
+ Disables one or more Windows apps in the current user Windows app list. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class SettingsLocationTemplate -Name EnableByTemplateId -ArgumentList <template ID>
|
+ Enables a settings location template with UE-V. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class MachineConfiguredWindows8App -Name EnableApp -ArgumentList <package family name | package family name>
|
+ Enables Windows apps in the computer Windows app list. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class UserConfiguredWindows8App -Name EnableApp -ArgumentList <package family name | package family name>
|
+ Enables Windows apps in the current user Windows app list. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class SettingsLocationTemplate -Name Validate -ArgumentList <template path>
|
+ Determines whether a given settings location template complies with its XML schema. |
+
+
+
+
+**Note**
+Where a list of Package Family Names is called by the WMI command, the list must be in quotes and separated by a pipe symbol, for example, `""`.
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Administering UE-V with Windows PowerShell and WMI](uev-administering-uev-with-windows-powershell-and-wmi.md)
+
+[Administering UE-V](uev-administering-uev.md)
diff --git a/windows/manage/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md b/windows/manage/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md
new file mode 100644
index 0000000000..fc1134e656
--- /dev/null
+++ b/windows/manage/uev-managing-uev-agent-and-packages-with-windows-powershell-and-wmi.md
@@ -0,0 +1,348 @@
+---
+title: Managing the UE-V Service and Packages with Windows PowerShell and WMI
+description: Managing the UE-V service and packages with Windows PowerShell and WMI
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Managing the UE-V service and packages with Windows PowerShell and WMI
+
+You can use Windows Management Instrumentation (WMI) and Windows PowerShell to manage User Experience Virtualization (UE-V) service configuration and synchronization behavior. For a complete list of UE-V PowerShell cmdlets, see [UE-V Cmdlet Reference](https://technet.microsoft.com/library/dn520275.aspx).
+
+
+## To configure the UE-V service with Windows PowerShell
+
+1. Open a Windows PowerShell window. To manage computer settings that affect all users of the computer by using the *Computer* parameter, open the window with an account that has administrator rights.
+
+2. Use the following Windows PowerShell commands to configure the service.
+
+
+
+
+
+
+
+
+
+
+
+ Enable-UEV
+ |
+ Turns on the UE-V service. Requires reboot. |
+
+
+ Disable-UEV
|
+ Turns off the UE-V service. Requires reboot. |
+
+
+ Get-UevStatus
|
+ Displays whether UE-V service is enabled or disabled, using a Boolean value. |
+
+
+ Get-UevConfiguration
+ |
+ Gets the effective UE-V service settings. User-specific settings have precedence over the computer settings. |
+
+
+ Get-UevConfiguration -CurrentComputerUser
+ |
+ Gets the UE-V service settings values for the current user only. |
+
+
+ Get-UevConfiguration -Computer
|
+ Gets the UE-V service configuration settings values for all users on the computer. |
+
+
+ Get-UevConfiguration -Details
|
+ Gets the details for each configuration setting. Displays where the setting is configured or if it uses the default value. Is displayed if the current setting is valid. |
+
+
+ Set-UevConfiguration -Computer –EnableDontSyncWindows8AppSettings
|
+ Configures the UE-V service to not synchronize any Windows apps for all users on the computer. |
+
+
+ Set-UevConfiguration -CurrentComputerUser – EnableDontSyncWindows8AppSettings
|
+ Configures the UE-V service to not synchronize any Windows apps for the current computer user. |
+
+
+ Set-UevConfiguration -Computer –EnableFirstUseNotification
|
+ Configures the UE-V service to display notification the first time the service runs for all users on the computer. |
+
+
+ Set-UevConfiguration -Computer –DisableFirstUseNotification
|
+ Configures the UE-V service to not display notification the first time that the service runs for all users on the computer. |
+
+
+ Set-UevConfiguration -Computer –EnableSettingsImportNotify
|
+ Configures the UE-V service to notify all users on the computer when settings synchronization is delayed.
+ Use the DisableSettingsImportNotify parameter to disable notification. |
+
+
+ Set-UevConfiguration -CurrentComputerUser -EnableSettingsImportNotify
|
+ Configures the UE-V service to notify the current user when settings synchronization is delayed.
+ Use the DisableSettingsImportNotify parameter to disable notification. |
+
+
+ Set-UevConfiguration -Computer –EnableSyncUnlistedWindows8Apps
|
+ Configures the UE-V service to synchronize all Windows apps that are not explicitly disabled by the Windows app list for all users of the computer. For more information, see "Get-UevAppxPackage" in [Managing UE-V 2.x Settings Location Templates Using Windows PowerShell and WMI](uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md).
+ Use the DisableSyncUnlistedWindows8Apps parameter to configure the UE-V service to synchronize only Windows apps that are explicitly enabled by the Windows App List. |
+
+
+ Set-UevConfiguration -CurrentComputerUser - EnableSyncUnlistedWindows8Apps
|
+ Configures the UE-V service to synchronize all Windows apps that are not explicitly disabled by the Windows app list for the current user on the computer. For more information, see "Get-UevAppxPackage" in [Managing UE-V 2.x Settings Location Templates Using Windows PowerShell and WMI](uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md).
+ Use the DisableSyncUnlistedWindows8Apps parameter to configure the UE-V service to synchronize only Windows apps that are explicitly enabled by the Windows App List. |
+
+
+ Set-UevConfiguration –Computer –DisableSync
|
+ Disables UE-V for all the users on the computer.
+ Use the EnableSync parameter to enable or re-enable. |
+
+
+ Set-UevConfiguration –CurrentComputerUser -DisableSync
|
+ Disables UE-V for the current user on the computer.
+ Use the EnableSync parameter to enable or re-enable. |
+
+
+ Set-UevConfiguration -Computer –EnableTrayIcon
|
+ Enables the UE-V icon in the notification area for all users of the computer.
+ Use the DisableTrayIcon parameter to disable the icon. |
+
+
+ Set-UevConfiguration -Computer -MaxPackageSizeInBytes <size in bytes>
|
+ Configures the UE-V service to report when a settings package file size reaches the defined threshold for all users on the computer. Sets the threshold package size in bytes. |
+
+
+ Set-UevConfiguration -CurrentComputerUser -MaxPackageSizeInBytes <size in bytes>
|
+ Configures the UE-V service to report when a settings package file size reaches the defined threshold. Sets the package size warning threshold for the current user. |
+
+
+ Set-UevConfiguration -Computer -SettingsImportNotifyDelayInSeconds
|
+ Specifies the time in seconds before the user is notified for all users of the computer |
+
+
+ Set-UevConfiguration -CurrentComputerUser -SettingsImportNotifyDelayInSeconds
|
+ Specifies the time in seconds before notification for the current user is sent. |
+
+
+ Set-UevConfiguration -Computer -SettingsStoragePath <path to _settings_storage_location>
|
+ Defines a per-computer settings storage location for all users of the computer. |
+
+
+ Set-UevConfiguration -CurrentComputerUser -SettingsStoragePath <path to _settings_storage_location>
|
+ Defines a per-user settings storage location. |
+
+
+ Set-UevConfiguration –Computer –SettingsTemplateCatalogPath <path to catalog>
|
+ Sets the settings template catalog path for all users of the computer. |
+
+
+ Set-UevConfiguration -Computer -SyncMethod <sync method>
|
+ Sets the synchronization method for all users of the computer: SyncProvider or None. |
+
+
+ Set-UevConfiguration -CurrentComputerUser -SyncMethod <sync method>
|
+ Sets the synchronization method for the current user: SyncProvider or None. |
+
+
+ Set-UevConfiguration -Computer -SyncTimeoutInMilliseconds <timeout in milliseconds>
|
+ Sets the synchronization time-out in milliseconds for all users of the computer |
+
+
+ Set-UevConfiguration -CurrentComputerUser -SyncTimeoutInMilliseconds <timeout in milliseconds>
|
+ Set the synchronization time-out for the current user. |
+
+
+ Clear-UevConfiguration –Computer -<setting name>
|
+ Clears the specified setting for all users on the computer. |
+
+
+ Clear-UevConfiguration –CurrentComputerUser -<setting name>
|
+ Clears the specified setting for the current user only. |
+
+
+ Export-UevConfiguration <settings migration file>
|
+ Exports the UE-V computer configuration to a settings migration file. The file name extension must be .uev.
+ The Export cmdlet exports all UE-V service settings that are configurable with the Computer parameter. |
+
+
+ Import-UevConfiguration <settings migration file>
|
+ Imports the UE-V computer configuration from a settings migration file. The file name extension must be .uev. |
+
+
+
+
+
+
+## To export UE-V package settings and repair UE-V templates with Windows PowerShell
+
+1. Open a Windows PowerShell window as an administrator.
+
+2. Use the following Windows PowerShell commands to configure the service.
+
+
+
+
+
+
+
+
+ Windows PowerShell command |
+ Description |
+
+
+ Export-UevPackage MicrosoftNotepad.pkgx
|
+ Extracts the settings from a Microsoft Notepad package file and converts them into a human-readable format in XML. |
+
+
+ Repair-UevTemplateIndex
|
+ Repairs the index of the UE-V settings location templates. |
+
+
+
+
+## To configure the UE-V service with WMI
+
+1. User Experience Virtualization provides the following set of WMI commands. Administrators can use this interface to configure the UE-V service at the command line and automate typical configuration tasks.
+
+ Use an account with administrator rights to open a Windows PowerShell window.
+
+2. Use the following WMI commands to configure the service.
+
+
+
+
+
+
+
+
+
+
+
+ Get-WmiObject -Namespace root\Microsoft\UEV Configuration
+ |
+ Displays the active UE-V service settings. User-specific settings have precedence over the computer settings. |
+
+
+ Get-WmiObject -Namespace root\Microsoft\UEV UserConfiguration
|
+ Displays the UE-V service configuration that is defined for a user. |
+
+
+ Get-WmiObject -Namespace root\Microsoft\UEV ComputerConfiguration
|
+ Displays the UE-V service configuration that is defined for a computer. |
+
+
+ Get-WmiObject –Namespace root\Microsoft\Uev ConfigurationItem
|
+ Displays the details for each configuration item. |
+
+
+ $config = Get-WmiObject -Namespace root\Microsoft\UEV ComputerConfiguration
+ $config.SettingsStoragePath = <path_to_settings_storage_location>
+ $config.Put() |
+ Defines a per-computer settings storage location. |
+
+
+ $config = Get-WmiObject -Namespace root\Microsoft\UEV UserConfiguration
+ $config.SettingsStoragePath = <path_to_settings_storage_location>
+ $config.Put()
|
+ Defines a per-user settings storage location. |
+
+
+ $config = Get-WmiObject -Namespace root\Microsoft\UEV ComputerConfiguration
+ $config.SyncTimeoutInMilliseconds = <timeout_in_milliseconds>
+ $config.Put()
|
+ Sets the synchronization time-out in milliseconds for all users of the computer. |
+
+
+ $config = Get-WmiObject -Namespace root\Microsoft\UEV ComputerConfiguration
+ $config.MaxPackageSizeInBytes = <size_in_bytes>
+ $config.Put()
|
+ Configures the UE-V service to report when a settings package file size reaches a defined threshold. Set the threshold package file size in bytes for all users of the computer. |
+
+
+ $config = Get-WmiObject -Namespace root\Microsoft\UEV ComputerConfiguration
+ $config.SyncMethod = <sync_method>
+ $config.Put()
|
+ Sets the synchronization method for all users of the computer: SyncProvider or None. |
+
+
+ $config = Get-WmiObject -Namespace root\Microsoft\UEV ComputerConfiguration
+ $config.<setting name> = $true
+ $config.Put()
|
+ To enable a specific per-computer setting, clear the setting, and use $null as the setting value. Use UserConfiguration for per-user settings. |
+
+
+ $config = Get-WmiObject -Namespace root\Microsoft\UEV ComputerConfiguration
+ $config.<setting name> = $false
+ $config.Put()
|
+ To disable a specific per-computer setting, clear the setting, and use $null as the setting value. Use User Configuration for per-user settings. |
+
+
+ $config = Get-WmiObject -Namespace root\Microsoft\UEV ComputerConfiguration
+ $config.<setting name> = <setting value>
+ $config.Put()
|
+ Updates a specific per-computer setting. To clear the setting, use $null as the setting value. |
+
+
+ $config = Get-WmiObject -Namespace root\Microsoft\UEV ComputerConfiguration
+ $config.<setting name> = <setting value>
+ $config.Put()
|
+ Updates a specific per-user setting for all users of the computer. To clear the setting, use $null as the setting value. |
+
+
+
+
+When you are finished configuring the UE-V service with WMI and Windows PowerShell, the defined configuration is stored in the registry in the following locations.
+
+`\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\UEV\Agent\Configuration`
+
+`\HKEY_CURRENT_USER\SOFTWARE\Microsoft\UEV\Agent\Configuration`
+
+## To export UE-V package settings and repair UE-V templates by using WMI
+
+1. UE-V provides the following set of WMI commands. Administrators can use this interface to export a package or repair UE-V templates.
+
+2. Use the following WMI commands.
+
+
+
+
+
+
+
+
+
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class UserSettings -Name ExportPackage -ArgumentList <package name>
|
+ Extracts the settings from a package file and converts them into a human-readable format in XML. |
+
+
+ Invoke-WmiMethod -Namespace root\Microsoft\UEV -Class SettingsLocationTemplate -Name RebuildIndex
|
+ Repairs the index of the UE-V settings location templates. Must be run as administrator. |
+
+
+
+
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Administering UE-V with Windows PowerShell and WMI](uev-administering-uev-with-windows-powershell-and-wmi.md)
+
+[Administering UE-V](uev-administering-uev.md)
diff --git a/windows/manage/uev-migrating-settings-packages.md b/windows/manage/uev-migrating-settings-packages.md
new file mode 100644
index 0000000000..0bf674caeb
--- /dev/null
+++ b/windows/manage/uev-migrating-settings-packages.md
@@ -0,0 +1,51 @@
+---
+title: Migrating UE-V settings packages
+description: Migrating UE-V settings packages
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Migrating UE-V settings packages
+
+
+In the lifecycle of a User Experience Virtualization (UE-V) deployment, you might have to relocate the user settings packages either when you migrate to a new server or when you perform backups. Settings packages might have to be migrated in the following scenarios:
+
+- Upgrade of existing server hardware to a more modern server
+
+- Migration of a settings storage location share from a test server to a production server
+
+Simply copying the files and folders does not preserve the security settings and permissions. The following steps describe how to correctly copy the settings package along with their NTFS file system permissions to a new share.
+
+**To preserve UE-V settings packages when you migrate to a new server**
+
+1. In a new location on a different server, create a new folder, for example, MySettings.
+
+2. Disable sharing for the old folder share on the old server.
+
+3. To copy the existing settings packages to the new server with Robocopy
+
+ ``` syntax
+ C:\start robocopy "\\servername\E$\MySettings" "\\servername\E$\MySettings" /b /sec /secfix /e /LOG:D:\Robocopylogs\MySettings.txt
+ ```
+
+ **Note**
+ To monitor the copy progress, open MySettings.txt with a log viewer such as Trace32.
+
+
+
+4. Grant share-level permissions to the new share. Leave the NTFS file system permissions as they were set by Robocopy.
+
+ On computers on which the UE-V service is enabled, update the **SettingsStoragePath** configuration setting to the Universal Naming Convention (UNC) path of the new share.
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Administering UE-V](uev-administering-uev.md)
+
diff --git a/windows/manage/uev-prepare-for-deployment.md b/windows/manage/uev-prepare-for-deployment.md
new file mode 100644
index 0000000000..a7735d20e4
--- /dev/null
+++ b/windows/manage/uev-prepare-for-deployment.md
@@ -0,0 +1,398 @@
+---
+title: Prepare a UE-V Deployment
+description: Prepare a UE-V Deployment
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# Prepare a UE-V Deployment
+
+Applies to: Windows 10, version 1607
+
+Before you deploy User Experience Virtualization (UE-V), review this topic for important information about the type of deployment you’re planning and for preparations you can make beforehand so that your deployment is successful. If you leave this page, be sure to come back and read through the planning information in this topic.
+
+## Plan your UE-V deployment
+
+With UE-V, you can synchronize user-defined application and operating system settings across all the devices that a user works from. Use UE-V to synchronize settings for Windows applications and custom applications, such as third-party and line of business applications.
+
+Whether you want to synchronize settings for only default Windows applications or for both Windows and custom applications, you’ll need to first deploy the features required to use UE-V.
+
+[Deploy required UE-V features](uev-deploy-required-features.md)
+
+- [Define a settings storage location](uev-deploy-required-features.md#ssl)
+
+- [Decide how to manage UE-V configurations](#config)
+
+- [Enable the UE-V service](uev-deploy-required-features.md#enable-the-ue-v-service) on user computers
+
+If you want to use UE-V to synchronize user-defined settings for custom applications (third-party or line-of-business), you’ll need to install and configure these optional additional UE-V features:
+
+[Deploy UE-V for custom applications](uev-deploy-uev-for-custom-applications.md)
+
+- [Install the UE-V template generator](uev-deploy-uev-for-custom-applications.md#install-the-uev-template-generator) so you can create, edit, and validate the custom settings location templates required to synchronize custom application settings
+
+- [Create custom settings location templates](uev-deploy-uev-for-custom-applications.md#createcustomtemplates) with the UE-V template generator
+
+- [Deploy a UE-V settings template catalog](uev-deploy-uev-for-custom-applications.md#deploycatalogue) to store your custom settings location templates
+
+The workflow diagram below illustrates a typical UE-V deployment and the decisions you need to be prepared to make.
+
+
+
+
+
+### Planning a UE-V deployment
+
+Review the following topics to determine which UE-V components you’ll be deploying.
+
+- [Decide whether to synchronize settings for custom applications](#decide-whether-to-synchronize-settings-for-custom-applications)
+
+ If you want to synchronize settings for custom applications, you’ll need to install the UE-V template generator. Use the generator to create custom settings location templates, which involves the following tasks:
+
+ - Review the [settings that are synchronized automatically in a UE-V deployment](#settings-automatically-synchronized-in-a-ue-v-deployment).
+
+ - [Determine whether you need settings synchronized for other applications](#determine-whether-you-need-settings-synchronized-for-other-applications).
+
+- Review [other considerations for deploying UE-V](#other-considerations-when-preparing-a-ue-v-deployment), including high availability and capacity planning.
+
+- [Confirm prerequisites and supported configurations for UE-V](#confirm-prerequisites-and-supported-configurations-for-ue-v)
+
+## Decide whether to synchronize settings for custom applications
+
+In a UE-V deployment, many settings are automatically synchronized. You can also customize UE-V to synchronize settings for other applications, such as line-of-business and third-party apps.
+
+Deciding if you want UE-V to synchronize settings for custom applications is an essential part of planning your UE-V deployment. The topics in this section will help you make that decision.
+
+### Settings automatically synchronized in a UE-V deployment
+
+This section explains which settings are synchronized by default in UE-V, including:
+
+- Desktop applications that are synchronized by default
+
+- Windows desktop settings that are synchronized by default
+
+- A statement of support for Windows applications setting synchronization
+
+See [Microsoft Authored Office 2016 UE-V Templates](https://www.microsoft.com/download/details.aspx?id=46367) to download a list of the specific Office 2016 settings that are synchronized by UE-V.
+
+To download a list of the Microsoft Office 2013 and 2010 settings that are synchronized by UE-V, see [User Experience Virtualization (UE-V) settings templates for Microsoft Office](https://www.microsoft.com/download/details.aspx?id=46367).
+
+
+### Desktop applications synchronized by default in UE-V
+
+When you enable the UE-V service on user devices, it registers a default group of settings location templates that capture settings values for these common Microsoft applications.
+
+| **Application category** | **Description** |
+|-----------------------------|-------------------|
+| Microsoft Office 2016 applications
[Download a list of all settings synced](https://gallery.technet.microsoft.com/Authored-Office-2016-32-0dc05cd8) | Microsoft Access 2016
Microsoft Lync 2016
Microsoft Excel 2016
Microsoft OneNote 2016
Microsoft Outlook 2016
Microsoft PowerPoint 2016
Microsoft Project 2016
Microsoft Publisher 2016
Microsoft SharePoint Designer 2013 (not updated for 2016)
Microsoft Visio 2016
Microsoft Word 2016
Microsoft Office Upload Manager
Microsoft Infopath has been removed (deprecated) from the Office 2016 suite |
+| Microsoft Office 2013 applications
[Download a list of all settings synced](https://www.microsoft.com/download/details.aspx?id=46367) | Microsoft Word 2013
Microsoft Excel 2013
Microsoft Outlook 2013
Microsoft Access 2013
Microsoft Project 2013
Microsoft PowerPoint 2013
Microsoft Publisher 2013
Microsoft Visio 2013
Microsoft InfoPath 2013
Microsoft Lync 2013
Microsoft OneNote 2013
Microsoft SharePoint Designer 2013
Microsoft Office 2013 Upload Center
Microsoft OneDrive for Business 2013
+| Microsoft Office 2010 applications
[Download a list of all settings synced](https://www.microsoft.com/download/details.aspx?id=46367) | Microsoft Word 2010
Microsoft Excel 2010
Microsoft Outlook 2010
Microsoft Access 2010
Microsoft Project 2010
Microsoft PowerPoint 2010
Microsoft Publisher 2010
Microsoft Visio 2010
Microsoft SharePoint Workspace 2010
Microsoft InfoPath 2010
Microsoft Lync 2010
Microsoft OneNote 2010
Microsoft SharePoint Designer 2010 |
+| Browser options: Internet Explorer 11 and 10 | Synchronize favorites, home page, tabs, and toolbars.
**Note**
UE-V does not roam settings for Internet Explorer cookies. |
+| Windows accessories | Microsoft NotePad, WordPad |
+
+**Notes**
+An Outlook profile must be created for any device on which a user wants to sync their Outlook signature. If the profile is not already created, the user can create one and then restart Outlook on that device to enable signature synchronization.
+
+UE-V does not synchronize settings between the Microsoft Calculator in Windows 10 and the Microsoft Calculator in previous operating systems.
+
+### Windows settings synchronized by default
+
+UE-V includes settings location templates that capture settings values for these Windows settings.
+
+| **Windows settings** | **Description** | **Apply on** | **Export on** | **Default state** |
+|----------------------|-----------------|--------------|---------------|-------------------|
+| Desktop background | Currently active desktop background or wallpaper | Log on, unlock, remote connect, Scheduled Task events | Log off, lock, remote disconnect, or scheduled task interval | Enabled |
+| Ease of Access | Accessibility and input settings, Microsoft Magnifier, Narrator, and on-Screen Keyboard | Log on only | Log off or scheduled task interval | Enabled |
+| Desktop settings | Start menu and Taskbar settings, folder options, default desktop icons, additional clocks, and region and language settings | Log on only | Log off or scheduled task | Enabled |
+
+>**Important**
+UE-V roams taskbar settings between Windows 10 devices. However, UE-V does not synchronize taskbar settings between Windows 10 devices and devices running previous operating systems versions.
+
+| **Settings group** | **Category** | **Capture** | **Apply** |
+|--------------------------|----------------|----------------|--------------|
+| **Application Settings** | Windows applications | Close appllication
Windows application settings change event | Start the UE-V App Monitor at startup
Open app
Windows application settings change event
Arrival of a settings package |
+| | Desktop applications | Application closes | Application opens and closes |
+| **Desktop settings** | Desktop background | Lock or log off | Log on, unlock, remote connect, notification of new package arrival, or scheduled task runs |
+| | Ease of Access (Common – Accessibility, Narrator, Magnifier, On-Screen-Keyboard) | Lock or Log off | Log on |
+| | Ease of Access (Shell - Audio, Accessibility, Keyboard, Mouse) | Lock or log off | Log on, unlock, remote connect, notification of new package arrival, or scheduled task runs |
+| | Desktop settings | Lock or log off | Log on |
+
+### UE-V-support for Windows applications
+
+For Windows applications, the application developer specifies which user settings are synchronized. You can specify which Windows apps are enabled for settings synchronization.
+
+To display a list of Windows applications that can synchronize settings with their package family name, enabled status, and enabled source, open a Windows PowerShell window, type Get-UevAppxPackage, and press ENTER.
+
+>**Note**
+Starting in Windows 10, version 1607, you can configure UE-V to not synchronize Windows applications settings if the device is configured to use Enterprise State Roaming.
+
+### UE-V-support for roaming printers
+
+Users can print to their saved network printers, including their default network printer, from any network device.
+
+Printer roaming in UE-V requires one of these scenarios:
+
+- The print server can download the required driver when it roams to a new device.
+
+- The driver for the roaming network printer is pre-installed on any device that needs to access that network printer.
+
+- The printer driver can be imported from Windows Update.
+
+>**Note**
+The UE-V printer roaming feature does not roam printer settings or preferences, such as printing double-sided.
+
+### Determine whether you need settings synchronized for other applications
+
+After you have reviewed the settings that are synchronized automatically in a UE-V deployment, you’ll need to decide whether to synchronize settings for other applications as your decision will determine how you deploy UE-V throughout your enterprise.
+
+As an administrator, when you consider which desktop applications to include in your UE-V solution, consider which settings can be customized by users, and how and where the application stores its settings. Not all desktop applications have settings that can be customized or that are routinely customized by users. In addition, not all desktop applications settings can be synchronized safely across multiple devices or environments.
+
+In general, you can synchronize settings that meet the following criteria:
+
+- Settings that are stored in user-accessible locations. For example, do not synchronize settings that are stored in System32 or outside the HKEY\_CURRENT\_USER (HKCU) section of the registry.
+
+- Settings that are not specific to the particular device. For example, exclude network shortcuts or hardware configurations.
+
+- Settings that can be synchronized between computers without risk of corrupted data. For example, do not use settings that are stored in a database file.
+
+### Checklist for evaluating custom applications
+
+If you’ve decided that you need to synchronize settings for custom applications, use this checklist to determine which applications you’ll include.
+
+| | **Description** |
+|-------|--------------------------|
+|  | Does this application contain settings that the user can customize? |
+|  | Is it important for the user that these settings are synchronized? |
+|  | Are these user settings already managed by an application management or settings policy solution? UE-V applies application settings at application startup and Windows settings at logon, unlock, or remote connect events. If you use UE-V with other settings sharing solutions, users might experience inconsistency across synchronized settings. |
+|  | Are the application settings specific to the computer? Application preferences and customizations that are associated with hardware or specific computer configurations do not consistently synchronize across sessions and can cause a poor application experience. |
+|  | Does the application store settings in the Program Files directory or in the file directory that is located in the **Users**\\ \[User name\] \\**AppData**\\**LocalLow** directory? Application data that is stored in either of these locations usually should not synchronize with the user, because this data is specific to the computer or because the data is too large to synchronize. |
+|  | Does the application store any settings in a file that contains other application data that should not synchronize? UE-V synchronizes files as a single unit. If settings are stored in files that include application data other than settings, then synchronizing this additional data can cause a poor application experience. |
+|  | How large are the files that contain the settings? The performance of the settings synchronization can be affected by large files. Including large files can affect the performance of settings synchronization. |
+
+## Other considerations when preparing a UE-V deployment
+
+You should also consider these things when you are preparing to deploy UE-V:
+
+- [Managing credentials synchronization](#managing-credentials-synchronization-in-ue-v)
+
+- [Windows applications settings synchronization](#windows-applications-settings-synchronization)
+
+- [Custom UE-V settings location templates](#custom-ue-v-settings-location-templates)
+
+- [Unintentional user settings configurations](#prevent-unintentional-user-settings-configuration)
+
+- [Performance and capacity](#performance-and-capacity-planning)
+
+- [High availability](#high-availability-for-ue-v)
+
+- [Computer clock synchronization](#synchronize-computer-clocks-for-ue-v-settings-synchronization)
+
+### Managing credentials synchronization in UE-V
+
+Many enterprise applications, including Microsoft Outlook, Lync, and Skype for Business prompt users for their domain credentials when they log in. Users have the option of saving their credentials to disk to prevent having to enter them every time they open these applications. Enabling roaming credentials synchronization lets users save their credentials on one computer and avoid re-entering them on every computer they use in their environment. Users can synchronize some domain credentials with UE-V.
+
+**Important**
+Credentials synchronization is disabled by default. You must explicitly enable credentials synchronization after you enable the UE-V service to implement this feature.
+
+UE-V can synchronize enterprise credentials, but does not roam credentials intended only for use on the local device.
+
+Credentials are synchronous settings, meaning that they are applied to users' profiles the first time they log on to their devices after UE-V synchronizes.
+
+Credentials synchronization is managed by its own settings location template, which is disabled by default. You can enable or disable this template through the same methods used for other templates. The template identifier for this feature is RoamingCredentialSettings.
+
+>**Important**
+If you are using Active Directory Credential Roaming in your environment, we recommend that you do not enable the UE-V credential roaming template. Instead, use PowerShell or Group Policy to enable credentials synchronization. Note that credentials are encrypted during synchronization.
+
+[PowerShell](uev-administering-uev-with-windows-powershell-and-wmi.md)**:** Enter this PowerShell cmdlet to enable credential synchronization:
+
+`Enable-UevTemplate RoamingCredentialSettings`
+
+`Copy`
+
+Use this PowerShell cmdlet to disable credential synchronization:
+
+`Disable-UevTemplate RoamingCredentialSettings`
+
+`Copy`
+
+
+
+[Group Policy](uev-configuring-uev-with-group-policy-objects.md)**:** You must edit the Group Policy administrative template for UE-V, which is included in Windows 10, version 1607, to enable credential synchronization through group policy. Credentials synchronization is managed in Windows settings. To manage this feature with Group Policy, enable the **Synchronize Windows** settings policy.
+
+1. Open Group Policy Editor and navigate to **User Configuration > Administrative Templates > Windows Components > Microsoft User Experience Virtualization**.
+
+2. Double-click **Synchronize Windows settings**.
+
+3. If this policy is enabled, you can enable credentials synchronization by checking the **Roaming Credentials** check box, or disable credentials synchronization by unchecking it.
+
+4. Click **OK**.
+
+### Credential locations synchronized by UE-V
+
+Credential files saved by applications into the following locations are synchronized:
+
+- %UserProfile%\\AppData\\Roaming\\Microsoft\\Credentials\\
+
+- %UserProfile%\\AppData\\Roaming\\Microsoft\\Crypto\\
+
+- %UserProfile%\\AppData\\Roaming\\Microsoft\\Protect\\
+
+- %UserProfile%\\AppData\\Roaming\\Microsoft\\SystemCertificates\\
+
+Credentials saved to other locations are not synchronized by UE-V.
+
+### Windows applications settings synchronization
+
+UE-V manages Windows application settings synchronization in three ways:
+
+- **Sync Windows applications:** Allow or deny any Windows application synchronization
+
+- **Windows applications list:** Synchronize a list of Windows applications
+
+- **Unlisted default sync behavior:** Determine the synchronization behavior of Windows applications that are not in the Windows applications list.
+
+For more information, see the [Windows Application List](uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md#win8applist).
+
+### Custom UE-V settings location templates
+
+If you are deploying UE-V to synchronize settings for custom applications, you’ll use the UE-V template generator to create custom settings location templates for those desktop applications. After you create and test a custom settings location template in a test environment, you can deploy the settings location templates to user devices.
+
+Custom settings location templates must be deployed with an existing deployment infrastructure, such as an enterprise software distribution method, including System Center Configuration Manager, with preferences, or by configuring a UE-V settings template catalog. Templates that are deployed with Configuration Manager or Group Policy must be registered using UE-V WMI or Windows PowerShell.
+
+For more information about custom settings location templates, see [Deploy UE-V with custom applications](uev-deploy-uev-for-custom-applications.md). For more information about using UE-V with Configuration Manager, see [Configuring UE-V with System Center Configuration Manager](uev-configuring-uev-with-system-center-configuration-manager.md).
+
+### Prevent unintentional user settings configuration
+
+UE-V downloads new user settings information from a settings storage location and applies the settings to the local device in these instances:
+
+- Each time an application is started that has a registered UE-V template
+
+- When a user logs on to a device
+
+- When a user unlocks a device
+
+- When a connection is made to a remote desktop device running UE-V
+
+- When the Sync Controller Application scheduled task is run
+
+If UE-V is installed on computer A and computer B, and the settings that you want for the application are on computer A, then computer A should open and close the application first. If the application is opened and closed on computer B first, then the application settings on computer A are configured to the application settings on computer B. Settings are synchronized between computers on per-application basis. Over time, settings become consistent between computers as they are opened and closed with preferred settings.
+
+This scenario also applies to Windows settings. If the Windows settings on computer B should be the same as the Windows settings on computer A, then the user should log on and log off computer A first.
+
+If the user settings that the user wants are applied in the wrong order, they can be recovered by performing a restore operation for the specific application or Windows configuration on the computer on which the settings were overwritten. For more information, see [Manage Administrative Backup and Restore in UE-V](uev-manage-administrative-backup-and-restore.md).
+
+### Performance and capacity planning
+
+Specify your requirements for UE-V with standard disk capacity and network health monitoring.
+
+UE-V uses a Server Message Block (SMB) share for the storage of settings packages. The size of settings packages varies depending on the settings information for each application. While most settings packages are small, the synchronization of potentially large files, such as desktop images, can result in poor performance, particularly on slower networks.
+
+To reduce problems with network latency, create settings storage locations on the same local networks where the users’ computers reside. We recommend 20 MB of disk space per user for the settings storage location.
+
+By default, UE-V synchronization times out after 2 seconds to prevent excessive lag due to a large settings package. You can configure the SyncMethod=SyncProvider setting by using [Group Policy objects](uev-configuring-uev-with-group-policy-objects.md).
+
+### High availability for UE-V
+
+The UE-V settings storage location and settings template catalog support storing user data on any writable share. To ensure high availability, follow these criteria:
+
+- Format the storage volume with an NTFS file system.
+
+
+
+- The share can use Distributed File System (DFS) replication, but Distributed File System Replication (DFSR) is specifically not supported. Distributed File System Namespaces (DFSN) are supported. For detailed information, see [Microsoft’s Support Statement Around Replicated User Profile Data](http://go.microsoft.com/fwlink/p/?LinkId=313991).
+
+ In addition, because SYSVOL uses DFSR for replication, SYSVOL cannot be used for UE-V data file replication.
+
+- Configure the share permissions and NTFS access control lists (ACLs) as specified in [Deploying the settings storage location for UE-V](uev-deploy-required-features.md#ssl).
+
+- Use file server clustering along with the UE-V service to provide access to copies of user state data in the event of communications failures.
+
+- You can store the settings storage path data (user data) and settings template catalog templates on clustered shares, on DFSN shares, or on both.
+
+### Synchronize computer clocks for UE-V settings synchronization
+
+Computers that run the UE-V service must use a time server to maintain a consistent settings experience. UE-V uses time stamps to determine if settings must be synchronized from the settings storage location. If the computer clock is inaccurate, older settings can overwrite newer settings, or the new settings might not be saved to the settings storage location.
+
+## Confirm prerequisites and supported configurations for UE-V
+
+Before you proceed, ensure that your environment meets these requirements for using UE-V.
+
+| **Operating system** | **Edition** | **Service pack** | **System architecture** | **Windows PowerShell** | **Microsoft .NET Framework** |
+|--------------------------|---------------|------------------|-------------------------|--------------------------|--------------------------------|
+| Windows 10, version 1607 | Windows 10 for Enterprise | NA | 32-bit or 64-bit | Windows PowerShell 3.0 or higher | .NET Framework 4.5 or higher |
+| Windows 8 and Windows 8.1 | Enterprise or Pro | None | 32-bit or 64-bit | Windows PowerShell 3.0 or higher | .NET Framework 4.5 or higher |
+| Windows Server 2012 and Windows Server 2012 R2 | Standard or Datacenter | None | 64-bit | Windows PowerShell 3.0 or higher | .NET Framework 4.5 or higher |
+
+**Note**
+- Windows Server 2012 operating systems come with .NET Framework 4.5 installed. The Windows 10 operating system comes with .NET Framework 4.6 installed.
+
+- The “Delete Roaming Cache” policy for mandatory profiles is not supported with UE-V and should not be used.
+
+There are no special random access memory (RAM) requirements specific to UE-V.
+
+### Synchronization of settings through the Sync Provider
+
+Sync Provider is the default setting for users and synchronizes a local cache with the settings storage location in these instances:
+
+- Log on/log off
+
+- Lock/unlock
+
+- Remote desktop connect/disconnect
+
+- Application open/close
+
+A scheduled task manages this synchronization of settings every 30 minutes or through trigger events for certain applications. For more information, see [Changing the frequency of UE-V scheduled tasks](uev-changing-the-frequency-of-scheduled-tasks.md).
+
+The UE-V service synchronizes user settings for devices that are not always connected to the enterprise network (remote devices and laptops) and devices that are always connected to the network (devices that run Windows Server and host virtual desktop interface (VDI) sessions).
+
+**Synchronization for computers with always-available connections** When you use UE-V on devices that are always connected to the network, you must configure the UE-V service to synchronize settings by using the *SyncMethod=None* parameter, which treats the settings storage server as a standard network share. In this configuration, the UE-V service can be configured to notify if the import of the application settings is delayed.
+
+Enable this configuration using one of these methods:
+
+- After you enable the UE-V service, use the Settings Management feature in System Center Configuration Manager or the UE-V ADMX templates (installed with Windows 10, version 1607) to push the SyncMethod = None configuration.
+
+- Use Windows PowerShell or Windows Management Instrumentation (WMI) to set the SyncMethod = None configuration.
+
+Restart the device to allow the settings to synchronize.
+
+- >**Note**
+These methods do not work for pooled virtual desktop infrastructure (VDI) environments.
+
+
+>**Note**
+If you set *SyncMethod = None*, any settings changes are saved directly to the server. If the network connection to the settings storage path is not found, then the settings changes are cached on the device and are synchronized the next time that the sync provider runs. If the settings storage path is not found and the user profile is removed from a pooled VDI environment on log off, settings changes are lost and the user must reapply the change when the computer is reconnected to the settings storage path.
+
+**Synchronization for external sync engines** The *SyncMethod=External* parameter specifies that if UE-V settings are written to a local folder on the user device, then any external sync engine (such as OneDrive for Business, Work Folders, Sharepoint, or Dropbox) can be used to apply these settings to the different devices that users access.
+
+**Support for shared VDI sessions** UE-V supports VDI sessions that are shared among end users. You can register and configure a special VDI template, which ensures that UE-V keeps all of its functionality intact for non-persistent VDI sessions.
+
+>**Note**
+If you do not enable VDI mode for non-persistent VDI sessions, certain features do not work, such as [back-up/restore and last known good (LKG)](uev-manage-administrative-backup-and-restore.md).
+
+The VDI template is provided with UE-V and is typically available here after installation: C:\ProgramData\Microsoft\UEV\InboxTemplates
+
+### Prerequisites for UE-V template generator support
+
+Install the UE-V template generator on the device that is used to create custom settings location templates. This device should be able to run the applications that you want to synchronize settings for. You must be a member of the Administrators group on the device that runs the UE-V template generator software.
+
+The UE-V template generator must be installed on a device that uses an NTFS file system. The UE-V template generator software requires .NET Framework 4. For more information, see [Use UE-V with custom applications](uev-deploy-uev-for-custom-applications.md).
+
+## Other resources for this feature
+
+- [User Experience Virtualization overview](uev-for-windows.md)
+
+- [Get started with UE-V](uev-getting-started.md)
+
+- [Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md)
+
+- [Administering UE-V ](uev-administering-uev.md)
+
+- [Troubleshooting UE-V ](uev-troubleshooting.md)
+
+- [Technical Reference for UE-V](uev-technical-reference.md)
diff --git a/windows/manage/uev-privacy-statement.md b/windows/manage/uev-privacy-statement.md
new file mode 100644
index 0000000000..30e1e65622
--- /dev/null
+++ b/windows/manage/uev-privacy-statement.md
@@ -0,0 +1,156 @@
+---
+title: User Experience Virtualization Privacy Statement
+description: User Experience Virtualization Privacy Statement
+author: jamiejdt
+ms.assetid: c2919034-f2cf-48d6-b18e-4dd318252426
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w8
+---
+
+
+# User Experience Virtualization Privacy Statement
+
+
+Microsoft is committed to protecting your privacy, while delivering software that brings you the performance, power, and convenience you desire in your personal computing. This privacy statement explains many of the data collection and use practices of Microsoft User Experience Virtualization (“UE-V”). This is a preliminary disclosure that focuses on features that communicate with the Internet and is not intended to be an exhaustive list.
+
+Microsoft User Experience Virtualization allows the separation of settings from an application or operating system. Those settings can then be transferred to a remote storage location, eliminating the constraints of local storage and giving users the ability to have their settings follow them to other computers.
+
+## Collection and Use of Your Information
+
+
+The information we collect from you will be used by Microsoft and its controlled subsidiaries and affiliates to enable the features you are using and provide the service(s) or carry out the transaction(s) you have requested or authorized. It may also be used to analyze and improve Microsoft products and services.
+
+We may send certain mandatory service communications such as welcome letters, billing reminders, information on technical service issues, and security announcements. Some Microsoft services may send periodic member letters that are considered part of the service. We may occasionally request your feedback, invite you to participate in surveys, or send you promotional mailings to inform you of other products or services available from Microsoft and its affiliates.
+
+In order to offer you a more consistent and personalized experience in your interactions with Microsoft, information collected through one Microsoft service may be combined with information obtained through other Microsoft services. We may also supplement the information we collect with information obtained from other companies. For example, we may use services from other companies that enable us to derive a general geographic area based on your IP address in order to customize certain services to your geographic area.
+
+Except as described in this statement, personal information you provide will not be transferred to third parties without your consent. We occasionally hire other companies to provide limited services on our behalf, such as packaging, sending and delivering purchases and other mailings, answering customer questions about products or services, processing event registration, or performing statistical analysis of our services. We will only provide those companies the personal information they need to deliver the service, and they are prohibited from using that information for any other purpose.
+
+Microsoft may access or disclose information about you, including the content of your communications, in order to: (a) comply with the law or respond to lawful requests or legal process; (b) protect the rights or property of Microsoft or our customers, including the enforcement of our agreements or policies governing your use of the services; or (c) act on a good faith belief that such access or disclosure is necessary to protect the personal safety of Microsoft employees, customers, or the public. We may also disclose personal information as part of a corporate transaction such as a merger or sale of assets.
+
+Information that is collected by or sent to Microsoft by UE-V may be stored and processed in the United States or any other country in which Microsoft or its affiliates, subsidiaries, or service providers maintain facilities. Microsoft abides by the safe harbor framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of data from the European Union, the European Economic Area, and Switzerland.
+
+## Collection and Use of Information about Your Computer
+
+
+When you use software with Internet-enabled features, information about your computer ("standard computer information") is sent to the Web sites you visit and online services you use. Microsoft uses standard computer information to provide you Internet-enabled services, to help improve our products and services, and for statistical analysis. Standard computer information typically includes information such as your IP address, operating system version, browser version, and regional and language settings. In some cases, standard computer information may also include hardware ID, which indicates the device manufacturer, device name, and version. If a particular feature or service sends information to Microsoft, standard computer information will be sent as well.
+
+The privacy details for each UE-V feature, software or service listed in this privacy statement describe what additional information is collected and how it is used.
+
+## Security of Your Information
+
+
+Microsoft is committed to helping protect the security of your information. We use a variety of security technologies and procedures to help protect your information from unauthorized access, use, or disclosure. For example, we store the information you provide on computer systems with limited access, which are located in controlled facilities.
+
+## Changes to This Privacy Statement
+
+
+We will occasionally update this privacy statement to reflect changes in our products, services, and customer feedback. When we post changes, we will revise the "last updated" date at the top of this statement. If there are material changes to this statement or in how Microsoft will use your personal information, we will notify you either by posting a notice of such changes prior to implementing the change or by directly sending you a notification. We encourage you to periodically review this statement to be informed of how Microsoft is protecting your information.
+
+## For More Information
+
+
+Microsoft welcomes your comments regarding this privacy statement. If you have questions about this statement or believe that we have not adhered to it, please contact us [MSUEVPrivacy@microsoft.com](mailto:%20MSUEVPrivacy@microsoft.com).
+
+## Specific features
+
+
+The remainder of this document will address the following specific features:
+
+### UE-V Generator
+
+**What This Feature Does**:
+
+The UE-V generator is used to create settings location templates. These templates allow users to roam the settings for their applications.
+
+**Information Collected, Processed, or Transmitted**:
+
+When creating a settings location template the UE-V generator uses a Lightweight Directory Access Protocol (LDAP) query to get username and email address of the current logged in user. This information is stored in the template as the template author name and template author email. None of this information is sent to Microsoft.
+
+If you plan to share settings location templates with anyone outside your organization you should review all the settings locations and ensure the settings location template do not contain any personal or company information. You can view the contents by opening the settings location template files using any XML viewer. The following are ways you can view and remove any personal or company information from the settings location template files before sharing with anyone outside your company:
+
+- **Template Author Name** – Specify a general, non-identifying name for the template author name or exclude this data from the template.
+
+- **Template Author Email** – Specify a general, non-identifying template author email or exclude this data from the template.
+
+**Use of Information**:
+
+The template author name and template author email can be used to identify the author of settings location template. If you share the template, the author name and email is viewable to all who use the template. No information is sent to Microsoft.
+
+**Choice/Control**:
+
+To remove the template author name or template author email, start the UE-V generator application. Select **Edit a Settings Location Template**. Select the settings location template to edit from the recently used templates or Browse to the settings template file. Select **Next** to continue. On the Properties page, remove the data from the Template author name or Template author email text fields. Save the settings location template.
+
+## Customer Experience Improvement Program
+
+
+**What This Feature Does:**
+
+The Customer Experience Improvement Program (“CEIP”) collects basic information about your hardware configuration and how you use our software and services in order to identify trends and usage patterns. CEIP also collects the type and number of errors you encounter, software and hardware performance, and the speed of services. We will not collect your name, address, or other contact information.
+
+**Information Collected, Processed, or Transmitted:**
+
+For more information about the information collected, processed, or transmitted by CEIP, see the CEIP privacy statement at .
+
+**Use of Information:**
+
+We use this information to improve the quality, reliability, and performance of Microsoft software and services.
+
+**Choice/Control:**
+
+You are offered the opportunity to participate in CEIP during setup of the UE-V Agent. If you choose to participate and later change your mind, you can turn off CEIP at any time by:Re-running the UE-V agent setup and opting out of CEIP or by setting the following registry key either manually or via Group Policy:
+
+``` syntax
+Key = HKEY_LOCAL_MACHINE\Software\Microsoft\UEV\Agent
+RegEntry name = CustomerExperienceImprovementProgram
+Entry type REG_DWORD (Hexadecimal):
+0 is off
+1 is on
+```
+
+## Microsoft Error Reporting
+
+
+**What This Feature Does:**
+
+Microsoft Error Reporting provides a service that allows you to report problems you may be having with UE-V or other enabled applications to Microsoft and to receive information that may help you avoid or solve such problems.
+
+**Information Collected, Processed, or Transmitted:**
+
+For information about the information collected, processed, or transmitted by Microsoft Error Reporting, see the Microsoft Error Reporting privacy statement at .
+
+**Use of Information:**
+
+We use the error reporting data to solve customer problems and improve our software and services.
+
+**Choice/Control:**
+
+If you choose the recommended settings during Windows setup, you turn on automatic checking for solutions, which will send basic error reports and look for solutions to the problems reported. If you use automatic checking, you are not typically prompted to send basic information about errors to Microsoft. If a more detailed error report is required, you will be prompted to review it. You can change this setting at any time by going to Action Center in Control Panel.
+
+**Important Information:**
+
+Enterprise customers can use Group Policy to configure how Microsoft Error Reporting behaves on their computers. Configuration options include the ability to turn off Microsoft Error Reporting. If you are an administrator and wish to configure Group Policy for Microsoft Error Reporting, technical details are available at .
+
+UE-V will not modify the Microsoft Error Reporting preference and will honor the system setting in the Control Panel and/or the setting enforced via Group Policy.
+
+## Microsoft Update
+
+
+**What This Feature Does:**
+
+Microsoft Update is a service that provides Windows updates as well as updates for other Microsoft software.
+
+**Information Collected, Processed, or Transmitted:**
+
+For details about what information is collected and how it is used, see the Update Services Privacy Statement at
+
+**Use of Information:**
+
+- For details about what information is collected and how it is used, see the Update Services Privacy Statement at .
+
+- Choice/Control:
+
+ For details about controlling this feature, see the Update Services Privacy Statement at .
+
diff --git a/windows/manage/uev-release-notes-1607.md b/windows/manage/uev-release-notes-1607.md
new file mode 100644
index 0000000000..0f9af96e11
--- /dev/null
+++ b/windows/manage/uev-release-notes-1607.md
@@ -0,0 +1,117 @@
+---
+title: User Experience Virtualization (UE-V) Release Notes
+description: User Experience Virtualization (UE-V) Release Notes
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# User Experience Virtualization (UE-V) Release Notes
+
+Applies to: Windows 10, version 1607
+
+This topic includes information required to successfully install and use UE-V that is not included in the User Experience Virtualization (UE-V) documentation. If there are differences between the information in this topic and other UE-V topics, the latest change should be considered authoritative.
+
+### Upgrading from UE-V 1.0 to the in-box version of UE-V is blocked
+
+Version 1.0 of UE-V includes client-side caching technology used to pin the UE-V sync folder, however, this technology was removed in UE-V 2.x. As a result, UE-V 1.0 users are blocked from upgrading to UE-V for Windows 10, version 1607.
+
+WORKAROUND: Unpin the UE-V 1.0 client-side caching sync folder and then upgrade to the in-box version included in UE-V for Windows, version 1607 release.
+
+### UE-V settings location templates for Skype cause Skype to crash
+
+When a user generates a valid settings location template for the Skype desktop application, registers it, and then launches the Skype desktop application, Skype crashes. An ACCESS\_VIOLATION is recorded in the Application Event Log.
+
+WORKAROUND: Remove or unregister the Skype template to allow Skype to work again.
+
+### Registry settings do not synchronize between App-V and native applications on the same device
+
+When a device has an application that is installed through both Application Virtualization (App-V) and locally with a Windows Installer (.msi) file, the registry-based settings do not synchronize between the technologies.
+
+WORKAROUND: To resolve this problem, run the application by selecting one of the two technologies, but not both.
+
+### Unpredictable results when both Office 2010 and Office 2013 are installed on the same device
+
+When a user has both Office 2010 and Office 2013 installed, any common settings between the two versions of Office are roamed by UE-V. This could cause the Office 2010 package size to be quite large or result in unpredictable conflicts with 2013, particularly if Office 365 is used.
+
+WORKAROUND: Install only one version of Office or limit which settings are synchronized by UE-V.
+
+### Uninstall and re-install of Windows 8 applications reverts settings to initial state
+
+While using UE-V settings synchronization for a Windows 8 application, if the user uninstalls the application and then reinstalls the application, the application’s settings revert to their default values. This happens because the uninstall removes the local (cached) copy of the application’s settings but does not remove the local UE-V settings package. When the application is reinstalled and launched, UE-V gather the application settings that were reset to the application defaults and then uploads the default settings to the central storage location. Other computers running the application then download the default settings. This behavior is identical to the behavior of desktop applications.
+
+WORKAROUND: None.
+
+### UE-V does not support roaming settings between 32-bit and 64-bit versions of Microsoft Office
+
+We recommend that you install the 32-bit version of Microsoft Office for both 32-bit and 64-bit operating systems. To choose the Microsoft Office version that you need, click [here](). UE-V supports roaming settings between identical architecture versions of Office. For example, 32-bit Office settings will roam between all 32-bit Office instances. UE-V does not support roaming settings between 32-bit and 64-bit versions of Office.
+
+WORKAROUND: None
+
+### Favicons that are associated with Internet Explorer 9 favorites do not roam
+
+The favicons that are associated with Internet Explorer 9 favorites are not roamed by User Experience Virtualization and do not appear when the favorites first appear on a new computer.
+
+WORKAROUND: Favicons will appear with their associated favorites once the bookmark is used and cached in the Internet Explorer 9 browser.
+
+### File settings paths are stored in registry
+
+Some application settings store the paths of their configuration and settings files as values in the registry. The files that are referenced as paths in the registry must be synchronized when settings are roamed between computers.
+
+WORKAROUND: Use folder redirection or some other technology to ensure that any files that are referenced as file settings paths are present and placed in the same location on all computers where settings roam.
+
+### Long Settings Storage Paths could cause an error
+
+Keep settings storage paths as short as possible. Long paths could prevent resolution or synchronization. UE-V uses the Settings storage path as part of the calculated path to store settings. That path is calculated in the following way: settings storage path + “settingspackages” + package dir (template ID) + package name (template ID) + .pkgx. If that calculated path exceeds 260 characters, package storage will fail and generate the following error message in the UE-V operational event log:
+
+\[boost::filesystem::copy\_file: The system cannot find the path specified\]
+
+To check the operational log events, open the Event Viewer and navigate to Applications and Services Logs / Microsoft / User Experience Virtualization / Logging / Operational.
+
+WORKAROUND: None.
+
+### Some operating system settings only roam between like operating system versions
+
+Operating system settings for Narrator and currency characters specific to the locale (i.e. language and regional settings) will only roam across like operating system versions of Windows. For example, currency characters will not roam between Windows 7 and Windows 8.
+
+WORKAROUND: None
+
+## Hotfixes and Knowledge Base articles for UE-V
+
+This section contains hotfixes and KB articles for UE-V.
+
+| KB Article | Title | Link |
+|------------|---------|--------|
+| 3018608 | UE-V - TemplateConsole.exe crashes when UE-V WMI classes are missing | [support.microsoft.com/kb/3018608/EN-US](http://support.microsoft.com/kb/3018608/EN-US) |
+| 2903501 | UE-V: User Experience Virtualization (UE-V) compatibility with user profiles | [support.microsoft.com/kb/2903501/EN-US](http://support.microsoft.com/kb/2903501/EN-US) |
+| 2770042 | UE-V Registry Settings | [support.microsoft.com/kb/2770042/EN-US](http://support.microsoft.com/kb/2770042/EN-US) |
+| 2847017 | UE-V settings replicated by Internet Explorer | [support.microsoft.com/kb/2847017/EN-US](http://support.microsoft.com/kb/2847017/EN-US) |
+| 2769631 | How to repair a corrupted UE-V install | [support.microsoft.com/kb/2769631/EN-US](http://support.microsoft.com/kb/2769631/EN-US) |
+| 2850989 | Migrating MAPI profiles with Microsoft UE-V is not supported | [support.microsoft.com/kb/2850989/EN-US](http://support.microsoft.com/kb/2850989/EN-US) |
+| 2769586 | UE-V roams empty folders and registry keys | [support.microsoft.com/kb/2769586/EN-US](http://support.microsoft.com/kb/2769586/EN-US) |
+| 2782997 | How To Enable Debug Logging in Microsoft User Experience Virtualization (UE-V) | [support.microsoft.com/kb/2782997/EN-US](http://support.microsoft.com/kb/2782997/EN-US) |
+| 2769570 | UE-V does not update the theme on RDS or VDI sessions | [support.microsoft.com/kb/2769570/EN-US](http://support.microsoft.com/kb/2769570/EN-US) |
+| 2850582 | How To Use Microsoft User Experience Virtualization With App-V Applications | [support.microsoft.com/kb/2850582/EN-US](http://support.microsoft.com/kb/2850582/EN-US) |
+| 3041879 | Current file versions for Microsoft User Experience Virtualization | [support.microsoft.com/kb/3041879/EN-US](http://support.microsoft.com/kb/3041879/EN-US) |
+| 2843592 | Information on User Experience Virtualization and High Availability | [support.microsoft.com/kb/2843592/EN-US](http://support.microsoft.com/kb/2843592/EN-US) |
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+**Additional resources for this feature**
+
+
+- [User Experience Virtualization](uev-for-windows.md)
+
+- [Prepare a UE-V Deployment](uev-prepare-for-deployment.md)
+
+- [Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md)
+
+- [Administering UE-V ](uev-administering-uev.md)
+
+- [Troubleshooting UE-V ](uev-troubleshooting.md)
+
+- [Technical Reference for UE-V](uev-technical-reference.md)
diff --git a/windows/manage/uev-security-considerations.md b/windows/manage/uev-security-considerations.md
new file mode 100644
index 0000000000..2cfc34087e
--- /dev/null
+++ b/windows/manage/uev-security-considerations.md
@@ -0,0 +1,225 @@
+---
+title: Security Considerations for UE-V
+description: Security Considerations for UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Security Considerations for UE-V
+
+
+This topic contains a brief overview of accounts and groups, log files, and other security-related considerations for User Experience Virtualization (UE-V). For more information, follow the links that are provided here.
+
+## Security considerations for UE-V configuration
+
+
+**Important**
+When you create the settings storage share, limit the share access to users who require access.
+
+Because settings packages might contain personal information, you should take care to protect them as well as possible. In general, do the following:
+
+- Restrict the share to only those users who require access. Create a security group for users who have redirected folders on a particular share and limit access to only those users.
+
+- When you create the share, hide the share by putting a $ after the share name. This addition hides the share from casual browsers, and the share is not visible in My Network Places.
+
+- Only give users the minimum amount of permissions that they must have. The following tables show the required permissions.
+
+1. Set the following share-level SMB permissions for the setting storage location folder.
+
+
+
+
+
+
+
+
+
+
+
+ Everyone |
+ No permissions |
+
+
+ Security group of UE-V |
+ Full control |
+
+
+
+
+
+2. Set the following NTFS file system permissions for the settings storage location folder.
+
+
+
+
+
+
+
+
+
+
+
+
+ Creator/Owner |
+ No permissions |
+ No permissions |
+
+
+ Domain Admins |
+ Full control |
+ This folder, subfolders, and files |
+
+
+ Security group of UE-V users |
+ List folder/read data, create folders/append data |
+ This folder only |
+
+
+ Everyone |
+ Remove all permissions |
+ No permissions |
+
+
+
+
+3. Set the following share-level SMB permissions for the settings template catalog folder.
+
+
+
+
+
+
+
+
+
+
+
+ Everyone |
+ No permissions |
+
+
+ Domain computers |
+ Read permission Levels |
+
+
+ Administrators |
+ Read/write permission levels |
+
+
+
+
+
+4. Set the following NTFS permissions for the settings template catalog folder.
+
+
+
+
+
+
+
+
+
+
+
+
+ Creator/Owner |
+ Full control |
+ This folder, subfolders, and files |
+
+
+ Domain Computers |
+ List folder contents and Read permissions |
+ This folder, subfolders, and files |
+
+
+ Everyone |
+ No permissions |
+ No permissions |
+
+
+ Administrators |
+ Full Control |
+ This folder, subfolders, and files |
+
+
+
+
+### Use Windows Server as of Windows Server 2003 to host redirected file shares
+
+User settings package files contain personal information that is transferred between the client computer and the server that stores the settings packages. Because of this process, you should ensure that the data is protected while it travels over the network.
+
+User settings data is vulnerable to these potential threats: interception of the data as it passes over the network, tampering with the data as it passes over the network, and spoofing of the server that hosts the data.
+
+As of Windows Server 2003, several features of the Windows Server operating system can help secure user data:
+
+- **Kerberos** - Kerberos is standard on all versions of Microsoft Windows 2000 Server and Windows Server beginning with Windows Server 2003. Kerberos ensures the highest level of security to network resources. NTLM authenticates the client only; Kerberos authenticates the server and the client. When NTLM is used, the client does not know whether the server is valid. This difference is particularly important if the client exchanges personal files with the server, as is the case with Roaming User Profiles. Kerberos provides better security than NTLM. Kerberos is not available on the Microsoft Windows NT Server 4.0 or earlier operating systems.
+
+- **IPsec** - The IP Security Protocol (IPsec) provides network-level authentication, data integrity, and encryption. IPsec ensures the following:
+
+ - Roamed data is safe from data modification while data is en route.
+
+ - Roamed data is safe from interception, viewing, or copying.
+
+ - Roamed data is safe from access by unauthenticated parties.
+
+- **SMB Signing** - The Server Message Block (SMB) authentication protocol supports message authentication, which prevents active message and "man-in-the-middle" attacks. SMB signing provides this authentication by placing a digital signature into each SMB. The digital signature is then verified by both the client and the server. In order to use SMB signing, you must first either enable it, or you must require it on both the SMB client and the SMB server. Note that the SMB signing imposes a performance penalty. It does not consume any more network bandwidth, but it uses more CPU cycles on the client and server side.
+
+### Always use the NTFS file system for volumes that hold user data
+
+For the most secure configuration, configure servers that host the UE-V settings files to use the NTFS file system. Unlike the FAT file system, NTFS supports Discretionary access control lists (DACLs) and system access control lists (SACLs). DACLs and SACLs control who can perform operations on a file and what events trigger the logging of actions that is performed on a file.
+
+### Do not rely on EFS to encrypt user files when they are transmitted over the network
+
+When you use the Encrypting File System (EFS) to encrypt files on a remote server, the encrypted data is not encrypted during transit over the network; it only becomes encrypted when it is stored on disk.
+
+This encryption process does not apply when your system includes Internet Protocol security (IPsec) or Web Distributed Authoring and Versioning (WebDAV). IPsec encrypts data while it is transported over a TCP/IP network. If the file is encrypted before it is copied or moved to a WebDAV folder on a server, it remains encrypted during the transmission and while it is stored on the server.
+
+### Let the UE-V service create folders for each user
+
+To ensure that UE-V works optimally, create only the root share on the server, and let the UE-V service create the folders for each user. UE-V creates these user folders with the appropriate security.
+
+This permission configuration enables users to create folders for settings storage. The UE-V service creates and secures a settings package folder while it runs in the context of the user. Users receive full control to their settings package folder. Other users do not inherit access to this folder. You do not have to create and secure individual user directories. The UE-V service that runs in the context of the user does it automatically.
+
+> **Note** Additional security can be configured when a Windows Server is used for the settings storage share. UE-V can be configured to verify that either the local Administrators group or the current user is the owner of the folder where settings packages are stored. To enable additional security, use the following command:
+
+1. Add the REG\_DWORD registry key RepositoryOwnerCheckEnabled to `HKEY_LOCAL_MACHINE\Software\Microsoft\UEV\Agent\Configuration`.
+
+2. Set the registry key value to *1*.
+
+When this configuration setting is in place, the UE-V service verifies that the local Administrators group or current user is the owner of the settings package folder. If not, then the UE-V service does not grant access to the folder.
+
+
+If you must create folders for the users, ensure that you have the correct permissions set.
+
+We strongly recommend that you do not pre-create folders. Instead, let the UE-V service create the folder for the user.
+
+### Ensure correct permissions to store UE-V 2 settings in a home directory or custom directory
+
+If you redirect UE-V settings to a user’s home directory or a custom Active Directory (AD) directory, ensure that the permissions on the directory are set appropriately for your organization.
+
+## Have a suggestion for UE-V?
+
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Technical Reference for UE-V](uev-technical-reference.md)
diff --git a/windows/manage/uev-sync-methods.md b/windows/manage/uev-sync-methods.md
new file mode 100644
index 0000000000..7b78c035f0
--- /dev/null
+++ b/windows/manage/uev-sync-methods.md
@@ -0,0 +1,42 @@
+---
+title: Sync Methods for UE-V
+description: Sync Methods for UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# Sync Methods for UE-V
+
+
+The User Experience Virtualization (UE-V) service lets you synchronize users’ application and Windows settings with the settings storage location. The *Sync Method* configuration defines how the UE-V service uploads and downloads those settings to the settings storage location. UE-V includes a SyncMethod called the *SyncProvider*. For more information about trigger events that start the synchronization of application and Windows settings, see [Sync Trigger Events for UE-V](uev-sync-trigger-events.md).
+
+## SyncMethod Configuration
+
+This table provides a description of each SyncMethod configuration:
+
+| **SyncMethod Configuration** | **Description** |
+|------------------------------|---------------------|
+| SyncProvider (Default) | Settings changes for a specific application or for global Windows desktop settings are saved locally to a cache folder. These changes are then synchronized with the settings storage location when a synchronization trigger event takes place. Pushing out changes will save the local changes to the settings storage path.
This default setting is the gold standard for computers. This option attempts to synchronize the setting and times out after a short delay to ensure that the application or operating system startup isn’t delayed for a long period of time.
This functionality is also tied to the Scheduled task – Sync Controller Application. The administrator controls the frequency of the Scheduled task. By default, computers synchronize their settings every 30 min after logging on. |
+| External | This configuration method specifies that if UE-V settings are written to a local folder on the user computer, then any external sync engine (such as OneDrive for Business, Work Folders, Sharepoint, or Dropbox) can be used to apply these settings to the different computers that users access. |
+| None | This configuration setting is designed for the Virtual Desktop Infrastructure (VDI) and Streamed Application experience primarily. This setting should be used on computers running the Windows Server operating system in a datacenter, where the connection will always be available.
Any settings changes are saved directly to the server. If the network connection to the settings storage path is not available, then the settings changes are cached on the device and are synchronized the next time that the Sync Provider runs. If the settings storage path is not found and the user profile is removed from a pooled VDI environment on logoff, then these settings changes are lost, and the user must reapply the change when the computer can again reach the settings storage path.
Apps and OS will wait indefinitely for the location to be present. This could cause App load or OS logon time to dramatically increase if the location is not found. |
+
+You can configure the sync method in these ways:
+
+- Through [Group Policy](uev-configuring-uev-with-group-policy-objects.md) settings
+
+- With the [System Center Configuration Pack](uev-configuring-uev-with-system-center-configuration-manager.md) for UE-V
+
+- With [Windows PowerShell or Windows Management Instrumentation (WMI)](uev-administering-uev-with-windows-powershell-and-wmi.md)
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+[Deploy Required UE-V Features](uev-deploy-required-features.md)
+
+[Technical Reference for UE-V](uev-technical-reference.md)
diff --git a/windows/manage/uev-sync-trigger-events.md b/windows/manage/uev-sync-trigger-events.md
new file mode 100644
index 0000000000..811a463e97
--- /dev/null
+++ b/windows/manage/uev-sync-trigger-events.md
@@ -0,0 +1,126 @@
+---
+title: Sync Trigger Events for UE-V
+description: Sync Trigger Events for UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# Sync Trigger Events for UE-V
+
+
+User Experience Virtualization (UE-V) lets you synchronize your application and Windows settings across all your domain-joined devices. *Sync trigger events* define when the UE-V service synchronizes those settings with the settings storage location. For more information about Sync Method configuration, see [Sync Methods for UE-V](uev-sync-methods.md).
+
+## UE-V Sync Trigger Events
+
+
+The following table explains the trigger events for classic applications and Windows settings.
+
+
+
+
+
+
+
+
+
+UE-V Trigger Event |
+SyncMethod=SyncProvider |
+SyncMethod=None |
+
+
+Windows Logon |
+
+Application and Windows settings are imported to the local cache from the settings storage location.
+[Asynchronous Windows settings](http://technet.microsoft.com/library/dn458932.aspx#autosyncsettings2) are applied.
+Synchronous Windows settings will be applied during the next Windows logon.
+Application settings will be applied when the application starts.
+ |
+
+Application and Windows settings are read directly from the settings storage location.
+Asynchronous and synchronous Windows settings are applied.
+Application settings will be applied when the application starts.
+ |
+
+
+Windows Logoff |
+Store changes locally and cache and copy asynchronous and synchronous Windows settings to the settings storage location server, if available |
+Store changes to asynchronous and synchronous Windows settings storage location |
+
+
+Windows Connect (RDP) / Unlock |
+Synchronize any asynchronous Windows settings from settings storage location to local cache, if available.
+Apply cached Windows settings |
+Download and apply asynchronous windows settings from settings storage location |
+
+
+Windows Disconnect (RDP) / Lock |
+Store asynchronous Windows settings changes to the local cache.
+Synchronize any asynchronous Windows settings from the local cache to settings storage location, if available |
+Store asynchronous Windows settings changes to the settings storage location |
+
+
+Application start |
+Apply application settings from local cache as the application starts |
+Apply application settings from settings storage location as the application starts |
+
+
+Application closes |
+Store any application settings changes to the local cache and copy settings to settings storage location, if available |
+Store any application settings changes to settings storage location |
+
+
+Sync Controller Scheduled Task
+ |
+Application and Windows settings are synchronized between the settings storage location and the local cache.
+
+ Note
+ Settings changes are not cached locally until an application closes. This trigger will not export changes made to a currently running application.
+ For Windows settings, this means that any changes will not be cached locally and exported until the next Lock (Asynchronous) or Logoff (Asynchronous and Synchronous).
+
+
+
+
+Settings are applied in these cases:
+
+Asynchronous Windows settings are applied directly.
+Application settings are applied when the application starts.
+Both asynchronous and synchronous Windows settings are applied during the next Windows logon.
+Windows app (AppX) settings are applied during the next refresh. See [Monitor Application Settings](http://technet.microsoft.com/library/dn458944.aspx) for more information.
+ |
+NA |
+
+
+Asynchronous Settings updated on remote store* |
+Load and apply new asynchronous settings from the cache. |
+Load and apply settings from central server |
+
+
+
+
+
+
+## Have a suggestion for UE-V?
+
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+
+[Technical Reference for UE-V](uev-technical-reference.md)
+
+[Changing the Frequency of UE-V Scheduled Tasks](uev-changing-the-frequency-of-scheduled-tasks.md)
+
+[Choose the Configuration Method for UE-V](uev-deploy-required-features.md)
+
+
+
+
+
+
+
+
+
diff --git a/windows/manage/uev-synchronizing-microsoft-office-with-uev.md b/windows/manage/uev-synchronizing-microsoft-office-with-uev.md
new file mode 100644
index 0000000000..47aaa206af
--- /dev/null
+++ b/windows/manage/uev-synchronizing-microsoft-office-with-uev.md
@@ -0,0 +1,139 @@
+---
+title: Synchronizing Microsoft Office with UE-V
+description: Synchronizing Office with UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Synchronizing Office with UE-V
+
+Microsoft User Experience Virtualization (UE-V) supports the synchronization of Microsoft Office application settings. The combination of UE-V and App-V support for Office enables the same experience on virtualized instances of Office from any UE-V-enabled device or virtualized desktop.
+
+To synchronize Office applications settings, you can download Office templates from the [Microsoft User Experience Virtualization (UE-V) Template Gallery](http://go.microsoft.com/fwlink/p/?LinkId=246589). This resource provides Microsoft-authored UE-V settings location templates as well as community-developed settings location templates.
+
+
+## Microsoft Office support in UE-V
+
+UE-V includes settings location templates for Microsoft Office 2016, 2013, and 2010. In previous versions of UE-V, settings location templates for Office 2013 and Office 2010 were distributed and registered when you installed the UE-V agent. Now that UE-V is a feature in Windows 10, version 1607, settings location templates are installed when you install or upgrade to the new operating system.
+
+These templates help synchronize users’ Office experience between devices. Microsoft Office 2016 settings roamed by Office 365 experience are not included in these settings. For a list of Office 365-specific settings, see [Overview of user and roaming settings for Office](http://go.microsoft.com/fwlink/p/?LinkId=391220).
+
+## Synchronized Office Settings
+
+
+Review the following tables for details about Office support in UE-V:
+
+### Supported UE-V templates for Microsoft Office
+
+
+
+
+
+
+
+
+
+
+
+
+MicrosoftOffice2016Win32.xml
+MicrosoftOffice2016Win64.xml
+MicrosoftSkypeForBusiness2016Win32.xml
+MicrosoftSkypeForBusiness2016Win64.xml |
+MicrosoftOffice2013Win32.xml
+MicrosoftOffice2013Win64.xml
+MicrosoftLync2013Win32.xml
+MicrosoftLync2013Win64.xml |
+MicrosoftOffice2010Win32.xml
+MicrosoftOffice2010Win64.xml
+MicrosoftLync2010.xml
+ |
+
+
+
+
+
+
+### Microsoft Office Applications supported by the UE-V templates
+
+
+
+
+
+
+
+
+
+Microsoft Access 2016
+Microsoft Lync 2016
+Microsoft Excel 2016
+Microsoft OneNote 2016
+Microsoft Outlook 2016
+Microsoft PowerPoint 2016
+Microsoft Project 2016
+Microsoft Publisher 2016
+Microsoft SharePoint Designer 2013 (not udpated for 2016)
+Microsoft Visio 2016
+Microsoft Word 2016
+Microsoft Office Upload Manager |
+Microsoft Access 2013
+Microsoft Lync 2013
+Microsoft Excel 2013
+Microsoft InfoPath 2013
+Microsoft OneNote 2013
+Microsoft Outlook 2013
+Microsoft PowerPoint 2013
+Microsoft Project 2013
+Microsoft Publisher 2013
+Microsoft SharePoint Designer 2013
+Microsoft Visio 2013
+Microsoft Word 2013
+Microsoft Office Upload Manager |
+Microsoft Access 2010
+Microsoft Lync 2010
+Microsoft Excel 2010
+Microsoft InfoPath 2010
+Microsoft OneNote 2010
+Microsoft Outlook 2010
+Microsoft PowerPoint 2010
+Microsoft Project 2010
+Microsoft Publisher 2010
+Microsoft SharePoint Designer 2010
+Microsoft Visio 2010
+Microsoft Word 2010
+ |
+
+
+
+
+
+
+## Deploying Office templates
+
+
+You can deploy UE-V settings location template with the following methods:
+
+- **Registering template with PowerShell**. If you use Windows PowerShell to manage computers, run the following Windows PowerShell command as Administrator to register this settings location template:
+
+ ``` syntax
+ Register-UevTemplate -Path
+ ```
+
+ For more information about using UE-V and Windows PowerShell, see [Managing UE-V settings location templates using Windows PowerShell and WMI](uev-managing-settings-location-templates-using-windows-powershell-and-wmi.md).
+
+- **Registering template with Template Catalog Path**. If you use the Settings Template Catalog Path to manage templates on users’ computers, copy the Office template into the folder defined in the UE-V service. The next time the Template Auto Update (ApplySettingsCatalog.exe) scheduled task runs, the settings location template will be registered on the device. For more information, see [Deploy a settings template catalog](uev-deploy-uev-for-custom-applications.md#deployasettingstemplatecatalog).
+
+- **Registering template with Configuration Manager**. If you use Configuration Manager to manage your UE-V settings storage templates, recreate the Template Baseline CAB, import it into Configuration Manager, and then deploy the baseline to user devices. For more information, see the guidance provided in the documentation for the [System Center Configuration Pack for User Experience Virtualization](http://go.microsoft.com/fwlink/?LinkId=317263).
+
+## Have a suggestion for UE-V?
+
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
diff --git a/windows/manage/uev-technical-reference.md b/windows/manage/uev-technical-reference.md
new file mode 100644
index 0000000000..d8eec5847d
--- /dev/null
+++ b/windows/manage/uev-technical-reference.md
@@ -0,0 +1,69 @@
+---
+title: Technical Reference for UE-V
+description: Technical Reference for UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Technical Reference for UE-V
+
+
+This technical reference section includes additional technical documentation about the various features of User Experience Virtualization (UE-V). This information is provided to help the administrator better understand UE-V.
+
+## Technical reference topics for UE-V
+
+
+- [Sync Methods for UE-V](uev-sync-methods.md)
+
+ Defines how UE-V synchronizes settings between computers and the settings storage location. Sync Provider is the default sync method for UE-V. This topic includes technical reference information for sync methods, including the Sync Provider.
+
+- [Sync Trigger Events for UE-V](uev-sync-trigger-events.md)
+
+ Defines when the UE-V service synchronizes those settings with the settings storage location. This topic provides technical reference information about when synchronization takes place based upon the sync method deployed.
+
+- [Synchronizing Microsoft Office with UE-V](uev-synchronizing-microsoft-office-with-uev.md)
+
+ Provides guidance for downloading and enabling the Microsoft-authored UE-V settings location templates that support Microsoft Office settings synchronization.
+
+- [Application Template Schema Reference for UE-V](uev-application-template-schema-reference.md)
+
+ Details the XML structure of UE-V settings location templates and provides guidance for editing these files.
+
+- [Accessibility for UE-V](uev-accessibility.md)
+
+ Describes features and services that make UE-V more accessible for people with disabilities.
+
+- [Security Considerations for UE-V](uev-security-considerations.md)
+
+ Provides a brief overview of accounts, groups, and other security-related considerations for UE-V.
+
+## Other resources for this feature
+
+
+- [User Experience Virtualization overview](uev-for-windows.md)
+
+- [Get Started with UE-V](uev-getting-started.md)
+
+- [Prepare a UE-V Deployment](uev-prepare-for-deployment.md)
+
+- [Administering UE-V](uev-administering-uev.md)
+
+- [Troubleshooting UE-V](uev-troubleshooting.md)
+
+## Have a suggestion for UE-V?
+
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+
+
+
+
+
+
+
+
diff --git a/windows/manage/uev-troubleshooting.md b/windows/manage/uev-troubleshooting.md
new file mode 100644
index 0000000000..bc48051f72
--- /dev/null
+++ b/windows/manage/uev-troubleshooting.md
@@ -0,0 +1,79 @@
+---
+title: Troubleshooting UE-V
+description: Troubleshooting UE-V
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Troubleshooting UE-V
+
+
+Troubleshooting content is not included in the Administrator's Guide for this product. Instead, you can find troubleshooting information for this product on the [TechNet Wiki](http://go.microsoft.com/fwlink/p/?LinkId=224905).
+
+## Find troubleshooting information
+
+
+You can use the following information to find troubleshooting content or additional technical content for this product.
+
+
+**To search the TechNet Wiki**
+
+1. Open a web browser and browse to the [TechNet Wiki](http://go.microsoft.com/fwlink/p/?LinkId=224905) home page.
+
+2. Locate the **Search TechNet Wiki** search box and enter your search term.
+
+3. Review the search results for assistance.
+
+## Create a troubleshooting article
+
+
+If you have a troubleshooting tip or a best practice to share that is not already included in TechNet Wiki, you can create your own TechNet Wiki article.
+
+**To create a TechNet Wiki troubleshooting or best practices article**
+
+1. Open a web browser and browse to the [TechNet Wiki](http://go.microsoft.com/fwlink/p/?LinkId=224905) home page.
+
+2. Sign in with your Microsoft account.
+
+3. Review the **Getting Started** section to learn the basics of the TechNet Wiki and its articles.
+
+4. Select **Post an article** in the **Getting Started** section.
+
+5. On the Wiki article **Add Page** page, select **Insert Template** from the toolbar, select the troubleshooting article template, which is named **Troubleshooting.html**, and then click **Insert**.
+
+6. Give the article a descriptive title, and then overwrite the template information as needed to create your article.
+
+7. After you review your article, add a tag that is named **Troubleshooting** and another tag for the product name. To add tags help other users find your content.
+
+8. Click **Save** to publish the article to the TechNet Wiki.
+
+## Other resources for this feature
+
+
+- [User Experience Virtualization overview](uev-for-windows.md)
+
+- [Get Started with UE-V](uev-getting-started.md)
+
+- [Prepare a UE-V deployment](uev-prepare-for-deployment.md)
+
+- [Administering UE-V](uev-administering-uev.md)
+
+- [Technical reference for UE-V](uev-technical-reference.md)
+
+## Have a suggestion for UE-V?
+
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+
+
+
+
+
+
+
+
diff --git a/windows/manage/uev-upgrade-uev-from-previous-releases.md b/windows/manage/uev-upgrade-uev-from-previous-releases.md
new file mode 100644
index 0000000000..7b70598124
--- /dev/null
+++ b/windows/manage/uev-upgrade-uev-from-previous-releases.md
@@ -0,0 +1,104 @@
+---
+title: Upgrade to UE-V for Windows 10
+description: Explains how to upgrade to the latest version of UE-V.
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# Upgrade to UE-V for Windows 10
+
+Applies to: Windows 10, version 1607
+
+If you’re already using UE-V 2.x and you’re planning to upgrade user devices to Windows 10, version 1607 or later releases, you need to make only a few adjustments to your existing environment. These steps are explained in more detail below.
+
+1. Upgrade user devices to Windows 10, version 1607 or later release.
+
+2. Verify that UE-V settings were migrated correctly.
+
+3. Enable the UE-V service on user devices.
+
+4. Install the UE-V template generator.
+
+> **Important** You can upgrade your existing UE-V installation to Windows 10, version 1607 from UE-V versions 2.1 or 2.0 only. If you are using a previous version of UE-V, you’ll need to upgrade from that version to UE-V 2.x before you upgrade to Windows 10, version 1607..
+
+## Upgrade user devices to Windows 10, version 1607
+
+Performing an in-place upgrade on user devices automatically installs the UE-V service, updates the settings location path, and migrates users' UE-V settings. See the [Windows 10 for IT Pros documentation](https://technet.microsoft.com/itpro/windows/index) for information about upgrading user devices to Windows 10.
+
+## Verify that UE-V settings were migrated correctly
+
+After upgrading a user device to Windows 10, it’s important to verify that UE-V settings and template registrations were migrated correctly during the upgrade. You can verify UE-V settings using Windows Powershell or the device’s registry.
+
+**To verify UE-V settings using Windows PowerShell**
+
+1. Run PowerShell as Administrator and type **Get-UEVConfiguration** to view current configurations.
+
+2. Check that the settings were successfully updated.
+
+3. Type **Get-UEVTemplate** to check that your templates are still registered.
+
+ > **Note** You’ll need to register the Notepad template again after you upgrade the device to Windows 10.
+
+**To verify UE-V settings using the device’s registry**
+
+1. In a command prompt, run **Regedit** as Administrator.
+
+2. Navigate to **HKEY_LOCAL_MACHINE\Software\Microsoft\UEV\Agent\Configuration.**
+
+3. Verify that the settings storage path and the settings template catalog path are pointing to the same locations as before you upgraded the device to Windows 10.
+
+## Enable the UE-V service on user devices
+
+The UE-V service is the client-side component that captures user-personalized application and Windows settings and saves them in settings packages. Settings packages are built, locally stored, and copied to the settings storage location.
+
+With Windows 10, version 1607 and later, the UE-V service is installed on user devices and no longer requires a separate download and installation. Enable the service to start using UE-V. You can enable the service with the Group Policy editor or with Windows PowerShell.
+
+> **Important** The UE-V Agent used in prior releases of UE-V is replaced with the UE service. The UE-V service included with Windows 10, version 1607 and later releases, does not include the agent user interface and is configurable through cmdlets or registry settings only.
+
+**To enable the UE-V service with Group Policy**
+
+1. Open the device’s **Group Policy Editor**.
+
+2. Navigate to **Computer Configuration > Administrative Templates > Windows Components > Microsoft User Experience Virtualization**.
+
+3. Run **Enable UEV**
+
+4. Restart the device.
+
+**To enable the UE-V service with Windows PowerShell**
+
+1. Run PowerShell as Administrator and enter **Enable-UEV**.
+
+2. Restart the device.
+
+3. Type **Get-UEVStatus** to verify that the service was successfully enabled.
+
+## Install the UE-V template generator
+
+The UE-V template generator is included in the Windows Assessment and Deployment Kit (ADK) for Windows 10.
+
+**To install the UE-V template generator**
+
+1. Go to [Download the Windows ADK](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) to access the ADK.
+
+2. Select the **Get Windows ADK for Windows 10** button on this page to start the ADK installer. On the screen pictured below, select **Microsoft User Experience Virtualization (UE-V) Template Generator** and then select **Install**.
+
+ 
+
+3. To open the generator, select **Microsoft User Experience Virtualization Generator** from the **Start** menu.
+
+
+## Other resources for this feature
+
+- [UE-V Release Notes](uev-release-notes-1607.md)
+
+- [Prepare a UE-V Deployment](uev-prepare-for-deployment.md)
+
+- [Administer UE-V](uev-administering-uev.md)
+
+- [Migrating settings packages](uev-migrating-settings-packages.md)
+
+- [Technical Reference for UE-V](uev-technical-reference.md)
diff --git a/windows/manage/uev-using-uev-with-application-virtualization-applications.md b/windows/manage/uev-using-uev-with-application-virtualization-applications.md
new file mode 100644
index 0000000000..1f495c9b74
--- /dev/null
+++ b/windows/manage/uev-using-uev-with-application-virtualization-applications.md
@@ -0,0 +1,54 @@
+---
+title: Using UE-V with Application Virtualization applications
+description: Using UE-V with Application Virtualization applications
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Using UE-V with Application Virtualization applications
+
+
+User Experience Virtualization (UE-V) supports Microsoft Application Virtualization (App-V) applications without any required modifications to either the App-V package or the UE-V template. However, an additional step is required because you cannot run the UE-V template generator directly on a virtualized App-V application. Instead, you must install the application locally, generate the template, and then apply the template to the virtualized application. UE-V supports App-V for Windows 10 packages and App-V 5.0 packages.
+
+## UE-V settings synchronization for App-V applications
+
+
+UE-V monitors when an application opens by the program name and, optionally, by file version numbers and product version numbers, whether the application is installed locally or virtually by using App-V. When the application starts, UE-V monitors the App-V process, applies any settings that are stored in the user's settings storage path, and then enables the application to start normally. UE-V monitors App-V applications and automatically translates the relevant file and registry paths to the virtualized location as opposed to the physical location outside the App-V computing environment.
+
+ **To implement settings synchronization for a virtualized application**
+
+1. Run the UE-V template generator to collect the settings of the locally installed application whose settings you want to synchronize between computers. This process creates a settings location template. If you use a built-in template such as a Microsoft Office template, skip this step. For more information about using the UE-V template generator, see [Deploy UE-V for custom applications](uev-deploy-uev-for-custom-applications.md#createcustomtemplates).
+
+2. Install the App-V application package if you have not already done so.
+
+3. Publish the template to the location of your settings template catalog or manually install the template by using the `Register-UEVTemplate` Windows PowerShell cmdlet.
+
+ **Note**
+ If you publish the newly created template to the settings template catalog, the client does not receive the template until the sync provider updates the settings. To manually start this process, open **Task Scheduler**, expand **Task Scheduler Library**, expand **Microsoft**, and expand **UE-V**. In the results pane, right-click **Template Auto Update**, and then click **Run**.
+
+
+
+4. Start the App-V package.
+
+## Have a suggestion for UE-V?
+
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+
+[Administering UE-V](uev-administering-uev.md)
+
+
+
+
+
+
+
+
+
diff --git a/windows/manage/uev-whats-new-in-uev-for-windows.md b/windows/manage/uev-whats-new-in-uev-for-windows.md
new file mode 100644
index 0000000000..55ed88b868
--- /dev/null
+++ b/windows/manage/uev-whats-new-in-uev-for-windows.md
@@ -0,0 +1,103 @@
+---
+title: What's New in UE-V for Windows 10, version 1607
+description: What's New in UE-V for Windows 10, version 1607
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+# What's New in UE-V
+
+Applies to: Windows 10, version 1607
+
+User Experience Virtualization (UE-V) for Windows 10, version 1607, includes these new features and capabilities compared to UE-V 2.1. See [UE-V Release notes](uev-release-notes-1607.md) for more information about the UE-V for Windows 10, version 1607 release.
+
+## UE-V is now a feature in Windows 10
+
+With Windows 10, version 1607 and later releases, UE-V is included with [Windows 10 for Enterprise](https://www.microsoft.com/en-us/WindowsForBusiness/windows-for-enterprise) and is no longer part of the Microsoft Desktop Optimization Pack.
+
+The changes in UE-V for Windows 10, version 1607 impact already existing implementations of UE-V in the following ways:
+
+- The UE-V Agent is replaced by the UE-V service. The UE-V service is installed with Windows 10, version 1607 and no longer has to be deployed separately. Performing an in-place upgrade to Windows 10, version 1607, on user devices automatically installs the UE-V service, migrates users’ UE-V configurations, and updates the settings storage path.
+
+- The UE-V template generator is available from the Windows 10 ADK. In previous releases of UE-V, the template generator was included in the Microsoft Desktop Optimization Pack. Although you’ll need to use the new template generator to create new settings location templates, existing settings location templates will continue to work.
+
+For more information about how to configure an existing UE-V installation after upgrading user devices to Windows 10, see [Upgrade to UE-V for Windows 10](uev-upgrade-uev-from-previous-releases.md).
+
+> **Important** You can upgrade your existing UE-V installation to Windows 10 from UE-V versions 2.1 or 2.0 only. If you are using a previous version of UE-V, you’ll need to upgrade from that version to UE-V 2.x before you upgrade to Windows 10.
+
+## New UE-V template generator is available from the Windows 10 ADK
+
+UE-V for Windows 10 includes a new template generator, available from a new location. If you are upgrading from an existing UE-V installation, you’ll need to use the new generator to create settings location templates. The UE-V for Windows 10 template generator is now available in the [Windows 10 Assessment and Deployment Kit](https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit) (Windows ADK).
+
+## Compatibility with Microsoft Enterprise State Roaming
+
+With Windows 10, version 1607, users can synchronize Windows application settings and Windows operating system settings to Azure instead of to OneDrive. You can use the Windows 10 enterprise sync functionality together with UE-V on on-premises domain-joined devices only.
+
+In hybrid cloud environments, UE-V can roam win32 applications on-premise while [Enterprise State Roaming](https://azure.microsoft.com/documentation/articles/active-directory-windows-enterprise-state-roaming-overview/) (ESR) can roam the rest, e.g., Windows and desktop settings, themes, colors, etc., to an Azure cloud installation.
+
+To configure UE-V to roam Windows desktop and application data only, change the following group policies:
+
+- Disable “Roam Windows settings” group policy
+
+- Enable “Do not synchronize Windows Apps” group policy
+
+For more information about using UE-V with Enterprise State Roaming, see [Settings and data roaming FAQ](https://azure.microsoft.com/documentation/articles/active-directory-windows-enterprise-state-roaming-faqs/#what-are-the-options-for-roaming-settings-for-existing-windows-desktop-applications).
+
+Additionally, to enable Windows 10 and UE-V to work together, configure these policy settings in the Microsoft User Experience Virtualization node:
+
+- Enable “Do Not Synchronize Windows Apps”
+
+- Disable “Sync Windows Settings”
+
+## Settings Synchronization Behavior Changed in UE-V for Windows 10
+
+While earlier versions of UE-V roamed taskbar settings between Windows 10 devices, UE-V for Windows 10, version 1607 does not synchronize taskbar settings between devices running Windows 10 and devices running previous versions of Windows.
+
+In addition, UE-for Windows does not synchronize settings between the Microsoft Calculator in Windows 10 and the Microsoft Calculator in previous versions of Windows.
+
+## Support Added for Roaming Network Printers
+
+Users can now print to their saved network printers from any network device, including their default network printer.
+
+Printer roaming in UE-V requires one of these scenarios:
+
+- The print server can download the required driver when it roams to a new device.
+
+- The driver for the roaming network printer is pre-installed on any device that needs to access that network printer.
+
+- The printer driver can be imported from Windows Update.
+
+> **Note** The UE-V printer roaming feature does not roam printer settings or preferences, such as printing double-sided.
+
+## Office 2016 Settings Location Template
+
+UE-V for Windows 10, version 1607 includes the Microsoft Office 2016 settings location template with improved Outlook signature support. We’ve added synchronization of default signature settings for new, reply, and forwarded emails. Users no longer have to choose the default signature settings.
+
+> **Note** An Outlook profile must be created on any device on which a user wants to synchronize their Outlook signature. If the profile is not already created, the user can create one and then restart Outlook on that device to enable signature synchronization.
+
+UE-V works with Office 365 to determine whether Office 2016 settings are roamed by Office 365. If settings are roamed by Office 365, they are not roamed by UE-V. See [Overview of user and roaming settings for Microsoft Office](https://technet.microsoft.com/library/jj733593.aspx) for more information.
+
+To enable settings synchronization using UE-V, do one of the following:
+
+- Use Group Policy to disable Office 365 synchronization
+
+- Do not enable the Office 365 synchronization experience during Office 2013 installation
+
+UE-V includes Office 2016, Office 2013, and Office 2010 templates. Office 2007 templates are no longer supported. Users can still use Office 2007 templates from UE-V 2.0 or earlier and can still get the templates from the UE-V template gallery located [here](http://go.microsoft.com/fwlink/p/?LinkID=246589).
+
+## Have a suggestion for UE-V?
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+- [Microsoft User Experience Virtualization](uev-for-windows.md)
+
+- [Get Started with UE-V](uev-getting-started.md)
+
+- [Prepare a UE-V Deployment](uev-prepare-for-deployment.md)
+
+- [User Experience Virtualization (UE-V) Release Notes](uev-release-notes-1607.md) for Windows 10, version 1607
diff --git a/windows/manage/uev-working-with-custom-templates-and-the-uev-generator.md b/windows/manage/uev-working-with-custom-templates-and-the-uev-generator.md
new file mode 100644
index 0000000000..d708176c7f
--- /dev/null
+++ b/windows/manage/uev-working-with-custom-templates-and-the-uev-generator.md
@@ -0,0 +1,162 @@
+---
+title: Working with Custom UE-V Templates and the UE-V Template Generator
+description: Working with Custom UE-V Templates and the UE-V Template Generator
+author: MaggiePucciEvans
+ms.pagetype: mdop, virtualization
+ms.mktglfcycl: deploy
+ms.sitesec: library
+ms.prod: w10
+---
+
+
+# Working with custom UE-V templates and the UE-V template generator
+
+Applies to: Windows 10, version 1607
+
+User Experience Virtualization (UE-V) uses XML files called ***settings location templates*** to monitor and synchronize application settings and Windows settings between user devices. By default, some settings location templates are included in UE-V. However, if you want to synchronize settings for desktop applications other than those included in the default templates, you can create your own custom settings location templates with the UE-V template generator. You can also edit or validate custom settings location templates with the UE-V template generator.
+
+Use the UE-V template generator to monitor, discover, and capture the locations where Win32 applications store settings. The template generator does not create settings location templates for the following types of applications:
+
+- Virtualized applications
+- Applications that are offered through Terminal Services
+- Java applications
+- Windows applications
+
+## Standard and non-standard settings locations
+
+The UE-V template generator helps you identify where applications search for settings files and registry settings that applications use to store settings information. The generator discovers settings only in locations that are accessible to a standard user. Settings that are stored in other locations are excluded.
+
+Discovered settings are grouped into two categories: **Standard** and **Non-standard**. Standard settings are recommended for synchronization, and UE-V can readily capture and apply them. Non-standard settings can potentially synchronize settings but, because of the rules that UE-V uses, these settings might not consistently or dependably synchronize settings. These settings might depend on temporary files, result in unreliable synchronization, or might not be useful. These settings locations are presented in the UE-V template generator. You can choose to include or exclude them on a case-by-case basis.
+
+The UE-V template generator opens the application as part of the discovery process. The generator can capture settings in the following locations:
+
+- **Registry Settings** – Registry locations under **HKEY\_CURRENT\_USER**
+
+- **Application Settings Files** – Files that are stored under \\ **Users** \\ \[User name\] \\ **AppData** \\ **Roaming**
+
+The UE-V template generator excludes locations, which commonly store application software files, but do not synchronize well between user computers or environments. The UE-V template generator excludes these locations. Excluded locations are as follows:
+
+- HKEY\_CURRENT\_USER registry keys and files to which the logged-on user cannot write values
+
+- HKEY\_CURRENT\_USER registry keys and files that are associated with the core functionality of the Windows operating system
+
+- All registry keys that are located in the HKEY\_LOCAL\_MACHINE hive, which requires administrator rights and might require to set a User Account Control (UAC) agreement
+
+- Files that are located in Program Files directories, which requires administrator rights and might require to set a UAC agreement
+
+- Files that are located under Users \\ \[User name\] \\ AppData \\ LocalLow
+
+- Windows operating system files that are located in %Systemroot%, which requires administrator rights and might require to set a UAC agreement
+
+If registry keys and files that are stored in these locations are required to synchronize application settings, you can manually add the excluded locations to the settings location template during the template creation process.
+
+## Edit settings location templates with the UE-V template generator
+
+Use the UE-V template generator to edit settings location templates. When the revised settings are added to the templates with the UE-V template generator, the version information within the template is automatically updated to ensure that any existing templates that are deployed in the enterprise are updated correctly.
+
+**To edit a UE-V settings location template with the UE-V template generator**
+
+1. Open the **Start** menu and navigate to **Windows Kits** > **Microsoft User Experience Virtualization (UE-V) Template Generator** to open the template generator.
+
+2. Click **Edit a settings location template**.
+
+3. In the list of recently used templates, select the template to be edited. Alternatively, click **Browse** to search for the settings template file. Click **Next** to continue.
+
+4. Review the **Properties**, **Registry** locations, and **Files** locations for the settings template. Edit as required.
+
+ - On the **Properties** tab, you can view and edit the following properties:
+
+ - **Application name** The application name that is written in the description of the program file properties.
+
+ - **Program name** The name of the program that is taken from the program file properties. This name usually has the .exe file name extension.
+
+ - **Product version** The product version number of the .exe file of the application. This property, together with the **File version**, helps determine which applications are targeted by the settings location template. This property accepts a major version number. If this property is empty, then the settings location template applies to all versions of the product.
+
+ - **File version** The file version number of the .exe file of the application. This property, along with the **Product version**, helps determine which applications are targeted by the settings location template. This property accepts a major version number. If this property is empty, the settings location template applies to all versions of the program.
+
+ - **Template author name** (optional) The name of the settings template author.
+
+ - **Template author email** (optional) The email address of the settings location template author.
+
+ - The **Registry** tab lists the **Key** and **Scope** of the registry locations that are included in the settings location template. You can edit the registry locations by using the **Tasks** drop-down menu. In the Tasks menu, you can add new keys, edit the name or scope of existing keys, delete keys, and browse the registry in which the keys are located. When you define the scope for the registry, you can use the **All Settings** scope to include all the registry settings under the specified key. Use **All Settings** and **Subkeys** to include all the registry settings under the specified key, subkeys, and subkey settings.
+
+ - The **Files** tab lists the file path and file mask of the file locations that are included in the settings location template. You can edit the file locations by using the **Tasks** drop-down menu. In the **Tasks** menu for file locations, you can add new files or folder locations, edit the scope of existing files or folders, delete files or folders, and open the selected location in Windows Explorer. To include all files in the specified folder, leave the file mask empty.
+
+5. Click **Save** to save the changes to the settings location template.
+
+6. Click **Close** to close the Settings Template Wizard. Exit the UE-V template generator application.
+
+ After you edit the settings location template for an application, you should test the template. Deploy the revised settings location template in a lab environment before you put it into production in the enterprise.
+
+**How to manually edit a settings location template**
+
+1. Create a local copy of the settings location template .xml file. UE-V settings location templates are .xml files that identify the locations where application store settings values.
+
+ >**Note**
+ A settings location template is unique because of the template **ID**. If you copy the template and rename the .xml file, template registration fails because UE-V reads the template **ID** tag in the .xml file to determine the name, not the file name of the .xml file. UE-V also reads the **Version** number to know if anything has changed. If the version number is higher, UE-V updates the template.
+
+
+2. Open the settings location template file with an XML editor.
+
+3. Edit the settings location template file. All changes must conform to the UE-V schema file that is defined in [SettingsLocationTempate.xsd](uev-application-template-schema-reference.md). By default, a copy of the .xsd file is located in \\ProgramData\\Microsoft\\UEV\\Templates.
+
+4. Increment the **Version** number for the settings location template.
+
+5. Save the settings location template file, and then close the XML editor.
+
+6. Validate the modified settings location template file by using the UE-V template generator.
+
+7. You must register the edited UE-V settings location template before it can synchronize settings between client computers. To register a template, open Windows PowerShell, and then run the following cmdlet: `update-uevtemplate [templatefilename]`. You can then copy the file to the settings storage catalog. The UE-V Agent on users’ computers should then update as scheduled in the scheduled task.
+
+## Validate settings location templates with the UE-V template generator
+
+
+It is possible to create or edit settings location templates in an XML editor without using the UE-V template generator. If you do, you can use the UE-V template generator to validate that the new or revised XML matches the schema that has been defined for the template.
+
+**To validate a UE-V settings location template with the UE-V template generator**
+
+1. Open the **Start** menu and navigate to **Windows Kits** > **Microsoft User Experience Virtualization (UE-V) Template Generator** to open the template generator.
+
+2. Click **Validate a settings location template**.
+
+3. In the list of recently used templates, select the template to be edited. Alternatively, you can **Browse** to the settings template file. Click **Next** to continue.
+
+4. Click **Validate** to continue.
+
+5. Click **Close** to close the Settings Template Wizard. Exit the UE-V template generator application.
+
+ After you validate the settings location template for an application, you should test the template. Deploy the template in a lab environment before you put it into a production environment in enterprise.
+
+## Share settings location templates with the Template Gallery
+
+
+The UE-V template gallery enables administrators to share their UE-V settings location templates. Upload your settings location templates to the gallery for other users to use, and download templates that other users have created. The UE-V template gallery is located on Microsoft TechNet [here](http://go.microsoft.com/fwlink/p/?LinkId=246589).
+
+Before you share a settings location template on the UE-V template gallery, ensure it does not contain any personal or company information. You can use any XML viewer to open and view the contents of a settings location template file. The following template values should be reviewed before you share a template with anyone outside your company.
+
+- Template Author Name – Specify a general, non-identifying name for the template author name or exclude this data from the template.
+
+- Template Author Email – Specify a general, non-identifying template author email or exclude this data from the template.
+
+Before you deploy any settings location template that you have downloaded from the UE-V gallery, you should first test the template to ensure that the application settings synchronize settings correctly in a test environment.
+
+## Have a suggestion for UE-V?
+
+
+Add or vote on suggestions [here](http://uev.uservoice.com/forums/280428-microsoft-user-experience-virtualization). For UE-V issues, use the [UE-V TechNet Forum](https://social.technet.microsoft.com/Forums/en-us/home?forum=mdopuev&filter=alltypes&sort=lastpostdesc).
+
+## Related topics
+
+
+[Administering UE-V](uev-administering-uev.md)
+
+[Use UE-V with custom applications](uev-deploy-uev-for-custom-applications.md)
+
+
+
+
+
+
+
+
+
diff --git a/windows/whats-new/whats-new-windows-10-version-1607.md b/windows/whats-new/whats-new-windows-10-version-1607.md
index f31f532c25..153d63c8e1 100644
--- a/windows/whats-new/whats-new-windows-10-version-1607.md
+++ b/windows/whats-new/whats-new-windows-10-version-1607.md
@@ -76,6 +76,11 @@ Several new features and management options have been added to Windows Defender
- [Run a Windows Defender scan from the command line](../keep-secure/run-cmd-scan-windows-defender-for-windows-10.md).
- [Detect and block Potentially Unwanted Applications with Windows Defender](../keep-secure/enable-pua-windows-defender-for-windows-10.md) during download and install times.
+### Windows Defender Advanced Threat Protection (ATP)
+With the growing threat from more sophisticated targeted attacks, a new security solution is imperative in securing an increasingly complex network ecosystem. Windows Defender Advanced Threat Protection (Windows Defender ATP) is a security service, built into Windows 10 that enables enterprise customers detect, investigate, and respond to advanced threats on their networks.
+
+[Learn more about Windows Defender Advanced Threat Protection (ATP)](../keep-secure/windows-defender-advanced-threat-protection.md).
+
## Management
### Use Remote Desktop Connection for PCs joined to Azure Active Directory