Merge branch 'main' into v-smandalika-8858073-windows
@ -229,6 +229,11 @@
|
|||||||
"source_path": "education/windows/windows-editions-for-education-customers.md",
|
"source_path": "education/windows/windows-editions-for-education-customers.md",
|
||||||
"redirect_url": "/education/windows",
|
"redirect_url": "/education/windows",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "education/windows/configure-windows-for-education.md",
|
||||||
|
"redirect_url": "/education/windows",
|
||||||
|
"redirect_document_id": false
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -462,7 +462,12 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/configuration/windows-spotlight.md",
|
"source_path": "windows/configuration/windows-spotlight.md",
|
||||||
"redirect_url": "/windows/configuration/lock-screen/windows-spotlight",
|
"redirect_url": "/windows/configuration/windows-spotlight/index",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/configuration/lock-screen/windows-spotlight.md",
|
||||||
|
"redirect_url": "/windows/configuration/windows-spotlight",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1,159 +0,0 @@
|
|||||||
---
|
|
||||||
title: Windows 10 configuration recommendations for education customers
|
|
||||||
description: Learn how to configure the OS diagnostic data, consumer experiences, Cortana, search, and some of the preinstalled apps, so that Windows is ready for your school.
|
|
||||||
ms.topic: how-to
|
|
||||||
ms.date: 08/10/2022
|
|
||||||
appliesto:
|
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
|
||||||
---
|
|
||||||
# Windows 10 configuration recommendations for education customers
|
|
||||||
|
|
||||||
Privacy is important to us, we want to provide you with ways to customize the OS diagnostic data, consumer experiences, Cortana, search, and some of the preinstalled apps, for usage with [education editions of Windows 10](windows-editions-for-education-customers.md) in education environments. These features work on all Windows 10 editions, but education editions of Windows 10 have the settings preconfigured. We recommend that all Windows 10 devices in an education setting be configured with **[SetEduPolicies](#setedupolicies)** enabled. For more information, see the following table. To learn more about Microsoft's commitment to privacy, see [Windows 10 and privacy](https://go.microsoft.com/fwlink/?LinkId=809305).
|
|
||||||
|
|
||||||
We want all students to have the chance to use the apps they need for success in the classroom and all school personnel to have apps they need for their job. Students and school personnel who use assistive technology apps not available in the Microsoft Store, and use devices running Windows 10 S, will be able to configure the device at no extra charge to Windows 10 Pro Education. To learn more about the steps to configure this device, see [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md).
|
|
||||||
|
|
||||||
In Windows 10, version 1703 (Creators Update), it's straightforward to configure Windows to be education ready.
|
|
||||||
|
|
||||||
| Area | How to configure | What this area does | Windows 10 Education | Windows 10 Pro Education | Windows 10 S |
|
|
||||||
| --- | --- | --- | --- | --- | --- |
|
|
||||||
| **Diagnostic Data** | **AllowTelemetry** | Sets Diagnostic Data to [Basic](/windows/configuration/configure-windows-telemetry-in-your-organization) | This feature is already set | This feature is already set | The policy must be set |
|
|
||||||
| **Microsoft consumer experiences** | **SetEduPolicies** | Disables suggested content from Windows such as app recommendations | This feature is already set | This feature is already set | The policy must be set |
|
|
||||||
| **Cortana** | **AllowCortana** | Disables Cortana </br></br> * Cortana is enabled by default on all editions in Windows 10, version 1703 | If using Windows 10 Education, upgrading from Windows 10, version 1607 to Windows 10, version 1703 will enable Cortana. </br></br> See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. | If using Windows 10 Pro Education, upgrading from Windows 10, version 1607 to Windows 10, version 1703 will enable Cortana. </br></br> See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. | See the [Recommended configuration](#recommended-configuration) section below for recommended Cortana settings. |
|
|
||||||
| **Safe search** | **SetEduPolicies** | Locks Bing safe search to Strict in Microsoft Edge | This feature is already set | This feature is already set | The policy must be set |
|
|
||||||
| **Bing search advertising** | Ad free search with Bing | Disables ads when searching the internet with Bing in Microsoft Edge. See [Ad-free search with Bing](#ad-free-search-with-bing | View configuration instructions as detailed in [Ad-free search with Bing](#ad-free-search-with-bing) | View configuration instructions as detailed in [Ad-free search with Bing](#ad-free-search-with-bing) | View configuration instructions as detailed in [Ad-free search with Bing](#ad-free-search-with-bing) |
|
|
||||||
| **Apps** | **SetEduPolicies** | Preinstalled apps like Microsoft Edge, Movies & TV, Groove, and Skype become education ready </br></br> * Any app can detect Windows is running in an education ready configuration through [IsEducationEnvironment](/uwp/api/windows.system.profile.educationsettings) | This feature is already set | This feature is already set | The policy must be set |
|
|
||||||
|
|
||||||
|
|
||||||
## Recommended configuration
|
|
||||||
It's easy to be education ready when using Microsoft products. We recommend the following configuration:
|
|
||||||
|
|
||||||
1. Use an Office 365 Education tenant.
|
|
||||||
|
|
||||||
With Office 365, you also have Microsoft Entra ID. To learn more about Office 365 Education features and pricing, see [Office 365 Education plans and pricing](https://products.office.com/en-us/academic/compare-office-365-education-plans).
|
|
||||||
|
|
||||||
2. Activate Intune for Education in your tenant.
|
|
||||||
|
|
||||||
You can [sign up to learn more about Intune for Education](https://info.microsoft.com/US-WNDWS-CNTNT-FY17-01Jan-17-IntuneforEducationlandingpageandnurture292531_01Registration-ForminBody.html).
|
|
||||||
|
|
||||||
3. On PCs running Windows 10, version 1703:
|
|
||||||
1. Provision the PC using one of these methods:
|
|
||||||
* [Provision PCs with the Set up School PCs app](use-set-up-school-pcs-app.md) - The usage of this method will automatically set both **SetEduPolicies** to True and **AllowCortana** to False.
|
|
||||||
* [Provision PCs with a custom package created with Windows Configuration Designer](/windows/configuration/provisioning-packages/provisioning-create-package) - Make sure to set both **SetEduPolicies** to True and **AllowCortana** to False.
|
|
||||||
2. Join the PC to Microsoft Entra ID.
|
|
||||||
* Use Set up School PCs or Windows Configuration Designer to bulk enroll to Microsoft Entra ID.
|
|
||||||
* Manually Microsoft Entra join the PC during the Windows device setup experience.
|
|
||||||
3. Enroll the PCs in MDM.
|
|
||||||
* If you've activated Intune for Education in your Microsoft Entra tenant, enrollment will happen automatically when the PC is joined to Microsoft Entra ID. Intune for Education will automatically set **SetEduPolicies** to True and **AllowCortana** to False.
|
|
||||||
4. Ensure that needed assistive technology apps can be used.
|
|
||||||
* If you've students or school personnel who rely on assistive technology apps that aren't available in the Microsoft Store, and who are using a Windows 10 S device, configure their device to Windows 10 Pro Education to allow the download and use of non-Microsoft Store assistive technology apps. See [Switch to Windows 10 Pro Education from Windows 10 Pro or Windows 10 S](change-to-pro-education.md) for more info.
|
|
||||||
|
|
||||||
4. Distribute the PCs to students.
|
|
||||||
|
|
||||||
Students sign in with their Azure AD/Office 365 identity, which enables single sign-on to Bing in Microsoft Edge, enabling an ad-free search experience with Bing in Microsoft Edge.
|
|
||||||
|
|
||||||
5. Ongoing management through Intune for Education.
|
|
||||||
|
|
||||||
You can set many policies through Intune for Education, including **SetEduPolicies** and **AllowCortana**, for ongoing management of the PCs.
|
|
||||||
|
|
||||||
## Configuring Windows
|
|
||||||
You can configure Windows through provisioning or management tools including industry standard MDM.
|
|
||||||
- Provisioning - A one-time setup process.
|
|
||||||
- Management - A one-time and/or ongoing management of a PC by setting policies.
|
|
||||||
|
|
||||||
You can set all the education compliance areas through both provisioning and management tools. Additionally, these Microsoft education tools will ensure PCs that you set up are education ready:
|
|
||||||
- [Set up School PCs](use-set-up-school-pcs-app.md)
|
|
||||||
- [Intune for Education](/intune-education/available-settings)
|
|
||||||
|
|
||||||
## AllowCortana
|
|
||||||
**AllowCortana** is a policy that enables or disables Cortana. It's a policy node in the Policy configuration service provider, [AllowCortana](/windows/client-management/mdm/policy-configuration-service-provider#experience-allowcortana).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> See the [Recommended configuration](#recommended-configuration) section for recommended Cortana settings.
|
|
||||||
|
|
||||||
Use one of these methods to set this policy.
|
|
||||||
|
|
||||||
### MDM
|
|
||||||
- Intune for Education automatically sets this policy in the **All devices** group policy configuration.
|
|
||||||
- If you're using an MDM provider other than Intune for Education, check your MDM provider documentation on how to set this policy.
|
|
||||||
- If your MDM provider doesn't explicitly support this policy, you can manually set this policy if your MDM provider allows specific OMA-URIs to be manually set.
|
|
||||||
|
|
||||||
For example, in Intune, create a new configuration policy and add an OMA-URI.
|
|
||||||
- OMA-URI: ./Vendor/MSFT/Policy/Config/Experience/AllowCortana
|
|
||||||
- Data type: Integer
|
|
||||||
- Value: 0
|
|
||||||
|
|
||||||
### Group Policy
|
|
||||||
Set **Computer Configuration > Administrative Templates > Windows Components > Search > AllowCortana** to **Disabled**.
|
|
||||||
|
|
||||||
### Provisioning tools
|
|
||||||
- [Set up School PCs](use-set-up-school-pcs-app.md) always sets this policy in provisioning packages it creates.
|
|
||||||
- [Windows Configuration Designer](/windows/configuration/provisioning-packages/provisioning-create-package)
|
|
||||||
- Under **Runtime settings**, click the **Policies** settings group, set **Experience > Cortana** to **No**.
|
|
||||||
|
|
||||||
## SetEduPolicies
|
|
||||||
**SetEduPolicies** is a policy that applies a set of configuration behaviors to Windows. It's a policy node in the [SharedPC configuration service provider](/windows/client-management/mdm/sharedpc-csp).
|
|
||||||
|
|
||||||
Use one of these methods to set this policy.
|
|
||||||
|
|
||||||
### MDM
|
|
||||||
- Intune for Education automatically sets this policy in the **All devices** group policy configuration.
|
|
||||||
- If you're using an MDM provider other than Intune for Education, check your MDM provider documentation on how to set this policy.
|
|
||||||
- If your MDM provider doesn't explicitly support this policy, you can manually set this policy if your MDM provider allows specific OMA-URIs to be manually set.
|
|
||||||
|
|
||||||
For example, in Intune, create a new configuration policy and add an OMA-URI.
|
|
||||||
- OMA-URI: ./Vendor/MSFT/SharedPC/SetEduPolicies
|
|
||||||
- Data type: Boolean
|
|
||||||
- Value: true
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
### Group Policy
|
|
||||||
**SetEduPolicies** isn't natively supported in Group Policy. Instead, use the [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal) to set the policy in [MDM SharedPC](/windows/win32/dmwmibridgeprov/mdm-sharedpc).
|
|
||||||
|
|
||||||
For example:
|
|
||||||
|
|
||||||
- Open PowerShell as an administrator and enter the following:
|
|
||||||
|
|
||||||
```
|
|
||||||
$sharedPC = Get-CimInstance -Namespace "root\cimv2\mdm\dmmap" -ClassName "MDM_SharedPC"
|
|
||||||
|
|
||||||
$sharedPC.SetEduPolicies = $True
|
|
||||||
|
|
||||||
Set-CimInstance -CimInstance $sharedPC
|
|
||||||
|
|
||||||
Get-CimInstance -Namespace $namespaceName -ClassName $MDM_SharedPCClass
|
|
||||||
```
|
|
||||||
|
|
||||||
### Provisioning tools
|
|
||||||
- [Set up School PCs](use-set-up-school-pcs-app.md) always sets this policy in provisioning packages it creates.
|
|
||||||
- [Windows Configuration Designer](/windows/configuration/provisioning-packages/provisioning-create-package)
|
|
||||||
- Under **Runtime settings**, click the **SharedPC** settings group, set **PolicyCustomization > SetEduPolicies** to **True**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Ad-free search with Bing
|
|
||||||
Provide an ad-free experience that is a safer, more private search option for K–12 education institutions in the United States.
|
|
||||||
|
|
||||||
### Configurations
|
|
||||||
|
|
||||||
<a name='azure-ad-and-office-365-education-tenant'></a>
|
|
||||||
|
|
||||||
#### Microsoft Entra ID and Office 365 Education tenant
|
|
||||||
To suppress ads when searching with Bing on Microsoft Edge on any network, follow these steps:
|
|
||||||
|
|
||||||
1. Ensure your Office 365 tenant is registered as an education tenant. For more information, see [Verify your Office 365 domain to prove education status](https://support.office.com/article/Verify-your-Office-365-domain-to-prove-ownership-nonprofit-or-education-status-or-to-activate-viva-engage-87d1844e-aa47-4dc0-a61b-1b773fd4e590).
|
|
||||||
2. Domain join the Windows 10 PCs to your Microsoft Entra tenant (this tenant is the same as your Office 365 tenant).
|
|
||||||
3. Configure **SetEduPolicies** according to one of the methods described in the previous sections in this topic.
|
|
||||||
4. Have students sign in with their Microsoft Entra identity, which is the same as your Office 365 identity, to use the PC.
|
|
||||||
> [!NOTE]
|
|
||||||
> If you are verifying your Office 365 domain to prove education status (step 1 above), you may need to wait up to 7 days for the ad-free experience to take effect. Microsoft recommends not to roll out the browser to your students until that time.
|
|
||||||
|
|
||||||
#### Office 365 sign-in to Bing
|
|
||||||
To suppress ads only when the student signs into Bing with their Office 365 account in Microsoft Edge, follow these steps:
|
|
||||||
|
|
||||||
1. Configure **SetEduPolicies** according to one of the methods described in the previous sections in this topic.
|
|
||||||
2. Have students sign into Bing with their Office 365 account.
|
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
[Deployment recommendations for school IT administrators](edu-deployment-recommendations.md)
|
|
Before Width: | Height: | Size: 25 KiB |
Before Width: | Height: | Size: 83 KiB |
Before Width: | Height: | Size: 60 KiB |
@ -32,7 +32,7 @@ You can use Internet Information Services' (IIS) network load balancing (NLB) to
|
|||||||
|
|
||||||
Review the following articles to learn more about configuring IIS and NLB for computers running Windows Server operating systems:
|
Review the following articles to learn more about configuring IIS and NLB for computers running Windows Server operating systems:
|
||||||
|
|
||||||
* [Achieving High Availability and Scalability - ARR and NLB](https://www.iis.net/learn/extensions/configuring-application-request-routing-arr/achieving-high-availability-and-scalability-arr-and-nlb) describes how to configure IIS 7.0.
|
* [Achieving High Availability and Scalability - ARR and NLB](/iis/extensions/configuring-application-request-routing-arr/achieving-high-availability-and-scalability-arr-and-nlb) describes how to configure IIS 7.0.
|
||||||
|
|
||||||
* [Network load balancing overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831698(v=ws.11)) will tell you more about how to configure Microsoft Windows Server.
|
* [Network load balancing overview](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831698(v=ws.11)) will tell you more about how to configure Microsoft Windows Server.
|
||||||
|
|
||||||
@ -88,13 +88,13 @@ Use the following steps to modify the connection string to include ```failover p
|
|||||||
3. Modify the **MANAGEMENT\_SQL\_CONNECTION\_STRING** value with the ```failover partner = <server2>``` value.
|
3. Modify the **MANAGEMENT\_SQL\_CONNECTION\_STRING** value with the ```failover partner = <server2>``` value.
|
||||||
4. Restart management service using the IIS console.
|
4. Restart management service using the IIS console.
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
>Database Mirroring is on the list of [deprecated database engine features in SQL Server 2012](<https://msdn.microsoft.com/library/ms143729(v=sql.110).aspx>) due to the **AlwaysOn** feature available starting with Microsoft SQL Server 2012.
|
>Database Mirroring is on the list of [deprecated database engine features in SQL Server 2012](/previous-versions/sql/sql-server-2012/ms143729(v=sql.110)) due to the **AlwaysOn** feature available starting with Microsoft SQL Server 2012.
|
||||||
|
|
||||||
Click any of the following links for more information:
|
For more information, see the following articles:
|
||||||
|
|
||||||
* [Prepare a mirror database for mirroring (SQL Server)](/sql/database-engine/database-mirroring/prepare-a-mirror-database-for-mirroring-sql-server).
|
* [Prepare a mirror database for mirroring (SQL Server)](/sql/database-engine/database-mirroring/prepare-a-mirror-database-for-mirroring-sql-server).
|
||||||
* [Establish a database mirroring session using Windows Authentication (SQL Server Management Studio)](/sql/database-engine/database-mirroring/establish-database-mirroring-session-windows-authentication).
|
* [Establish a database mirroring session using Windows Authentication (SQL Server Management Studio)](/sql/database-engine/database-mirroring/establish-database-mirroring-session-windows-authentication).
|
||||||
* [Deprecated database engine features in SQL Server 2012](<https://msdn.microsoft.com/library/ms143729(v=sql.110).aspx>).
|
* [Deprecated database engine features in SQL Server 2012](/previous-versions/sql/sql-server-2012/ms143729(v=sql.110)).
|
||||||
|
|
||||||
## Support for Microsoft SQL Server Always On configuration
|
## Support for Microsoft SQL Server Always On configuration
|
||||||
|
|
||||||
|
@ -6,7 +6,9 @@ ms.subservice: windows-copilot
|
|||||||
ms.date: 03/21/2024
|
ms.date: 03/21/2024
|
||||||
ms.author: mstewart
|
ms.author: mstewart
|
||||||
author: mestew
|
author: mestew
|
||||||
ms.collection: windows-copilot
|
ms.collection:
|
||||||
|
- windows-copilot
|
||||||
|
- magic-ai-copilot
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11, version 22H2 or later</a>
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11, version 22H2 or later</a>
|
||||||
---
|
---
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Policies in Policy CSP supported by Group Policy
|
title: Policies in Policy CSP supported by Group Policy
|
||||||
description: Learn about the policies in Policy CSP supported by Group Policy.
|
description: Learn about the policies in Policy CSP supported by Group Policy.
|
||||||
ms.date: 04/10/2024
|
ms.date: 04/23/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
<!-- Auto-Generated CSP Document -->
|
<!-- Auto-Generated CSP Document -->
|
||||||
@ -871,7 +871,6 @@ This article lists the policies in Policy CSP that have a group policy mapping.
|
|||||||
## WindowsAI
|
## WindowsAI
|
||||||
|
|
||||||
- [TurnOffWindowsCopilot](policy-csp-windowsai.md)
|
- [TurnOffWindowsCopilot](policy-csp-windowsai.md)
|
||||||
- [DisableAIDataAnalysis](policy-csp-windowsai.md)
|
|
||||||
|
|
||||||
## WindowsDefenderSecurityCenter
|
## WindowsDefenderSecurityCenter
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: WindowsAI Policy CSP
|
title: WindowsAI Policy CSP
|
||||||
description: Learn more about the WindowsAI Area in Policy CSP.
|
description: Learn more about the WindowsAI Area in Policy CSP.
|
||||||
ms.date: 01/31/2024
|
ms.date: 04/23/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
<!-- Auto-Generated CSP Document -->
|
<!-- Auto-Generated CSP Document -->
|
||||||
@ -9,74 +9,10 @@ ms.date: 01/31/2024
|
|||||||
<!-- WindowsAI-Begin -->
|
<!-- WindowsAI-Begin -->
|
||||||
# Policy CSP - WindowsAI
|
# Policy CSP - WindowsAI
|
||||||
|
|
||||||
[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)]
|
|
||||||
|
|
||||||
<!-- WindowsAI-Editable-Begin -->
|
<!-- WindowsAI-Editable-Begin -->
|
||||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||||
<!-- WindowsAI-Editable-End -->
|
<!-- WindowsAI-Editable-End -->
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-Begin -->
|
|
||||||
## DisableAIDataAnalysis
|
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-Applicability-Begin -->
|
|
||||||
| Scope | Editions | Applicable OS |
|
|
||||||
|:--|:--|:--|
|
|
||||||
| ❌ Device <br> ✅ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview [99.9.9999] |
|
|
||||||
<!-- DisableAIDataAnalysis-Applicability-End -->
|
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-OmaUri-Begin -->
|
|
||||||
```User
|
|
||||||
./User/Vendor/MSFT/Policy/Config/WindowsAI/DisableAIDataAnalysis
|
|
||||||
```
|
|
||||||
<!-- DisableAIDataAnalysis-OmaUri-End -->
|
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-Description-Begin -->
|
|
||||||
<!-- Description-Source-DDF -->
|
|
||||||
This policy setting allows you to prevent Windows AI from using and analyzing user patterns and data.
|
|
||||||
|
|
||||||
- If you enable this policy setting, Windows AI won't be able to take advantage of historical user patterns.
|
|
||||||
|
|
||||||
- If you disable or don't configure this policy setting, Windows AI will be able to assist users by considering their historical behaviors and data.
|
|
||||||
<!-- DisableAIDataAnalysis-Description-End -->
|
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-Editable-Begin -->
|
|
||||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
|
||||||
<!-- DisableAIDataAnalysis-Editable-End -->
|
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-DFProperties-Begin -->
|
|
||||||
**Description framework properties**:
|
|
||||||
|
|
||||||
| Property name | Property value |
|
|
||||||
|:--|:--|
|
|
||||||
| Format | `int` |
|
|
||||||
| Access Type | Add, Delete, Get, Replace |
|
|
||||||
| Default Value | 0 |
|
|
||||||
<!-- DisableAIDataAnalysis-DFProperties-End -->
|
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-AllowedValues-Begin -->
|
|
||||||
**Allowed values**:
|
|
||||||
|
|
||||||
| Value | Description |
|
|
||||||
|:--|:--|
|
|
||||||
| 0 (Default) | Enable Data Analysis for Windows AI. |
|
|
||||||
| 1 | Disable Data Analysis for Windows AI. |
|
|
||||||
<!-- DisableAIDataAnalysis-AllowedValues-End -->
|
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-GpMapping-Begin -->
|
|
||||||
**Group policy mapping**:
|
|
||||||
|
|
||||||
| Name | Value |
|
|
||||||
|:--|:--|
|
|
||||||
| Name | DisableAIDataAnalysis |
|
|
||||||
| Path | WindowsAI > AT > WindowsComponents > WindowsAI |
|
|
||||||
<!-- DisableAIDataAnalysis-GpMapping-End -->
|
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-Examples-Begin -->
|
|
||||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
|
||||||
<!-- DisableAIDataAnalysis-Examples-End -->
|
|
||||||
|
|
||||||
<!-- DisableAIDataAnalysis-End -->
|
|
||||||
|
|
||||||
<!-- TurnOffWindowsCopilot-Begin -->
|
<!-- TurnOffWindowsCopilot-Begin -->
|
||||||
## TurnOffWindowsCopilot
|
## TurnOffWindowsCopilot
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: SurfaceHub CSP
|
title: SurfaceHub CSP
|
||||||
description: Learn more about the SurfaceHub CSP.
|
description: Learn more about the SurfaceHub CSP.
|
||||||
ms.date: 01/18/2024
|
ms.date: 04/22/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
<!-- Auto-Generated CSP Document -->
|
<!-- Auto-Generated CSP Document -->
|
||||||
@ -65,6 +65,10 @@ The following list shows the SurfaceHub configuration service provider nodes:
|
|||||||
- [MOMAgent](#momagent)
|
- [MOMAgent](#momagent)
|
||||||
- [WorkspaceID](#momagentworkspaceid)
|
- [WorkspaceID](#momagentworkspaceid)
|
||||||
- [WorkspaceKey](#momagentworkspacekey)
|
- [WorkspaceKey](#momagentworkspacekey)
|
||||||
|
- [MOMAgentGovtCloud](#momagentgovtcloud)
|
||||||
|
- [AzureCloudIndexGovtCloud](#momagentgovtcloudazurecloudindexgovtcloud)
|
||||||
|
- [WorkspaceIDGovtCloud](#momagentgovtcloudworkspaceidgovtcloud)
|
||||||
|
- [WorkspaceKeyGovtCloud](#momagentgovtcloudworkspacekeygovtcloud)
|
||||||
- [Properties](#properties)
|
- [Properties](#properties)
|
||||||
- [AllowAutoProxyAuth](#propertiesallowautoproxyauth)
|
- [AllowAutoProxyAuth](#propertiesallowautoproxyauth)
|
||||||
- [AllowSessionResume](#propertiesallowsessionresume)
|
- [AllowSessionResume](#propertiesallowsessionresume)
|
||||||
@ -2011,6 +2015,162 @@ Primary key for authenticating with workspace. Will always return an empty strin
|
|||||||
|
|
||||||
<!-- Device-MOMAgent-WorkspaceKey-End -->
|
<!-- Device-MOMAgent-WorkspaceKey-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-Begin -->
|
||||||
|
## MOMAgentGovtCloud
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-Applicability-Begin -->
|
||||||
|
| Scope | Editions | Applicable OS |
|
||||||
|
|:--|:--|:--|
|
||||||
|
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 22H2 [10.0.19045.4355] and later |
|
||||||
|
<!-- Device-MOMAgentGovtCloud-Applicability-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-OmaUri-Begin -->
|
||||||
|
```Device
|
||||||
|
./Vendor/MSFT/SurfaceHub/MOMAgentGovtCloud
|
||||||
|
```
|
||||||
|
<!-- Device-MOMAgentGovtCloud-OmaUri-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-Description-Begin -->
|
||||||
|
<!-- Description-Source-Not-Found -->
|
||||||
|
<!-- Device-MOMAgentGovtCloud-Description-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-Editable-Begin -->
|
||||||
|
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||||
|
<!-- Device-MOMAgentGovtCloud-Editable-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-DFProperties-Begin -->
|
||||||
|
**Description framework properties**:
|
||||||
|
|
||||||
|
| Property name | Property value |
|
||||||
|
|:--|:--|
|
||||||
|
| Format | `node` |
|
||||||
|
| Access Type | Get |
|
||||||
|
<!-- Device-MOMAgentGovtCloud-DFProperties-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-Examples-Begin -->
|
||||||
|
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||||
|
<!-- Device-MOMAgentGovtCloud-Examples-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-Begin -->
|
||||||
|
### MOMAgentGovtCloud/AzureCloudIndexGovtCloud
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-Applicability-Begin -->
|
||||||
|
| Scope | Editions | Applicable OS |
|
||||||
|
|:--|:--|:--|
|
||||||
|
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 22H2 [10.0.19045.4355] and later |
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-Applicability-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-OmaUri-Begin -->
|
||||||
|
```Device
|
||||||
|
./Vendor/MSFT/SurfaceHub/MOMAgentGovtCloud/AzureCloudIndexGovtCloud
|
||||||
|
```
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-OmaUri-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-Description-Begin -->
|
||||||
|
<!-- Description-Source-DDF -->
|
||||||
|
Enum value for Azure Clouds supported for OMS tracking in SurfaceHub.
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-Description-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-Editable-Begin -->
|
||||||
|
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-Editable-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-DFProperties-Begin -->
|
||||||
|
**Description framework properties**:
|
||||||
|
|
||||||
|
| Property name | Property value |
|
||||||
|
|:--|:--|
|
||||||
|
| Format | `int` |
|
||||||
|
| Access Type | Get, Replace |
|
||||||
|
| Default Value | 0 |
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-DFProperties-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-Examples-Begin -->
|
||||||
|
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-Examples-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-AzureCloudIndexGovtCloud-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-Begin -->
|
||||||
|
### MOMAgentGovtCloud/WorkspaceIDGovtCloud
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-Applicability-Begin -->
|
||||||
|
| Scope | Editions | Applicable OS |
|
||||||
|
|:--|:--|:--|
|
||||||
|
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 22H2 [10.0.19045.4355] and later |
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-Applicability-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-OmaUri-Begin -->
|
||||||
|
```Device
|
||||||
|
./Vendor/MSFT/SurfaceHub/MOMAgentGovtCloud/WorkspaceIDGovtCloud
|
||||||
|
```
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-OmaUri-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-Description-Begin -->
|
||||||
|
<!-- Description-Source-DDF -->
|
||||||
|
GUID identifying the Microsoft Operations Management Suite workspace ID to collect the data for Govt Clouds. Set this to an empty string to disable the MOM agent.
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-Description-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-Editable-Begin -->
|
||||||
|
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-Editable-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-DFProperties-Begin -->
|
||||||
|
**Description framework properties**:
|
||||||
|
|
||||||
|
| Property name | Property value |
|
||||||
|
|:--|:--|
|
||||||
|
| Format | `chr` (string) |
|
||||||
|
| Access Type | Get, Replace |
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-DFProperties-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-Examples-Begin -->
|
||||||
|
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-Examples-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceIDGovtCloud-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-Begin -->
|
||||||
|
### MOMAgentGovtCloud/WorkspaceKeyGovtCloud
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-Applicability-Begin -->
|
||||||
|
| Scope | Editions | Applicable OS |
|
||||||
|
|:--|:--|:--|
|
||||||
|
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE <br> ✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 10, version 22H2 [10.0.19045.4355] and later |
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-Applicability-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-OmaUri-Begin -->
|
||||||
|
```Device
|
||||||
|
./Vendor/MSFT/SurfaceHub/MOMAgentGovtCloud/WorkspaceKeyGovtCloud
|
||||||
|
```
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-OmaUri-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-Description-Begin -->
|
||||||
|
<!-- Description-Source-DDF -->
|
||||||
|
Primary key for authenticating with workspace for Govt Clouds. Will always return an empty string.
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-Description-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-Editable-Begin -->
|
||||||
|
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-Editable-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-DFProperties-Begin -->
|
||||||
|
**Description framework properties**:
|
||||||
|
|
||||||
|
| Property name | Property value |
|
||||||
|
|:--|:--|
|
||||||
|
| Format | `chr` (string) |
|
||||||
|
| Access Type | Get, Replace |
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-DFProperties-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-Examples-Begin -->
|
||||||
|
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-Examples-End -->
|
||||||
|
|
||||||
|
<!-- Device-MOMAgentGovtCloud-WorkspaceKeyGovtCloud-End -->
|
||||||
|
|
||||||
<!-- Device-Properties-Begin -->
|
<!-- Device-Properties-Begin -->
|
||||||
## Properties
|
## Properties
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: SurfaceHub DDF file
|
title: SurfaceHub DDF file
|
||||||
description: View the XML file containing the device description framework (DDF) for the SurfaceHub configuration service provider.
|
description: View the XML file containing the device description framework (DDF) for the SurfaceHub configuration service provider.
|
||||||
ms.date: 01/18/2024
|
ms.date: 04/22/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
<!-- Auto-Generated CSP Document -->
|
<!-- Auto-Generated CSP Document -->
|
||||||
@ -12,11 +12,10 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
|
|
||||||
```xml
|
```xml
|
||||||
<?xml version="1.0" encoding="UTF-8"?>
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
<!DOCTYPE MgmtTree PUBLIC " -//OMA//DTD-DM-DDF 1.2//EN" "http://www.openmobilealliance.org/tech/DTD/DM_DDF-V1_2.dtd"[<?oma-dm-ddf-ver supported-versions="1.2"?>]>
|
<!DOCTYPE MgmtTree PUBLIC " -//OMA//DTD-DM-DDF 1.2//EN" "http://www.openmobilealliance.org/tech/DTD/DM_DDF-V1_2.dtd"[]>
|
||||||
<MgmtTree xmlns:MSFT="http://schemas.microsoft.com/MobileDevice/DM">
|
<MgmtTree xmlns:MSFT="http://schemas.microsoft.com/MobileDevice/DM">
|
||||||
<VerDTD>1.2</VerDTD>
|
<VerDTD>1.2</VerDTD>
|
||||||
<MSFT:Diagnostics>
|
<MSFT:Diagnostics />
|
||||||
</MSFT:Diagnostics>
|
|
||||||
<Node>
|
<Node>
|
||||||
<NodeName>SurfaceHub</NodeName>
|
<NodeName>SurfaceHub</NodeName>
|
||||||
<Path>./Vendor/MSFT</Path>
|
<Path>./Vendor/MSFT</Path>
|
||||||
@ -86,8 +85,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -110,8 +108,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -134,8 +131,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -158,8 +154,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -203,8 +198,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -227,8 +221,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -251,8 +244,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -534,8 +526,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<MSFT:OsBuildVersion>10.0.15063</MSFT:OsBuildVersion>
|
<MSFT:OsBuildVersion>10.0.15063</MSFT:OsBuildVersion>
|
||||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||||
</MSFT:Applicability>
|
</MSFT:Applicability>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
@ -611,8 +602,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -753,8 +743,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
@ -982,8 +971,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
@ -1028,8 +1016,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -1522,8 +1509,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<MSFT:OsBuildVersion>10.0.15063, 10.0.14393.969</MSFT:OsBuildVersion>
|
<MSFT:OsBuildVersion>10.0.15063, 10.0.14393.969</MSFT:OsBuildVersion>
|
||||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||||
</MSFT:Applicability>
|
</MSFT:Applicability>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -1584,8 +1570,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
@ -1633,8 +1618,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -1657,8 +1641,99 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>MOMAgentGovtCloud</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
</AccessType>
|
||||||
|
<DFFormat>
|
||||||
|
<node />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<DDFName />
|
||||||
|
</DFType>
|
||||||
|
<MSFT:Applicability>
|
||||||
|
<MSFT:OsBuildVersion>10.0.19045.4355</MSFT:OsBuildVersion>
|
||||||
|
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||||
|
<MSFT:EditionAllowList>0x4;0x1B;0x30;0x31;0x48;0x54;0x62;0x63;0x64;0x65;0x77;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xB4;0xBC;0xBF;0xCA;0xCB;0xCD;</MSFT:EditionAllowList>
|
||||||
|
</MSFT:Applicability>
|
||||||
|
</DFProperties>
|
||||||
|
<Node>
|
||||||
|
<NodeName>WorkspaceIDGovtCloud</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<Description>GUID identifying the Microsoft Operations Management Suite workspace ID to collect the data for Govt Clouds. Set this to an empty string to disable the MOM agent.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<chr />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>WorkspaceKeyGovtCloud</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Primary key for authenticating with workspace for Govt Clouds.. Will always return an empty string.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<chr />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>AzureCloudIndexGovtCloud</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>0</DefaultValue>
|
||||||
|
<Description>Enum value for Azure Clouds supported for OMS tracking in SurfaceHub.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
@ -1702,8 +1777,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -1726,8 +1800,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
@ -1754,8 +1827,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<MSFT:OsBuildVersion>10.0.17134, 10.0.16299.64</MSFT:OsBuildVersion>
|
<MSFT:OsBuildVersion>10.0.17134, 10.0.16299.64</MSFT:OsBuildVersion>
|
||||||
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
<MSFT:CspVersion>1.0</MSFT:CspVersion>
|
||||||
</MSFT:Applicability>
|
</MSFT:Applicability>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
<Node>
|
<Node>
|
||||||
<NodeName>LanProfile</NodeName>
|
<NodeName>LanProfile</NodeName>
|
||||||
@ -1777,8 +1849,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
@ -1801,8 +1872,7 @@ The following XML file contains the device description framework (DDF) for the S
|
|||||||
<DFType>
|
<DFType>
|
||||||
<MIME />
|
<MIME />
|
||||||
</DFType>
|
</DFType>
|
||||||
<MSFT:AllowedValues ValueType="None">
|
<MSFT:AllowedValues ValueType="None" />
|
||||||
</MSFT:AllowedValues>
|
|
||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
|
@ -1,47 +1,44 @@
|
|||||||
---
|
---
|
||||||
title: Configure cellular settings for tablets and PCs
|
title: Configure cellular settings
|
||||||
description: Enterprises can provision cellular settings for tablets and PC with built-in cellular modems or plug-in USB modem dongles.
|
description: Learn how to provision cellular settings for devices with built-in modems or plug-in USB modem dongles.
|
||||||
ms.topic: concept-article
|
ms.topic: concept-article
|
||||||
ms.date: 04/13/2018
|
ms.date: 04/23/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure cellular settings for tablets and PCs
|
# Configure cellular settings
|
||||||
|
|
||||||
>**Looking for consumer information?** See [Cellular settings in Windows 10](https://support.microsoft.com/help/10739/windows-10-cellular-settings)
|
This article describes how to configure cellular settings for devices that have a cellular modem using a [provisioning package](../provisioning-packages/provisioning-packages.md). After the devices are configured, users are automatically connected using the access point name (APN) defined in the provisioning package, without needing to connect manually.
|
||||||
|
|
||||||
Enterprises can configure cellular settings for tablets and PC that have built-in cellular modems or plug-in USB modem dongles and apply the settings in a [provisioning package](../provisioning-packages/provisioning-packages.md). After the devices are configured, users are automatically connected using the access point name (APN) defined by the enterprise without needing to manually connect.
|
For users who work in different locations, you can configure one APN to connect when the users are at work, and a different APN when the users are traveling.
|
||||||
|
|
||||||
For users who work in different locations, you can configure one APN to connect when the users are at work and a different APN when the users are traveling.
|
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
- Windows 10, version 1703, desktop editions (Home, Pro, Enterprise, Education)
|
- Device with built-in cellular modem or plug-in USB modem dongle
|
||||||
- Tablet or PC with built-in cellular modem or plug-in USB modem dongle
|
|
||||||
- [Windows Configuration Designer](../provisioning-packages/provisioning-install-icd.md)
|
- [Windows Configuration Designer](../provisioning-packages/provisioning-install-icd.md)
|
||||||
- APN (the address that your PC uses to connect to the Internet when using the cellular data connection)
|
- APN (the address that the device uses to connect to the Internet when using the cellular data connection)
|
||||||
|
|
||||||
## How to configure cellular settings in a provisioning package
|
## How to configure cellular settings in a provisioning package
|
||||||
|
|
||||||
1. In Windows Configuration Designer, [start a new project](../provisioning-packages/provisioning-create-package.md) using the **Advanced provisioning** option.
|
1. In Windows Configuration Designer, [start a new project](../provisioning-packages/provisioning-create-package.md) using the **Advanced provisioning** option
|
||||||
1. Enter a name for your project, and then click **Next**.
|
1. Enter a name for your project, and then select **Next**
|
||||||
1. Select **All Windows desktop editions**, click **Next**, and then click **Finish**.
|
1. Select **All Windows desktop editions**, select **Next**, and then select **Finish**
|
||||||
1. Go to **Runtime settings > Connections > EnterpriseAPN**.
|
1. Go to **Runtime settings > Connections > EnterpriseAPN**
|
||||||
1. Enter a name for the connection, and then click **Add**.
|
1. Enter a name for the connection, and then select **Add**
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
1. The connection appears in the **Available customizations** pane. Select it to view the settings that you can configure for the connection.
|
1. The connection appears in the **Available customizations** pane. Select it to view the settings that you can configure for the connection
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
1. The following table describes the settings available for the connection.
|
1. The following table describes the settings available for the connection
|
||||||
|
|
||||||
| Setting | Description |
|
| Setting | Description |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
| AlwaysOn | By default, the Connection Manager will automatically attempt to connect to the APN when a connection is available. You can disable this setting. |
|
| AlwaysOn | By default, the Connection Manager automatically attempts to connect to the APN when a connection is available. You can disable the setting. |
|
||||||
| APNName | Enter the name of the APN. |
|
| APNName | Enter the name of the APN. |
|
||||||
| AuthType | You can select **None** (the default), or specify **Auto**, **PAP**, **CHAP**, or **MSCHAPv2** authentication. If you select PAP, CHAP, or MSCHAPv2 authentication, you must also enter a user name and password. |
|
| AuthType | You can select **None** (the default), or specify **Auto**, **PAP**, **CHAP**, or **MSCHAPv2** authentication. If you select PAP, CHAP, or MSCHAPv2 authentication, you must also enter a user name and password. |
|
||||||
| ClassId | This is a GUID that defines the APN class to the modem. This is only required when **IsAttachAPN** is **true** and the attach APN is not only used as the Internet APN. |
|
| ClassId | This is a GUID that defines the APN class to the modem. This is only required when **IsAttachAPN** is **true** and the attached APN isn't only used as the Internet APN. |
|
||||||
| Enabled | By default, the connection is enabled. You can change this setting. |
|
| Enabled | By default, the connection is enabled. You can change this setting. |
|
||||||
| IccId | This is the Integrated Circuit Card ID (ICCID) associated with the cellular connection profile. |
|
| IccId | This is the Integrated Circuit Card ID (ICCID) associated with the cellular connection profile. |
|
||||||
| IPType | By default, the connection can use IPv4 and IPv6 concurrently. You can change this setting to only IPv4, only IPv6, or IPv6 with IPv4 provided by 46xlat. |
|
| IPType | By default, the connection can use IPv4 and IPv6 concurrently. You can change this setting to only IPv4, only IPv6, or IPv6 with IPv4 provided by 46xlat. |
|
||||||
@ -55,22 +52,22 @@ For users who work in different locations, you can configure one APN to connect
|
|||||||
|
|
||||||
## Confirm the settings
|
## Confirm the settings
|
||||||
|
|
||||||
After you apply the provisioning package, you can confirm that the settings have been applied.
|
After you apply the provisioning package, you can confirm that the settings are applied.
|
||||||
|
|
||||||
1. On the configured device, open a command prompt as an administrator.
|
1. On the configured device, open a command prompt as an administrator
|
||||||
1. Run the following command:
|
1. Run the following command:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
netsh mbn show profiles
|
netsh mbn show profiles
|
||||||
```
|
```
|
||||||
|
|
||||||
1. The command will list the mobile broadband profiles. Using the "Name" for the listed mobile broadband profile, run:
|
1. The command lists the mobile broadband profiles. Using the **Name** for the listed mobile broadband profile, run:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
netsh mbn show profiles name="name"
|
netsh mbn show profiles name="name"
|
||||||
```
|
```
|
||||||
|
|
||||||
This command will list details for that profile, including Access Point Name.
|
This command lists the details for that profile, including Access Point Name.
|
||||||
|
|
||||||
Alternatively, you can also use the command:
|
Alternatively, you can also use the command:
|
||||||
|
|
||||||
@ -84,4 +81,4 @@ From the results of that command, get the name of the cellular/mobile broadband
|
|||||||
netsh mbn show connection interface="name"
|
netsh mbn show connection interface="name"
|
||||||
```
|
```
|
||||||
|
|
||||||
The result of that command will show details for the cellular interface, including Access Point Name.
|
The result of that command shows the details for the cellular interface, including Access Point Name.
|
||||||
|
@ -11,7 +11,7 @@ metadata:
|
|||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
ms.author: paoloma
|
ms.author: paoloma
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 03/04/2024
|
ms.date: 04/25/2024
|
||||||
|
|
||||||
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
|
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
|
||||||
|
|
||||||
@ -25,8 +25,8 @@ landingContent:
|
|||||||
url: start/index.md
|
url: start/index.md
|
||||||
- text: Customize the Taskbar
|
- text: Customize the Taskbar
|
||||||
url: taskbar/index.md
|
url: taskbar/index.md
|
||||||
- text: Configure the Lock Screen
|
- text: Configure Windows spotlight
|
||||||
url: lock-screen/windows-spotlight.md
|
url: windows-spotlight/index.md
|
||||||
- text: Accessibility information for IT pros
|
- text: Accessibility information for IT pros
|
||||||
url: accessibility/index.md
|
url: accessibility/index.md
|
||||||
- linkListType: reference
|
- linkListType: reference
|
||||||
@ -34,7 +34,7 @@ landingContent:
|
|||||||
- text: Start policy settings
|
- text: Start policy settings
|
||||||
url: start/policy-settings.md
|
url: start/policy-settings.md
|
||||||
|
|
||||||
- title: Configure a Windows kiosk
|
- title: Kiosks and restricted user experiences
|
||||||
linkLists:
|
linkLists:
|
||||||
- linkListType: concept
|
- linkListType: concept
|
||||||
links:
|
links:
|
||||||
|
Before Width: | Height: | Size: 4.5 KiB |
Before Width: | Height: | Size: 305 KiB |
Before Width: | Height: | Size: 217 KiB |
Before Width: | Height: | Size: 145 KiB |
@ -1,66 +0,0 @@
|
|||||||
---
|
|
||||||
title: Configure Windows Spotlight
|
|
||||||
description: Learn how to configure Windows Spotlight, a Windows lock screen feature that displays different images.
|
|
||||||
ms.topic: how-to
|
|
||||||
ms.date: 04/30/2018
|
|
||||||
---
|
|
||||||
|
|
||||||
# Configure Windows Spotlight
|
|
||||||
|
|
||||||
Windows Spotlight is a Windows feature that displays different background images and occasionally offers suggestions on the lock screen. Windows Spotlight is available in all desktop editions of Windows 10.
|
|
||||||
|
|
||||||
For managed devices running Windows 10 Enterprise and Windows 10 Education, enterprise administrators can configure a mobile device management (MDM) or Group Policy setting to prevent users from using the Windows Spotlight background. For managed devices running Windows 10 Pro, version 1607, administrators can disable suggestions for third party apps.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>You can use the [Personalization CSP](/windows/client-management/mdm/personalization-csp) settings to set lock screen and desktop background images.
|
|
||||||
|
|
||||||
## What does Windows Spotlight include?
|
|
||||||
|
|
||||||
- **Background image**
|
|
||||||
The Windows Spotlight displays a new image on the lock screen each day. The initial background image is included during installation. More images are downloaded on ongoing basis.
|
|
||||||

|
|
||||||
- **Feature suggestions, fun facts, tips**
|
|
||||||
The lock screen background will occasionally make recommendations on how to enhance your productivity and enjoyment of Microsoft products including suggesting other relevant Microsoft products and services.
|
|
||||||

|
|
||||||
|
|
||||||
## How do you turn off Windows Spotlight locally?
|
|
||||||
|
|
||||||
To turn off Windows Spotlight locally, go to **Settings** > **Personalization** > **Lock screen** > **Background** > **Windows spotlight** > select a different lock screen background
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## How do you disable Windows Spotlight for managed devices?
|
|
||||||
|
|
||||||
Windows Spotlight is enabled by default. Windows 10 provides Group Policy and mobile device management (MDM) settings to help you manage Windows Spotlight on enterprise computers.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>These policies are in the **User Configuration \Policies\Administrative Templates\Windows Components\Cloud Content** path in the Group Policy Management Console, and in the **User Configuration \Administrative Templates\Windows Components\Cloud Content** path in the Local Group Policy Editor.
|
|
||||||
|
|
||||||
| Group Policy | MDM | Description | Applies to |
|
|
||||||
|--|--|--|--|
|
|
||||||
| **Do not suggest third-party content in Windows spotlight** | **Experience/Allow ThirdParty Suggestions In Windows Spotlight** | Enables enterprises to restrict suggestions to Microsoft apps and services | Windows 10 Pro, Enterprise, and Education, version 1607 and later |
|
|
||||||
| **Turn off all Windows Spotlight features** | **Experience/Allow Windows Spotlight** | Enables enterprises to completely disable all Windows Spotlight features in a single setting | Windows 10 Enterprise and Education, version 1607 and later |
|
|
||||||
| **Configure Spotlight on lock screen** | **Experience/Configure Windows Spotlight On Lock Screen** | Specifically controls the use of the dynamic Windows Spotlight image on the lock screen, and can be enabled or disabled | Windows 10 Enterprise and Education, version 1607 and later |
|
|
||||||
| **Turn off the Windows Spotlight on Action Center** | **Experience/Allow Windows Spotlight On Action Center** | Turn off Suggestions from Microsoft that show after each clean install, upgrade, or on an on-going basis to introduce users to what is new or changed | Windows 10 Enterprise and Education, version 1703 |
|
|
||||||
| **Do not use diagnostic data for tailored experiences** | **Experience/Allow Tailored Experiences With Diagnostic Data** | Prevent Windows from using diagnostic data to provide tailored experiences to the user | Windows 10 Pro, Enterprise, and Education, version 1703 |
|
|
||||||
| **Turn off the Windows Welcome Experience** | **Experience/Allow Windows Spotlight Windows Welcome Experience** | Turn off the Windows Spotlight Windows Welcome experience that helps introduce users to Windows, such as launching Microsoft Edge with a web page highlighting new features | Windows 10 Enterprise and Education, version 1703 |
|
|
||||||
| **Turn off the Windows Spotlight on Settings** | **Experience/Allow Windows Spotlight on Settings** | Turn off the Windows Spotlight in the Settings app. | Windows 10 Enterprise and Education, version 1803 |
|
|
||||||
|
|
||||||
In addition to the specific policy settings for Windows Spotlight, administrators can replace Windows Spotlight with a selected image using the Group Policy setting **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Personalization** > **Force a specific default lock screen image** (Windows 10 Enterprise and Education).
|
|
||||||
|
|
||||||
>[!TIP]
|
|
||||||
>If you want to use a custom lock screen image that contains text, see [Resolution for custom lock screen image](#resolution-for-custom-lock-screen-image).
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Pay attention to the checkbox in **Options**. In addition to providing the path to the lock screen image, administrators can choose to allow or **Turn off fun facts, tips, tricks, and more on lock screen**. If the checkbox isn't selected, users will see the lock screen image that is defined in the policy setting, and will also see occasional messages.
|
|
||||||
|
|
||||||
## Resolution for custom lock screen image
|
|
||||||
|
|
||||||
A concern with custom lock screen images is how they'll appear on different screen sizes and resolutions.
|
|
||||||
|
|
||||||
A custom lock screen image created in 16:9 aspect ratio (1600x900) will scale properly on devices using a 16:9 resolution, such as 1280x720 or 1920x1080. On devices using other aspect ratios, such as 4:3 (1024x768) or 16:10 (1280x800), height scales correctly and width is cropped to a size equal to the aspect ratio. The image will remain centered on the screen
|
|
||||||
|
|
||||||
Lock screen images created at other aspect ratios may scale and center unpredictably on your device when changing aspect ratios.
|
|
||||||
|
|
||||||
The recommendation for custom lock screen images that include text (such as a legal statement) is to create the lock screen image in 16:9 resolution with text contained in the 4:3 region, allowing the text to remain visible at any aspect ratio.
|
|
Before Width: | Height: | Size: 94 KiB After Width: | Height: | Size: 89 KiB |
Before Width: | Height: | Size: 45 KiB After Width: | Height: | Size: 43 KiB |
Before Width: | Height: | Size: 83 KiB After Width: | Height: | Size: 78 KiB |
Before Width: | Height: | Size: 89 KiB After Width: | Height: | Size: 85 KiB |
Before Width: | Height: | Size: 44 KiB After Width: | Height: | Size: 42 KiB |
Before Width: | Height: | Size: 40 KiB After Width: | Height: | Size: 39 KiB |
@ -1,18 +0,0 @@
|
|||||||
---
|
|
||||||
author: paolomatarazzo
|
|
||||||
ms.author: paoloma
|
|
||||||
ms.date: 04/11/2024
|
|
||||||
ms.topic: include
|
|
||||||
---
|
|
||||||
|
|
||||||
### Turn off Windows Copilot
|
|
||||||
|
|
||||||
This policy setting allows you to turn off Windows Copilot.
|
|
||||||
|
|
||||||
- If you enable this policy setting, users can't use Copilot. The Copilot icon doesn't appear on the taskbar either
|
|
||||||
- If you disable or don't configure this policy setting, users can use Copilot, if available
|
|
||||||
|
|
||||||
| | Path |
|
|
||||||
|--|--|
|
|
||||||
| **CSP** | `./User/Vendor/MSFT/Policy/Config/WindowsAI/`[TurnOffWindowsCopilot](/windows/client-management/mdm/policy-csp-windowsai#turnoffwindowscopilot) |
|
|
||||||
| **GPO** | **User Configuration** > **Administrative Templates** > **Windows Components** > **Windows Copilot** |
|
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure the Windows taskbar
|
title: Configure the Windows taskbar
|
||||||
description: Administrators can pin more apps to the taskbar and remove default pinned apps from the taskbar by adding a section to a layout modification XML file.
|
description: Learn how to configure the Windows taskbar to provide quick access to the tools and applications that users need most.
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 04/17/2024
|
ms.date: 04/17/2024
|
||||||
appliesto:
|
appliesto:
|
||||||
@ -47,10 +47,9 @@ Let's review the components of the Windows taskbar by dividing it into three are
|
|||||||
1. Pinned and running apps
|
1. Pinned and running apps
|
||||||
1. The *right area* contains:
|
1. The *right area* contains:
|
||||||
1. The system tray, which displays icons like the pen menu, touch keyboard, virtual touchpad, and any application icons that are running in the background like OneDrive, Teams, or antivirus software
|
1. The system tray, which displays icons like the pen menu, touch keyboard, virtual touchpad, and any application icons that are running in the background like OneDrive, Teams, or antivirus software
|
||||||
1. Quick Actions
|
1. Quick actions
|
||||||
1. Calendar
|
1. Calendar
|
||||||
1. Action Center
|
1. Notifications
|
||||||
1. Copilot
|
|
||||||
|
|
||||||
:::image type="content" source="images/taskbar-sections-11.png" alt-text="Screenshot of the Windows 11 taskbar with the three areas highlighted." border="false" lightbox="./images/taskbar-sections-11.png":::
|
:::image type="content" source="images/taskbar-sections-11.png" alt-text="Screenshot of the Windows 11 taskbar with the three areas highlighted." border="false" lightbox="./images/taskbar-sections-11.png":::
|
||||||
|
|
||||||
@ -72,8 +71,7 @@ Let's review the components of the Windows taskbar by dividing it into two areas
|
|||||||
- News and interests
|
- News and interests
|
||||||
- The system tray, which displays icons like the pen menu, touch keyboard, virtual touchpad, power, network, volume, and any application icons that are running in the background like OneDrive, Teams, or antivirus software
|
- The system tray, which displays icons like the pen menu, touch keyboard, virtual touchpad, power, network, volume, and any application icons that are running in the background like OneDrive, Teams, or antivirus software
|
||||||
- Calendar
|
- Calendar
|
||||||
- Action center
|
- Notifications and actions
|
||||||
- Copilot
|
|
||||||
|
|
||||||
:::image type="content" source="images/taskbar-sections-10.png" alt-text="Screenshot of the Windows 11 taskbar with the two areas highlighted." border="false" lightbox="./images/taskbar-sections-10.png":::
|
:::image type="content" source="images/taskbar-sections-10.png" alt-text="Screenshot of the Windows 11 taskbar with the two areas highlighted." border="false" lightbox="./images/taskbar-sections-10.png":::
|
||||||
|
|
||||||
|
@ -37,7 +37,6 @@ Select one of the tabs to see the list of available settings:
|
|||||||
|[Show additional calendar](#show-additional-calendar)|❌|✅|
|
|[Show additional calendar](#show-additional-calendar)|❌|✅|
|
||||||
|[Simplify Quick Settings Layout](#simplify-quick-settings-layout)|✅|✅|
|
|[Simplify Quick Settings Layout](#simplify-quick-settings-layout)|✅|✅|
|
||||||
|[Turn off automatic promotion of notification icons to the taskbar](#turn-off-automatic-promotion-of-notification-icons-to-the-taskbar)|❌|✅|
|
|[Turn off automatic promotion of notification icons to the taskbar](#turn-off-automatic-promotion-of-notification-icons-to-the-taskbar)|❌|✅|
|
||||||
|[Turn off Windows Copilot](#turn-off-windows-copilot)|✅|✅|
|
|
||||||
|
|
||||||
::: zone-end
|
::: zone-end
|
||||||
|
|
||||||
@ -62,7 +61,6 @@ Select one of the tabs to see the list of available settings:
|
|||||||
|[Show additional calendar](#show-additional-calendar)|❌|✅|
|
|[Show additional calendar](#show-additional-calendar)|❌|✅|
|
||||||
|[Turn off automatic promotion of notification icons to the taskbar](#turn-off-automatic-promotion-of-notification-icons-to-the-taskbar)|❌|✅|
|
|[Turn off automatic promotion of notification icons to the taskbar](#turn-off-automatic-promotion-of-notification-icons-to-the-taskbar)|❌|✅|
|
||||||
|[Turn off notification area cleanup](#turn-off-notification-area-cleanup)|❌|✅|
|
|[Turn off notification area cleanup](#turn-off-notification-area-cleanup)|❌|✅|
|
||||||
|[Turn off Windows Copilot](#turn-off-windows-copilot)|✅|✅|
|
|
||||||
|
|
||||||
::: zone-end
|
::: zone-end
|
||||||
|
|
||||||
@ -109,8 +107,6 @@ Select one of the tabs to see the list of available settings:
|
|||||||
[!INCLUDE [turn-off-notification-area-cleanup](includes/turn-off-notification-area-cleanup.md)]
|
[!INCLUDE [turn-off-notification-area-cleanup](includes/turn-off-notification-area-cleanup.md)]
|
||||||
::: zone-end
|
::: zone-end
|
||||||
|
|
||||||
[!INCLUDE [turn-off-windows-copilot](includes/turn-off-windows-copilot.md)]
|
|
||||||
|
|
||||||
#### [:::image type="icon" source="../images/icons/touch.svg"::: **Taskbar behaviors**](#tab/actions)
|
#### [:::image type="icon" source="../images/icons/touch.svg"::: **Taskbar behaviors**](#tab/actions)
|
||||||
|
|
||||||
::: zone pivot="windows-11"
|
::: zone pivot="windows-11"
|
||||||
|
@ -7,8 +7,8 @@ items:
|
|||||||
href: start/toc.yml
|
href: start/toc.yml
|
||||||
- name: Taskbar
|
- name: Taskbar
|
||||||
href: taskbar/toc.yml
|
href: taskbar/toc.yml
|
||||||
- name: Spotlight
|
- name: Windows spotlight
|
||||||
href: lock-screen/windows-spotlight.md
|
href: windows-spotlight/index.md
|
||||||
- name: Microsoft Store
|
- name: Microsoft Store
|
||||||
href: store/toc.yml
|
href: store/toc.yml
|
||||||
- name: Cellular settings
|
- name: Cellular settings
|
||||||
|
After Width: | Height: | Size: 42 KiB |
After Width: | Height: | Size: 50 KiB |
BIN
windows/configuration/windows-spotlight/images/lockscreen-10.png
Normal file
After Width: | Height: | Size: 859 KiB |
BIN
windows/configuration/windows-spotlight/images/lockscreen-11.png
Normal file
After Width: | Height: | Size: 878 KiB |
129
windows/configuration/windows-spotlight/index.md
Normal file
@ -0,0 +1,129 @@
|
|||||||
|
---
|
||||||
|
title: Configure Windows spotlight
|
||||||
|
description: Learn how to configure Windows spotlight using Group Policy and mobile device management (MDM) settings.
|
||||||
|
ms.topic: how-to
|
||||||
|
ms.date: 04/23/2024
|
||||||
|
ms.author: paoloma
|
||||||
|
author: paolomatarazzo
|
||||||
|
appliesto:
|
||||||
|
zone_pivot_groups: windows-versions-11-10
|
||||||
|
---
|
||||||
|
|
||||||
|
# Configure Windows spotlight
|
||||||
|
|
||||||
|
Windows spotlight is a feature that displays different wallpapers and offers suggestions, fun facts, tips, or organizational messages:
|
||||||
|
|
||||||
|
::: zone pivot="windows-11"
|
||||||
|
|
||||||
|
- **Wallpapers**: Windows spotlight displays a new image on the lock screen and in the background every day
|
||||||
|
- **Suggestions, fun facts, tips**: recommendations on how to enhance the user's productivity of Microsoft products. They're displayed in different locations, such as the lock screen, the background, the taskbar, or the Get Started app
|
||||||
|
- **Organizational messages**: messages from your organization, which can be displayed in the taskbar, the notification area, or the Get Started app
|
||||||
|
|
||||||
|
:::image type="content" source="images/lockscreen-11.png" alt-text="Screenshot of the Windows 11 lock screen with Windows Spotlight enabled." border="false":::
|
||||||
|
|
||||||
|
::: zone-end
|
||||||
|
|
||||||
|
::: zone pivot="windows-10"
|
||||||
|
|
||||||
|
- **Wallpapers**: Windows spotlight displays a new image on the lock screen every day
|
||||||
|
- **Suggestions, fun facts, tips**: recommendations on how to enhance the user's productivity of Microsoft products. They're displayed in different locations, such as the lock screen, the background, the taskbar, or the Get Started app
|
||||||
|
- **Organizational messages**: messages from your organization, which can be displayed in the taskbar, the notification area, or the Get Started app
|
||||||
|
|
||||||
|
:::image type="content" source="images/lockscreen-10.png" alt-text="Screenshot of the Windows 10 lock screen with Windows Spotlight enabled." border="false":::
|
||||||
|
|
||||||
|
::: zone-end
|
||||||
|
|
||||||
|
## Windows edition and licensing requirements
|
||||||
|
|
||||||
|
Windows spotlight is available on Windows Enterprise and Education editions only.
|
||||||
|
|
||||||
|
## Configuration options
|
||||||
|
|
||||||
|
Windows spotlight is enabled by default, but you can customize it to meet your organization's needs. There are several options to configure Windows spotlight.
|
||||||
|
|
||||||
|
If you need to configure a device for a single user, go to:
|
||||||
|
|
||||||
|
::: zone pivot="windows-11"
|
||||||
|
|
||||||
|
- **Settings** > **Personalization** > **[Background](ms-settings:personalization-background)**. To change the background image to Windows spotlight, select **Windows spotlight** from the **Personalize your background** drop-down menu
|
||||||
|
|
||||||
|
::: zone-end
|
||||||
|
|
||||||
|
- **Settings** > **Personalization** > **[Lock screen](ms-settings:personalization-lockscreen)**. To change the lock screen image to Windows spotlight, select **Windows spotlight** from the **Personalize your lock screen** drop-down menu
|
||||||
|
|
||||||
|
For advanced customizations and when you need to configure multiple devices, you can use one of the following options:
|
||||||
|
|
||||||
|
- Configuration Service Provider (CSP): commonly used for devices managed by a Mobile Device Management (MDM) solution, like Microsoft Intune. CSPs can also be configured with [provisioning packages](../provisioning-packages/how-it-pros-can-use-configuration-service-providers.md#csps-in-windows-configuration-designer), which are used at deployment time or for unmanaged devices. To configure Windows spotlight, use the [Experience Policy CSP][CSP-1]
|
||||||
|
- Group policy (GPO): used for devices that are Active Directory joined or Microsoft Entra hybrid joined, and not managed by a device management solution. Group policy can also be used for devices that aren't joined to an Active Directory domain, using the local group policy editor
|
||||||
|
|
||||||
|
## Policy settings
|
||||||
|
|
||||||
|
Here's a sorted list of the policy settings to configure Windows spotlight:
|
||||||
|
|
||||||
|
::: zone pivot="windows-11"
|
||||||
|
|Policy name| CSP | GPO |
|
||||||
|
|-|-|-|
|
||||||
|
|[AllowSpotlightCollection](/windows/client-management/mdm/policy-csp-experience#allowspotlightcollection)|✅|❌|
|
||||||
|
|[AllowThirdPartySuggestionsInWindowsSpotlight](/windows/client-management/mdm/policy-csp-experience#allowthirdpartysuggestionsinwindowsspotlight)|✅|✅|
|
||||||
|
|[AllowWindowsSpotlight](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlight)|✅|✅|
|
||||||
|
|[AllowWindowsSpotlightOnActionCenter](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlightonactioncenter)|✅|✅|
|
||||||
|
|[AllowWindowsSpotlightOnSettings](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlightonsettings)|✅|✅|
|
||||||
|
|[AllowWindowsSpotlightWindowsWelcomeExperience](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlightwindowswelcomeexperience)|✅|✅|
|
||||||
|
|[ConfigureWindowsSpotlightOnLockScreen](/windows/client-management/mdm/policy-csp-experience#configurewindowsspotlightonlockscreen)|✅|✅|
|
||||||
|
|
||||||
|
::: zone-end
|
||||||
|
|
||||||
|
::: zone pivot="windows-10"
|
||||||
|
|
||||||
|
|Policy name| CSP | GPO |
|
||||||
|
|-|-|-|
|
||||||
|
|[AllowThirdPartySuggestionsInWindowsSpotlight](/windows/client-management/mdm/policy-csp-experience#allowthirdpartysuggestionsinwindowsspotlight)|✅|✅|
|
||||||
|
|[AllowWindowsSpotlight](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlight)|✅|✅|
|
||||||
|
|[AllowWindowsSpotlightOnActionCenter](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlightonactioncenter)|✅|✅|
|
||||||
|
|[AllowWindowsSpotlightOnSettings](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlightonsettings)|✅|✅|
|
||||||
|
|[AllowWindowsSpotlightWindowsWelcomeExperience](/windows/client-management/mdm/policy-csp-experience#allowwindowsspotlightwindowswelcomeexperience)|✅|✅|
|
||||||
|
|[ConfigureWindowsSpotlightOnLockScreen](/windows/client-management/mdm/policy-csp-experience#configurewindowsspotlightonlockscreen)|✅|✅|
|
||||||
|
|
||||||
|
::: zone-end
|
||||||
|
|
||||||
|
## Custom lock screen and background images
|
||||||
|
|
||||||
|
You can replace the Windows spotlight lock screen and background images with a custom image. When you do so, users can still see suggestions, fun facts, tips, or organizational messages on the lock screen, but the background image is replaced with the custom image.
|
||||||
|
|
||||||
|
To configure the lock screen and background images, use the [Personalization CSP][CSP-2].
|
||||||
|
|
||||||
|
|Policy name| CSP | GPO |
|
||||||
|
|-|-|-|
|
||||||
|
|[DesktopImageUrl](/windows/client-management/mdm/personalization-csp#desktopimageurl)|✅|✅|
|
||||||
|
|[LockScreenImageUrl](/windows/client-management/mdm/personalization-csp#lockscreenimageurl)|✅|✅|
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> A concern with custom images is how they'll appear on different screen sizes and resolutions. A custom image created in `16:9` aspect ratio (for example, `1600x900`) scales properly on devices using a `16:9` resolution, such as `1280x720` or `1920x1080`. On devices using other aspect ratios, such as `4:3` (`1024x768`) or `16:10` (`1280x800`), height scales correctly and width is cropped to a size equal to the aspect ratio. The image remains centered on the screen.
|
||||||
|
>
|
||||||
|
> Lock screen images created at other aspect ratios might scale and center unpredictably on your device when changing aspect ratios. The recommendation for custom images that include text (such as a legal statement), is to create the lock screen image in `16:9` resolution with text contained in the `4:3` region, allowing the text to remain visible at any aspect ratio.
|
||||||
|
|
||||||
|
## User experience
|
||||||
|
|
||||||
|
When Windows spotlight is enabled, devices apply a new image on the lock screen and in the background every day. The image is displayed in the background when the user signs in, and on the lock screen when the user locks the device. Users can still receive suggestions, fun facts, tips, or organizational messages. If you deploy a custom lock screen or background image, devices apply the custom image instead of the Windows spotlight image:
|
||||||
|
|
||||||
|
::: zone pivot="windows-11"
|
||||||
|
|
||||||
|
:::image type="content" source="images/contoso-lockscreen-11.png" alt-text="Screenshot of the Windows 11 lock screen with Windows spotlight enabled over an organization wallpaper." border="false":::
|
||||||
|
|
||||||
|
::: zone-end
|
||||||
|
|
||||||
|
::: zone pivot="windows-10"
|
||||||
|
|
||||||
|
:::image type="content" source="images/contoso-lockscreen-10.png" alt-text="Screenshot of the Windows 10 lock screen with Windows spotlight enabled over an organization wallpaper." border="false":::
|
||||||
|
|
||||||
|
::: zone-end
|
||||||
|
|
||||||
|
## Next steps
|
||||||
|
|
||||||
|
To learn more about organizational messages, see [Organizational messages in Microsoft Intune][INT-1].
|
||||||
|
|
||||||
|
<!--links-->
|
||||||
|
|
||||||
|
[CSP-1]: /windows/client-management/mdm/policy-csp-experience
|
||||||
|
[CSP-2]: /windows/client-management/mdm/personalization-csp
|
||||||
|
[INT-1]: /mem/intune/remote-actions/organizational-messages-overview
|
@ -3,7 +3,7 @@ title: Manage additional Windows Update settings
|
|||||||
description: In this article, learn about additional settings to control the behavior of Windows Update in your organization.
|
description: In this article, learn about additional settings to control the behavior of Windows Update in your organization.
|
||||||
ms.service: windows-client
|
ms.service: windows-client
|
||||||
ms.subservice: itpro-updates
|
ms.subservice: itpro-updates
|
||||||
ms.topic: conceptual
|
ms.topic: reference
|
||||||
author: mestew
|
author: mestew
|
||||||
ms.author: mstewart
|
ms.author: mstewart
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
@ -14,7 +14,7 @@ ms.localizationpriority: medium
|
|||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||||
ms.date: 04/25/2023
|
ms.date: 04/29/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage additional Windows Update settings
|
# Manage additional Windows Update settings
|
||||||
@ -42,32 +42,35 @@ You can use Group Policy settings or mobile device management (MDM) to configure
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Additional information about settings to manage device restarts and restart notifications for updates is available on **[Manage device restarts after updates](waas-restart.md)**.
|
>Additional information about settings to manage device restarts and restart notifications for updates is available on **[Manage device restarts after updates](waas-restart.md)**.
|
||||||
>
|
>
|
||||||
>Additional settings that configure when Feature and Quality updates are received are detailed on **[Configure Windows Update for Business](waas-configure-wufb.md)**.
|
>Additional settings that configure when feature and quality updates are received are detailed on **[Configure Windows Update for Business](waas-configure-wufb.md)**.
|
||||||
|
|
||||||
## Scanning for updates
|
## Scanning for updates
|
||||||
|
|
||||||
Admins have a lot of flexibility in configuring how their devices scan and receive updates.
|
Admins have flexibility in configuring how their devices scan and receive updates.
|
||||||
|
|
||||||
[Specify Intranet Microsoft update service location](#specify-intranet-microsoft-update-service-location) allows admins to point devices to an internal Microsoft update service location, while [Do not connect to any Windows Update Internet locations](#do-not-connect-to-any-windows-update-internet-locations) gives them the option to restrict devices to just that internal update service. [Automatic Updates Detection Frequency](#automatic-updates-detection-frequency) controls how frequently devices scan for updates.
|
[Specify Intranet Microsoft update service location](#specify-intranet-microsoft-update-service-location) allows admins to point devices to an internal Microsoft update service location, while [Do not connect to any Windows Update Internet locations](#do-not-connect-to-any-windows-update-internet-locations) gives them the option to restrict devices to just that internal update service. [Automatic Updates Detection Frequency](#automatic-updates-detection-frequency) controls how frequently devices scan for updates.
|
||||||
|
|
||||||
You can make custom device groups that will work with your internal Microsoft update service by using [Enable client-side targeting](#enable-client-side-targeting). You can also make sure your devices receive updates that weren't signed by Microsoft from your internal Microsoft update service, through [Allow signed updates from an intranet Microsoft update service location](#allow-signed-updates-from-an-intranet-microsoft-update-service-location).
|
You can make custom device groups that work with your internal Microsoft update service by using [Enable client-side targeting](#enable-client-side-targeting). You can also make sure your devices receive updates that weren't signed by Microsoft from your internal Microsoft update service, through [Allow signed updates from an intranet Microsoft update service location](#allow-signed-updates-from-an-intranet-microsoft-update-service-location).
|
||||||
|
|
||||||
Finally, to make sure the updating experience is fully controlled by the admins, you can [Remove access to use all Windows Update features](#remove-access-to-use-all-windows-update-features) for users.
|
Finally, to make sure the updating experience is fully admin controlled, you can [Remove access to use all Windows Update features](#remove-access-to-use-all-windows-update-features) for users.
|
||||||
|
|
||||||
For additional settings that configure when Feature and Quality updates are received, see [Configure Windows Update for Business](waas-configure-wufb.md).
|
For additional settings that configure when feature and quality updates are received, see [Configure Windows Update for Business](waas-configure-wufb.md).
|
||||||
|
|
||||||
### Specify intranet Microsoft update service location
|
### Specify intranet Microsoft update service location
|
||||||
|
|
||||||
Specifies an intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network.
|
Specifies an intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network.
|
||||||
This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network.
|
This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client searches this service for updates that apply to the computers on your network.
|
||||||
|
|
||||||
To use this setting in Group Policy, go to **Computer Configuration\Administrative Templates\Windows Components\Windows Update\Specify Intranet Microsoft update service location**. You must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update Agent to download updates from an alternate download server instead of the intranet update service.
|
To use this setting in Group Policy, go to **Computer Configuration\Administrative Templates\Windows Components\Windows Update\Specify Intranet Microsoft update service location**. You must set two server name values:
|
||||||
|
- The server from which the Automatic Updates client detects and downloads updates
|
||||||
|
- The server to which updated workstations upload statistics
|
||||||
|
You can set both values to be the same server. An optional server name value can be specified to configure Windows Update Agent to download updates from an alternate download server instead of the intranet update service.
|
||||||
|
|
||||||
If the setting is set to **Enabled**, the Automatic Updates client connects to the specified intranet Microsoft update service (or alternate download server), instead of Windows Update, to search for and download updates. Enabling this setting means that end users in your organization don't have to go through a firewall to get updates, and it gives you the opportunity to test updates after deploying them.
|
If the setting is set to **Enabled**, the Automatic Updates client connects to the specified intranet Microsoft update service (or alternate download server), instead of Windows Update, to search for and download updates. Enabling this setting means that end users in your organization don't have to go through a firewall to get updates, and it gives you the opportunity to test updates after deploying them.
|
||||||
If the setting is set to **Disabled** or **Not Configured**, and if Automatic Updates isn't disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet.
|
If the setting is set to **Disabled** or **Not Configured**, and if Automatic Updates isn't disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet.
|
||||||
|
|
||||||
The alternate download server configures the Windows Update Agent to download files from an alternative download server instead of the intranet update service.
|
The alternate download server configures the Windows Update Agent to download files from an alternative download server instead of the intranet update service.
|
||||||
The option to download files with missing Urls allows content to be downloaded from the Alternate Download Server when there are no download Urls for files in the update metadata. This option should only be used when the intranet update service doesn't provide download Urls in the update metadata for files that are present on the alternate download server.
|
The option to download files with missing URLs allows content to be downloaded from the Alternate Download Server when there are no download URLs for files in the update metadata. This option should only be used when the intranet update service doesn't provide download URLs in the update metadata for files that are present on the alternate download server.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>If the "Configure Automatic Updates" policy is disabled, then this policy has no effect.
|
>If the "Configure Automatic Updates" policy is disabled, then this policy has no effect.
|
||||||
@ -84,8 +87,8 @@ Specifies the hours that Windows will use to determine how long to wait before c
|
|||||||
|
|
||||||
To set this setting with Group Policy, navigate to **Computer Configuration\Administrative Templates\Windows Components\Windows Update\Automatic Updates detection frequency**.
|
To set this setting with Group Policy, navigate to **Computer Configuration\Administrative Templates\Windows Components\Windows Update\Automatic Updates detection frequency**.
|
||||||
|
|
||||||
If the setting is set to **Enabled**, Windows will check for available updates at the specified interval.
|
If the setting is set to **Enabled**, Windows checks for available updates at the specified interval.
|
||||||
If the setting is set to **Disabled** or **Not Configured**, Windows will check for available updates at the default interval of 22 hours.
|
If the setting is set to **Disabled** or **Not Configured**, Windows checks for available updates at the default interval of 22 hours.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The "Specify intranet Microsoft update service location" setting must be enabled for this policy to have effect.
|
>The "Specify intranet Microsoft update service location" setting must be enabled for this policy to have effect.
|
||||||
@ -96,7 +99,7 @@ To configure this policy with MDM, use [DetectionFrequency](/windows/client-mana
|
|||||||
|
|
||||||
### Remove access to use all Windows Update features
|
### Remove access to use all Windows Update features
|
||||||
|
|
||||||
By enabling the Group Policy setting under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Remove access to use all Windows update features**, administrators can disable the "Check for updates" option for users. Any background update scans, downloads and installations will continue to work as configured.
|
By enabling the Group Policy setting under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Remove access to use all Windows update features**, administrators can disable the "Check for updates" option for users. Any background update scans, downloads, and installations will continue to work as configured.
|
||||||
|
|
||||||
### Do not connect to any Windows Update Internet locations
|
### Do not connect to any Windows Update Internet locations
|
||||||
|
|
||||||
@ -109,11 +112,11 @@ Use **Computer Configuration\Administrative Templates\Windows Components\Windows
|
|||||||
|
|
||||||
### Enable client-side targeting
|
### Enable client-side targeting
|
||||||
|
|
||||||
Specifies the target group name or names that should be used to receive updates from an intranet Microsoft update service. This allows admins to configure device groups that will receive different updates from sources like WSUS or Configuration Manager.
|
Specifies the target group name or names that should be used to receive updates from an intranet Microsoft update service. This allows admins to configure device groups that receive different updates from sources like WSUS or Configuration Manager.
|
||||||
|
|
||||||
This Group Policy setting can be found under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Enable client-side targeting**.
|
This Group Policy setting can be found under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Enable client-side targeting**.
|
||||||
If the setting is set to **Enabled**, the specified target group information is sent to the intranet Microsoft update service, which uses it to determine which updates should be deployed to this computer.
|
If the setting is set to **Enabled**, the specified target group information is sent to the intranet Microsoft update service, which uses it to determine which updates should be deployed to this computer.
|
||||||
If the setting is set to **Disabled** or **Not Configured**, no target group information will be sent to the intranet Microsoft update service.
|
If the setting is set to **Disabled** or **Not Configured**, no target group information is sent to the intranet Microsoft update service.
|
||||||
|
|
||||||
If the intranet Microsoft update service supports multiple target groups, this policy can specify multiple group names separated by semicolons. Otherwise, a single group must be specified.
|
If the intranet Microsoft update service supports multiple target groups, this policy can specify multiple group names separated by semicolons. Otherwise, a single group must be specified.
|
||||||
|
|
||||||
@ -147,7 +150,7 @@ Allows admins to exclude Windows Update drivers during updates.
|
|||||||
|
|
||||||
To configure this setting in Group Policy, use **Computer Configuration\Administrative Templates\Windows Components\Windows update\Do not include drivers with Windows Updates**.
|
To configure this setting in Group Policy, use **Computer Configuration\Administrative Templates\Windows Components\Windows update\Do not include drivers with Windows Updates**.
|
||||||
Enable this policy to not include drivers with Windows quality updates.
|
Enable this policy to not include drivers with Windows quality updates.
|
||||||
If you disable or don't configure this policy, Windows Update will include updates that have a Driver classification.
|
If you disable or don't configure this policy, Windows Update includes updates that have a Driver classification.
|
||||||
|
|
||||||
### Configure Automatic Updates
|
### Configure Automatic Updates
|
||||||
|
|
||||||
@ -157,15 +160,15 @@ Enables the IT admin to manage automatic update behavior to scan, download, and
|
|||||||
|
|
||||||
Under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Configure Automatic Updates**, you must select one of the following options:
|
Under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Configure Automatic Updates**, you must select one of the following options:
|
||||||
|
|
||||||
**2 - Notify for download and auto install** - When Windows finds updates that apply to this device, users will be notified that updates are ready to be downloaded. After going to **Settings > Update & security > Windows Update**, users can download and install any available updates.
|
**2 - Notify for download and auto install** - When Windows finds updates that apply to this device, users are notified that updates are ready to be downloaded. After going to **Settings > Update & security > Windows Update**, users can download and install any available updates.
|
||||||
|
|
||||||
**3 - Auto download and notify for Install** - Windows finds updates that apply to the device and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to **Settings > Update & security > Windows Update**, users can install them.
|
**3 - Auto download and notify for Install** - Windows finds updates that apply to the device and downloads them in the background (the user isn't notified or interrupted during this process). When the downloads are complete, users will be notified that they're ready to install. After going to **Settings > Update & security > Windows Update**, users can install them.
|
||||||
|
|
||||||
**4 - Auto download and schedule the install** - Specify the schedule using the options in the Group Policy Setting. For more information about this setting, see [Schedule update installation](waas-restart.md#schedule-update-installation).
|
**4 - Auto download and schedule the install** - Specify the schedule using the options in the Group Policy Setting. For more information about this setting, see [Schedule update installation](waas-restart.md#schedule-update-installation).
|
||||||
|
|
||||||
**5 - Allow local admin to choose setting** - With this option, local administrators will be allowed to use the settings app to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. This option isn't available in any Windows 10 or later versions.
|
**5 - Allow local admin to choose setting** - With this option, local administrators are allowed to use the settings app to select a configuration option of their choice. Local administrators won't be allowed to disable the configuration for Automatic Updates. This option isn't available in any Windows 10 or later versions.
|
||||||
|
|
||||||
**7 - Notify for install and notify for restart** (Windows Server 2016 and later only) - With this option, when Windows finds updates that apply to this device, they'll be downloaded, then users will be notified that updates are ready to be installed. Once updates are installed, a notification will be displayed to users to restart the device.
|
**7 - Notify for install and notify for restart** (Windows Server 2016 and later only) - With this option, when Windows finds updates that apply to this device, they are downloaded, then users are notified that updates are ready to be installed. Once updates are installed, a notification is displayed to users to restart the device.
|
||||||
|
|
||||||
If this setting is set to **Disabled**, any updates that are available on Windows Update must be downloaded and installed manually. To do this, users must go to **Settings > Update & security > Windows Update**.
|
If this setting is set to **Disabled**, any updates that are available on Windows Update must be downloaded and installed manually. To do this, users must go to **Settings > Update & security > Windows Update**.
|
||||||
|
|
||||||
@ -257,14 +260,14 @@ HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\
|
|||||||
|
|
||||||
## Display organization name in Windows Update notifications
|
## Display organization name in Windows Update notifications
|
||||||
<!--6286260-->
|
<!--6286260-->
|
||||||
When Windows 11 clients are associated with a Microsoft Entra tenant, the organization name appears in the Windows Update notifications. For instance, when you have a compliance deadline configured for Windows Update for Business, the user notification will display a message similar to **Contoso requires important updates to be installed**. The organization name will also display on the **Windows Update** page in the **Settings** for Windows 11.
|
When Windows 11 clients are associated with a Microsoft Entra tenant, the organization name appears in the Windows Update notifications. For instance, when you have a compliance deadline configured for Windows Update for Business, the user notification displays a message similar to **Contoso requires important updates to be installed**. The organization name will also display on the **Windows Update** page in the **Settings** for Windows 11.
|
||||||
|
|
||||||
The organization name appears automatically for Windows 11 clients that are associated with Microsoft Entra ID in any of the following ways:
|
The organization name appears automatically for Windows 11 clients that are associated with Microsoft Entra ID in any of the following ways:
|
||||||
- [Microsoft Entra joined](/azure/active-directory/devices/concept-azure-ad-join)
|
- [Microsoft Entra joined](/azure/active-directory/devices/concept-azure-ad-join)
|
||||||
- [Microsoft Entra registered](/azure/active-directory/devices/concept-azure-ad-register)
|
- [Microsoft Entra registered](/azure/active-directory/devices/concept-azure-ad-register)
|
||||||
- [Microsoft Entra hybrid joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid)
|
- [Microsoft Entra hybrid joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid)
|
||||||
|
|
||||||
To disable displaying the organization name in Windows Update notifications, add or modify the following in the registry:
|
To disable displaying the organization name in Windows Update notifications, add or modify the following values in the registry:
|
||||||
|
|
||||||
- **Registry key**: `HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsUpdate\Orchestrator\Configurations`
|
- **Registry key**: `HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsUpdate\Orchestrator\Configurations`
|
||||||
- **DWORD value name**: UsoDisableAADJAttribution
|
- **DWORD value name**: UsoDisableAADJAttribution
|
||||||
|
@ -6,7 +6,7 @@ manager: aaroncz
|
|||||||
ms.author: frankroj
|
ms.author: frankroj
|
||||||
ms.service: windows-client
|
ms.service: windows-client
|
||||||
author: frankroj
|
author: frankroj
|
||||||
ms.date: 01/09/2024
|
ms.date: 04/30/2024
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.subservice: itpro-deploy
|
ms.subservice: itpro-deploy
|
||||||
appliesto:
|
appliesto:
|
||||||
@ -127,33 +127,33 @@ The `/uel`, `/ue` and `/ui` options can be used together to migrate only the use
|
|||||||
|
|
||||||
## Incompatible command-line options
|
## Incompatible command-line options
|
||||||
|
|
||||||
The following table indicates which command-line options aren't compatible with the `LoadState.exe` command. If the table entry for a particular combination has a ✔️, the options are compatible, and they can be used together. The ❌ symbol means that the options aren't compatible. For example, the `/nocompress` option can't be used with the `/encrypt` option.
|
The following table indicates which command-line options aren't compatible with the `LoadState.exe` command. If the table entry for a particular combination has a ✅, the options are compatible, and they can be used together. The ❌ symbol means that the options aren't compatible. For example, the `/nocompress` option can't be used with the `/encrypt` option.
|
||||||
|
|
||||||
| Command-Line Option | /keyfile | /nocompress | /genconfig | /all |
|
| Command-Line Option | /keyfile | /nocompress | /genconfig | /all |
|
||||||
|--- |--- |--- |--- |--- |
|
|--- |--- |--- |--- |--- |
|
||||||
| **/i** | ✔️ | ✔️ | ✔️ | ✔️ |
|
| **/i** | ✅ | ✅ | ✅ | ✅ |
|
||||||
| **/v** | ✔️ | ✔️ | ✔️ | ✔️ |
|
| **/v** | ✅ | ✅ | ✅ | ✅ |
|
||||||
| **/nocompress** | ✔️ | N/A | ❌ | ✔️ |
|
| **/nocompress** | ✅ | N/A | ❌ | ✅ |
|
||||||
| **/key** | ❌ | ✔️ | ❌ | ✔️ |
|
| **/key** | ❌ | ✅ | ❌ | ✅ |
|
||||||
| **/decrypt** | Required* | ❌ | ❌ | ✔️ |
|
| **/decrypt** | Required* | ❌ | ❌ | ✅ |
|
||||||
| **/keyfile** | N/A | ✔️ | ❌ | ✔️ |
|
| **/keyfile** | N/A | ✅ | ❌ | ✅ |
|
||||||
| **/l** | ✔️ | ✔️ | ✔️ | ✔️ |
|
| **/l** | ✅ | ✅ | ✅ | ✅ |
|
||||||
| **/progress** | ✔️ | ✔️ | ❌ | ✔️ |
|
| **/progress** | ✅ | ✅ | ❌ | ✅ |
|
||||||
| **/r** | ✔️ | ✔️ | ❌ | ✔️ |
|
| **/r** | ✅ | ✅ | ❌ | ✅ |
|
||||||
| **/w** | ✔️ | ✔️ | ❌ | ✔️ |
|
| **/w** | ✅ | ✅ | ❌ | ✅ |
|
||||||
| **/c** | ✔️ | ✔️ | ❌ | ✔️ |
|
| **/c** | ✅ | ✅ | ❌ | ✅ |
|
||||||
| **/p** | ✔️ | ✔️ | ❌ | N/A |
|
| **/p** | ✅ | ✅ | ❌ | N/A |
|
||||||
| **/all** | ✔️ | ✔️ | ❌ | ✔️ |
|
| **/all** | ✅ | ✅ | ❌ | ✅ |
|
||||||
| **/ui** | ✔️ | ✔️ | ❌ | ❌ |
|
| **/ui** | ✅ | ✅ | ❌ | ❌ |
|
||||||
| **/ue** | ✔️ | ✔️ | ❌ | ❌ |
|
| **/ue** | ✅ | ✅ | ❌ | ❌ |
|
||||||
| **/uel** | ✔️ | ✔️ | ❌ | ❌ |
|
| **/uel** | ✅ | ✅ | ❌ | ❌ |
|
||||||
| **/genconfig** | ✔️ | ✔️ | N/A | ✔️ |
|
| **/genconfig** | ✅ | ✅ | N/A | ✅ |
|
||||||
| **/config** | ✔️ | ✔️ | ❌ | ✔️ |
|
| **/config** | ✅ | ✅ | ❌ | ✅ |
|
||||||
| *StorePath* | ✔️ | ✔️ | ✔️ | ✔️ |
|
| *StorePath* | ✅ | ✅ | ✅ | ✅ |
|
||||||
| **/md** | ✔️ | ✔️ | ✔️ | ✔️ |
|
| **/md** | ✅ | ✅ | ✅ | ✅ |
|
||||||
| **/mu** | ✔️ | ✔️ | ✔️ | ✔️ |
|
| **/mu** | ✅ | ✅ | ✅ | ✅ |
|
||||||
| **/lae** | ✔️ | ✔️ | ✔️ | ✔️ |
|
| **/lae** | ✅ | ✅ | ✅ | ✅ |
|
||||||
| **/lac** | ✔️ | ✔️ | ✔️ | ✔️ |
|
| **/lac** | ✅ | ✅ | ✅ | ✅ |
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
>
|
>
|
||||||
|
@ -6,7 +6,7 @@ manager: aaroncz
|
|||||||
ms.author: frankroj
|
ms.author: frankroj
|
||||||
ms.service: windows-client
|
ms.service: windows-client
|
||||||
author: frankroj
|
author: frankroj
|
||||||
ms.date: 01/18/2024
|
ms.date: 04/30/2024
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.subservice: itpro-deploy
|
ms.subservice: itpro-deploy
|
||||||
appliesto:
|
appliesto:
|
||||||
@ -24,10 +24,10 @@ The following table lists the operating systems supported in USMT.
|
|||||||
|
|
||||||
| Operating<br>Systems | ScanState<br>(Source<br>Device)| LoadState<br>(Destination<br>Device)|
|
| Operating<br>Systems | ScanState<br>(Source<br>Device)| LoadState<br>(Destination<br>Device)|
|
||||||
|--- |--- |--- |
|
|--- |--- |--- |
|
||||||
|Windows 7|✔️|❌|
|
|Windows 7|✅|❌|
|
||||||
|Windows 8|✔️|❌|
|
|Windows 8|✅|❌|
|
||||||
|Windows 10|✔️|✔️|
|
|Windows 10|✅|✅|
|
||||||
|Windows 11|✔️|✔️|
|
|Windows 11|✅|✅|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
>
|
>
|
||||||
@ -79,7 +79,7 @@ To open an elevated command prompt:
|
|||||||
|
|
||||||
### Specify the `/c` option and \<ErrorControl\> settings in the `Config.xml` file
|
### Specify the `/c` option and \<ErrorControl\> settings in the `Config.xml` file
|
||||||
|
|
||||||
USMT fails if it can't migrate a file or setting, unless the `/c` option is specified. When the `/c` option is specified, USMT logs an error each time it encounters a file that is in use that didn't migrate, but the migration isn't be interrupted. In USMT, which types of errors should allow the migration to continue and which should cause the migration to fail can be specified in the `Config.xml` file. For more information about error reporting, and the **\<ErrorControl\>** element, see [Config.xml file](usmt-configxml-file.md#errorcontrol), [Log files](usmt-log-files.md), and [XML elements library](usmt-xml-elements-library.md).
|
USMT fails if it can't migrate a file or setting, unless the `/c` option is specified. When the `/c` option is specified, USMT logs an error each time it encounters a file that is in use that didn't migrate, but the migration isn't to be interrupted. In USMT, which types of errors should allow the migration to continue and which should cause the migration to fail can be specified in the `Config.xml` file. For more information about error reporting, and the **\<ErrorControl\>** element, see [Config.xml file](usmt-configxml-file.md#errorcontrol), [Log files](usmt-log-files.md), and [XML elements library](usmt-xml-elements-library.md).
|
||||||
|
|
||||||
## LoadState
|
## LoadState
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@ manager: aaroncz
|
|||||||
ms.author: frankroj
|
ms.author: frankroj
|
||||||
ms.service: windows-client
|
ms.service: windows-client
|
||||||
author: frankroj
|
author: frankroj
|
||||||
ms.date: 01/09/2024
|
ms.date: 04/30/2024
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.subservice: itpro-deploy
|
ms.subservice: itpro-deploy
|
||||||
appliesto:
|
appliesto:
|
||||||
@ -197,33 +197,33 @@ For more information, see [Migrate EFS Files and Certificates](usmt-migrate-efs-
|
|||||||
|
|
||||||
## Incompatible command-line options
|
## Incompatible command-line options
|
||||||
|
|
||||||
The following table indicates which command-line options aren't compatible with the `ScanState.exe` command. If the table entry for a particular combination has a ✔️, the options are compatible and they can be used together. The ❌ symbol means that the options aren't compatible. For example, the `/nocompress` option can't be used with the `/encrypt` option.
|
The following table indicates which command-line options aren't compatible with the `ScanState.exe` command. If the table entry for a particular combination has a ✅, the options are compatible and they can be used together. The ❌ symbol means that the options aren't compatible. For example, the `/nocompress` option can't be used with the `/encrypt` option.
|
||||||
|
|
||||||
|Command-Line Option|/keyfile|/nocompress|/genconfig|/all|
|
|Command-Line Option|/keyfile|/nocompress|/genconfig|/all|
|
||||||
|--- |--- |--- |--- |--- |
|
|--- |--- |--- |--- |--- |
|
||||||
|**/i**| ✔️ | ✔️ | ✔️ | ✔️ |
|
|**/i**| ✅ | ✅ | ✅ | ✅ |
|
||||||
|**/o**| ✔️ | ✔️ | ✔️ | ✔️ |
|
|**/o**| ✅ | ✅ | ✅ | ✅ |
|
||||||
|**/v**| ✔️ | ✔️ | ✔️ | ✔️ |
|
|**/v**| ✅ | ✅ | ✅ | ✅ |
|
||||||
|**/nocompress**| ✔️ | ✔️ | ✔️ |N/A|
|
|**/nocompress**| ✅ | ✅ | ✅ |N/A|
|
||||||
|**/localonly**| ✔️ | ✔️ | ❌ | ✔️ |
|
|**/localonly**| ✅ | ✅ | ❌ | ✅ |
|
||||||
|**/key**| ❌ | ✔️ | ❌ | ✔️ |
|
|**/key**| ❌ | ✅ | ❌ | ✅ |
|
||||||
|**/encrypt**|Required*| ❌ | ❌ | ✔️ |
|
|**/encrypt**|Required*| ❌ | ❌ | ✅ |
|
||||||
|**/keyfile**|N/A| ✔️ | ❌ | ✔️ |
|
|**/keyfile**|N/A| ✅ | ❌ | ✅ |
|
||||||
|**/l**| ✔️ | ✔️ | ✔️ | ✔️ |
|
|**/l**| ✅ | ✅ | ✅ | ✅ |
|
||||||
|**/listfiles**| ✔️ | ✔️ | ❌ | ✔️ |
|
|**/listfiles**| ✅ | ✅ | ❌ | ✅ |
|
||||||
|**/progress**| ✔️ | ✔️ | ❌ | ✔️ |
|
|**/progress**| ✅ | ✅ | ❌ | ✅ |
|
||||||
|**/r**| ✔️ | ✔️ | ❌ | ✔️ |
|
|**/r**| ✅ | ✅ | ❌ | ✅ |
|
||||||
|**/w**| ✔️ | ✔️ | ❌ | ✔️ |
|
|**/w**| ✅ | ✅ | ❌ | ✅ |
|
||||||
|**/c**| ✔️ | ✔️ | ❌ | ✔️ |
|
|**/c**| ✅ | ✅ | ❌ | ✅ |
|
||||||
|**/p**| ✔️ | ✔️ | ❌ |N/A|
|
|**/p**| ✅ | ✅ | ❌ |N/A|
|
||||||
|**/all**| ✔️ | ✔️ | ❌ | ✔️ |
|
|**/all**| ✅ | ✅ | ❌ | ✅ |
|
||||||
|**/ui**| ✔️ | ✔️ | ❌ | ❌ |
|
|**/ui**| ✅ | ✅ | ❌ | ❌ |
|
||||||
|**/ue**| ✔️ | ✔️ | ❌ | ❌ |
|
|**/ue**| ✅ | ✅ | ❌ | ❌ |
|
||||||
|**/uel**| ✔️ | ✔️ | ❌ | ❌ |
|
|**/uel**| ✅ | ✅ | ❌ | ❌ |
|
||||||
|**/efs**:*\<option\>*| ✔️ | ✔️ | ❌ | ✔️ |
|
|**/efs**:*\<option\>*| ✅ | ✅ | ❌ | ✅ |
|
||||||
|**/genconfig**| ✔️ | ✔️ |N/A| ✔️ |
|
|**/genconfig**| ✅ | ✅ |N/A| ✅ |
|
||||||
|**/config**| ✔️ | ✔️ | ❌ | ✔️ |
|
|**/config**| ✅ | ✅ | ❌ | ✅ |
|
||||||
|*\<StorePath\>*| ✔️ | ✔️ | ❌ | ✔️ |
|
|*\<StorePath\>*| ✅ | ✅ | ❌ | ✅ |
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
>
|
>
|
||||||
|
@ -7,34 +7,37 @@ author: frankroj
|
|||||||
ms.author: frankroj
|
ms.author: frankroj
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 11/23/2022
|
ms.date: 04/25/2024
|
||||||
ms.subservice: itpro-deploy
|
ms.subservice: itpro-deploy
|
||||||
|
appliesto:
|
||||||
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||||
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 10</a>
|
||||||
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/windows-server-release-info" target="_blank">Windows Server 2022</a>
|
||||||
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/windows-server-release-info" target="_blank">Windows Server 2019</a>
|
||||||
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/windows-server-release-info" target="_blank">Windows Server 2016</a>
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Deployment Services (WDS) boot.wim support
|
# Windows Deployment Services (WDS) boot.wim support
|
||||||
|
|
||||||
*Applies to:*
|
The operating system deployment functionality of [Windows Deployment Services](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831764(v=ws.11)) (WDS) is being partially deprecated. Starting with Windows 11, workflows that rely on **boot.wim** from installation media or on running Windows Setup in WDS mode is no longer supported.
|
||||||
|
|
||||||
- Windows 10
|
|
||||||
- Windows 11
|
|
||||||
|
|
||||||
The operating system deployment functionality of [Windows Deployment Services](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831764(v=ws.11)) (WDS) is being partially deprecated. Starting with Windows 11, workflows that rely on **boot.wim** from installation media or on running Windows Setup in WDS mode will no longer be supported.
|
|
||||||
|
|
||||||
When you PXE-boot from a WDS server that uses the **boot.wim** file from installation media as its boot image, Windows Setup automatically launches in WDS mode. This workflow is deprecated for Windows 11 and newer boot images. The following deprecation message is displayed:
|
When you PXE-boot from a WDS server that uses the **boot.wim** file from installation media as its boot image, Windows Setup automatically launches in WDS mode. This workflow is deprecated for Windows 11 and newer boot images. The following deprecation message is displayed:
|
||||||
|
|
||||||

|
> Windows Setup
|
||||||
|
>
|
||||||
|
> Windows Deployment Services client functionality is being partly deprecated. Please visit https://aka.ms/WDSSupport for more details on what is deprecated and what will continue to be supported.
|
||||||
|
|
||||||
## Deployment scenarios affected
|
## Deployment scenarios affected
|
||||||
|
|
||||||
The table below provides support details for specific deployment scenarios. Boot.wim is the `boot.wim` file obtained from the Windows source files for each specified version of Windows.
|
The following table provides support details for specific deployment scenarios. Boot.wim is the `boot.wim` file obtained from the Windows source files for each specified version of Windows.
|
||||||
|
|
||||||
|Windows Version being deployed |Boot.wim from Windows 10|Boot.wim from Windows Server 2016|Boot.wim from Windows Server 2019|Boot.wim from Windows Server 2022|Boot.wim from Windows 11|
|
|Windows Version being deployed |Boot.wim from Windows 10|Boot.wim from Windows Server 2016|Boot.wim from Windows Server 2019|Boot.wim from Windows Server 2022|Boot.wim from Windows 11|
|
||||||
|--- |--- |--- |--- |--- |--- |
|
|--- |--- |--- |--- |--- |--- |
|
||||||
|**Windows 10**|Supported, using a boot image from matching or newer version.|Supported, using a boot image from Windows 10, version 1607 or later.|Supported, using a boot image from Windows 10, version 1809 or later.|Not supported.|Not supported.|
|
|
||||||
|**Windows Server 2016**|Supported, using a boot image from Windows 10, version 1607 or later.|Supported.|Not supported.|Not supported.|Not supported.|
|
|
||||||
|**Windows Server 2019**|Supported, using a boot image from Windows 10, version 1809 or later.|Supported.|Supported.|Not supported.|Not supported.|
|
|
||||||
|**Windows Server 2022**|Deprecated, with a warning message.|Deprecated, with a warning message.|Deprecated, with a warning message.|Deprecated, with a warning message.|Not supported.|
|
|
||||||
|**Windows 11**|Not supported, blocked.|Not supported, blocked.|Not supported, blocked.|Not supported, blocked.|Not supported, blocked.|
|
|**Windows 11**|Not supported, blocked.|Not supported, blocked.|Not supported, blocked.|Not supported, blocked.|Not supported, blocked.|
|
||||||
|
|**Windows 10**|Supported, using a boot image from matching or newer version.|Supported, using a boot image from Windows 10, version 1607 or later.|Supported, using a boot image from Windows 10, version 1809 or later.|Not supported.|Not supported.|
|
||||||
|
|**Windows Server 2022**|Deprecated, with a warning message.|Deprecated, with a warning message.|Deprecated, with a warning message.|Deprecated, with a warning message.|Not supported.|
|
||||||
|
|**Windows Server 2019**|Supported, using a boot image from Windows 10, version 1809 or later.|Supported.|Supported.|Not supported.|Not supported.|
|
||||||
|
|**Windows Server 2016**|Supported, using a boot image from Windows 10, version 1607 or later.|Supported.|Not supported.|Not supported.|Not supported.|
|
||||||
|
|
||||||
## Reason for the change
|
## Reason for the change
|
||||||
|
|
||||||
@ -46,15 +49,15 @@ Alternatives to WDS, such as [Microsoft Configuration Manager](/mem/configmgr/)
|
|||||||
|
|
||||||
## Not affected
|
## Not affected
|
||||||
|
|
||||||
WDS PXE boot isn't affected by this change. You can still use WDS to PXE boot devices with custom boot images, but you can't use **boot.wim** as the boot image and run Windows Setup in WDS mode.
|
This change doesn’t affect WDS PXE boot. You can still use WDS to PXE boot devices with custom boot images, but you can't use **boot.wim** as the boot image and run Windows Setup in WDS mode.
|
||||||
|
|
||||||
You can still run Windows Setup from a network share. Workflows that use a custom boot.wim, such as MDT or Configuration Manager aren't affected by this change.
|
You can still run Windows Setup from a network share. This change doesn't change Workflows that use a custom boot.wim, such as MDT or Configuration Manager.
|
||||||
|
|
||||||
## Summary
|
## Summary
|
||||||
|
|
||||||
- Windows 11 workflows that rely on **boot.wim** from installation media will be blocked. You can't perform an end to end deployment of Windows 11 using only WDS.
|
- Windows 11 workflows that rely on **boot.wim** from installation media are blocked. You can't perform an end to end deployment of Windows 11 using only WDS.
|
||||||
- Windows 10, Windows Server 2019, and previous operating system versions aren't affected by this change.
|
- This change doesn't affect Windows 10, Windows Server 2019, and previous operating system versions.
|
||||||
- Windows Server 2022 workflows that rely on **boot.wim** from installation media will show a non-blocking deprecation notice. The notice can be dismissed, and currently the workflow isn't blocked.
|
- Windows Server 2022 workflows that rely on **boot.wim** from installation media show a non-blocking deprecation notice. The notice can be dismissed, and currently the workflow isn't blocked.
|
||||||
- Windows Server workflows after Windows Server 2022 that rely on **boot.wim** from installation media are blocked.
|
- Windows Server workflows after Windows Server 2022 that rely on **boot.wim** from installation media are blocked.
|
||||||
|
|
||||||
If you currently use WDS with **boot.wim** from installation media for end-to-end operating system deployment, and your OS version isn't supported, deprecated, or blocked, it's recommended that you use deployment tools such as MDT, Configuration Manager, or a non-Microsoft solution with a custom boot.wim image.
|
If you currently use WDS with **boot.wim** from installation media for end-to-end operating system deployment, and your OS version isn't supported, deprecated, or blocked, it's recommended that you use deployment tools such as MDT, Configuration Manager, or a non-Microsoft solution with a custom boot.wim image.
|
||||||
|
@ -321,11 +321,11 @@ If you need assistance with your Windows Autopatch deployment journey, you have
|
|||||||
|
|
||||||
First contact your Microsoft Account team who can work with you to establish any guidance or support you might need. If you don't have a Microsoft Account Team contact or wish to explore other routes, Microsoft FastTrack offers Microsoft 365 deployment guidance for customers with 150 or more licenses of an eligible subscription at no additional cost. Finally, you can also log a support request with the Windows Autopatch Service Engineering Team.
|
First contact your Microsoft Account team who can work with you to establish any guidance or support you might need. If you don't have a Microsoft Account Team contact or wish to explore other routes, Microsoft FastTrack offers Microsoft 365 deployment guidance for customers with 150 or more licenses of an eligible subscription at no additional cost. Finally, you can also log a support request with the Windows Autopatch Service Engineering Team.
|
||||||
|
|
||||||
### Windows Autopatch Private Community (APC)
|
### Windows Commercial Advisors (WCA)
|
||||||
|
|
||||||
Once you're underway with your deployment, consider joining the [Windows Autopatch Private Community (APC)](https://aka.ms/WindowsAutopatchPrivateCommunity) where you can:
|
Once you're underway with your deployment, consider joining the [Windows Commercial Advisors (WCA)](https://aka.ms/joinccp) community within the [Microsoft Management Customer Connection Program (MM CCP)](https://techcommunity.microsoft.com/t5/microsoft-intune-blog/announcing-the-microsoft-management-customer-connection-program/ba-p/3725035), where you can:
|
||||||
|
|
||||||
- Engage directly with the Windows Autopatch Engineering Teams and other Autopatch customers
|
- Engage directly with the Windows Commercial Engineering Teams and other Windows Commercial Customers
|
||||||
- Gain access to:
|
- Gain access to:
|
||||||
- Exclusive virtual meetings
|
- Exclusive virtual meetings
|
||||||
- Focus groups
|
- Focus groups
|
||||||
@ -333,6 +333,3 @@ Once you're underway with your deployment, consider joining the [Windows Autopat
|
|||||||
- Teams discussions
|
- Teams discussions
|
||||||
- Previews
|
- Previews
|
||||||
|
|
||||||
### Windows Autopatch Technology Adoption Program (TAP)
|
|
||||||
|
|
||||||
If you have at least 500 devices enrolled in the service, and will test and give Microsoft feedback at least once a year, consider signing up to the [Windows Autopatch Technology Adoption Program (TAP)](https://aka.ms/JoinWindowsAutopatchTAP) to try out new and upcoming Windows Autopatch features.
|
|
||||||
|
@ -15,7 +15,7 @@ metadata:
|
|||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
ms.author: paoloma
|
ms.author: paoloma
|
||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.date: 10/31/2023
|
ms.date: 04/25/2024
|
||||||
|
|
||||||
highlightedContent:
|
highlightedContent:
|
||||||
items:
|
items:
|
||||||
@ -127,24 +127,24 @@ productDirectory:
|
|||||||
text: Customize the Start menu layout
|
text: Customize the Start menu layout
|
||||||
- url: /windows/configuration/set-up-shared-or-guest-pc
|
- url: /windows/configuration/set-up-shared-or-guest-pc
|
||||||
text: Set up a shared or guest PC
|
text: Set up a shared or guest PC
|
||||||
- url: /windows/configuration/kiosk-methods
|
- url: /windows/configuration/assigned-access
|
||||||
text: Configure kiosks and digital signs
|
text: Configure kiosks and restricted user experiences
|
||||||
- url: /windows/configuration
|
- url: /windows/configuration
|
||||||
text: Learn more about Windows configuration >
|
text: Learn more about Windows configuration >
|
||||||
|
|
||||||
- title: Learn about Windows for Education
|
- title: Learn about Windows for Education
|
||||||
imageSrc: /media/common/i_advanced.svg
|
imageSrc: /media/common/i_advanced.svg
|
||||||
links:
|
links:
|
||||||
|
- url: /education/windows/tutorial-school-deployment/
|
||||||
|
text: "Tutorial: deploy and manage Windows devices in a school"
|
||||||
- url: /education/windows/windows-11-se-overview
|
- url: /education/windows/windows-11-se-overview
|
||||||
text: Windows 11 SE Overview
|
text: Windows 11 SE Overview
|
||||||
- url: /education/windows/federated-sign-in
|
- url: /education/windows/federated-sign-in
|
||||||
text: Configure federated sign-in for Windows devices
|
text: Configure federated sign-in for Windows devices
|
||||||
- url: /education/windows/get-minecraft-for-education
|
- url: /education/windows/get-minecraft-for-education
|
||||||
text: Get and deploy Minecraft Education
|
text: Get and deploy Minecraft Education
|
||||||
- url: /education/windows/tutorial-school-deployment/
|
- url: /education/windows/take-tests-in-windows
|
||||||
text: "Tutorial: deploy and manage Windows devices in a school"
|
text: Take tests and assessments in Windows
|
||||||
- url: /education/windows/tutorial-deploy-apps-winse/
|
|
||||||
text: "Tutorial: deploy applications to Windows 11 SE"
|
|
||||||
- url: /education/Windows
|
- url: /education/Windows
|
||||||
text: Learn more about Windows for Education >
|
text: Learn more about Windows for Education >
|
||||||
|
|
||||||
|
@ -7,7 +7,7 @@ ms.localizationpriority: high
|
|||||||
author: DHB-MSFT
|
author: DHB-MSFT
|
||||||
ms.author: danbrown
|
ms.author: danbrown
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.date: 02/29/2024
|
ms.date: 04/24/2024
|
||||||
ms.topic: reference
|
ms.topic: reference
|
||||||
ms.collection: privacy-windows
|
ms.collection: privacy-windows
|
||||||
---
|
---
|
||||||
@ -8661,7 +8661,7 @@ The following fields are available:
|
|||||||
- **downlinkUsageBps** The download speed (in bytes per second).
|
- **downlinkUsageBps** The download speed (in bytes per second).
|
||||||
- **downloadMode** The download mode used for this file download session.
|
- **downloadMode** The download mode used for this file download session.
|
||||||
- **downloadModeReason** Reason for the download.
|
- **downloadModeReason** Reason for the download.
|
||||||
- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9).
|
- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, DefaultProvider = 99).
|
||||||
- **experimentId** When running a test, this is used to correlate with other events that are part of the same test.
|
- **experimentId** When running a test, this is used to correlate with other events that are part of the same test.
|
||||||
- **expiresAt** The time when the content will expire from the Delivery Optimization Cache.
|
- **expiresAt** The time when the content will expire from the Delivery Optimization Cache.
|
||||||
- **fileID** The ID of the file being downloaded.
|
- **fileID** The ID of the file being downloaded.
|
||||||
@ -8725,7 +8725,7 @@ The following fields are available:
|
|||||||
- **doErrorCode** The Delivery Optimization error code that was returned.
|
- **doErrorCode** The Delivery Optimization error code that was returned.
|
||||||
- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100).
|
- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100).
|
||||||
- **downloadModeReason** Reason for the download.
|
- **downloadModeReason** Reason for the download.
|
||||||
- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9).
|
- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, DefaultProvider = 99).
|
||||||
- **errorCode** The error code that was returned.
|
- **errorCode** The error code that was returned.
|
||||||
- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing.
|
- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing.
|
||||||
- **fileID** The ID of the file being downloaded.
|
- **fileID** The ID of the file being downloaded.
|
||||||
|
@ -8,7 +8,7 @@ author: DHB-MSFT
|
|||||||
ms.author: danbrown
|
ms.author: danbrown
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.date: 03/04/2024
|
ms.date: 03/04/2024
|
||||||
ms.topic: conceptual
|
ms.topic: legal
|
||||||
ms.collection: windows-copilot
|
ms.collection: windows-copilot
|
||||||
hideEdit: true
|
hideEdit: true
|
||||||
layout: ContentPage
|
layout: ContentPage
|
||||||
|
@ -7,7 +7,7 @@ ms.localizationpriority: high
|
|||||||
author: DHB-MSFT
|
author: DHB-MSFT
|
||||||
ms.author: danbrown
|
ms.author: danbrown
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.date: 02/29/2024
|
ms.date: 04/24/2024
|
||||||
ms.collection: privacy-windows
|
ms.collection: privacy-windows
|
||||||
ms.topic: reference
|
ms.topic: reference
|
||||||
---
|
---
|
||||||
@ -1373,7 +1373,7 @@ The following fields are available:
|
|||||||
- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built.
|
- **AppraiserBranch** The source branch in which the version of Appraiser that is running was built.
|
||||||
- **AppraiserDataVersion** The version of the data files being used by the Appraiser diagnostic data run.
|
- **AppraiserDataVersion** The version of the data files being used by the Appraiser diagnostic data run.
|
||||||
- **AppraiserProcess** The name of the process that launched Appraiser.
|
- **AppraiserProcess** The name of the process that launched Appraiser.
|
||||||
- **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots.
|
- **AppraiserVersion** The file version (major, minor, and build) of the Appraiser DLL, concatenated without dots.
|
||||||
- **AuxFinal** Obsolete, always set to false.
|
- **AuxFinal** Obsolete, always set to false.
|
||||||
- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app.
|
- **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app.
|
||||||
- **CountCustomSdbs** The number of custom Sdbs used by Appraiser.
|
- **CountCustomSdbs** The number of custom Sdbs used by Appraiser.
|
||||||
@ -1387,7 +1387,7 @@ The following fields are available:
|
|||||||
- **PCFP** An ID for the system calculated by hashing hardware identifiers.
|
- **PCFP** An ID for the system calculated by hashing hardware identifiers.
|
||||||
- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal.
|
- **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal.
|
||||||
- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row.
|
- **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row.
|
||||||
- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it's understood that data events won't be received from this device.
|
- **RunAppraiser** Indicates if Appraiser was set to run at all. If this is false, it's understood that data events won't be received from this device.
|
||||||
- **RunDate** The date that the diagnostic data run was stated, expressed as a filetime.
|
- **RunDate** The date that the diagnostic data run was stated, expressed as a filetime.
|
||||||
- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional diagnostic data on an infrequent schedule and only from machines at diagnostic data levels higher than Basic.
|
- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional diagnostic data on an infrequent schedule and only from machines at diagnostic data levels higher than Basic.
|
||||||
- **RunOnline** Indicates if appraiser was able to connect to Windows Update and therefore is making decisions using up-to-date driver coverage information.
|
- **RunOnline** Indicates if appraiser was able to connect to Windows Update and therefore is making decisions using up-to-date driver coverage information.
|
||||||
@ -1601,7 +1601,7 @@ The following fields are available:
|
|||||||
|
|
||||||
- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine.
|
- **ActivationChannel** Retrieves the retail license key or Volume license key for a machine.
|
||||||
- **AssignedAccessStatus** Kiosk configuration mode.
|
- **AssignedAccessStatus** Kiosk configuration mode.
|
||||||
- **CompactOS** Indicates if the Compact OS feature from Win10 is enabled.
|
- **CompactOS** Indicates if the Compact OS feature from Windows 10 is enabled.
|
||||||
- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy.
|
- **DeveloperUnlockStatus** Represents if a device has been developer unlocked by the user or Group Policy.
|
||||||
- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time
|
- **DeviceTimeZone** The time zone that is set on the device. Example: Pacific Standard Time
|
||||||
- **GenuineState** Retrieves the ID Value specifying the OS Genuine check.
|
- **GenuineState** Retrieves the ID Value specifying the OS Genuine check.
|
||||||
@ -1615,7 +1615,7 @@ The following fields are available:
|
|||||||
- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we're running an OS License granted by the MS store.
|
- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we're running an OS License granted by the MS store.
|
||||||
- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine.
|
- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine.
|
||||||
- **OSEdition** Retrieves the version of the current OS.
|
- **OSEdition** Retrieves the version of the current OS.
|
||||||
- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc
|
- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc.
|
||||||
- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC).
|
- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC).
|
||||||
- **OSSKU** Retrieves the Friendly Name of OS Edition.
|
- **OSSKU** Retrieves the Friendly Name of OS Edition.
|
||||||
- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines.
|
- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines.
|
||||||
@ -1880,11 +1880,11 @@ The following fields are available:
|
|||||||
- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting
|
- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting
|
||||||
- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades.
|
- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades.
|
||||||
- **IsHotPatchEnrolled** Represents the current state of the device in relation to enrollment in the hotpatch program.
|
- **IsHotPatchEnrolled** Represents the current state of the device in relation to enrollment in the hotpatch program.
|
||||||
- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device didn't install it?
|
- **OSAssessmentFeatureOutOfDate** How many days has it been since the last feature update was released but the device didn't install it?
|
||||||
- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update?
|
- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update?
|
||||||
- **OSAssessmentForQualityUpdate** Is the device on the latest quality update?
|
- **OSAssessmentForQualityUpdate** Is the device on the latest quality update?
|
||||||
- **OSAssessmentForSecurityUpdate** Is the device on the latest security update?
|
- **OSAssessmentForSecurityUpdate** Is the device on the latest security update?
|
||||||
- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device didn't install it?
|
- **OSAssessmentQualityOutOfDate** How many days has it been since the last quality update was released but the device didn't install it?
|
||||||
- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment.
|
- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment.
|
||||||
- **OSRollbackCount** The number of times feature updates have rolled back on the device.
|
- **OSRollbackCount** The number of times feature updates have rolled back on the device.
|
||||||
- **OSRolledBack** A flag that represents when a feature update has rolled back during setup.
|
- **OSRolledBack** A flag that represents when a feature update has rolled back during setup.
|
||||||
@ -2210,7 +2210,7 @@ The following fields are available:
|
|||||||
|
|
||||||
- **action** The change that was invoked on a device inventory object.
|
- **action** The change that was invoked on a device inventory object.
|
||||||
- **inventoryId** Device ID used for Compatibility testing
|
- **inventoryId** Device ID used for Compatibility testing
|
||||||
- **objectInstanceId** Object identity which is unique within the device scope.
|
- **objectInstanceId** Object identity, which is unique within the device scope.
|
||||||
- **objectType** Indicates the object type that the event applies to.
|
- **objectType** Indicates the object type that the event applies to.
|
||||||
- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object.
|
- **syncId** A string used to group StartSync, EndSync, Add, and Remove operations that belong together. This field is unique by Sync period and is used to disambiguate in situations where multiple agents perform overlapping inventories for the same object.
|
||||||
|
|
||||||
@ -2290,7 +2290,7 @@ The following fields are available:
|
|||||||
- **pendingDecision** Indicates the cause of reboot, if applicable.
|
- **pendingDecision** Indicates the cause of reboot, if applicable.
|
||||||
- **primitiveExecutionContext** The state during system startup when the uninstall was completed.
|
- **primitiveExecutionContext** The state during system startup when the uninstall was completed.
|
||||||
- **revisionVersion** The revision number of the security update being uninstalled.
|
- **revisionVersion** The revision number of the security update being uninstalled.
|
||||||
- **transactionCanceled** Indicates whether the uninstall was cancelled.
|
- **transactionCanceled** Indicates whether the uninstall was canceled.
|
||||||
|
|
||||||
|
|
||||||
### CbsServicingProvider.CbsQualityUpdateInstall
|
### CbsServicingProvider.CbsQualityUpdateInstall
|
||||||
@ -2552,7 +2552,7 @@ The following fields are available:
|
|||||||
- **HeartBeatSequenceNumber** The sequence number of this heartbeat.
|
- **HeartBeatSequenceNumber** The sequence number of this heartbeat.
|
||||||
- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex.
|
- **InvalidHttpCodeCount** Number of invalid HTTP codes received from contacting Vortex.
|
||||||
- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel.
|
- **LastAgentConnectionError** Last non-timeout error encountered in the host/agent channel.
|
||||||
- **LastEventSizeOffender** Event name of last event which exceeded max event size.
|
- **LastEventSizeOffender** Event name of last event that exceeded max event size.
|
||||||
- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex.
|
- **LastInvalidHttpCode** Last invalid HTTP code received from Vortex.
|
||||||
- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe.
|
- **MaxActiveAgentConnectionCount** The maximum number of active agents during this heartbeat timeframe.
|
||||||
- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC.
|
- **MaxInUseScenarioCounter** Soft maximum number of scenarios loaded by UTC.
|
||||||
@ -3103,7 +3103,7 @@ The following fields are available:
|
|||||||
|
|
||||||
- **InventoryVersion** The version of the inventory binary generating the events.
|
- **InventoryVersion** The version of the inventory binary generating the events.
|
||||||
- **ProducerId** The ACPI vendor ID.
|
- **ProducerId** The ACPI vendor ID.
|
||||||
- **VersionValue** The 64 bit component version value.
|
- **VersionValue** The 64-bit component version value.
|
||||||
|
|
||||||
|
|
||||||
### Microsoft.Windows.Inventory.Core.InventoryAcpiPhatVersionElementStartSync
|
### Microsoft.Windows.Inventory.Core.InventoryAcpiPhatVersionElementStartSync
|
||||||
@ -3132,7 +3132,7 @@ The following fields are available:
|
|||||||
- **LattePackageId** The ID of the Latte package.
|
- **LattePackageId** The ID of the Latte package.
|
||||||
- **MsiInstallDate** The install date recorded in the program's MSI package.
|
- **MsiInstallDate** The install date recorded in the program's MSI package.
|
||||||
- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage.
|
- **MsiPackageCode** A GUID that describes the MSI Package. Multiple 'Products' (apps) can make up an MsiPackage.
|
||||||
- **MsiProductCode** A GUID that describe the MSI Product.
|
- **MsiProductCode** A GUID that describes the MSI Product.
|
||||||
- **Name** The name of the application.
|
- **Name** The name of the application.
|
||||||
- **PackageFullName** The package full name for a Store application.
|
- **PackageFullName** The package full name for a Store application.
|
||||||
- **ProgramInstanceId** A hash of the file IDs in an app.
|
- **ProgramInstanceId** A hash of the file IDs in an app.
|
||||||
@ -3756,7 +3756,7 @@ This Ping event sends a detailed inventory of software and hardware information
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **appAp** Any additional parameters for the specified application. Default: ''.
|
- **appAp** Any additional parameters for the specified application. Default: ''.
|
||||||
- **appAppId** The GUID that identifies the product. Compatible clients must transmit this attribute. Please see the wiki for additional information. Default: undefined.
|
- **appAppId** The GUID that identifies the product. Compatible clients must transmit this attribute. See the wiki for additional information. Default: undefined.
|
||||||
- **appBrandCode** The brand code under which the product was installed, if any. A brand code is a short (4-character) string used to identify installations that took place as a result of partner deals or website promotions. Default: ''.
|
- **appBrandCode** The brand code under which the product was installed, if any. A brand code is a short (4-character) string used to identify installations that took place as a result of partner deals or website promotions. Default: ''.
|
||||||
- **appChannel** An integer indicating the channel of the installation (i.e. Canary or Dev).
|
- **appChannel** An integer indicating the channel of the installation (i.e. Canary or Dev).
|
||||||
- **appClientId** A generalized form of the brand code that can accept a wider range of values and is used for similar purposes. Default: ''.
|
- **appClientId** A generalized form of the brand code that can accept a wider range of values and is used for similar purposes. Default: ''.
|
||||||
@ -3764,13 +3764,13 @@ The following fields are available:
|
|||||||
- **appCohortHint** A machine-readable enum indicating that the client has a desire to switch to a different release cohort. The exact legal values are app-specific and should be shared between the server and app implementations. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
- **appCohortHint** A machine-readable enum indicating that the client has a desire to switch to a different release cohort. The exact legal values are app-specific and should be shared between the server and app implementations. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
||||||
- **appCohortName** A stable non-localized human-readable enum indicating which (if any) set of messages the app should display to the user. For example, an app with a cohort Name of 'beta' might display beta-specific branding to the user. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
- **appCohortName** A stable non-localized human-readable enum indicating which (if any) set of messages the app should display to the user. For example, an app with a cohort Name of 'beta' might display beta-specific branding to the user. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
||||||
- **appConsentState** Bit flags describing the diagnostic data disclosure and response flow where 1 indicates the affirmative and 0 indicates the negative or unspecified data. Bit 1 indicates consent was given, bit 2 indicates data originated from the download page, bit 18 indicates choice for sending data about how the browser is used, and bit 19 indicates choice for sending data about websites visited.
|
- **appConsentState** Bit flags describing the diagnostic data disclosure and response flow where 1 indicates the affirmative and 0 indicates the negative or unspecified data. Bit 1 indicates consent was given, bit 2 indicates data originated from the download page, bit 18 indicates choice for sending data about how the browser is used, and bit 19 indicates choice for sending data about websites visited.
|
||||||
- **appDayOfInstall** The date-based counting equivalent of appInstallTimeDiffSec (the numeric calendar day that the app was installed on). This value is provided by the server in the response to the first request in the installation flow. The client MAY fuzz this value to the week granularity (e.g. send '0' for 0 through 6, '7' for 7 through 13, etc.). The first communication to the server should use a special value of '-1'. A value of '-2' indicates that this value isn't known. Please see the wiki for additional information. Default: '-2'.
|
- **appDayOfInstall** The date-based counting equivalent of appInstallTimeDiffSec (the numeric calendar day that the app was installed on). This value is provided by the server in the response to the first request in the installation flow. The client MAY fuzz this value to the week granularity (e.g. send '0' for 0 through 6, '7' for 7 through 13, etc.). The first communication to the server should use a special value of '-1'. A value of '-2' indicates that this value isn't known. See the wiki for additional information. Default: '-2'.
|
||||||
- **appExperiments** A key/value list of experiment identifiers. Experiment labels are used to track membership in different experimental groups, and may be set at install or update time. The experiments string is formatted as a semicolon-delimited concatenation of experiment label strings. An experiment label string is an experiment Name, followed by the '=' character, followed by an experimental label value. For example: 'crdiff=got_bsdiff;optimized=O3'. The client shouldn't transmit the expiration date of any experiments it has, even if the server previously specified a specific expiration date. Default: ''.
|
- **appExperiments** A key/value list of experiment identifiers. Experiment labels are used to track membership in different experimental groups, and may be set at install or update time. The experiments string is formatted as a semicolon-delimited concatenation of experiment label strings. An experiment label string is an experiment Name, followed by the '=' character, followed by an experimental label value. For example: 'crdiff=got_bsdiff;optimized=O3'. The client shouldn't transmit the expiration date of any experiments it has, even if the server previously specified a specific expiration date. Default: ''.
|
||||||
- **appInstallTime** The product install time in seconds. '0' if unknown. Default: '-1'.
|
- **appInstallTime** The product install time in seconds. '0' if unknown. Default: '-1'.
|
||||||
- **appInstallTimeDiffSec** The difference between the current time and the install date in seconds. '0' if unknown. Default: '-1'.
|
- **appInstallTimeDiffSec** The difference between the current time and the install date in seconds. '0' if unknown. Default: '-1'.
|
||||||
- **appLang** The language of the product install, in IETF BCP 47 representation. Default: ''.
|
- **appLang** The language of the product install, in IETF BCP 47 representation. Default: ''.
|
||||||
- **appLastLaunchTime** The time when browser was last launched.
|
- **appLastLaunchTime** The time when browser was last launched.
|
||||||
- **appNextVersion** The version of the app that the update flow to which this event belongs attempted to reach, regardless of the success or failure of the update operation. Please see the wiki for additional information. Default: '0.0.0.0'.
|
- **appNextVersion** The version of the app that the update flow to which this event belongs attempted to reach, regardless of the success or failure of the update operation. See the wiki for additional information. Default: '0.0.0.0'.
|
||||||
- **appPingEventAppSize** The total number of bytes of all downloaded packages. Default: '0'.
|
- **appPingEventAppSize** The total number of bytes of all downloaded packages. Default: '0'.
|
||||||
- **appPingEventDoneBeforeOOBEComplete** Indicates whether the install or update was completed before Windows Out of the Box Experience ends. 1 means event completed before OOBE finishes; 0 means event wasn't completed before OOBE finishes; -1 means the field doesn't apply.
|
- **appPingEventDoneBeforeOOBEComplete** Indicates whether the install or update was completed before Windows Out of the Box Experience ends. 1 means event completed before OOBE finishes; 0 means event wasn't completed before OOBE finishes; -1 means the field doesn't apply.
|
||||||
- **appPingEventDownloadMetricsCdnCCC** ISO 2 character country or region code that matches to the country or region updated binaries are delivered from. E.g.: US.
|
- **appPingEventDownloadMetricsCdnCCC** ISO 2 character country or region code that matches to the country or region updated binaries are delivered from. E.g.: US.
|
||||||
@ -3784,8 +3784,8 @@ The following fields are available:
|
|||||||
- **appPingEventDownloadMetricsUrl** For events representing a download, the CDN URL provided by the update server for the client to download the update, the URL is controlled by Microsoft servers and always maps back to either *.delivery.mp.microsoft.com or msedgesetup.azureedge.net. Default: ''.
|
- **appPingEventDownloadMetricsUrl** For events representing a download, the CDN URL provided by the update server for the client to download the update, the URL is controlled by Microsoft servers and always maps back to either *.delivery.mp.microsoft.com or msedgesetup.azureedge.net. Default: ''.
|
||||||
- **appPingEventDownloadTimeMs** For events representing a download, the time elapsed between the start of the download and the end of the download, in milliseconds. For events representing an entire update flow, the sum of all such download times over the course of the update flow. Sent in events that have an event type of '1', '2', '3', and '14' only. Default: '0'.
|
- **appPingEventDownloadTimeMs** For events representing a download, the time elapsed between the start of the download and the end of the download, in milliseconds. For events representing an entire update flow, the sum of all such download times over the course of the update flow. Sent in events that have an event type of '1', '2', '3', and '14' only. Default: '0'.
|
||||||
- **appPingEventErrorCode** The error code (if any) of the operation, encoded as a signed, base-10 integer. Default: '0'.
|
- **appPingEventErrorCode** The error code (if any) of the operation, encoded as a signed, base-10 integer. Default: '0'.
|
||||||
- **appPingEventEventResult** An enum indicating the result of the event. Please see the wiki for additional information. Default: '0'.
|
- **appPingEventEventResult** An enum indicating the result of the event. See the wiki for additional information. Default: '0'.
|
||||||
- **appPingEventEventType** An enum indicating the type of the event. Compatible clients MUST transmit this attribute. Please see the wiki for additional information.
|
- **appPingEventEventType** An enum indicating the type of the event. Compatible clients MUST transmit this attribute. See the wiki for additional information.
|
||||||
- **appPingEventExtraCode1** Additional numeric information about the operation's result, encoded as a signed, base-10 integer. Default: '0'.
|
- **appPingEventExtraCode1** Additional numeric information about the operation's result, encoded as a signed, base-10 integer. Default: '0'.
|
||||||
- **appPingEventInstallTimeMs** For events representing an install, the time elapsed between the start of the install and the end of the install, in milliseconds. For events representing an entire update flow, the sum of all such durations. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
- **appPingEventInstallTimeMs** For events representing an install, the time elapsed between the start of the install and the end of the install, in milliseconds. For events representing an entire update flow, the sum of all such durations. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
||||||
- **appPingEventNumBytesDownloaded** The number of bytes downloaded for the specified application. Default: '0'.
|
- **appPingEventNumBytesDownloaded** The number of bytes downloaded for the specified application. Default: '0'.
|
||||||
@ -3797,9 +3797,9 @@ The following fields are available:
|
|||||||
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they haven't.
|
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they haven't.
|
||||||
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The server shouldn't return an update instruction to a version number that doesn't match the prefix or complete version number. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it isn't a lexical prefix (for example, '1.2.3' must match '1.2.3.4' but must not match '1.2.34'). Default: ''.
|
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The server shouldn't return an update instruction to a version number that doesn't match the prefix or complete version number. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it isn't a lexical prefix (for example, '1.2.3' must match '1.2.3.4' but must not match '1.2.34'). Default: ''.
|
||||||
- **appUpdateCheckTtToken** An opaque access token that can be used to identify the requesting client as a member of a trusted-tester group. If non-empty, the request should be sent over SSL or another secure protocol. Default: ''.
|
- **appUpdateCheckTtToken** An opaque access token that can be used to identify the requesting client as a member of a trusted-tester group. If non-empty, the request should be sent over SSL or another secure protocol. Default: ''.
|
||||||
- **appVersion** The version of the product install. Please see the wiki for additional information. Default: '0.0.0.0'.
|
- **appVersion** The version of the product install. See the wiki for additional information. Default: '0.0.0.0'.
|
||||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
||||||
- **eventType** A string indicating the type of the event. Please see the wiki for additional information.
|
- **eventType** A string indicating the type of the event. See the wiki for additional information.
|
||||||
- **expETag** An identifier representing all service applied configurations and experiments when current update happens. Used for testing only.
|
- **expETag** An identifier representing all service applied configurations and experiments when current update happens. Used for testing only.
|
||||||
- **hwDiskType** Device’s hardware disk type.
|
- **hwDiskType** Device’s hardware disk type.
|
||||||
- **hwHasAvx** '1' if the client's hardware supports the AVX instruction set. '0' if the client's hardware doesn't support the AVX instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasAvx** '1' if the client's hardware supports the AVX instruction set. '0' if the client's hardware doesn't support the AVX instruction set. '-1' if unknown. Default: '-1'.
|
||||||
@ -3842,7 +3842,7 @@ The following fields are available:
|
|||||||
- **app_name** The name of the crashing process.
|
- **app_name** The name of the crashing process.
|
||||||
- **app_session_guid** Encodes the boot session, process id, and process start time.
|
- **app_session_guid** Encodes the boot session, process id, and process start time.
|
||||||
- **app_version** The version of the crashing process.
|
- **app_version** The version of the crashing process.
|
||||||
- **client_id_hash** Hash of the browser client ID which helps identify installations.
|
- **client_id_hash** Hash of the browser client ID that helps identify installations.
|
||||||
- **etag** Encodes the running experiments in the browser.
|
- **etag** Encodes the running experiments in the browser.
|
||||||
- **module_name** The name of the module in which the crash originated.
|
- **module_name** The name of the module in which the crash originated.
|
||||||
- **module_offset** Memory offset into the module in which the crash originated.
|
- **module_offset** Memory offset into the module in which the crash originated.
|
||||||
@ -4039,11 +4039,11 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.SecureBootTelemetry.SecureBootEncodeUEFI
|
### Microsoft.Windows.SecureBootTelemetry.SecureBootEncodeUEFI
|
||||||
|
|
||||||
Information about Secure Boot configuration including the PK, KEKs, DB and DBX files on the device.
|
Information about Secure Boot configuration including the PK, KEKs, DB, and DBX files on the device.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **SecureBootUEFIEncoding** Information about the PK, KEKs, DB and DBX files on the device.
|
- **SecureBootUEFIEncoding** Information about the PK, KEKs, DB, and DBX files on the device.
|
||||||
|
|
||||||
|
|
||||||
### XboxSystemFlightRecorder.SmcErrorLog
|
### XboxSystemFlightRecorder.SmcErrorLog
|
||||||
@ -4134,12 +4134,12 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Setup.WinSetupMon.ProtectionViolation
|
### Microsoft.Windows.Setup.WinSetupMon.ProtectionViolation
|
||||||
|
|
||||||
This event provides information about move or deletion of a file or a directory which is being monitored for data safety during feature updates. The data collected with this event is used to help keep Windows up to date.
|
This event provides information about move or deletion of a file or a directory that is being monitored for data safety during feature updates. The data collected with this event is used to help keep Windows up to date.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **Path** Path to the file or the directory which is being moved or deleted.
|
- **Path** Path to the file or the directory that is being moved or deleted.
|
||||||
- **Process** Path to the process which is requesting the move or the deletion.
|
- **Process** Path to the process that is requesting the move or the deletion.
|
||||||
- **TargetPath** (Optional) If the operation is a move, the target path to which the file or directory is being moved.
|
- **TargetPath** (Optional) If the operation is a move, the target path to which the file or directory is being moved.
|
||||||
|
|
||||||
|
|
||||||
@ -4204,14 +4204,14 @@ The following fields are available:
|
|||||||
|
|
||||||
- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion.
|
- **ActivityMatchingId** Contains a unique ID identifying a single CheckForUpdates session from initialization to completion.
|
||||||
- **AllowCachedResults** Indicates if the scan allowed using cached results.
|
- **AllowCachedResults** Indicates if the scan allowed using cached results.
|
||||||
- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable
|
- **ApplicableUpdateInfo** Metadata for the updates that were detected as applicable
|
||||||
- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine doesn't exist, the value is null.
|
- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine doesn't exist, the value is null.
|
||||||
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
||||||
- **ClientVersion** The version number of the software distribution client.
|
- **ClientVersion** The version number of the software distribution client.
|
||||||
- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0.
|
- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. No data is currently reported in this field. Expected value for this field is 0.
|
||||||
- **DriverSyncPassPerformed** Were drivers scanned this time?
|
- **DriverSyncPassPerformed** Were drivers scanned this time?
|
||||||
- **EventInstanceID** A globally unique identifier for event instance.
|
- **EventInstanceID** A globally unique identifier for event instance.
|
||||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed.
|
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was canceled, succeeded, or failed.
|
||||||
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough.
|
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough.
|
||||||
- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device.
|
- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device.
|
||||||
- **IPVersion** Indicates whether the download took place over IPv4 or IPv6
|
- **IPVersion** Indicates whether the download took place over IPv4 or IPv6
|
||||||
@ -4222,9 +4222,9 @@ The following fields are available:
|
|||||||
- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce
|
- **MetadataIntegrityMode** The mode of the update transport metadata integrity check. 0-Unknown, 1-Ignoe, 2-Audit, 3-Enforce
|
||||||
- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked
|
- **NumberOfApplicationsCategoryScanEvaluated** The number of categories (apps) for which an app update scan checked
|
||||||
- **NumberOfLoop** The number of round trips the scan required
|
- **NumberOfLoop** The number of round trips the scan required
|
||||||
- **NumberOfNewUpdatesFromServiceSync** The number of updates which were seen for the first time in this scan
|
- **NumberOfNewUpdatesFromServiceSync** The number of updates that were seen for the first time in this scan
|
||||||
- **NumberOfUpdatesEvaluated** The total number of updates which were evaluated as a part of the scan
|
- **NumberOfUpdatesEvaluated** The total number of updates that were evaluated as a part of the scan
|
||||||
- **NumFailedMetadataSignatures** The number of metadata signatures checks which failed for new metadata synced down.
|
- **NumFailedMetadataSignatures** The number of metadata signatures checks that failed for new metadata synced down.
|
||||||
- **Online** Indicates if this was an online scan.
|
- **Online** Indicates if this was an online scan.
|
||||||
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName wasn't provided.
|
- **ProcessName** The process name of the caller who initiated API calls, in the event where CallerApplicationName wasn't provided.
|
||||||
- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device.
|
- **QualityUpdatePause** Indicates whether quality OS updates are paused on the device.
|
||||||
@ -4232,7 +4232,7 @@ The following fields are available:
|
|||||||
- **ScanDurationInSeconds** The number of seconds a scan took
|
- **ScanDurationInSeconds** The number of seconds a scan took
|
||||||
- **ScanEnqueueTime** The number of seconds it took to initialize a scan
|
- **ScanEnqueueTime** The number of seconds it took to initialize a scan
|
||||||
- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates).
|
- **ScanProps** This is a 32-bit integer containing Boolean properties for a given Windows Update scan. The following bits are used; all remaining bits are reserved and set to zero. Bit 0 (0x1): IsInteractive - is set to 1 if the scan is requested by a user, or 0 if the scan is requested by Automatic Updates. Bit 1 (0x2): IsSeeker - is set to 1 if the Windows Update client's Seeker functionality is enabled. Seeker functionality is enabled on certain interactive scans, and results in the scans returning certain updates that are in the initial stages of release (not yet released for full adoption via Automatic Updates).
|
||||||
- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.).
|
- **ServiceGuid** An ID that represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.).
|
||||||
- **ServiceUrl** The environment URL a device is configured to scan with
|
- **ServiceUrl** The environment URL a device is configured to scan with
|
||||||
- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult).
|
- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult).
|
||||||
- **SyncType** Describes the type of scan the event was
|
- **SyncType** Describes the type of scan the event was
|
||||||
@ -4255,7 +4255,7 @@ The following fields are available:
|
|||||||
- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority.
|
- **DownloadPriority** Indicates whether a download happened at background, normal, or foreground priority.
|
||||||
- **DownloadProps** Information about the download operation properties in the form of a bitmask.
|
- **DownloadProps** Information about the download operation properties in the form of a bitmask.
|
||||||
- **EventInstanceID** A globally unique identifier for event instance.
|
- **EventInstanceID** A globally unique identifier for event instance.
|
||||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was cancelled, succeeded, or failed.
|
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started downloading content, or whether it was canceled, succeeded, or failed.
|
||||||
- **EventType** Possible values are Child, Bundle, or Driver.
|
- **EventType** Possible values are Child, Bundle, or Driver.
|
||||||
- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device.
|
- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device.
|
||||||
- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight.
|
- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight.
|
||||||
@ -4285,7 +4285,7 @@ The following fields are available:
|
|||||||
|
|
||||||
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client
|
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client
|
||||||
- **ClientVersion** The version number of the software distribution client
|
- **ClientVersion** The version number of the software distribution client
|
||||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed
|
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was canceled, succeeded, or failed
|
||||||
- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver"
|
- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver"
|
||||||
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough
|
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough
|
||||||
- **FileId** A hash that uniquely identifies a file
|
- **FileId** A hash that uniquely identifies a file
|
||||||
@ -4293,7 +4293,7 @@ The following fields are available:
|
|||||||
- **FlightId** The unique identifier for each flight
|
- **FlightId** The unique identifier for each flight
|
||||||
- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one
|
- **RelatedCV** The previous Correlation Vector that was used before swapping with a new one
|
||||||
- **RevisionNumber** Unique revision number of Update
|
- **RevisionNumber** Unique revision number of Update
|
||||||
- **ServiceGuid** An ID which represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.)
|
- **ServiceGuid** An ID that represents which service the software distribution client is checking for content (Windows Update, Microsoft Store, etc.)
|
||||||
- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult)
|
- **StatusCode** Indicates the result of a CheckForUpdates event (success, cancellation, failure code HResult)
|
||||||
- **UpdateId** Unique Update ID
|
- **UpdateId** Unique Update ID
|
||||||
- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue
|
- **WUDeviceID** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue
|
||||||
@ -4315,7 +4315,7 @@ The following fields are available:
|
|||||||
- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing)
|
- **DownloadState** Current state of the active download for this content (queued, suspended, or progressing)
|
||||||
- **EventType** Possible values are "Child", "Bundle", or "Driver"
|
- **EventType** Possible values are "Child", "Bundle", or "Driver"
|
||||||
- **FlightId** The unique identifier for each flight
|
- **FlightId** The unique identifier for each flight
|
||||||
- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered"
|
- **IsNetworkMetered** Indicates whether Windows considered the current network to be metered"
|
||||||
- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any
|
- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any
|
||||||
- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any
|
- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any
|
||||||
- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby)
|
- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby)
|
||||||
@ -4351,7 +4351,7 @@ This event sends data about an AppX app that has been updated from the Microsoft
|
|||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **ApplicableUpdateInfo** Metadata for the updates which were detected as applicable.
|
- **ApplicableUpdateInfo** Metadata for the updates that were detected as applicable.
|
||||||
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
||||||
- **IntentPFNs** Intended application-set metadata for atomic update scenarios.
|
- **IntentPFNs** Intended application-set metadata for atomic update scenarios.
|
||||||
- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete.
|
- **NumberOfApplicableUpdates** The number of updates ultimately deemed applicable to the system after the detection process is complete.
|
||||||
@ -4554,7 +4554,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Surface.SystemReset.Prod.ResetCauseEventV2
|
### Microsoft.Surface.SystemReset.Prod.ResetCauseEventV2
|
||||||
|
|
||||||
This event sends reason for SAM, PCH and SoC reset. The data collected with this event is used to keep Windows performing properly.
|
This event sends reason for SAM, PCH, and SoC reset. The data collected with this event is used to keep Windows performing properly.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -4733,7 +4733,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.UpdateAssistantApp.UpdateAssistantInteractive
|
### Microsoft.Windows.UpdateAssistantApp.UpdateAssistantInteractive
|
||||||
|
|
||||||
An user action such as button click happens.
|
A user action such as button click happens.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -4814,7 +4814,7 @@ The following fields are available:
|
|||||||
|
|
||||||
- **CV** The correlation vector.
|
- **CV** The correlation vector.
|
||||||
- **GlobalEventCounter** The counter for all telemetry on the device.
|
- **GlobalEventCounter** The counter for all telemetry on the device.
|
||||||
- **UpdateAssistantDownloadCancelled** True when the ESD download is cancelled.
|
- **UpdateAssistantDownloadCancelled** True when the ESD download is canceled.
|
||||||
- **UpdateAssistantDownloadDownloadTotalBytes** The total size in bytes of the download.
|
- **UpdateAssistantDownloadDownloadTotalBytes** The total size in bytes of the download.
|
||||||
- **UpdateAssistantDownloadEditionMismatch** True if downloaded ESD doesn't match edition.
|
- **UpdateAssistantDownloadEditionMismatch** True if downloaded ESD doesn't match edition.
|
||||||
- **UpdateAssistantDownloadESDEncrypted** True if ESD is encrypted.
|
- **UpdateAssistantDownloadESDEncrypted** True if ESD is encrypted.
|
||||||
@ -4838,7 +4838,7 @@ This event indicates that the detection phase of USO has started. The data colle
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CV** Correlation vector.
|
- **CV** Correlation vector.
|
||||||
- **ExpeditePolicyId** The policy ID of the expedite request.
|
- **ExpeditePolicyId** The policy ID of the expedited request.
|
||||||
- **ExpediteUpdaterOfferedUpdateId** UpdateId of the LCU expected to be expedited.
|
- **ExpediteUpdaterOfferedUpdateId** UpdateId of the LCU expected to be expedited.
|
||||||
- **ExpediteUpdatesInProgress** List of update IDs in progress.
|
- **ExpediteUpdatesInProgress** List of update IDs in progress.
|
||||||
- **ExpediteUsoLastError** The last error returned by USO.
|
- **ExpediteUsoLastError** The last error returned by USO.
|
||||||
@ -4938,7 +4938,7 @@ This event is received when the UpdateHealthTools service uploads device informa
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CV** Correlation vector.
|
- **CV** Correlation vector.
|
||||||
- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user.
|
- **GlobalEventCounter** Client side counter that indicates ordering of events sent by this user.
|
||||||
- **PackageVersion** Current package version of remediation.
|
- **PackageVersion** Current package version of remediation.
|
||||||
- **UpdateHealthToolsDeviceUbrChanged** 1 if the Ubr just changed, 0 otherwise.
|
- **UpdateHealthToolsDeviceUbrChanged** 1 if the Ubr just changed, 0 otherwise.
|
||||||
- **UpdateHealthToolsDeviceUri** The URI to be used for push notifications on this device.
|
- **UpdateHealthToolsDeviceUri** The URI to be used for push notifications on this device.
|
||||||
@ -4946,7 +4946,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsDeviceInformationUploadFailed
|
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsDeviceInformationUploadFailed
|
||||||
|
|
||||||
This event provides information for device which failed to upload the details. The data collected with this event is used to help keep Windows secure and up to date.
|
This event provides information for device that failed to upload the details. The data collected with this event is used to help keep Windows secure and up to date.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -4963,7 +4963,7 @@ This event is received when a push notification has been completed by the Update
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CV** Correlation vector.
|
- **CV** Correlation vector.
|
||||||
- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user.
|
- **GlobalEventCounter** Client side counter that indicates ordering of events sent by this user.
|
||||||
- **PackageVersion** Current package version of UpdateHealthTools.
|
- **PackageVersion** Current package version of UpdateHealthTools.
|
||||||
- **UpdateHealthToolsEnterpriseActionResult** The HRESULT return by the enterprise action.
|
- **UpdateHealthToolsEnterpriseActionResult** The HRESULT return by the enterprise action.
|
||||||
- **UpdateHealthToolsEnterpriseActionType** Enum describing the type of action requested by the push.
|
- **UpdateHealthToolsEnterpriseActionType** Enum describing the type of action requested by the push.
|
||||||
@ -4976,7 +4976,7 @@ This event is received when the UpdateHealthTools service receives a push notifi
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CV** Correlation vector.
|
- **CV** Correlation vector.
|
||||||
- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user.
|
- **GlobalEventCounter** Client side counter that indicates ordering of events sent by this user.
|
||||||
- **PackageVersion** Current package version of UpdateHealthTools.
|
- **PackageVersion** Current package version of UpdateHealthTools.
|
||||||
- **UpdateHealthToolsDeviceUri** The URI to be used for push notifications on this device.
|
- **UpdateHealthToolsDeviceUri** The URI to be used for push notifications on this device.
|
||||||
- **UpdateHealthToolsEnterpriseActionType** Enum describing the type of action requested by the push.
|
- **UpdateHealthToolsEnterpriseActionType** Enum describing the type of action requested by the push.
|
||||||
@ -4992,7 +4992,7 @@ This event is received when there's status on a push notification. The data coll
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CV** Correlation vector.
|
- **CV** Correlation vector.
|
||||||
- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user.
|
- **GlobalEventCounter** Client side counter that indicates ordering of events sent by this user.
|
||||||
- **PackageVersion** Current package version of UpdateHealthTools.
|
- **PackageVersion** Current package version of UpdateHealthTools.
|
||||||
- **UpdateHealthToolsDeviceUri** The URI to be used for push notifications on this device.
|
- **UpdateHealthToolsDeviceUri** The URI to be used for push notifications on this device.
|
||||||
- **UpdateHealthToolsEnterpriseActionType** Enum describing the type of action requested by the push.
|
- **UpdateHealthToolsEnterpriseActionType** Enum describing the type of action requested by the push.
|
||||||
@ -5007,7 +5007,7 @@ This event is sent when a device has been detected as DSS device. The data colle
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CV** A correlation vector.
|
- **CV** A correlation vector.
|
||||||
- **GlobalEventCounter** This is a client side counter which indicates ordering of events sent by this user.
|
- **GlobalEventCounter** This is a client side counter that indicates ordering of events sent by this user.
|
||||||
- **PackageVersion** The package version of the label.
|
- **PackageVersion** The package version of the label.
|
||||||
|
|
||||||
|
|
||||||
@ -5018,7 +5018,7 @@ This event is sent when the service first starts. It's a heartbeat indicating th
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CV** Correlation vector.
|
- **CV** Correlation vector.
|
||||||
- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this user.
|
- **GlobalEventCounter** Client side counter that indicates ordering of events sent by this user.
|
||||||
- **PackageVersion** Current package version of remediation.
|
- **PackageVersion** Current package version of remediation.
|
||||||
|
|
||||||
|
|
||||||
@ -5347,7 +5347,7 @@ The following fields are available:
|
|||||||
- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value.
|
- **ClientId** If using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but it can be overwritten by the caller to a unique value.
|
||||||
- **FlightData** Unique value that identifies the flight.
|
- **FlightData** Unique value that identifies the flight.
|
||||||
- **HostOSBuildNumber** The build number of the downlevel OS.
|
- **HostOSBuildNumber** The build number of the downlevel OS.
|
||||||
- **HostOsSkuName** The operating system edition which is running Setup360 instance (downlevel OS).
|
- **HostOsSkuName** The operating system edition that is running Setup360 instance (downlevel OS).
|
||||||
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
||||||
- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
- **ReportId** In the Windows Update scenario, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
||||||
- **Setup360Extended** More detailed information about phase/action when the potential failure occurred.
|
- **Setup360Extended** More detailed information about phase/action when the potential failure occurred.
|
||||||
@ -5355,7 +5355,7 @@ The following fields are available:
|
|||||||
- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors).
|
- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors).
|
||||||
- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT).
|
- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT).
|
||||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS).
|
- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS).
|
||||||
- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||||
- **TestId** An ID that uniquely identifies a group of events.
|
- **TestId** An ID that uniquely identifies a group of events.
|
||||||
- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId.
|
- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId.
|
||||||
|
|
||||||
@ -5369,7 +5369,7 @@ The following fields are available:
|
|||||||
- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||||
- **FlightData** Unique value that identifies the flight.
|
- **FlightData** Unique value that identifies the flight.
|
||||||
- **HostOSBuildNumber** The build number of the previous OS.
|
- **HostOSBuildNumber** The build number of the previous OS.
|
||||||
- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS).
|
- **HostOsSkuName** The OS edition that is running Setup360 instance (previous OS).
|
||||||
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe
|
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe
|
||||||
- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
||||||
- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred.
|
- **Setup360Extended** More detailed information about the phase/action when the potential failure occurred.
|
||||||
@ -5377,7 +5377,7 @@ The following fields are available:
|
|||||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors.
|
- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors.
|
||||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT.
|
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT.
|
||||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||||
- **TestId** ID that uniquely identifies a group of events.
|
- **TestId** ID that uniquely identifies a group of events.
|
||||||
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId.
|
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId.
|
||||||
|
|
||||||
@ -5391,7 +5391,7 @@ The following fields are available:
|
|||||||
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||||
- **FlightData** Unique value that identifies the flight.
|
- **FlightData** Unique value that identifies the flight.
|
||||||
- **HostOSBuildNumber** The build number of the previous OS.
|
- **HostOSBuildNumber** The build number of the previous OS.
|
||||||
- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS).
|
- **HostOsSkuName** The OS edition that is running the Setup360 instance (previous OS).
|
||||||
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
||||||
- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim.
|
- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim.
|
||||||
- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred.
|
- **Setup360Extended** Detailed information about the phase or action when the potential failure occurred.
|
||||||
@ -5399,7 +5399,7 @@ The following fields are available:
|
|||||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors.
|
- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors.
|
||||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT
|
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT
|
||||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||||
- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||||
- **TestId** ID that uniquely identifies a group of events.
|
- **TestId** ID that uniquely identifies a group of events.
|
||||||
- **WuId** Windows Update client ID.
|
- **WuId** Windows Update client ID.
|
||||||
|
|
||||||
@ -5413,7 +5413,7 @@ The following fields are available:
|
|||||||
- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value.
|
- **ClientId** With Windows Update, this is the Windows Update client ID that is passed to Setup. In Media setup, the default value is Media360, but can be overwritten by the caller to a unique value.
|
||||||
- **FlightData** Unique value that identifies the flight.
|
- **FlightData** Unique value that identifies the flight.
|
||||||
- **HostOSBuildNumber** The build number of the previous OS.
|
- **HostOSBuildNumber** The build number of the previous OS.
|
||||||
- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS).
|
- **HostOsSkuName** The OS edition that is running Setup360 instance (previous OS).
|
||||||
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
||||||
- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
||||||
- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened
|
- **Setup360Extended** Extension of result - more granular information about phase/action when the potential failure happened
|
||||||
@ -5421,7 +5421,7 @@ The following fields are available:
|
|||||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors.
|
- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors.
|
||||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT
|
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT
|
||||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled
|
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled
|
||||||
- **TestId** A string to uniquely identify a group of events.
|
- **TestId** A string to uniquely identify a group of events.
|
||||||
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId.
|
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId.
|
||||||
|
|
||||||
@ -5435,7 +5435,7 @@ The following fields are available:
|
|||||||
- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
- **ClientId** Using Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||||
- **FlightData** Unique value that identifies the flight.
|
- **FlightData** Unique value that identifies the flight.
|
||||||
- **HostOSBuildNumber** The build number of the previous OS.
|
- **HostOSBuildNumber** The build number of the previous OS.
|
||||||
- **HostOsSkuName** The OS edition which is running Setup360 instance (previous operating system).
|
- **HostOsSkuName** The OS edition that is running Setup360 instance (previous operating system).
|
||||||
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
||||||
- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
- **ReportId** Using Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
||||||
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
||||||
@ -5457,7 +5457,7 @@ The following fields are available:
|
|||||||
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||||
- **FlightData** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
- **FlightData** In the Windows Update scenario, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||||
- **HostOSBuildNumber** The build number of the previous operating system.
|
- **HostOSBuildNumber** The build number of the previous operating system.
|
||||||
- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous operating system).
|
- **HostOsSkuName** The OS edition that is running the Setup360 instance (previous operating system).
|
||||||
- **InstanceId** Unique GUID that identifies each instance of setuphost.exe.
|
- **InstanceId** Unique GUID that identifies each instance of setuphost.exe.
|
||||||
- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim.
|
- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim.
|
||||||
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
||||||
@ -5465,7 +5465,7 @@ The following fields are available:
|
|||||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors.
|
- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors.
|
||||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT.
|
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT.
|
||||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS).
|
- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS).
|
||||||
- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||||
- **TestId** ID that uniquely identifies a group of events.
|
- **TestId** ID that uniquely identifies a group of events.
|
||||||
- **WuId** Windows Update client ID.
|
- **WuId** Windows Update client ID.
|
||||||
|
|
||||||
@ -5479,7 +5479,7 @@ The following fields are available:
|
|||||||
- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||||
- **FlightData** Unique value that identifies the flight.
|
- **FlightData** Unique value that identifies the flight.
|
||||||
- **HostOSBuildNumber** The build number of the previous OS.
|
- **HostOSBuildNumber** The build number of the previous OS.
|
||||||
- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS).
|
- **HostOsSkuName** The OS edition that is running Setup360 instance (previous OS).
|
||||||
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe
|
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe
|
||||||
- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
||||||
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
||||||
@ -5487,7 +5487,7 @@ The following fields are available:
|
|||||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors.
|
- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors.
|
||||||
- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT).
|
- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT).
|
||||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||||
- **TestId** A string to uniquely identify a group of events.
|
- **TestId** A string to uniquely identify a group of events.
|
||||||
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId.
|
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId.
|
||||||
|
|
||||||
@ -5501,7 +5501,7 @@ The following fields are available:
|
|||||||
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
- **ClientId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||||
- **FlightData** Unique value that identifies the flight.
|
- **FlightData** Unique value that identifies the flight.
|
||||||
- **HostOSBuildNumber** The build number of the previous OS.
|
- **HostOSBuildNumber** The build number of the previous OS.
|
||||||
- **HostOsSkuName** The OS edition which is running the Setup360 instance (previous OS).
|
- **HostOsSkuName** The OS edition that is running the Setup360 instance (previous OS).
|
||||||
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe.
|
||||||
- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim.
|
- **ReportId** For Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, this is the GUID for the install.wim.
|
||||||
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
||||||
@ -5509,7 +5509,7 @@ The following fields are available:
|
|||||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors.
|
- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors.
|
||||||
- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT.
|
- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT.
|
||||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||||
- **TestId** A string to uniquely identify a group of events.
|
- **TestId** A string to uniquely identify a group of events.
|
||||||
- **WuId** Windows Update client ID.
|
- **WuId** Windows Update client ID.
|
||||||
|
|
||||||
@ -5616,7 +5616,7 @@ The following fields are available:
|
|||||||
- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
- **ClientId** With Windows Update, this will be the Windows Update client ID that is passed to Setup. In Media setup, default value is Media360, but can be overwritten by the caller to a unique value.
|
||||||
- **FlightData** Unique value that identifies the flight.
|
- **FlightData** Unique value that identifies the flight.
|
||||||
- **HostOSBuildNumber** The build number of the previous OS.
|
- **HostOSBuildNumber** The build number of the previous OS.
|
||||||
- **HostOsSkuName** The OS edition which is running Setup360 instance (previous OS).
|
- **HostOsSkuName** The OS edition that is running Setup360 instance (previous OS).
|
||||||
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe
|
- **InstanceId** A unique GUID that identifies each instance of setuphost.exe
|
||||||
- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
- **ReportId** With Windows Update, this is the updateID that is passed to Setup. In media setup, this is the GUID for the install.wim.
|
||||||
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
- **Setup360Extended** Detailed information about the phase/action when the potential failure occurred.
|
||||||
@ -5624,7 +5624,7 @@ The following fields are available:
|
|||||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors.
|
- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors.
|
||||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT.
|
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT.
|
||||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||||
- **TestId** A string to uniquely identify a group of events.
|
- **TestId** A string to uniquely identify a group of events.
|
||||||
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId.
|
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId.
|
||||||
|
|
||||||
@ -5642,7 +5642,7 @@ The following fields are available:
|
|||||||
- **HrLastFailure** Error code from the failed removal.
|
- **HrLastFailure** Error code from the failed removal.
|
||||||
- **HrResetDatastore** Result of the attempted removal.
|
- **HrResetDatastore** Result of the attempted removal.
|
||||||
- **HrStopGroupOfServices** Result of stopping the services.
|
- **HrStopGroupOfServices** Result of stopping the services.
|
||||||
- **MaskServicesStopped** Bit field to indicate which services were stopped succesfully. Bit on means success. List of services: usosvc(1<<0), dosvc(1<<1), wuauserv(1<<2), bits(1<<3).
|
- **MaskServicesStopped** Bit field to indicate which services were stopped successfully. Bit on means success. List of services: usosvc(1<<0), dosvc(1<<1), wuauserv(1<<2), bits(1<<3).
|
||||||
- **NumberServicesToStop** The number of services that require manual stopping.
|
- **NumberServicesToStop** The number of services that require manual stopping.
|
||||||
|
|
||||||
|
|
||||||
@ -5681,7 +5681,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.WERVertical.OSCrash
|
### Microsoft.Windows.WERVertical.OSCrash
|
||||||
|
|
||||||
This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event.
|
This event sends binary data from the collected dump file whenever a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -5735,7 +5735,7 @@ The following fields are available:
|
|||||||
|
|
||||||
- **creatorId** The unique identifier for the entity that created the error record.
|
- **creatorId** The unique identifier for the entity that created the error record.
|
||||||
- **errorFlags** Any flags set on the error record.
|
- **errorFlags** Any flags set on the error record.
|
||||||
- **notifyType** The unique identifier for the notification mechanism which reported the error to the operating system.
|
- **notifyType** The unique identifier for the notification mechanism that reported the error to the operating system.
|
||||||
- **partitionId** The unique identifier for the partition on which the hardware error occurred.
|
- **partitionId** The unique identifier for the partition on which the hardware error occurred.
|
||||||
- **platformId** The unique identifier for the platform on which the hardware error occurred.
|
- **platformId** The unique identifier for the platform on which the hardware error occurred.
|
||||||
- **record** A collection of binary data containing the full error record.
|
- **record** A collection of binary data containing the full error record.
|
||||||
@ -6116,7 +6116,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.StoreAgent.Telemetry.StateTransition
|
### Microsoft.Windows.StoreAgent.Telemetry.StateTransition
|
||||||
|
|
||||||
Products in the process of being fulfilled (installed or updated) are maintained in a list. This event is sent any time there's a change in a product's fulfillment status (pending, working, paused, cancelled, or complete), to help keep Windows up to date and secure.
|
Products in the process of being fulfilled (installed or updated) are maintained in a list. This event is sent any time there's a change in a product's fulfillment status (pending, working, paused, canceled, or complete), to help keep Windows up to date and secure.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -6213,7 +6213,7 @@ The following fields are available:
|
|||||||
- **doClientVersion** The version of the Delivery Optimization client.
|
- **doClientVersion** The version of the Delivery Optimization client.
|
||||||
- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100).
|
- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100).
|
||||||
- **downloadModeReason** Reason for the download.
|
- **downloadModeReason** Reason for the download.
|
||||||
- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9).
|
- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, DefaultProvider = 99).
|
||||||
- **errorCode** The error code that was returned.
|
- **errorCode** The error code that was returned.
|
||||||
- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing.
|
- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing.
|
||||||
- **fileID** The ID of the file being downloaded.
|
- **fileID** The ID of the file being downloaded.
|
||||||
@ -6298,7 +6298,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary
|
### Microsoft.Windows.Update.DeviceUpdateAgent.UpdateAgentAnalysisSummary
|
||||||
|
|
||||||
This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario which is used to install a device manifest describing a set of driver packages. The data collected with this event is used to help keep Windows secure and up to date.
|
This event collects information regarding the state of devices and drivers on the system following a reboot after the install phase of the new device manifest UUP (Unified Update Platform) update scenario that is used to install a device manifest describing a set of driver packages. The data collected with this event is used to help keep Windows secure and up to date.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
|
@ -7,7 +7,7 @@ ms.localizationpriority: high
|
|||||||
author: DHB-MSFT
|
author: DHB-MSFT
|
||||||
ms.author: danbrown
|
ms.author: danbrown
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.date: 02/29/2024
|
ms.date: 04/24/2024
|
||||||
ms.collection: privacy-windows
|
ms.collection: privacy-windows
|
||||||
ms.topic: reference
|
ms.topic: reference
|
||||||
---
|
---
|
||||||
@ -624,7 +624,7 @@ The following fields are available:
|
|||||||
- **ActiveNetworkConnection** Indicates whether the device is an active network device.
|
- **ActiveNetworkConnection** Indicates whether the device is an active network device.
|
||||||
- **AppraiserVersion** The version of the appraiser file generating the events.
|
- **AppraiserVersion** The version of the appraiser file generating the events.
|
||||||
- **IsBootCritical** Indicates whether the device boot is critical.
|
- **IsBootCritical** Indicates whether the device boot is critical.
|
||||||
- **WuDriverCoverage** Indicates whether there is a driver uplevel for this device, according to Windows Update.
|
- **WuDriverCoverage** Indicates whether there's a driver uplevel for this device, according to Windows Update.
|
||||||
- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver.
|
- **WuDriverUpdateId** The Windows Update ID of the applicable uplevel driver.
|
||||||
- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update.
|
- **WuPopulatedFromId** The expected uplevel driver matching ID based on driver coverage from Windows Update.
|
||||||
|
|
||||||
@ -686,7 +686,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd
|
### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoBlockAdd
|
||||||
|
|
||||||
This event sends blocking data about any compatibility blocking entries on the system that are not directly related to specific applications or devices, to help keep Windows up to date.
|
This event sends blocking data about any compatibility blocking entries on the system that aren't directly related to specific applications or devices, to help keep Windows up to date.
|
||||||
|
|
||||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||||
|
|
||||||
@ -720,7 +720,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd
|
### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPassiveAdd
|
||||||
|
|
||||||
This event sends compatibility database information about non-blocking compatibility entries on the system that are not keyed by either applications or devices, to help keep Windows up to date.
|
This event sends compatibility database information about non-blocking compatibility entries on the system that aren't keyed by either applications or devices, to help keep Windows up to date.
|
||||||
|
|
||||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||||
|
|
||||||
@ -753,7 +753,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd
|
### Microsoft.Windows.Appraiser.General.DataSourceMatchingInfoPostUpgradeAdd
|
||||||
|
|
||||||
This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that are not keyed by either applications or devices, to help keep Windows up to date.
|
This event sends compatibility database information about entries requiring reinstallation after an upgrade on the system that aren't keyed by either applications or devices, to help keep Windows up to date.
|
||||||
|
|
||||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||||
|
|
||||||
@ -831,8 +831,8 @@ The following fields are available:
|
|||||||
- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB,
|
- **SdbBlockUpgrade** The file is tagged as blocking upgrade in the SDB,
|
||||||
- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade.
|
- **SdbBlockUpgradeCanReinstall** The file is tagged as blocking upgrade in the SDB. It can be reinstalled after upgrade.
|
||||||
- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed.
|
- **SdbBlockUpgradeUntilUpdate** The file is tagged as blocking upgrade in the SDB. If the app is updated, the upgrade can proceed.
|
||||||
- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It does not block upgrade.
|
- **SdbReinstallUpgrade** The file is tagged as needing to be reinstalled after upgrade in the SDB. It doesn't block upgrade.
|
||||||
- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade.
|
- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It doesn't block upgrade.
|
||||||
- **SoftBlock** The file is softblocked in the SDB and has a warning.
|
- **SoftBlock** The file is softblocked in the SDB and has a warning.
|
||||||
|
|
||||||
|
|
||||||
@ -871,14 +871,14 @@ The following fields are available:
|
|||||||
- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate?
|
- **AssociatedDriverWillNotMigrate** Will the driver associated with this plug-and-play device migrate?
|
||||||
- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked?
|
- **BlockAssociatedDriver** Should the driver associated with this PNP device be blocked?
|
||||||
- **BlockingDevice** Is this PNP device blocking upgrade?
|
- **BlockingDevice** Is this PNP device blocking upgrade?
|
||||||
- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and does not have a driver included with the OS?
|
- **BlockUpgradeIfDriverBlocked** Is the PNP device both boot critical and doesn't have a driver included with the OS?
|
||||||
- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device?
|
- **BlockUpgradeIfDriverBlockedAndOnlyActiveNetwork** Is this PNP device the only active network device?
|
||||||
- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device?
|
- **DisplayGenericMessage** Will a generic message be shown during Setup for this PNP device?
|
||||||
- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device.
|
- **DisplayGenericMessageGated** Indicates whether a generic message will be shown during Setup for this PNP device.
|
||||||
- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device?
|
- **DriverAvailableInbox** Is a driver included with the operating system for this PNP device?
|
||||||
- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update?
|
- **DriverAvailableOnline** Is there a driver for this PNP device on Windows Update?
|
||||||
- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device?
|
- **DriverAvailableUplevel** Is there a driver on Windows Update or included with the operating system for this PNP device?
|
||||||
- **DriverBlockOverridden** Is there is a driver block on the device that has been overridden?
|
- **DriverBlockOverridden** Is there's a driver block on the device that has been overridden?
|
||||||
- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device?
|
- **NeedsDismissAction** Will the user would need to dismiss a warning during Setup for this device?
|
||||||
- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS?
|
- **NotRegressed** Does the device have a problem code on the source OS that is no better than the one it would have on the target OS?
|
||||||
- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade?
|
- **SdbDeviceBlockUpgrade** Is there an SDB block on the PNP device that blocks upgrade?
|
||||||
@ -949,7 +949,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd
|
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockAdd
|
||||||
|
|
||||||
This event sends compatibility decision data about blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date.
|
This event sends compatibility decision data about blocking entries on the system that aren't keyed by either applications or devices, to help keep Windows up to date.
|
||||||
|
|
||||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||||
|
|
||||||
@ -963,7 +963,7 @@ The following fields are available:
|
|||||||
- **SdbBlockUpgrade** Is a matching info block blocking upgrade?
|
- **SdbBlockUpgrade** Is a matching info block blocking upgrade?
|
||||||
- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag?
|
- **SdbBlockUpgradeCanReinstall** Is a matching info block blocking upgrade, but has the can reinstall tag?
|
||||||
- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag?
|
- **SdbBlockUpgradeUntilUpdate** Is a matching info block blocking upgrade but has the until update tag?
|
||||||
- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It does not block upgrade.
|
- **SdbReinstallUpgradeWarn** The file is tagged as needing to be reinstalled after upgrade with a warning in the SDB. It doesn't block upgrade.
|
||||||
|
|
||||||
|
|
||||||
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove
|
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoBlockRemove
|
||||||
@ -990,7 +990,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd
|
### Microsoft.Windows.Appraiser.General.DecisionMatchingInfoPassiveAdd
|
||||||
|
|
||||||
This event sends compatibility decision data about non-blocking entries on the system that are not keyed by either applications or devices, to help keep Windows up to date.
|
This event sends compatibility decision data about non-blocking entries on the system that aren't keyed by either applications or devices, to help keep Windows up to date.
|
||||||
|
|
||||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||||
|
|
||||||
@ -1345,7 +1345,7 @@ The following fields are available:
|
|||||||
- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64.
|
- **BinaryType** A binary type. Example: UNINITIALIZED, ZERO_BYTE, DATA_ONLY, DOS_MODULE, NE16_MODULE, PE32_UNKNOWN, PE32_I386, PE32_ARM, PE64_UNKNOWN, PE64_AMD64, PE64_ARM64, PE64_IA64, PE32_CLR_32, PE32_CLR_IL, PE32_CLR_IL_PREFER32, PE64_CLR_64.
|
||||||
- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets.
|
- **BinFileVersion** An attempt to clean up FileVersion at the client that tries to place the version into 4 octets.
|
||||||
- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets.
|
- **BinProductVersion** An attempt to clean up ProductVersion at the client that tries to place the version into 4 octets.
|
||||||
- **BoeProgramId** If there is no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata.
|
- **BoeProgramId** If there's no entry in Add/Remove Programs, this is the ProgramID that is generated from the file metadata.
|
||||||
- **CompanyName** The company name of the vendor who developed this file.
|
- **CompanyName** The company name of the vendor who developed this file.
|
||||||
- **FileId** A hash that uniquely identifies a file.
|
- **FileId** A hash that uniquely identifies a file.
|
||||||
- **FileVersion** The File version field from the file metadata under Properties -> Details.
|
- **FileVersion** The File version field from the file metadata under Properties -> Details.
|
||||||
@ -1489,7 +1489,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd
|
### Microsoft.Windows.Appraiser.General.InventoryUplevelDriverPackageAdd
|
||||||
|
|
||||||
This event runs only during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. It is critical in understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. The data collected with this event is used to help keep Windows up to date.
|
This event runs only during setup. It provides a listing of the uplevel driver packages that were downloaded before the upgrade. It's critical in understanding if failures in setup can be traced to not having sufficient uplevel drivers before the upgrade. The data collected with this event is used to help keep Windows up to date.
|
||||||
|
|
||||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||||
|
|
||||||
@ -1886,7 +1886,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Appraiser.General.WmdrmAdd
|
### Microsoft.Windows.Appraiser.General.WmdrmAdd
|
||||||
|
|
||||||
This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data does not indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place.
|
This event sends data about the usage of older digital rights management on the system, to help keep Windows up to date. This data doesn't indicate the details of the media using the digital rights management, only whether any such files exist. Collecting this data was critical to ensuring the correct mitigation for customers, and should be able to be removed once all mitigations are in place.
|
||||||
|
|
||||||
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
This event includes fields from [Ms.Device.DeviceInventoryChange](#msdevicedeviceinventorychange).
|
||||||
|
|
||||||
@ -1984,7 +1984,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Census.Azure
|
### Census.Azure
|
||||||
|
|
||||||
This event returns data from Microsoft-internal Azure server machines (only from Microsoft-internal machines with Server SKUs). All other machines (those outside Microsoft and/or machines that are not part of the “Azure fleet”) return empty data sets. The data collected with this event is used to help keep Windows secure.
|
This event returns data from Microsoft-internal Azure server machines (only from Microsoft-internal machines with Server SKUs). All other machines (those outside Microsoft and/or machines that aren't part of the “Azure fleet”) return empty data sets. The data collected with this event is used to help keep Windows secure.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -2121,11 +2121,11 @@ This event sends data about the mobile and cellular network used by the device (
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CellularModemHWInstanceId0** HardwareInstanceId of the embedded Mobile broadband modem, as reported and used by PnP system to identify the WWAN modem device in Windows system. Empty string (null string) indicates that this property is unknown for telemetry.
|
- **CellularModemHWInstanceId0** HardwareInstanceId of the embedded Mobile broadband modem, as reported and used by PnP system to identify the WWAN modem device in Windows system. Empty string (null string) indicates that this property is unknown for telemetry.
|
||||||
- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage.
|
- **IMEI0** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft doesn't have access to mobile operator billing data so collecting this data doesn't expose or identify the user. The two fields represent phone with dual sim coverage.
|
||||||
- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user. The two fields represent phone with dual sim coverage.
|
- **IMEI1** Represents the International Mobile Station Equipment Identity. This number is usually unique and used by the mobile operator to distinguish different phone hardware. Microsoft doesn't have access to mobile operator billing data so collecting this data doesn't expose or identify the user. The two fields represent phone with dual sim coverage.
|
||||||
- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
- **MCC0** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
||||||
- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
- **MCC1** Represents the Mobile Country Code (MCC). It used with the Mobile Network Code (MNC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
||||||
- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft does not have access to mobile operator billing data so collecting this data does not expose or identify the user.
|
- **MEID** Represents the Mobile Equipment Identity (MEID). MEID is a worldwide unique phone ID assigned to CDMA phones. MEID replaces electronic serial number (ESN), and is equivalent to IMEI for GSM and WCDMA phones. Microsoft doesn't have access to mobile operator billing data so collecting this data doesn't expose or identify the user.
|
||||||
- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
- **MNC0** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
||||||
- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
- **MNC1** Retrieves the Mobile Network Code (MNC). It used with the Mobile Country Code (MCC) to uniquely identify a mobile network operator. The two fields represent phone with dual sim coverage.
|
||||||
- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users.
|
- **MobileOperatorBilling** Represents the telephone company that provides services for mobile phone users.
|
||||||
@ -2159,7 +2159,7 @@ The following fields are available:
|
|||||||
- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go
|
- **IsPortableOperatingSystem** Retrieves whether OS is running Windows-To-Go
|
||||||
- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI.
|
- **IsSecureBootEnabled** Retrieves whether Boot chain is signed under UEFI.
|
||||||
- **LanguagePacks** The list of language packages installed on the device.
|
- **LanguagePacks** The list of language packages installed on the device.
|
||||||
- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we are running an OS License granted by the MS store.
|
- **LicenseStateReason** Retrieves why (or how) a system is licensed or unlicensed. The HRESULT may indicate an error code that indicates a key blocked error, or it may indicate that we're running an OS License granted by the MS store.
|
||||||
- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine.
|
- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine.
|
||||||
- **OSEdition** Retrieves the version of the current OS.
|
- **OSEdition** Retrieves the version of the current OS.
|
||||||
- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc
|
- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc
|
||||||
@ -2429,11 +2429,11 @@ The following fields are available:
|
|||||||
- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting
|
- **AppStoreAutoUpdatePolicy** Retrieves the Microsoft Store App Auto Update group policy setting
|
||||||
- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades.
|
- **DelayUpgrade** Retrieves the Windows upgrade flag for delaying upgrades.
|
||||||
- **IsHotPatchEnrolled** Represents the current state of the device in relation to enrollment in the hotpatch program.
|
- **IsHotPatchEnrolled** Represents the current state of the device in relation to enrollment in the hotpatch program.
|
||||||
- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device did not install it?
|
- **OSAssessmentFeatureOutOfDate** How many days has it been since a the last feature update was released but the device didn't install it?
|
||||||
- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update?
|
- **OSAssessmentForFeatureUpdate** Is the device is on the latest feature update?
|
||||||
- **OSAssessmentForQualityUpdate** Is the device on the latest quality update?
|
- **OSAssessmentForQualityUpdate** Is the device on the latest quality update?
|
||||||
- **OSAssessmentForSecurityUpdate** Is the device on the latest security update?
|
- **OSAssessmentForSecurityUpdate** Is the device on the latest security update?
|
||||||
- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device did not install it?
|
- **OSAssessmentQualityOutOfDate** How many days has it been since a the last quality update was released but the device didn't install it?
|
||||||
- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment.
|
- **OSAssessmentReleaseInfoTime** The freshness of release information used to perform an assessment.
|
||||||
- **OSRollbackCount** The number of times feature updates have rolled back on the device.
|
- **OSRollbackCount** The number of times feature updates have rolled back on the device.
|
||||||
- **OSRolledBack** A flag that represents when a feature update has rolled back during setup.
|
- **OSRolledBack** A flag that represents when a feature update has rolled back during setup.
|
||||||
@ -2506,7 +2506,7 @@ Fires when driver scanning fails to get results.
|
|||||||
|
|
||||||
### Microsoft.Windows.Security.CodeIntegrity.HVCISysprep.HvciScanningDriverInSdbError
|
### Microsoft.Windows.Security.CodeIntegrity.HVCISysprep.HvciScanningDriverInSdbError
|
||||||
|
|
||||||
Fires when there is an error checking the SDB for a particular driver.
|
Fires when there's an error checking the SDB for a particular driver.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -2664,7 +2664,7 @@ The following fields are available:
|
|||||||
- **popSample** Represents the effective sample rate for this event at the time it was generated by a client.
|
- **popSample** Represents the effective sample rate for this event at the time it was generated by a client.
|
||||||
- **providerGuid** The ETW provider ID associated with the provider name.
|
- **providerGuid** The ETW provider ID associated with the provider name.
|
||||||
- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW.
|
- **raId** Represents the ETW Related ActivityId. Logged via TraceLogging or directly via ETW.
|
||||||
- **seq** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server.
|
- **seq** Represents the sequence field used to track absolute order of uploaded events. It's an incrementing identifier for each event added to the upload queue. The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server.
|
||||||
- **sqmId** The Windows SQM (Software Quality Metrics—a precursor of Windows 10 Diagnostic Data collection) device identifier.
|
- **sqmId** The Windows SQM (Software Quality Metrics—a precursor of Windows 10 Diagnostic Data collection) device identifier.
|
||||||
- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID.
|
- **stId** Represents the Scenario Entry Point ID. This is a unique GUID for each event in a diagnostic scenario. This used to be Scenario Trigger ID.
|
||||||
- **wcmp** The Windows Shell Composer ID.
|
- **wcmp** The Windows Shell Composer ID.
|
||||||
@ -2767,11 +2767,11 @@ The following fields are available:
|
|||||||
|
|
||||||
### CbsServicingProvider.CbsLateAcquisition
|
### CbsServicingProvider.CbsLateAcquisition
|
||||||
|
|
||||||
This event sends data to indicate if some Operating System packages could not be updated as part of an upgrade, to help keep Windows up to date.
|
This event sends data to indicate if some Operating System packages couldn't be updated as part of an upgrade, to help keep Windows up to date.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **Features** The list of feature packages that could not be updated.
|
- **Features** The list of feature packages that couldn't be updated.
|
||||||
- **RetryID** The ID identifying the retry attempt to update the listed packages.
|
- **RetryID** The ID identifying the retry attempt to update the listed packages.
|
||||||
|
|
||||||
|
|
||||||
@ -3004,7 +3004,7 @@ The following fields are available:
|
|||||||
- **PowerButtonPressLastPowerWatchdogStage** Progress while the monitor is being turned on.
|
- **PowerButtonPressLastPowerWatchdogStage** Progress while the monitor is being turned on.
|
||||||
- **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press.
|
- **PowerButtonPressPowerWatchdogArmed** Indicates whether or not the watchdog for the monitor was active at the time of the last power button press.
|
||||||
- **ShutdownDeviceType** Identifies who triggered a shutdown. Is it because of battery, thermal zones, or through a Kernel API.
|
- **ShutdownDeviceType** Identifies who triggered a shutdown. Is it because of battery, thermal zones, or through a Kernel API.
|
||||||
- **SleepCheckpoint** Provides the last checkpoint when there is a failure during a sleep transition.
|
- **SleepCheckpoint** Provides the last checkpoint when there's a failure during a sleep transition.
|
||||||
- **SleepCheckpointSource** Indicates whether the source is the EFI variable or bootstat file.
|
- **SleepCheckpointSource** Indicates whether the source is the EFI variable or bootstat file.
|
||||||
- **SleepCheckpointStatus** Indicates whether the checkpoint information is valid.
|
- **SleepCheckpointStatus** Indicates whether the checkpoint information is valid.
|
||||||
- **StaleBootStatData** Identifies if the data from bootstat is stale.
|
- **StaleBootStatData** Identifies if the data from bootstat is stale.
|
||||||
@ -3030,12 +3030,12 @@ The following fields are available:
|
|||||||
|
|
||||||
### TelClientSynthetic.AuthorizationInfo_RuntimeTransition
|
### TelClientSynthetic.AuthorizationInfo_RuntimeTransition
|
||||||
|
|
||||||
This event is fired by UTC at state transitions to signal what data we are allowed to collect. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
This event is fired by UTC at state transitions to signal what data we're allowed to collect. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise.
|
- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise.
|
||||||
- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise.
|
- **CanCollectAnyTelemetry** True if we're allowed to collect partner telemetry, false otherwise.
|
||||||
- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise.
|
- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise.
|
||||||
- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise.
|
- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise.
|
||||||
- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise.
|
- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise.
|
||||||
@ -3044,17 +3044,17 @@ The following fields are available:
|
|||||||
- **CanReportScenarios** True if we can report scenario completions, false otherwise.
|
- **CanReportScenarios** True if we can report scenario completions, false otherwise.
|
||||||
- **IsProcessorMode** True if it's Processor Mode, false otherwise.
|
- **IsProcessorMode** True if it's Processor Mode, false otherwise.
|
||||||
- **PreviousPermissions** Bitmask of previous telemetry state.
|
- **PreviousPermissions** Bitmask of previous telemetry state.
|
||||||
- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise.
|
- **TransitionFromEverythingOff** True if we're transitioning from all telemetry being disabled, false otherwise.
|
||||||
|
|
||||||
|
|
||||||
### TelClientSynthetic.AuthorizationInfo_Startup
|
### TelClientSynthetic.AuthorizationInfo_Startup
|
||||||
|
|
||||||
This event is fired by UTC at startup to signal what data we are allowed to collect. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
This event is fired by UTC at startup to signal what data we're allowed to collect. The data collected with this event is used to help keep Windows up to date, secure, and performing properly.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise.
|
- **CanAddMsaToMsTelemetry** True if we can add MSA PUID and CID to telemetry, false otherwise.
|
||||||
- **CanCollectAnyTelemetry** True if we are allowed to collect partner telemetry, false otherwise.
|
- **CanCollectAnyTelemetry** True if we're allowed to collect partner telemetry, false otherwise.
|
||||||
- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise.
|
- **CanCollectCoreTelemetry** True if we can collect CORE/Basic telemetry, false otherwise.
|
||||||
- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise.
|
- **CanCollectHeartbeats** True if we can collect heartbeat telemetry, false otherwise.
|
||||||
- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise.
|
- **CanCollectOsTelemetry** True if we can collect diagnostic data telemetry, false otherwise.
|
||||||
@ -3063,7 +3063,7 @@ The following fields are available:
|
|||||||
- **CanReportScenarios** True if we can report scenario completions, false otherwise.
|
- **CanReportScenarios** True if we can report scenario completions, false otherwise.
|
||||||
- **IsProcessorMode** True if it's Processor Mode, false otherwise.
|
- **IsProcessorMode** True if it's Processor Mode, false otherwise.
|
||||||
- **PreviousPermissions** Bitmask of previous telemetry state.
|
- **PreviousPermissions** Bitmask of previous telemetry state.
|
||||||
- **TransitionFromEverythingOff** True if we are transitioning from all telemetry being disabled, false otherwise.
|
- **TransitionFromEverythingOff** True if we're transitioning from all telemetry being disabled, false otherwise.
|
||||||
|
|
||||||
|
|
||||||
### TelClientSynthetic.ConnectivityHeartBeat_0
|
### TelClientSynthetic.ConnectivityHeartBeat_0
|
||||||
@ -3131,7 +3131,7 @@ The following fields are available:
|
|||||||
- **VortexHttpAttempts** Number of attempts to contact Vortex.
|
- **VortexHttpAttempts** Number of attempts to contact Vortex.
|
||||||
- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex.
|
- **VortexHttpFailures4xx** Number of 400-499 error codes received from Vortex.
|
||||||
- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex.
|
- **VortexHttpFailures5xx** Number of 500-599 error codes received from Vortex.
|
||||||
- **VortexHttpResponseFailures** Number of Vortex responses that are not 2XX or 400.
|
- **VortexHttpResponseFailures** Number of Vortex responses that aren't 2XX or 400.
|
||||||
- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event.
|
- **VortexHttpResponsesWithDroppedEvents** Number of Vortex responses containing at least 1 dropped event.
|
||||||
|
|
||||||
|
|
||||||
@ -3662,7 +3662,7 @@ The following fields are available:
|
|||||||
- **CoordinatorVersion** Coordinator version of DTU.
|
- **CoordinatorVersion** Coordinator version of DTU.
|
||||||
- **CV** Correlation vector.
|
- **CV** Correlation vector.
|
||||||
- **HRESULT** Error (if any) that occurred.
|
- **HRESULT** Error (if any) that occurred.
|
||||||
- **NextState** Next workflow state we will enter.
|
- **NextState** Next workflow state we'll enter.
|
||||||
- **State** The state of the workflow.
|
- **State** The state of the workflow.
|
||||||
|
|
||||||
|
|
||||||
@ -3909,7 +3909,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.DxDiag.DxDiagProviderErrorStatistics
|
### Microsoft.Windows.DxDiag.DxDiagProviderErrorStatistics
|
||||||
|
|
||||||
This event provides statistics of major error(s) occurred during data collection, when data has not been properly collected in some queries. The data collected with this event is used to help keep Windows up to date and performing properly.
|
This event provides statistics of major error(s) occurred during data collection, when data hasn't been properly collected in some queries. The data collected with this event is used to help keep Windows up to date and performing properly.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -4010,7 +4010,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.FaultReporting.AppCrashEvent
|
### Microsoft.Windows.FaultReporting.AppCrashEvent
|
||||||
|
|
||||||
This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event.
|
This event sends data about crashes for both native and managed applications, to help keep Windows up to date. The data includes information about the crashing process and a summary of its exception record. It doesn't contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the crash to the Watson service, and the WER event will contain the same ReportID (see field 14 of crash event, field 19 of WER event) as the crash event for the crash being reported. AppCrash is emitted once for each crash handled by WER (e.g. from an unhandled exception or FailFast or ReportException). Note that Generic Watson event types (e.g. from PLM) that may be considered crashes\" by a user DO NOT emit this event.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -4020,7 +4020,7 @@ The following fields are available:
|
|||||||
- **AppVersion** The version of the app that has crashed.
|
- **AppVersion** The version of the app that has crashed.
|
||||||
- **ExceptionCode** The exception code returned by the process that has crashed.
|
- **ExceptionCode** The exception code returned by the process that has crashed.
|
||||||
- **ExceptionOffset** The address where the exception had occurred.
|
- **ExceptionOffset** The address where the exception had occurred.
|
||||||
- **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting.
|
- **Flags** Flags indicating how reporting is done. For example, queue the report, don't offer JIT debugging, or don't terminate the process after reporting.
|
||||||
- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name.
|
- **FriendlyAppName** The description of the app that has crashed, if different from the AppName. Otherwise, the process name.
|
||||||
- **IsFatal** True/False to indicate whether the crash resulted in process termination.
|
- **IsFatal** True/False to indicate whether the crash resulted in process termination.
|
||||||
- **ModName** Exception module name (e.g. bar.dll).
|
- **ModName** Exception module name (e.g. bar.dll).
|
||||||
@ -4114,7 +4114,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.HangReporting.AppHangEvent
|
### Microsoft.Windows.HangReporting.AppHangEvent
|
||||||
|
|
||||||
This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It does not contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and won't produce AppHang events.
|
This event sends data about hangs for both native and managed applications, to help keep Windows up to date. It doesn't contain any Watson bucketing information. The bucketing information is recorded in a Windows Error Reporting (WER) event that is generated when the WER client reports the hang to the Watson service, and the WER event will contain the same ReportID (see field 13 of hang event, field 19 of WER event) as the hang event for the hang being reported. AppHang is reported only on PC devices. It handles classic Win32 hangs and is emitted only once per report. Some behaviors that may be perceived by a user as a hang are reported by app managers (e.g. PLM/RM/EM) as Watson Generics and won't produce AppHang events.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -4261,7 +4261,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum
|
### Microsoft.Windows.Inventory.Core.AmiTelCacheChecksum
|
||||||
|
|
||||||
This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they will always represent a count of a given object. The data collected with this event is used to keep Windows performing properly.
|
This event captures basic checksum data about the device inventory items stored in the cache for use in validating data completeness for Microsoft.Windows.Inventory.Core events. The fields in this event may change over time, but they'll always represent a count of a given object. The data collected with this event is used to keep Windows performing properly.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -5162,14 +5162,14 @@ The following fields are available:
|
|||||||
- **appCohortName** A stable non-localized human-readable enum indicating which (if any) set of messages the app should display to the user. For example, an app with a cohort Name of 'beta' might display beta-specific branding to the user. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
- **appCohortName** A stable non-localized human-readable enum indicating which (if any) set of messages the app should display to the user. For example, an app with a cohort Name of 'beta' might display beta-specific branding to the user. Limited to ASCII characters 32 to 127 (inclusive) and a maximum length of 1024 characters. Default: ''.
|
||||||
- **appConsentState** Bit flags describing the diagnostic data disclosure and response flow where 1 indicates the affirmative and 0 indicates the negative or unspecified data. Bit 1 indicates consent was given, bit 2 indicates data originated from the download page, bit 18 indicates choice for sending data about how the browser is used, and bit 19 indicates choice for sending data about websites visited.
|
- **appConsentState** Bit flags describing the diagnostic data disclosure and response flow where 1 indicates the affirmative and 0 indicates the negative or unspecified data. Bit 1 indicates consent was given, bit 2 indicates data originated from the download page, bit 18 indicates choice for sending data about how the browser is used, and bit 19 indicates choice for sending data about websites visited.
|
||||||
- **appDayOfInstall** The date-based counting equivalent of appInstallTimeDiffSec (the numeric calendar day that the app was installed on). This value is provided by the server in the response to the first request in the installation flow. The client MAY fuzz this value to the week granularity (e.g. send '0' for 0 through 6, '7' for 7 through 13, etc.). The first communication to the server should use a special value of '-1'. A value of '-2' indicates that this value isn't known. Please see the wiki for additional information. Default: '-2'.
|
- **appDayOfInstall** The date-based counting equivalent of appInstallTimeDiffSec (the numeric calendar day that the app was installed on). This value is provided by the server in the response to the first request in the installation flow. The client MAY fuzz this value to the week granularity (e.g. send '0' for 0 through 6, '7' for 7 through 13, etc.). The first communication to the server should use a special value of '-1'. A value of '-2' indicates that this value isn't known. Please see the wiki for additional information. Default: '-2'.
|
||||||
- **appExperiments** A key/value list of experiment identifiers. Experiment labels are used to track membership in different experimental groups, and may be set at install or update time. The experiments string is formatted as a semicolon-delimited concatenation of experiment label strings. An experiment label string is an experiment Name, followed by the '=' character, followed by an experimental label value. For example: 'crdiff=got_bsdiff;optimized=O3'. The client should not transmit the expiration date of any experiments it has, even if the server previously specified a specific expiration date. Default: ''.
|
- **appExperiments** A key/value list of experiment identifiers. Experiment labels are used to track membership in different experimental groups, and may be set at install or update time. The experiments string is formatted as a semicolon-delimited concatenation of experiment label strings. An experiment label string is an experiment Name, followed by the '=' character, followed by an experimental label value. For example: 'crdiff=got_bsdiff;optimized=O3'. The client shouldn't transmit the expiration date of any experiments it has, even if the server previously specified a specific expiration date. Default: ''.
|
||||||
- **appInstallTime** The product install time in seconds. '0' if unknown. Default: '-1'.
|
- **appInstallTime** The product install time in seconds. '0' if unknown. Default: '-1'.
|
||||||
- **appInstallTimeDiffSec** The difference between the current time and the install date in seconds. '0' if unknown. Default: '-1'.
|
- **appInstallTimeDiffSec** The difference between the current time and the install date in seconds. '0' if unknown. Default: '-1'.
|
||||||
- **appLang** The language of the product install, in IETF BCP 47 representation. Default: ''.
|
- **appLang** The language of the product install, in IETF BCP 47 representation. Default: ''.
|
||||||
- **appLastLaunchTime** The time when browser was last launched.
|
- **appLastLaunchTime** The time when browser was last launched.
|
||||||
- **appNextVersion** The version of the app that the update flow to which this event belongs attempted to reach, regardless of the success or failure of the update operation. Please see the wiki for additional information. Default: '0.0.0.0'.
|
- **appNextVersion** The version of the app that the update flow to which this event belongs attempted to reach, regardless of the success or failure of the update operation. Please see the wiki for additional information. Default: '0.0.0.0'.
|
||||||
- **appPingEventAppSize** The total number of bytes of all downloaded packages. Default: '0'.
|
- **appPingEventAppSize** The total number of bytes of all downloaded packages. Default: '0'.
|
||||||
- **appPingEventDoneBeforeOOBEComplete** Indicates whether the install or update was completed before Windows Out of the Box Experience ends. 1 means event completed before OOBE finishes; 0 means event wasn't completed before OOBE finishes; -1 means the field does not apply.
|
- **appPingEventDoneBeforeOOBEComplete** Indicates whether the install or update was completed before Windows Out of the Box Experience ends. 1 means event completed before OOBE finishes; 0 means event wasn't completed before OOBE finishes; -1 means the field doesn't apply.
|
||||||
- **appPingEventDownloadMetricsCdnAzureRefOriginShield** Provides a unique reference string that identifies a request served by Azure Front Door. It's used to search access logs and is critical for troubleshooting. For example, Ref A: E172B39D19774147B0EFCC8E3E823D9D Ref B: BL2EDGE0215 Ref C: 2021-05-11T22:25:48Z.
|
- **appPingEventDownloadMetricsCdnAzureRefOriginShield** Provides a unique reference string that identifies a request served by Azure Front Door. It's used to search access logs and is critical for troubleshooting. For example, Ref A: E172B39D19774147B0EFCC8E3E823D9D Ref B: BL2EDGE0215 Ref C: 2021-05-11T22:25:48Z.
|
||||||
- **appPingEventDownloadMetricsCdnCache** Corresponds to the result, whether the proxy has served the result from cache (HIT for yes, and MISS for no) For example, HIT from proxy.domain.tld, MISS from proxy.local.
|
- **appPingEventDownloadMetricsCdnCache** Corresponds to the result, whether the proxy has served the result from cache (HIT for yes, and MISS for no) For example, HIT from proxy.domain.tld, MISS from proxy.local.
|
||||||
- **appPingEventDownloadMetricsCdnCCC** ISO 2 character country or region code that matches to the country or region updated binaries are delivered from. E.g.: US.
|
- **appPingEventDownloadMetricsCdnCCC** ISO 2 character country or region code that matches to the country or region updated binaries are delivered from. E.g.: US.
|
||||||
@ -5190,15 +5190,15 @@ The following fields are available:
|
|||||||
- **appPingEventExtraCode1** Additional numeric information about the operation's result, encoded as a signed, base-10 integer. Default: '0'.
|
- **appPingEventExtraCode1** Additional numeric information about the operation's result, encoded as a signed, base-10 integer. Default: '0'.
|
||||||
- **appPingEventInstallTimeMs** For events representing an install, the time elapsed between the start of the install and the end of the install, in milliseconds. For events representing an entire update flow, the sum of all such durations. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
- **appPingEventInstallTimeMs** For events representing an install, the time elapsed between the start of the install and the end of the install, in milliseconds. For events representing an entire update flow, the sum of all such durations. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
||||||
- **appPingEventNumBytesDownloaded** The number of bytes downloaded for the specified application. Default: '0'.
|
- **appPingEventNumBytesDownloaded** The number of bytes downloaded for the specified application. Default: '0'.
|
||||||
- **appPingEventPackageCacheResult** Indicates whether there is an existing package cached in the system to update or install. 1 means that there's a cache hit under the expected key; 2 means there's a cache hit under a different key; 0 means that there's a cache miss; -1 means the field does not apply.
|
- **appPingEventPackageCacheResult** Indicates whether there's an existing package cached in the system to update or install. 1 means that there's a cache hit under the expected key; 2 means there's a cache hit under a different key; 0 means that there's a cache miss; -1 means the field doesn't apply.
|
||||||
- **appPingEventSequenceId** An id that uniquely identifies particular events within one requestId. Since a request can contain multiple ping events, this field is necessary to uniquely identify each possible event.
|
- **appPingEventSequenceId** An id that uniquely identifies particular events within one requestId. Since a request can contain multiple ping events, this field is necessary to uniquely identify each possible event.
|
||||||
- **appPingEventSourceUrlIndex** For events representing a download, the position of the download URL in the list of URLs supplied by the server in a "urls" tag.
|
- **appPingEventSourceUrlIndex** For events representing a download, the position of the download URL in the list of URLs supplied by the server in a "urls" tag.
|
||||||
- **appPingEventUpdateCheckTimeMs** For events representing an entire update flow, the time elapsed between the start of the update check and the end of the update check, in milliseconds. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
- **appPingEventUpdateCheckTimeMs** For events representing an entire update flow, the time elapsed between the start of the update check and the end of the update check, in milliseconds. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
||||||
- **appReferralHash** The hash of the referral code used to install the product. '0' if unknown. Default: '0'.
|
- **appReferralHash** The hash of the referral code used to install the product. '0' if unknown. Default: '0'.
|
||||||
- **appUpdateCheckIsRollbackAllowed** Check for status showing whether or not rollback is allowed.
|
- **appUpdateCheckIsRollbackAllowed** Check for status showing whether or not rollback is allowed.
|
||||||
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they have not.
|
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they haven't.
|
||||||
- **appUpdateCheckTargetChannel** Check for status showing the target release channel.
|
- **appUpdateCheckTargetChannel** Check for status showing the target release channel.
|
||||||
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The server should not return an update instruction to a version number that does not match the prefix or complete version number. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it isn't a lexical prefix (for example, '1.2.3' must match '1.2.3.4' but must not match '1.2.34'). Default: ''.
|
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The server shouldn't return an update instruction to a version number that doesn't match the prefix or complete version number. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it isn't a lexical prefix (for example, '1.2.3' must match '1.2.3.4' but must not match '1.2.34'). Default: ''.
|
||||||
- **appUpdateCheckTtToken** An opaque access token that can be used to identify the requesting client as a member of a trusted-tester group. If non-empty, the request should be sent over SSL or another secure protocol. Default: ''.
|
- **appUpdateCheckTtToken** An opaque access token that can be used to identify the requesting client as a member of a trusted-tester group. If non-empty, the request should be sent over SSL or another secure protocol. Default: ''.
|
||||||
- **appVersion** The version of the product install. Please see the wiki for additional information. Default: '0.0.0.0'.
|
- **appVersion** The version of the product install. Please see the wiki for additional information. Default: '0.0.0.0'.
|
||||||
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
- **EventInfo.Level** The minimum Windows diagnostic data level required for the event where 1 is basic, 2 is enhanced, and 3 is full.
|
||||||
@ -5207,13 +5207,13 @@ The following fields are available:
|
|||||||
- **expEtag** An identifier representing all service applied configurations and experiments when current update happens. Used for testing only.
|
- **expEtag** An identifier representing all service applied configurations and experiments when current update happens. Used for testing only.
|
||||||
- **expETag** An identifier representing all service applied configurations and experiments when current update happens. Used for testing only.
|
- **expETag** An identifier representing all service applied configurations and experiments when current update happens. Used for testing only.
|
||||||
- **hwDiskType** Device’s hardware disk type.
|
- **hwDiskType** Device’s hardware disk type.
|
||||||
- **hwHasAvx** '1' if the client's hardware supports the AVX instruction set. '0' if the client's hardware does not support the AVX instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasAvx** '1' if the client's hardware supports the AVX instruction set. '0' if the client's hardware doesn't support the AVX instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse** '1' if the client's hardware supports the SSE instruction set. '0' if the client's hardware does not support the SSE instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse** '1' if the client's hardware supports the SSE instruction set. '0' if the client's hardware doesn't support the SSE instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse2** '1' if the client's hardware supports the SSE2 instruction set. '0' if the client's hardware does not support the SSE2 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse2** '1' if the client's hardware supports the SSE2 instruction set. '0' if the client's hardware doesn't support the SSE2 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse3** '1' if the client's hardware supports the SSE3 instruction set. '0' if the client's hardware does not support the SSE3 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse3** '1' if the client's hardware supports the SSE3 instruction set. '0' if the client's hardware doesn't support the SSE3 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse41** '1' if the client's hardware supports the SSE4.1 instruction set. '0' if the client's hardware does not support the SSE4.1 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse41** '1' if the client's hardware supports the SSE4.1 instruction set. '0' if the client's hardware doesn't support the SSE4.1 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse42** '1' if the client's hardware supports the SSE4.2 instruction set. '0' if the client's hardware does not support the SSE4.2 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse42** '1' if the client's hardware supports the SSE4.2 instruction set. '0' if the client's hardware doesn't support the SSE4.2 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSsse3** '1' if the client's hardware supports the SSSE3 instruction set. '0' if the client's hardware does not support the SSSE3 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSsse3** '1' if the client's hardware supports the SSSE3 instruction set. '0' if the client's hardware doesn't support the SSSE3 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwLogcicalCpus** Number of logical CPUs of the device. Used for testing only.
|
- **hwLogcicalCpus** Number of logical CPUs of the device. Used for testing only.
|
||||||
- **hwLogicalCpus** Number of logical CPUs of the device.
|
- **hwLogicalCpus** Number of logical CPUs of the device.
|
||||||
- **hwPhysmemory** The physical memory available to the client, truncated down to the nearest gibibyte. '-1' if unknown. This value is intended to reflect the maximum theoretical storage capacity of the client, not including any hard drive or paging to a hard drive or peripheral. Default: '-1'.
|
- **hwPhysmemory** The physical memory available to the client, truncated down to the nearest gibibyte. '-1' if unknown. This value is intended to reflect the maximum theoretical storage capacity of the client, not including any hard drive or paging to a hard drive or peripheral. Default: '-1'.
|
||||||
@ -5235,7 +5235,7 @@ The following fields are available:
|
|||||||
- **requestRequestId** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha request. Each request attempt should have (with high probability) a unique request id. Default: ''.
|
- **requestRequestId** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha request. Each request attempt should have (with high probability) a unique request id. Default: ''.
|
||||||
- **requestSessionCorrelationVectorBase** A client generated random MS Correlation Vector base code used to correlate the update session with update and CDN servers. Default: ''.
|
- **requestSessionCorrelationVectorBase** A client generated random MS Correlation Vector base code used to correlate the update session with update and CDN servers. Default: ''.
|
||||||
- **requestSessionId** A randomly-generated (uniformly distributed) GUID. Each single update flow (e.g. update check, update application, event ping sequence) should have (with high probability) a single unique session ID. Default: ''.
|
- **requestSessionId** A randomly-generated (uniformly distributed) GUID. Each single update flow (e.g. update check, update application, event ping sequence) should have (with high probability) a single unique session ID. Default: ''.
|
||||||
- **requestTestSource** Either '', 'dev', 'qa', 'prober', 'auto', or 'ossdev'. Any value except '' indicates that the request is a test and should not be counted toward normal metrics. Default: ''.
|
- **requestTestSource** Either '', 'dev', 'qa', 'prober', 'auto', or 'ossdev'. Any value except '' indicates that the request is a test and shouldn't be counted toward normal metrics. Default: ''.
|
||||||
- **requestUid** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha user. Each request attempt SHOULD have (with high probability) a unique request id. Default: ''.
|
- **requestUid** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha user. Each request attempt SHOULD have (with high probability) a unique request id. Default: ''.
|
||||||
|
|
||||||
|
|
||||||
@ -5347,18 +5347,18 @@ The following fields are available:
|
|||||||
- **appPingEventSequenceId** An ID that uniquely identifies particular events within one requestId. Since a request can contain multiple ping events, this field is necessary to uniquely identify each possible event.
|
- **appPingEventSequenceId** An ID that uniquely identifies particular events within one requestId. Since a request can contain multiple ping events, this field is necessary to uniquely identify each possible event.
|
||||||
- **appPingEventSourceUrlIndex** For events representing a download, the position of the download URL in the list of URLs supplied by the server in a tag.
|
- **appPingEventSourceUrlIndex** For events representing a download, the position of the download URL in the list of URLs supplied by the server in a tag.
|
||||||
- **appPingEventUpdateCheckTimeMs** For events representing an entire update flow, the time elapsed between the start of the update check and the end of the update check, in milliseconds. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
- **appPingEventUpdateCheckTimeMs** For events representing an entire update flow, the time elapsed between the start of the update check and the end of the update check, in milliseconds. Sent in events that have an event type of '2' and '3' only. Default: '0'.
|
||||||
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they have not.
|
- **appUpdateCheckIsUpdateDisabled** The state of whether app updates are restricted by group policy. True if updates have been restricted by group policy or false if they haven't.
|
||||||
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it isn't a lexical prefix (for example, '1.2.3' MUST match '1.2.3.4' but MUST NOT match '1.2.34'). Default: ''.
|
- **appUpdateCheckTargetVersionPrefix** A component-wise prefix of a version number, or a complete version number suffixed with the $ character. The prefix is interpreted a dotted-tuple that specifies the exactly-matching elements; it isn't a lexical prefix (for example, '1.2.3' MUST match '1.2.3.4' but MUST NOT match '1.2.34'). Default: ''.
|
||||||
- **appUpdateCheckTtToken** An opaque access token that can be used to identify the requesting client as a member of a trusted-tester group. If non-empty, the request is sent over SSL or another secure protocol. This field is unused by Edge Update and always empty. Default: ''.
|
- **appUpdateCheckTtToken** An opaque access token that can be used to identify the requesting client as a member of a trusted-tester group. If non-empty, the request is sent over SSL or another secure protocol. This field is unused by Edge Update and always empty. Default: ''.
|
||||||
- **appVersion** The version of the product install. Default: '0.0.0.0'.
|
- **appVersion** The version of the product install. Default: '0.0.0.0'.
|
||||||
- **eventType** A string representation of appPingEventEventType indicating the type of the event.
|
- **eventType** A string representation of appPingEventEventType indicating the type of the event.
|
||||||
- **hwHasAvx** '1' if the client's hardware supports the AVX instruction set. '0' if the client's hardware does not support the AVX instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasAvx** '1' if the client's hardware supports the AVX instruction set. '0' if the client's hardware doesn't support the AVX instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse** '1' if the client's hardware supports the SSE instruction set. '0' if the client's hardware does not support the SSE instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse** '1' if the client's hardware supports the SSE instruction set. '0' if the client's hardware doesn't support the SSE instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse2** '1' if the client's hardware supports the SSE2 instruction set. '0' if the client's hardware does not support the SSE2 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse2** '1' if the client's hardware supports the SSE2 instruction set. '0' if the client's hardware doesn't support the SSE2 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse3** '1' if the client's hardware supports the SSE3 instruction set. '0' if the client's hardware does not support the SSE3 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse3** '1' if the client's hardware supports the SSE3 instruction set. '0' if the client's hardware doesn't support the SSE3 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse41** '1' if the client's hardware supports the SSE4.1 instruction set. '0' if the client's hardware does not support the SSE4.1 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse41** '1' if the client's hardware supports the SSE4.1 instruction set. '0' if the client's hardware doesn't support the SSE4.1 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSse42** '1' if the client's hardware supports the SSE4.2 instruction set. '0' if the client's hardware does not support the SSE4.2 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSse42** '1' if the client's hardware supports the SSE4.2 instruction set. '0' if the client's hardware doesn't support the SSE4.2 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwHasSsse3** '1' if the client's hardware supports the SSSE3 instruction set. '0' if the client's hardware does not support the SSSE3 instruction set. '-1' if unknown. Default: '-1'.
|
- **hwHasSsse3** '1' if the client's hardware supports the SSSE3 instruction set. '0' if the client's hardware doesn't support the SSSE3 instruction set. '-1' if unknown. Default: '-1'.
|
||||||
- **hwPhysmemory** The physical memory available to the client, truncated down to the nearest gibibyte. '-1' if unknown. This value is intended to reflect the maximum theoretical storage capacity of the client, not including any hard drive or paging to a hard drive or peripheral. Default: '-1'.
|
- **hwPhysmemory** The physical memory available to the client, truncated down to the nearest gibibyte. '-1' if unknown. This value is intended to reflect the maximum theoretical storage capacity of the client, not including any hard drive or paging to a hard drive or peripheral. Default: '-1'.
|
||||||
- **isMsftDomainJoined** '1' if the client is a member of a Microsoft domain. '0' otherwise. Default: '0'.
|
- **isMsftDomainJoined** '1' if the client is a member of a Microsoft domain. '0' otherwise. Default: '0'.
|
||||||
- **osArch** The architecture of the operating system (e.g. 'x86', 'x64', 'arm'). '' if unknown. Default: ''.
|
- **osArch** The architecture of the operating system (e.g. 'x86', 'x64', 'arm'). '' if unknown. Default: ''.
|
||||||
@ -5376,7 +5376,7 @@ The following fields are available:
|
|||||||
- **requestRequestId** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha request. Each request attempt SHOULD have (with high probability) a unique request id. Default: ''.
|
- **requestRequestId** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha request. Each request attempt SHOULD have (with high probability) a unique request id. Default: ''.
|
||||||
- **requestSessionCorrelationVectorBase** A client generated random MS Correlation Vector base code used to correlate the update session with update and CDN servers. Default: ''.
|
- **requestSessionCorrelationVectorBase** A client generated random MS Correlation Vector base code used to correlate the update session with update and CDN servers. Default: ''.
|
||||||
- **requestSessionId** A randomly-generated (uniformly distributed) GUID. Each single update flow (e.g. update check, update application, event ping sequence) SHOULD have (with high probability) a single unique session ID. Default: ''.
|
- **requestSessionId** A randomly-generated (uniformly distributed) GUID. Each single update flow (e.g. update check, update application, event ping sequence) SHOULD have (with high probability) a single unique session ID. Default: ''.
|
||||||
- **requestTestSource** Either '', 'dev', 'qa', 'prober', 'auto', or 'ossdev'. Any value except '' indicates that the request is a test and should not be counted toward normal metrics. Default: ''.
|
- **requestTestSource** Either '', 'dev', 'qa', 'prober', 'auto', or 'ossdev'. Any value except '' indicates that the request is a test and shouldn't be counted toward normal metrics. Default: ''.
|
||||||
- **requestUid** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha user. Each request attempt SHOULD have (with high probability) a unique request id. Default: ''.
|
- **requestUid** A randomly-generated (uniformly distributed) GUID, corresponding to the Omaha user. Each request attempt SHOULD have (with high probability) a unique request id. Default: ''.
|
||||||
|
|
||||||
|
|
||||||
@ -5805,7 +5805,7 @@ The following fields are available:
|
|||||||
|
|
||||||
- **Action** It indicates phase/stage of operation.
|
- **Action** It indicates phase/stage of operation.
|
||||||
- **Detail** It indicates details about the phase/stage of the operation.
|
- **Detail** It indicates details about the phase/stage of the operation.
|
||||||
- **Rollback** It is blank as this event triggers in success scenario only.
|
- **Rollback** It's blank as this event triggers in success scenario only.
|
||||||
- **Status** It indicates details about the status for getting the disk device object during boot.
|
- **Status** It indicates details about the status for getting the disk device object during boot.
|
||||||
|
|
||||||
|
|
||||||
@ -5817,7 +5817,7 @@ The following fields are available:
|
|||||||
|
|
||||||
- **Action** It indicates phase/stage of operation.
|
- **Action** It indicates phase/stage of operation.
|
||||||
- **Detail** It indicates details about the phase/stage of the operation.
|
- **Detail** It indicates details about the phase/stage of the operation.
|
||||||
- **Rollback** It is blank as this event triggers in success scenario only.
|
- **Rollback** It's blank as this event triggers in success scenario only.
|
||||||
- **Status** It indicates details about the status for getting the disk device object during boot.
|
- **Status** It indicates details about the status for getting the disk device object during boot.
|
||||||
|
|
||||||
|
|
||||||
@ -5829,7 +5829,7 @@ The following fields are available:
|
|||||||
|
|
||||||
- **Action** It indicates phase/stage of operation. As success event fires on exiting the operation, this value must be 'Exiting'.
|
- **Action** It indicates phase/stage of operation. As success event fires on exiting the operation, this value must be 'Exiting'.
|
||||||
- **Duration(ms)** Duration of filter setup instance operation in milliseconds.
|
- **Duration(ms)** Duration of filter setup instance operation in milliseconds.
|
||||||
- **Rollback** It is blank as this event triggers in success scenario only.
|
- **Rollback** It's blank as this event triggers in success scenario only.
|
||||||
|
|
||||||
|
|
||||||
### Microsoft.Windows.Setup.WinSetupBoot.Warning
|
### Microsoft.Windows.Setup.WinSetupBoot.Warning
|
||||||
@ -5911,9 +5911,9 @@ The following fields are available:
|
|||||||
- **BIOSVendor** The vendor of the BIOS.
|
- **BIOSVendor** The vendor of the BIOS.
|
||||||
- **BiosVersion** The version of the BIOS.
|
- **BiosVersion** The version of the BIOS.
|
||||||
- **BranchReadinessLevel** The servicing branch configured on the device.
|
- **BranchReadinessLevel** The servicing branch configured on the device.
|
||||||
- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine does not exist, the value is null.
|
- **CachedEngineVersion** For self-initiated healing, the version of the SIH engine that is cached on the device. If the SIH engine doesn't exist, the value is null.
|
||||||
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
||||||
- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that could not be evaluated.
|
- **CapabilityDetectoidGuid** The GUID for a hardware applicability detectoid that couldn't be evaluated.
|
||||||
- **CDNCountryCode** Two letter country or region abbreviation for the Content Distribution Network (CDN) location.
|
- **CDNCountryCode** Two letter country or region abbreviation for the Content Distribution Network (CDN) location.
|
||||||
- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue.
|
- **CDNId** The unique identifier of a specific device, used to identify how many devices are encountering success or a particular issue.
|
||||||
- **ClientVersion** The version number of the software distribution client.
|
- **ClientVersion** The version number of the software distribution client.
|
||||||
@ -5991,7 +5991,7 @@ This event sends data on whether the Update Service has been called to execute a
|
|||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found.
|
- **BundleId** Identifier associated with the specific content bundle; shouldn't be all zeros if the bundleID was found.
|
||||||
- **BundleRevisionNumber** Identifies the revision number of the content bundle
|
- **BundleRevisionNumber** Identifies the revision number of the content bundle
|
||||||
- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client
|
- **CallerApplicationName** Name provided by the caller who initiated API calls into the software distribution client
|
||||||
- **ClassificationId** Classification identifier of the update content.
|
- **ClassificationId** Classification identifier of the update content.
|
||||||
@ -6027,7 +6027,7 @@ The following fields are available:
|
|||||||
- **BIOSVendor** The vendor of the BIOS.
|
- **BIOSVendor** The vendor of the BIOS.
|
||||||
- **BiosVersion** The version of the BIOS.
|
- **BiosVersion** The version of the BIOS.
|
||||||
- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle.
|
- **BundleBytesDownloaded** Number of bytes downloaded for the specific content bundle.
|
||||||
- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found.
|
- **BundleId** Identifier associated with the specific content bundle; shouldn't be all zeros if the bundleID was found.
|
||||||
- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed.
|
- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed.
|
||||||
- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download.
|
- **BundleRepeatFailFlag** Indicates whether this particular update bundle previously failed to download.
|
||||||
- **BundleRevisionNumber** Identifies the revision number of the content bundle.
|
- **BundleRevisionNumber** Identifies the revision number of the content bundle.
|
||||||
@ -6154,7 +6154,7 @@ This event sends tracking data about the software distribution client installati
|
|||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **BundleId** Identifier associated with the specific content bundle; should not be all zeros if the bundleID was found.
|
- **BundleId** Identifier associated with the specific content bundle; shouldn't be all zeros if the bundleID was found.
|
||||||
- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed.
|
- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed.
|
||||||
- **BundleRevisionNumber** Identifies the revision number of the content bundle.
|
- **BundleRevisionNumber** Identifies the revision number of the content bundle.
|
||||||
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client.
|
||||||
@ -6211,13 +6211,13 @@ This is a revert event for target update on Windows Update Client. See EventScen
|
|||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **BundleId** Identifier associated with the specific content bundle. Should not be all zeros if the BundleId was found.
|
- **BundleId** Identifier associated with the specific content bundle. Shouldn't be all zeros if the BundleId was found.
|
||||||
- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed.
|
- **BundleRepeatFailCount** Indicates whether this particular update bundle has previously failed.
|
||||||
- **BundleRevisionNumber** Identifies the revision number of the content bundle.
|
- **BundleRevisionNumber** Identifies the revision number of the content bundle.
|
||||||
- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request.
|
- **CallerApplicationName** Name of application making the Windows Update request. Used to identify context of request.
|
||||||
- **ClassificationId** Classification identifier of the update content.
|
- **ClassificationId** Classification identifier of the update content.
|
||||||
- **ClientVersion** Version number of the software distribution client.
|
- **ClientVersion** Version number of the software distribution client.
|
||||||
- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0.
|
- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There's no value being reported in this field right now. Expected value for this field is 0.
|
||||||
- **CSIErrorType** Stage of CBS installation that failed.
|
- **CSIErrorType** Stage of CBS installation that failed.
|
||||||
- **DeploymentMutexId** Mutex identifier of the deployment operation.
|
- **DeploymentMutexId** Mutex identifier of the deployment operation.
|
||||||
- **DeploymentProviderHostModule** Name of the module which is hosting the Update Deployment Provider for deployment operation.
|
- **DeploymentProviderHostModule** Name of the module which is hosting the Update Deployment Provider for deployment operation.
|
||||||
@ -6277,13 +6277,13 @@ This is an uninstall event for target update on Windows Update Client. See Event
|
|||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **BundleId** The identifier associated with the specific content bundle. This should not be all zeros if the bundleID was found.
|
- **BundleId** The identifier associated with the specific content bundle. This shouldn't be all zeros if the bundleID was found.
|
||||||
- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed.
|
- **BundleRepeatFailCount** Indicates whether this particular update bundle previously failed.
|
||||||
- **BundleRevisionNumber** Identifies the revision number of the content bundle.
|
- **BundleRevisionNumber** Identifies the revision number of the content bundle.
|
||||||
- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request.
|
- **CallerApplicationName** Name of the application making the Windows Update request. Used to identify context of request.
|
||||||
- **ClassificationId** Classification identifier of the update content.
|
- **ClassificationId** Classification identifier of the update content.
|
||||||
- **ClientVersion** Version number of the software distribution client.
|
- **ClientVersion** Version number of the software distribution client.
|
||||||
- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There is no value being reported in this field right now. Expected value for this field is 0.
|
- **CommonProps** A bitmask for future flags associated with the Windows Update client behavior. There's no value being reported in this field right now. Expected value for this field is 0.
|
||||||
- **DeploymentMutexId** Mutex identifier of the deployment operation.
|
- **DeploymentMutexId** Mutex identifier of the deployment operation.
|
||||||
- **DeploymentProviderHostModule** Name of the module which is hosting the Update Deployment Provider for deployment operation.
|
- **DeploymentProviderHostModule** Name of the module which is hosting the Update Deployment Provider for deployment operation.
|
||||||
- **DeploymentProviderMode** The mode of operation of the Update Deployment Provider.
|
- **DeploymentProviderMode** The mode of operation of the Update Deployment Provider.
|
||||||
@ -6361,7 +6361,7 @@ The following fields are available:
|
|||||||
- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast
|
- **SLSPrograms** A test program to which a device may have opted in. Example: Insider Fast
|
||||||
- **StatusCode** Result code of the event (success, cancellation, failure code HResult).
|
- **StatusCode** Result code of the event (success, cancellation, failure code HResult).
|
||||||
- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token.
|
- **TimestampTokenCertThumbprint** The thumbprint of the encoded timestamp token.
|
||||||
- **TimestampTokenId** The time this was created. It is encoded in a timestamp blob and will be zero if the token is malformed.
|
- **TimestampTokenId** The time this was created. It's encoded in a timestamp blob and will be zero if the token is malformed.
|
||||||
- **UpdateId** The update ID for a specific piece of content.
|
- **UpdateId** The update ID for a specific piece of content.
|
||||||
- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp.
|
- **ValidityWindowInDays** The validity window that's in effect when verifying the timestamp.
|
||||||
|
|
||||||
@ -6627,7 +6627,7 @@ The following fields are available:
|
|||||||
- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this device.
|
- **GlobalEventCounter** Client side counter which indicates ordering of events sent by this device.
|
||||||
- **KBNumber** KBNumber of the update being installed.
|
- **KBNumber** KBNumber of the update being installed.
|
||||||
- **PackageVersion** Current package version of quality update assistant.
|
- **PackageVersion** Current package version of quality update assistant.
|
||||||
- **Reason** Indicates why the device did not pass the readiness check.
|
- **Reason** Indicates why the device didn't pass the readiness check.
|
||||||
- **Result** Device readiness check for quality update assistant.
|
- **Result** Device readiness check for quality update assistant.
|
||||||
|
|
||||||
|
|
||||||
@ -6740,7 +6740,7 @@ This event is raised when a targeted mitigation is rejected by the device based
|
|||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **callerId** It is a GUID to identify the component that is calling into Mitigation Client APIs. It can be: Task Scheduler, Settings App, or GetHelp App.
|
- **callerId** It's a GUID to identify the component that is calling into Mitigation Client APIs. It can be: Task Scheduler, Settings App, or GetHelp App.
|
||||||
- **description** String describing why a mitigation was rejected.
|
- **description** String describing why a mitigation was rejected.
|
||||||
- **mitigationId** GUID identifier for a mitigation.
|
- **mitigationId** GUID identifier for a mitigation.
|
||||||
- **mitigationVersion** Version of the mitigation.
|
- **mitigationVersion** Version of the mitigation.
|
||||||
@ -7213,7 +7213,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsPushNotificationStatus
|
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsPushNotificationStatus
|
||||||
|
|
||||||
This event is received when there is status on a push notification. The data collected with this event is used to help keep Windows secure and up to date.
|
This event is received when there's status on a push notification. The data collected with this event is used to help keep Windows secure and up to date.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -7269,7 +7269,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsServiceStarted
|
### Microsoft.Windows.UpdateHealthTools.UpdateHealthToolsServiceStarted
|
||||||
|
|
||||||
This event is sent when the service first starts. It is a heartbeat indicating that the service is available on the device. The data collected with this event is used to help keep Windows secure and up to date.
|
This event is sent when the service first starts. It's a heartbeat indicating that the service is available on the device. The data collected with this event is used to help keep Windows secure and up to date.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -7545,7 +7545,7 @@ The following fields are available:
|
|||||||
- **FlightId** Unique ID for the flight (test instance version).
|
- **FlightId** Unique ID for the flight (test instance version).
|
||||||
- **IsSuspendable** Indicates whether the update has the ability to be suspended and resumed at the time of reboot. When the machine is rebooted and the update is in middle of Predownload or Install and Setup.exe is running, this field is TRUE, if not its FALSE.
|
- **IsSuspendable** Indicates whether the update has the ability to be suspended and resumed at the time of reboot. When the machine is rebooted and the update is in middle of Predownload or Install and Setup.exe is running, this field is TRUE, if not its FALSE.
|
||||||
- **ObjectId** The unique value for each Update Agent mode.
|
- **ObjectId** The unique value for each Update Agent mode.
|
||||||
- **Reason** Indicates the HResult why the machine could not be suspended. If it's successfully suspended, the result is 0.
|
- **Reason** Indicates the HResult why the machine couldn't be suspended. If it's successfully suspended, the result is 0.
|
||||||
- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan.
|
- **RelatedCV** The correlation vector value generated from the latest USO (Update Service Orchestrator) scan.
|
||||||
- **Result** The HResult of the event.
|
- **Result** The HResult of the event.
|
||||||
- **ScenarioId** The ID of the update scenario.
|
- **ScenarioId** The ID of the update scenario.
|
||||||
@ -7988,8 +7988,8 @@ The following fields are available:
|
|||||||
- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on.
|
- **remediationSummary** Result of each operation performed on a device to fix an invalid state or configuration that's preventing the device from getting updates. For example, if Windows Update service is turned off, the fix is to turn the it back on.
|
||||||
- **usingBackupFeatureAssessment** Relying on backup feature assessment.
|
- **usingBackupFeatureAssessment** Relying on backup feature assessment.
|
||||||
- **usingBackupQualityAssessment** Relying on backup quality assessment.
|
- **usingBackupQualityAssessment** Relying on backup quality assessment.
|
||||||
- **usingCachedFeatureAssessment** WaaS Medic run did not get OS build age from the network on the previous run.
|
- **usingCachedFeatureAssessment** WaaS Medic run didn't get OS build age from the network on the previous run.
|
||||||
- **usingCachedQualityAssessment** WaaS Medic run did not get OS revision age from the network on the previous run.
|
- **usingCachedQualityAssessment** WaaS Medic run didn't get OS revision age from the network on the previous run.
|
||||||
- **versionString** Version of the WaaSMedic engine.
|
- **versionString** Version of the WaaSMedic engine.
|
||||||
- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter.
|
- **waasMedicRunMode** Indicates whether this was a background regular run of the medic or whether it was triggered by a user launching Windows Update Troubleshooter.
|
||||||
|
|
||||||
@ -8214,7 +8214,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate
|
### Microsoft.Windows.StoreAgent.Telemetry.EndFrameworkUpdate
|
||||||
|
|
||||||
This event is sent when an app update requires an updated Framework package and the process starts to download it. It is used to help keep Windows up-to-date and secure.
|
This event is sent when an app update requires an updated Framework package and the process starts to download it. It's used to help keep Windows up-to-date and secure.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -8284,7 +8284,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages
|
### Microsoft.Windows.StoreAgent.Telemetry.EndSearchUpdatePackages
|
||||||
|
|
||||||
This event is sent after searching for update packages to install. It is used to help keep Windows up-to-date and secure.
|
This event is sent after searching for update packages to install. It's used to help keep Windows up-to-date and secure.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -8310,7 +8310,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData
|
### Microsoft.Windows.StoreAgent.Telemetry.EndStageUserData
|
||||||
|
|
||||||
This event is sent after restoring user data (if any) that needs to be restored following a product install. It is used to keep Windows up-to-date and secure.
|
This event is sent after restoring user data (if any) that needs to be restored following a product install. It's used to keep Windows up-to-date and secure.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -8463,7 +8463,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.StoreAgent.Telemetry.StateTransition
|
### Microsoft.Windows.StoreAgent.Telemetry.StateTransition
|
||||||
|
|
||||||
Products in the process of being fulfilled (installed or updated) are maintained in a list. This event is sent any time there is a change in a product's fulfillment status (pending, working, paused, cancelled, or complete), to help keep Windows up to date and secure.
|
Products in the process of being fulfilled (installed or updated) are maintained in a list. This event is sent any time there's a change in a product's fulfillment status (pending, working, paused, cancelled, or complete), to help keep Windows up to date and secure.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -8550,7 +8550,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.UpdateCsp.ExecuteRollBackQualityNotApplicable
|
### Microsoft.Windows.UpdateCsp.ExecuteRollBackQualityNotApplicable
|
||||||
|
|
||||||
This event informs you whether a rollback of Quality updates is applicable to the devices that you are attempting to rollback. The data collected with this event is used to help keep Windows secure and up to date.
|
This event informs you whether a rollback of Quality updates is applicable to the devices that you're attempting to rollback. The data collected with this event is used to help keep Windows secure and up to date.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -8718,7 +8718,7 @@ The following fields are available:
|
|||||||
- **doErrorCode** The Delivery Optimization error code that was returned.
|
- **doErrorCode** The Delivery Optimization error code that was returned.
|
||||||
- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100).
|
- **downloadMode** The download mode used for this file download session (CdnOnly = 0, Lan = 1, Group = 2, Internet = 3, Simple = 99, Bypass = 100).
|
||||||
- **downloadModeReason** Reason for the download.
|
- **downloadModeReason** Reason for the download.
|
||||||
- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, InvalidProviderType = 9).
|
- **downloadModeSrc** Source of the DownloadMode setting (KvsProvider = 0, GeoProvider = 1, GeoVerProvider = 2, CpProvider = 3, DiscoveryProvider = 4, RegistryProvider = 5, GroupPolicyProvider = 6, MdmProvider = 7, SettingsProvider = 8, DefaultProvider = 99).
|
||||||
- **errorCode** The error code that was returned.
|
- **errorCode** The error code that was returned.
|
||||||
- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing.
|
- **experimentId** ID used to correlate client/services calls that are part of the same test during A/B testing.
|
||||||
- **fileID** The ID of the file being downloaded.
|
- **fileID** The ID of the file being downloaded.
|
||||||
@ -8796,7 +8796,7 @@ This event collects information regarding the state of devices and drivers on th
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **activated** Whether the entire device manifest update is considered activated and in use.
|
- **activated** Whether the entire device manifest update is considered activated and in use.
|
||||||
- **analysisErrorCount** The number of driver packages that could not be analyzed because errors occurred during analysis.
|
- **analysisErrorCount** The number of driver packages that couldn't be analyzed because errors occurred during analysis.
|
||||||
- **flightId** Unique ID for each flight.
|
- **flightId** Unique ID for each flight.
|
||||||
- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system.
|
- **missingDriverCount** The number of driver packages delivered by the device manifest that are missing from the system.
|
||||||
- **missingUpdateCount** The number of updates in the device manifest that are missing from the system.
|
- **missingUpdateCount** The number of updates in the device manifest that are missing from the system.
|
||||||
@ -9050,8 +9050,8 @@ This event sends launch data for a Windows Update scan to help keep Windows secu
|
|||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **detectionBlockingPolicy** State of update action.
|
- **detectionBlockingPolicy** State of update action.
|
||||||
- **detectionBlockreason** The reason detection did not complete.
|
- **detectionBlockreason** The reason detection didn't complete.
|
||||||
- **detectionRetryMode** Indicates whether we will try to scan again.
|
- **detectionRetryMode** Indicates whether we'll try to scan again.
|
||||||
- **errorCode** The error code returned for the current process.
|
- **errorCode** The error code returned for the current process.
|
||||||
- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed.
|
- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed.
|
||||||
- **interactive** Indicates whether the session was user initiated.
|
- **interactive** Indicates whether the session was user initiated.
|
||||||
@ -9270,7 +9270,7 @@ The following fields are available:
|
|||||||
|
|
||||||
### Microsoft.Windows.Update.Orchestrator.StickUpdate
|
### Microsoft.Windows.Update.Orchestrator.StickUpdate
|
||||||
|
|
||||||
This event is sent when the update service orchestrator (USO) indicates the update cannot be superseded by a newer update. The data collected with this event is used to help keep Windows secure and up to date.
|
This event is sent when the update service orchestrator (USO) indicates the update can't be superseded by a newer update. The data collected with this event is used to help keep Windows secure and up to date.
|
||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
@ -9683,7 +9683,7 @@ This event is generated whenever the RUXIM Evaluator DLL performs an evaluation.
|
|||||||
|
|
||||||
The following fields are available:
|
The following fields are available:
|
||||||
|
|
||||||
- **HRESULT** Error, if any, that occurred during evaluation. (Note that if errors encountered during individual checks do not affect the overall result of the evaluation, those errors will be reported in NodeEvaluationData, but this HRESULT will still be zero.)
|
- **HRESULT** Error, if any, that occurred during evaluation. (Note that if errors encountered during individual checks don't affect the overall result of the evaluation, those errors will be reported in NodeEvaluationData, but this HRESULT will still be zero.)
|
||||||
- **Id** GUID passed in by the caller to identify the evaluation.
|
- **Id** GUID passed in by the caller to identify the evaluation.
|
||||||
- **NodeEvaluationData** Structure showing the results of individual checks that occurred during the overall evaluation.
|
- **NodeEvaluationData** Structure showing the results of individual checks that occurred during the overall evaluation.
|
||||||
- **Result** Overall result generated by the evaluation.
|
- **Result** Overall result generated by the evaluation.
|
||||||
@ -9714,9 +9714,9 @@ The following fields are available:
|
|||||||
- **MitigationScenario** The update scenario in which the mitigation was executed.
|
- **MitigationScenario** The update scenario in which the mitigation was executed.
|
||||||
- **MountedImageCount** The number of mounted images.
|
- **MountedImageCount** The number of mounted images.
|
||||||
- **MountedImageMatches** The number of mounted image matches.
|
- **MountedImageMatches** The number of mounted image matches.
|
||||||
- **MountedImagesFailed** The number of mounted images that could not be removed.
|
- **MountedImagesFailed** The number of mounted images that couldn't be removed.
|
||||||
- **MountedImagesRemoved** The number of mounted images that were successfully removed.
|
- **MountedImagesRemoved** The number of mounted images that were successfully removed.
|
||||||
- **MountedImagesSkipped** The number of mounted images that were not found.
|
- **MountedImagesSkipped** The number of mounted images that weren't found.
|
||||||
- **RelatedCV** The correlation vector value generated from the latest USO scan.
|
- **RelatedCV** The correlation vector value generated from the latest USO scan.
|
||||||
- **Result** HResult of this operation.
|
- **Result** HResult of this operation.
|
||||||
- **ScenarioId** ID indicating the mitigation scenario.
|
- **ScenarioId** ID indicating the mitigation scenario.
|
||||||
@ -9760,7 +9760,7 @@ The following fields are available:
|
|||||||
- **RelatedCV** Correlation vector value generated from the latest USO scan.
|
- **RelatedCV** Correlation vector value generated from the latest USO scan.
|
||||||
- **ReparsePointsFailed** Number of reparse points that are corrupted but we failed to fix them.
|
- **ReparsePointsFailed** Number of reparse points that are corrupted but we failed to fix them.
|
||||||
- **ReparsePointsFixed** Number of reparse points that were corrupted and were fixed by this mitigation.
|
- **ReparsePointsFixed** Number of reparse points that were corrupted and were fixed by this mitigation.
|
||||||
- **ReparsePointsSkipped** Number of reparse points that are not corrupted and no action is required.
|
- **ReparsePointsSkipped** Number of reparse points that aren't corrupted and no action is required.
|
||||||
- **Result** HResult of this operation.
|
- **Result** HResult of this operation.
|
||||||
- **ScenarioId** ID indicating the mitigation scenario.
|
- **ScenarioId** ID indicating the mitigation scenario.
|
||||||
- **ScenarioSupported** Indicates whether the scenario was supported.
|
- **ScenarioSupported** Indicates whether the scenario was supported.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows and cloud security
|
title: Windows and cloud security
|
||||||
description: Get an overview of cloud security features in Windows
|
description: Get an overview of cloud security features in Windows.
|
||||||
ms.date: 08/02/2023
|
ms.date: 08/02/2023
|
||||||
ms.topic: overview
|
ms.topic: overview
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
@ -9,7 +9,7 @@ ms.author: paoloma
|
|||||||
|
|
||||||
# Windows and cloud security
|
# Windows and cloud security
|
||||||
|
|
||||||
Today's workforce has more freedom and mobility than ever before, and the risk of data exposure is also at its highest. We are focused on getting customers to the cloud to benefit from modern hybrid workstyles while improving security management. Built on zero-trust principles, Windows works with Microsoft cloud services to safeguard sensitive information while controlling access and mitigating threats.
|
Today's workforce has more freedom and mobility than ever before, and the risk of data exposure is also at its highest. We're focused on getting customers to the cloud to benefit from modern hybrid workstyles while improving security management. Built on zero-trust principles, Windows works with Microsoft cloud services to safeguard sensitive information while controlling access and mitigating threats.
|
||||||
|
|
||||||
From identity and device management to Office apps and data storage, Windows and integrated cloud services can help improve productivity, security, and resilience anywhere.
|
From identity and device management to Office apps and data storage, Windows and integrated cloud services can help improve productivity, security, and resilience anywhere.
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Configure Windows Hello for Business
|
title: Configure Windows Hello for Business
|
||||||
description: Learn about the configuration options for Windows Hello for Business and how to implement them in your organization.
|
description: Learn about the configuration options for Windows Hello for Business and how to implement them in your organization.
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 01/03/2024
|
ms.date: 04/23/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure Windows Hello for Business
|
# Configure Windows Hello for Business
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Dynamic lock
|
title: Dynamic lock
|
||||||
description: Learn how to configure dynamic lock on Windows devices via group policies. This feature locks a device when a Bluetooth signal falls below a set value.
|
description: Learn how to configure dynamic lock on Windows devices via group policies. This feature locks a device when a Bluetooth signal falls below a set value.
|
||||||
ms.date: 02/29/2024
|
ms.date: 04/23/2024
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Configure single sign-on (SSO) for Microsoft Entra joined devices
|
title: Configure single sign-on (SSO) for Microsoft Entra joined devices
|
||||||
description: Learn how to configure single sign-on to on-premises resources for Microsoft Entra joined devices, using Windows Hello for Business.
|
description: Learn how to configure single sign-on to on-premises resources for Microsoft Entra joined devices, using Windows Hello for Business.
|
||||||
ms.date: 12/30/2022
|
ms.date: 04/23/2024
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -9,7 +9,7 @@ ms.topic: how-to
|
|||||||
|
|
||||||
[!INCLUDE [apply-to-hybrid-key-and-cert-trust](deploy/includes/apply-to-hybrid-key-and-cert-trust.md)]
|
[!INCLUDE [apply-to-hybrid-key-and-cert-trust](deploy/includes/apply-to-hybrid-key-and-cert-trust.md)]
|
||||||
|
|
||||||
Windows Hello for Business combined with Microsoft Entra joined devices makes it easy for users to securely access cloud-based resources using a strong, two-factor credential. Some resources may remain on-premises as enterprises transition resources to the cloud and Microsoft Entra joined devices may need to access these resources. With additional configurations to the hybrid deployment, you can provide single sign-on to on-premises resources for Microsoft Entra joined devices using Windows Hello for Business, using a key or a certificate.
|
Windows Hello for Business combined with Microsoft Entra joined devices makes it easy for users to securely access cloud-based resources using a strong, two-factor credential. As organizations transition resources to the cloud, some resources might remain on-premises, and Microsoft Entra joined devices might need to access them. With additional configurations to the hybrid deployment, you can provide single sign-on to on-premises resources for Microsoft Entra joined devices using Windows Hello for Business, using a key or a certificate.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> These steps are not needed when using the cloud Kerberos trust model.
|
> These steps are not needed when using the cloud Kerberos trust model.
|
||||||
@ -25,14 +25,14 @@ Unlike Microsoft Entra hybrid joined devices, Microsoft Entra joined devices don
|
|||||||
|
|
||||||
### CRL Distribution Point (CDP)
|
### CRL Distribution Point (CDP)
|
||||||
|
|
||||||
Certificates issued by a certificate authority can be revoked. When a certificate authority revokes as certificate, it writes information about the certificate into a *certificate revocation list* (CRL).\
|
Certificates issued by a certificate authority can be revoked. When a certificate authority revokes a certificate, it writes information about the certificate into a *certificate revocation list* (CRL).\
|
||||||
During certificate validation, Windows compares the current certificate with information in the CRL to determine if the certificate is valid.
|
During certificate validation, Windows compares the current certificate with information in the CRL to determine if the certificate is valid.
|
||||||
|
|
||||||

|
:::image type="content" source="images/aadj/Certificate-CDP.png" alt-text="Screenshot of a certificate's CDP property.":::
|
||||||
|
|
||||||
The preceding domain controller certificate shows a *CRL distribution point* (CDP) in Active Directory. The value in the URL begins with *ldap*. Using Active Directory for domain joined devices provides a highly available CRL distribution point. However, Microsoft Entra joined devices can't read data from Active Directory, and certificate validation doesn't provide an opportunity to authenticate prior to reading the CRL. The authentication becomes a circular problem: the user is attempting to authenticate, but must read Active Directory to complete the authentication, but the user can't read Active Directory because they haven't authenticated.
|
In the screenshot, the CDP property of the domain controller certificate shows an LDAP path. Using Active Directory for domain joined devices provides a highly available CRL distribution point. However, Microsoft Entra joined devices can't read data from Active Directory, and certificate validation doesn't provide an opportunity to authenticate prior to reading the CRL. The authentication becomes a circular problem: the user is attempting to authenticate, but must read Active Directory to complete the authentication, but the user can't read Active Directory because they haven't authenticated.
|
||||||
|
|
||||||
To resolve this issue, the CRL distribution point must be a location accessible by Microsoft Entra joined devices that doesn't require authentication. The easiest solution is to publish the CRL distribution point on a web server that uses HTTP (not HTTPS).
|
To resolve this issue, the CRL distribution point must be a location accessible by Microsoft Entra joined devices that don't require authentication. The easiest solution is to publish the CRL distribution point on a web server that uses HTTP (not HTTPS).
|
||||||
|
|
||||||
If your CRL distribution point doesn't list an HTTP distribution point, then you need to reconfigure the issuing certificate authority to include an HTTP CRL distribution point, preferably first, in the list of distribution points.
|
If your CRL distribution point doesn't list an HTTP distribution point, then you need to reconfigure the issuing certificate authority to include an HTTP CRL distribution point, preferably first, in the list of distribution points.
|
||||||
|
|
||||||
@ -45,17 +45,18 @@ Certificate authorities write CDP information in certificates as they're issued.
|
|||||||
|
|
||||||
#### Why does Windows need to validate the domain controller certificate?
|
#### Why does Windows need to validate the domain controller certificate?
|
||||||
|
|
||||||
Windows Hello for Business enforces the strict KDC validation security feature when authenticating from a Microsoft Entra joined device to a domain. This enforcement imposes more restrictive criteria that must be met by the Key Distribution Center (KDC). When authenticating using Windows Hello for Business on a Microsoft Entra joined device, the Windows client validates the reply from the domain controller by ensuring all of the following are met:
|
Windows Hello for Business enforces the *strict KDC validation* security feature when authenticating from a Microsoft Entra joined device to a domain. This enforcement imposes more restrictive criteria that must be met by the Key Distribution Center (KDC). When authenticating using Windows Hello for Business on a Microsoft Entra joined device, the Windows client validates the reply from the domain controller by ensuring all of the following are met:
|
||||||
|
|
||||||
- The domain controller has the private key for the certificate provided
|
- The domain controller has the private key for the certificate provided
|
||||||
- The root CA that issued the domain controller's certificate is in the device's *Trusted Root Certificate Authorities*
|
- The root CA that issued the domain controller's certificate is in the device's *Trusted Root Certificate Authorities*
|
||||||
- Use the *Kerberos Authentication certificate template* instead of any other older template
|
- Use the *Kerberos Authentication certificate template* instead of any other older template
|
||||||
- The domain controller's certificate has the *KDC Authentication* extended key usage (EKU)
|
- The domain controller's certificate has the *KDC Authentication* extended key usage (EKU)
|
||||||
- The domain controller's certificate's subject alternate name has a DNS Name that matches the name of the domain
|
- The domain controller's certificate's subject alternate name has a DNS Name that matches the name of the domain
|
||||||
- The domain controller's certificate's signature hash algorithm is **sha256**
|
- The domain controller's certificate's signature hash algorithm is *sha256*
|
||||||
- The domain controller's certificate's public key is **RSA (2048 Bits)**
|
- The domain controller's certificate's public key is *RSA (2048 Bits)*
|
||||||
|
|
||||||
Authenticating from a Microsoft Entra hybrid joined device to a domain using Windows Hello for Business doesn't enforce that the domain controller certificate includes the *KDC Authentication* EKU. If you're adding Microsoft Entra joined devices to an existing domain environment, make sure to verify that your domain controller certificate has been updated to include the *KDC Authentication* EKU.
|
> [!IMPORTANT]
|
||||||
|
> Authenticating from a Microsoft Entra hybrid joined device to a domain using Windows Hello for Business doesn't enforce that the domain controller certificate includes the *KDC Authentication* EKU. If you're adding Microsoft Entra joined devices to an existing domain environment, make sure to verify that your domain controller certificate has been updated to include the *KDC Authentication* EKU.
|
||||||
|
|
||||||
## Configure a CRL distribution point for an issuing CA
|
## Configure a CRL distribution point for an issuing CA
|
||||||
|
|
||||||
@ -118,7 +119,7 @@ These procedures configure NTFS and share permissions on the web server to allow
|
|||||||
1. In the **Advanced Sharing** dialog box, select **OK**
|
1. In the **Advanced Sharing** dialog box, select **OK**
|
||||||
|
|
||||||
> [!Tip]
|
> [!Tip]
|
||||||
> Make sure that users can access **\\\Server FQDN\sharename**.
|
> Make sure that users can access `\\Server FQDN\sharename`.
|
||||||
|
|
||||||
### Disable Caching
|
### Disable Caching
|
||||||
1. On the web server, open **Windows Explorer** and navigate to the **cdp** folder you created in step 3 of [Configure the Web Server](#configure-the-web-server)
|
1. On the web server, open **Windows Explorer** and navigate to the **cdp** folder you created in step 3 of [Configure the Web Server](#configure-the-web-server)
|
||||||
@ -216,6 +217,7 @@ With the CA properly configured with a valid HTTP-based CRL distribution point,
|
|||||||
1. In the navigation pane, expand **Personal**. Select **Certificates**. In the details pane, double-click the existing domain controller certificate includes **KDC Authentication** in the list of **Intended Purposes**
|
1. In the navigation pane, expand **Personal**. Select **Certificates**. In the details pane, double-click the existing domain controller certificate includes **KDC Authentication** in the list of **Intended Purposes**
|
||||||
1. Select the **Details** tab. Scroll down the list until **CRL Distribution Points** is visible in the **Field** column of the list. Select **CRL Distribution Point**
|
1. Select the **Details** tab. Scroll down the list until **CRL Distribution Points** is visible in the **Field** column of the list. Select **CRL Distribution Point**
|
||||||
1. Review the information below the list of fields to confirm the new URL for the CRL distribution point is present in the certificate. Select **OK**
|
1. Review the information below the list of fields to confirm the new URL for the CRL distribution point is present in the certificate. Select **OK**
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Deploy the root CA certificate to Microsoft Entra joined devices
|
## Deploy the root CA certificate to Microsoft Entra joined devices
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How Windows Hello for Business authentication works
|
title: How Windows Hello for Business authentication works
|
||||||
description: Learn about the Windows Hello for Business authentication flows.
|
description: Learn about the Windows Hello for Business authentication flows.
|
||||||
ms.date: 01/03/2024
|
ms.date: 04/23/2024
|
||||||
ms.topic: reference
|
ms.topic: reference
|
||||||
---
|
---
|
||||||
# Windows Hello for Business authentication
|
# Windows Hello for Business authentication
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How Windows Hello for Business provisioning works
|
title: How Windows Hello for Business provisioning works
|
||||||
description: Learn about the provisioning flows for Windows Hello for Business.
|
description: Learn about the provisioning flows for Windows Hello for Business.
|
||||||
ms.date: 01/03/2024
|
ms.date: 04/23/2024
|
||||||
ms.topic: reference
|
ms.topic: reference
|
||||||
appliesto:
|
appliesto:
|
||||||
---
|
---
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How Windows Hello for Business works
|
title: How Windows Hello for Business works
|
||||||
description: Learn how Windows Hello for Business works, and how it can help you protect your organization.
|
description: Learn how Windows Hello for Business works, and how it can help you protect your organization.
|
||||||
ms.date: 01/09/2024
|
ms.date: 04/23/2024
|
||||||
ms.topic: concept-article
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -78,7 +78,7 @@ All devices included in the Windows Hello for Business deployment must go throug
|
|||||||
- For cloud and hybrid deployments, the identity provider is Microsoft Entra ID, and the device registers with the *Device Registration Service*
|
- For cloud and hybrid deployments, the identity provider is Microsoft Entra ID, and the device registers with the *Device Registration Service*
|
||||||
- For on-premises deployments, the identity provider is Active Directory Federation Services (AD FS), and the device registers with the *Enterprise Device Registration Service* hosted on AD FS
|
- For on-premises deployments, the identity provider is Active Directory Federation Services (AD FS), and the device registers with the *Enterprise Device Registration Service* hosted on AD FS
|
||||||
|
|
||||||
When a device is registered, the IdP provides the device with an identity that is used to authenticate the device when a user signs-in.
|
When a device is registered, the IdP provides the device with an identity that is used to authenticate the device when a user signs in.
|
||||||
|
|
||||||
There are different registration types, which are identified as *join type*. For more information, see [What is a device identity][ENTRA-1].
|
There are different registration types, which are identified as *join type*. For more information, see [What is a device identity][ENTRA-1].
|
||||||
|
|
||||||
@ -156,8 +156,8 @@ Access to the key material stored in the container, is enabled only by the PIN o
|
|||||||
A container can contain several types of key material:
|
A container can contain several types of key material:
|
||||||
|
|
||||||
- An *authentication key*, which is always an asymmetric public-private key pair. This key pair is generated during registration. It must be unlocked each time it's accessed, by using either the user's PIN or a biometric gesture. The authentication key exists until the user resets the PIN, at which time a new key is generated. When the new key is generated, all the key material that the old key previously protected must be decrypted and re-encrypted using the new key
|
- An *authentication key*, which is always an asymmetric public-private key pair. This key pair is generated during registration. It must be unlocked each time it's accessed, by using either the user's PIN or a biometric gesture. The authentication key exists until the user resets the PIN, at which time a new key is generated. When the new key is generated, all the key material that the old key previously protected must be decrypted and re-encrypted using the new key
|
||||||
- One or multiple *user ID keys*. These keys can be either symmetric or asymmetric, depending on which IdP you use. For certificate-based Windows Hello for Work, when the container is unlocked, applications that require access to the user ID key or key pair can request access. User ID keys are used to sign or encrypt authentication requests or tokens sent from this device to the IdP. User ID keys are typically long-lived but could have a shorter lifetime than the authentication key. Microsoft accounts, Active Directory accounts, and Microsoft Entra accounts all require the use of asymmetric key pairs. The device generates public and private keys, registers the public key with the IdP (which stores it for later verification), and securely stores the private key. For organizatrons, the user ID keys can be generated in two ways:
|
- One or multiple *user ID keys*. These keys can be either symmetric or asymmetric, depending on which IdP you use. For certificate-based Windows Hello for Work, when the container is unlocked, applications that require access to the user ID key or key pair can request access. User ID keys are used to sign or encrypt authentication requests or tokens sent from this device to the IdP. User ID keys are typically long-lived but could have a shorter lifetime than the authentication key. Microsoft accounts, Active Directory accounts, and Microsoft Entra accounts all require the use of asymmetric key pairs. The device generates public and private keys, registers the public key with the IdP (which stores it for later verification), and securely stores the private key. For organizations, the user ID keys can be generated in two ways:
|
||||||
- The user ID key pair can be associated with an organization's Certificate Authority (CA). This option lets organizations that have an existing PKI continue to use it where appropriate. Given that many applications, such as VPN solutions, require the use of certificates, when you deploy Windows Hello in this mode, it allows a faster transition away from user passwords while still preserving certificate-based functionality. This option also allows the organization to store other certificates in the protected container. For example, certificates that allows the user to authenticate via RDP
|
- The user ID key pair can be associated with an organization's Certificate Authority (CA). This option lets organizations that have an existing PKI continue to use it where appropriate. Given that many applications, such as VPN solutions, require the use of certificates, when you deploy Windows Hello in this mode, it allows a faster transition away from user passwords while still preserving certificate-based functionality. This option also allows the organization to store other certificates in the protected container. For example, certificates that allow the user to authenticate via RDP
|
||||||
- The IdP can generate the user ID key pair directly, which allows quick, lower-overhead deployment of Windows Hello in environments that don't have or need a PKI
|
- The IdP can generate the user ID key pair directly, which allows quick, lower-overhead deployment of Windows Hello in environments that don't have or need a PKI
|
||||||
|
|
||||||
User ID keys are used to authenticate the user to a service. For example, by signing a nonce to prove possession of the private key, which corresponds to a registered public key. Users with an Active Directory, Microsoft Entra ID or Microsoft account have a key associated with their account. The key can be used to sign into their Windows device by authenticating to a domain controller (Active Directory scenario), or to the cloud (Microsoft Entra ID and MSA scenarios).
|
User ID keys are used to authenticate the user to a service. For example, by signing a nonce to prove possession of the private key, which corresponds to a registered public key. Users with an Active Directory, Microsoft Entra ID or Microsoft account have a key associated with their account. The key can be used to sign into their Windows device by authenticating to a domain controller (Active Directory scenario), or to the cloud (Microsoft Entra ID and MSA scenarios).
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows Hello for Business overview
|
title: Windows Hello for Business overview
|
||||||
description: Learn how Windows Hello for Business replaces passwords with strong two-factor authentication on Windows devices.
|
description: Learn how Windows Hello for Business replaces passwords with strong two-factor authentication on Windows devices.
|
||||||
ms.topic: overview
|
ms.topic: overview
|
||||||
ms.date: 01/03/2024
|
ms.date: 04/23/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Hello for Business
|
# Windows Hello for Business
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Multi-factor unlock
|
title: Multi-factor unlock
|
||||||
description: Learn how to configure Windows Hello for Business multi-factor unlock by extending Windows Hello with trusted signals.
|
description: Learn how to configure Windows Hello for Business multi-factor unlock by extending Windows Hello with trusted signals.
|
||||||
ms.date: 01/03/2024
|
ms.date: 04/23/2024
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: PIN reset
|
title: PIN reset
|
||||||
description: Learn how Microsoft PIN reset service enables your users to recover a forgotten Windows Hello for Business PIN, and how to configure it.
|
description: Learn how Microsoft PIN reset service enables your users to recover a forgotten Windows Hello for Business PIN, and how to configure it.
|
||||||
ms.date: 01/03/2024
|
ms.date: 04/23/2024
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows Hello for Business policy settings
|
title: Windows Hello for Business policy settings
|
||||||
description: Learn about the policy settings to configure Configure Windows Hello for Business.
|
description: Learn about the policy settings to configure Configure Windows Hello for Business.
|
||||||
ms.topic: reference
|
ms.topic: reference
|
||||||
ms.date: 01/03/2024
|
ms.date: 04/23/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Hello for Business policy settings
|
# Windows Hello for Business policy settings
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Remote Desktop sign-in with Windows Hello for Business
|
title: Remote Desktop sign-in with Windows Hello for Business
|
||||||
description: Learn how to configure Remote Desktop (RDP) sign-in with Windows Hello for Business.
|
description: Learn how to configure Remote Desktop (RDP) sign-in with Windows Hello for Business.
|
||||||
ms.date: 12/11/2023
|
ms.date: 04/23/2024
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: WebAuthn APIs
|
title: WebAuthn APIs
|
||||||
description: Learn how to use WebAuthn APIs to enable passwordless authentication for your sites and apps.
|
description: Learn how to use WebAuthn APIs to enable passwordless authentication for your sites and apps.
|
||||||
ms.date: 07/27/2023
|
ms.date: 04/23/2024
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
# WebAuthn APIs for passwordless authentication on Windows
|
# WebAuthn APIs for passwordless authentication on Windows
|
||||||
|
@ -1,9 +1,10 @@
|
|||||||
---
|
---
|
||||||
author: vinaypamnani-msft
|
author: vinaypamnani-msft
|
||||||
ms.author: vinpa
|
ms.author: vinpa
|
||||||
ms.date: 12/13/2023
|
ms.date: 04/23/2024
|
||||||
ms.topic: include
|
ms.topic: include
|
||||||
---
|
---
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Microsoft Defender Application Guard, including the [Windows Isolated App Launcher APIs](/windows/win32/api/isolatedapplauncher/), will be deprecated for Microsoft Edge for Business and [will no longer be updated](/windows/whats-new/feature-lifecycle). Please download the [Microsoft Edge For Business Security Whitepaper](https://edgestatic.azureedge.net/shared/cms/pdfs/Microsoft_Edge_Security_Whitepaper_v2.pdf) to learn more about Edge for Business security capabilities.
|
> - Microsoft Defender Application Guard, including the [Windows Isolated App Launcher APIs](/windows/win32/api/isolatedapplauncher/), will be deprecated for Microsoft Edge for Business and [will no longer be updated](/windows/whats-new/feature-lifecycle). Please download the [Microsoft Edge For Business Security Whitepaper](https://edgestatic.azureedge.net/shared/cms/pdfs/Microsoft_Edge_Security_Whitepaper_v2.pdf) to learn more about Edge for Business security capabilities.
|
||||||
|
> - Because Application Guard is deprecated there will not be a migration to Edge Manifest V3. The corresponding extensions and associated [Windows Store app](https://apps.microsoft.com/detail/9N8GNLC8Z9C8) will not be available after May 2024. This affects the following browsers: [*Application Guard Extension - Chrome*](https://chromewebstore.google.com/detail/application-guard-extensi/mfjnknhkkiafjajicegabkbimfhplplj) and [*Application Guard Extension - Firefox*](https://addons.mozilla.org/firefox/addon/application-guard-extension/). If you want to block unprotected browsers until you are ready to retire MDAG usage in your enterprise, we recommend using AppLocker policies or [Microsoft Edge management service](/deployedge/microsoft-edge-management-service). For more information, see [Microsoft Edge and Microsoft Defender Application Guard](/deployedge/microsoft-edge-security-windows-defender-application-guard).<!--8932292-->
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deprecated features in the Windows client
|
title: Deprecated features in the Windows client
|
||||||
description: Review the list of features that Microsoft is no longer actively developing in Windows 10 and Windows 11.
|
description: Review the list of features that Microsoft is no longer actively developing in Windows 10 and Windows 11.
|
||||||
ms.date: 03/25/2024
|
ms.date: 04/23/2024
|
||||||
ms.service: windows-client
|
ms.service: windows-client
|
||||||
ms.subservice: itpro-fundamentals
|
ms.subservice: itpro-fundamentals
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
@ -51,7 +51,7 @@ The features in this article are no longer being actively developed, and might b
|
|||||||
| TLS server authentication certificates using RSA keys with key lengths shorter than 2048 bits <!--8644149-->| Support for certificates using RSA keys with key lengths shorter than 2048 bits will be deprecated. Internet standards and regulatory bodies disallowed the use of 1024-bit keys in 2013, recommending specifically that RSA keys should have a key length of 2048 bits or longer. For more information, see [Transitioning of Cryptographic Algorithms and Key Sizes - Discussion Paper (nist.gov)](https://csrc.nist.gov/CSRC/media/Projects/Key-Management/documents/transitions/Transitioning_CryptoAlgos_070209.pdf). This deprecation focuses on ensuring that all RSA certificates used for TLS server authentication must have key lengths greater than or equal to 2048 bits to be considered valid by Windows. </br></br> TLS certificates issued by enterprise or test certification authorities (CA) aren't impacted with this change. However, we recommend that they be updated to RSA keys greater than or equal to 2048 bits as a security best practice. This change is necessary to preserve security of Windows customers using certificates for authentication and cryptographic purposes.| March 2024|
|
| TLS server authentication certificates using RSA keys with key lengths shorter than 2048 bits <!--8644149-->| Support for certificates using RSA keys with key lengths shorter than 2048 bits will be deprecated. Internet standards and regulatory bodies disallowed the use of 1024-bit keys in 2013, recommending specifically that RSA keys should have a key length of 2048 bits or longer. For more information, see [Transitioning of Cryptographic Algorithms and Key Sizes - Discussion Paper (nist.gov)](https://csrc.nist.gov/CSRC/media/Projects/Key-Management/documents/transitions/Transitioning_CryptoAlgos_070209.pdf). This deprecation focuses on ensuring that all RSA certificates used for TLS server authentication must have key lengths greater than or equal to 2048 bits to be considered valid by Windows. </br></br> TLS certificates issued by enterprise or test certification authorities (CA) aren't impacted with this change. However, we recommend that they be updated to RSA keys greater than or equal to 2048 bits as a security best practice. This change is necessary to preserve security of Windows customers using certificates for authentication and cryptographic purposes.| March 2024|
|
||||||
| Test Base <!--8790681--> | [Test Base for Microsoft 365](/microsoft-365/test-base/overview), an Azure cloud service for application testing, is deprecated. The service will be retired in the future and will be no longer available for use after retirement. | March 2024 |
|
| Test Base <!--8790681--> | [Test Base for Microsoft 365](/microsoft-365/test-base/overview), an Azure cloud service for application testing, is deprecated. The service will be retired in the future and will be no longer available for use after retirement. | March 2024 |
|
||||||
| Windows Mixed Reality <!--8412877--> | [Windows Mixed Reality](/windows/mixed-reality/enthusiast-guide/before-you-start) is deprecated and will be removed in Windows 11, version 24H2. This deprecation includes the [Mixed Reality Portal](/windows/mixed-reality/enthusiast-guide/install-windows-mixed-reality) app, [Windows Mixed Reality for SteamVR](/windows/mixed-reality/enthusiast-guide/using-steamvr-with-windows-mixed-reality), and Steam VR Beta. Existing Windows Mixed Reality devices will continue to work with Steam through November 2026, if users remain on their current released version of Windows 11, version 23H2. After November 2026, Windows Mixed Reality will no longer receive security updates, nonsecurity updates, bug fixes, technical support, or online technical content updates.</br> </br>This deprecation doesn't affect HoloLens. We remain committed to HoloLens and our enterprise customers. | December 2023 |
|
| Windows Mixed Reality <!--8412877--> | [Windows Mixed Reality](/windows/mixed-reality/enthusiast-guide/before-you-start) is deprecated and will be removed in Windows 11, version 24H2. This deprecation includes the [Mixed Reality Portal](/windows/mixed-reality/enthusiast-guide/install-windows-mixed-reality) app, [Windows Mixed Reality for SteamVR](/windows/mixed-reality/enthusiast-guide/using-steamvr-with-windows-mixed-reality), and Steam VR Beta. Existing Windows Mixed Reality devices will continue to work with Steam through November 2026, if users remain on their current released version of Windows 11, version 23H2. After November 2026, Windows Mixed Reality will no longer receive security updates, nonsecurity updates, bug fixes, technical support, or online technical content updates.</br> </br>This deprecation doesn't affect HoloLens. We remain committed to HoloLens and our enterprise customers. | December 2023 |
|
||||||
| Microsoft Defender Application Guard for Edge <!--8591267-->| [Microsoft Defender Application Guard](/windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview), including the [Windows Isolated App Launcher APIs](/windows/win32/api/isolatedapplauncher/), is being deprecated for Microsoft Edge for Business and [will no longer be updated](feature-lifecycle.md). Please download the [Microsoft Edge For Business Security Whitepaper](https://edgestatic.azureedge.net/shared/cms/pdfs/Microsoft_Edge_Security_Whitepaper_v2.pdf) to learn more about Edge for Business security capabilities. | December 2023 |
|
| Microsoft Defender Application Guard for Edge <!--8591267-->| [Microsoft Defender Application Guard](/windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview), including the [Windows Isolated App Launcher APIs](/windows/win32/api/isolatedapplauncher/), is being deprecated for Microsoft Edge for Business and [will no longer be updated](feature-lifecycle.md). Please download the [Microsoft Edge For Business Security Whitepaper](https://edgestatic.azureedge.net/shared/cms/pdfs/Microsoft_Edge_Security_Whitepaper_v2.pdf) to learn more about Edge for Business security capabilities. </br></br> **[Update - April 2024]**: Because Application Guard is deprecated there will not be a migration to Edge Manifest V3. The corresponding extensions and associated [Windows Store app](https://apps.microsoft.com/detail/9N8GNLC8Z9C8) will not be available after May 2024. This affects the following browsers: [*Application Guard Extension - Chrome*](https://chromewebstore.google.com/detail/application-guard-extensi/mfjnknhkkiafjajicegabkbimfhplplj) and [*Application Guard Extension - Firefox*](https://addons.mozilla.org/firefox/addon/application-guard-extension/). If you want to block unprotected browsers until you are ready to retire MDAG usage in your enterprise, we recommend using AppLocker policies or [Microsoft Edge management service](/deployedge/microsoft-edge-management-service). For more information, see [Microsoft Edge and Microsoft Defender Application Guard](/deployedge/microsoft-edge-security-windows-defender-application-guard). <!--8932292-->| December 2023 |
|
||||||
| Legacy console mode <!-- 8577271 -->| The [legacy console mode](/windows/console/legacymode) is deprecated and no longer being updated. In future Windows releases, it will be available as an optional [Feature on Demand](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). This feature won't be installed by default. | December 2023 |
|
| Legacy console mode <!-- 8577271 -->| The [legacy console mode](/windows/console/legacymode) is deprecated and no longer being updated. In future Windows releases, it will be available as an optional [Feature on Demand](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). This feature won't be installed by default. | December 2023 |
|
||||||
| Windows speech recognition <!--8396142-->| [Windows speech recognition](https://support.microsoft.com/windows/83ff75bd-63eb-0b6c-18d4-6fae94050571) is deprecated and is no longer being developed. This feature is being replaced with [voice access](https://support.microsoft.com/topic/4dcd23ee-f1b9-4fd1-bacc-862ab611f55d). Voice access is available for Windows 11, version 22H2, or later devices. Currently, voice access supports five English locales: English - US, English - UK, English - India, English - New Zealand, English - Canada, and English - Australia. For more information, see [Setup voice access](https://support.microsoft.com/topic/set-up-voice-access-9fc44e29-12bf-4d86-bc4e-e9bb69df9a0e). | December 2023 |
|
| Windows speech recognition <!--8396142-->| [Windows speech recognition](https://support.microsoft.com/windows/83ff75bd-63eb-0b6c-18d4-6fae94050571) is deprecated and is no longer being developed. This feature is being replaced with [voice access](https://support.microsoft.com/topic/4dcd23ee-f1b9-4fd1-bacc-862ab611f55d). Voice access is available for Windows 11, version 22H2, or later devices. Currently, voice access supports five English locales: English - US, English - UK, English - India, English - New Zealand, English - Canada, and English - Australia. For more information, see [Setup voice access](https://support.microsoft.com/topic/set-up-voice-access-9fc44e29-12bf-4d86-bc4e-e9bb69df9a0e). | December 2023 |
|
||||||
| Microsoft Defender Application Guard for Office <!--8396036-->| [Microsoft Defender Application Guard for Office](/microsoft-365/security/office-365-security/app-guard-for-office-install), including the [Windows Isolated App Launcher APIs](/windows/win32/api/isolatedapplauncher/), is being deprecated and will no longer be updated. We recommend transitioning to Microsoft Defender for Endpoint [attack surface reduction rules](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction) along with [Protected View](/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365#global-settings-for-safe-attachments) and [Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/wdac). | November 2023 |
|
| Microsoft Defender Application Guard for Office <!--8396036-->| [Microsoft Defender Application Guard for Office](/microsoft-365/security/office-365-security/app-guard-for-office-install), including the [Windows Isolated App Launcher APIs](/windows/win32/api/isolatedapplauncher/), is being deprecated and will no longer be updated. We recommend transitioning to Microsoft Defender for Endpoint [attack surface reduction rules](/microsoft-365/security/defender-endpoint/overview-attack-surface-reduction) along with [Protected View](/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365#global-settings-for-safe-attachments) and [Windows Defender Application Control](/windows/security/application-security/application-control/windows-defender-application-control/wdac). | November 2023 |
|
||||||
|