diff --git a/windows/deployment/update/device-health-get-started.md b/windows/deployment/update/device-health-get-started.md new file mode 100644 index 0000000000..3cc4c005f8 --- /dev/null +++ b/windows/deployment/update/device-health-get-started.md @@ -0,0 +1,119 @@ +--- +title: Get started with Device Health (Windows 10) +description: Configure Device Health in OMS to see statistics on frequency and causes of crashes of devices in your network. +keywords: Device Health, oms, operations management suite, prerequisites, requirements, monitoring, crash, drivers +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: deploy +author: jaimeo +--- + +# Get started with Device Health + +This topic explains the steps necessary to configure your environment for Windows Analytics: Device Health. + +Steps are provided in sections that follow the recommended setup process: +1. Ensure that [prerequisites](#device-health-prerequisites) are met. +2. [Add Device Health](#add-device-health-to-microsoft-operations-management-suite) to Microsoft Operations Management Suite. +3. [Deploy your Commercial ID](#deploy-your-commercial-id-to-your-windows-10-devices) to your organization’s devices. + +## Device Health prerequisites + +Device Health has the following requirements: +1. Device Health is currently only compatible with Windows 10 devices. The solution is intended to be used with desktop devices (Windows 10 workstations and laptops). +2. The solution requires that **enhanced** Windows 10 telemetry is enabled on all devices that are intended to be displayed in the solution. These devices must have at least the [enhanced level of telemetry](https://technet.microsoft.com/itpro/windows/manage/configure-windows-telemetry-in-your-organization#basic-level) enabled. To learn more about Windows telemetry, see [Configure Windows telemetry in your organization](/windows/configuration/configure-windows-telemetry-in-your-organization). +3. The telemetry of your organization’s Windows devices must be successfully transmitted to Microsoft. Microsoft has specified [endpoints for each of the telemetry services](https://technet.microsoft.com/itpro/windows/manage/configure-windows-telemetry-in-your-organization#endpoints), which must be whitelisted by your organization so the data can be transmitted. The following table is taken from the article on telemetry endpoints and summarizes the use of each endpoint: + +Service | Endpoint +--- | --- +Connected User Experience and Telemetry component | v10.vortex-win.data.microsoft.com
settings-win.data.microsoft.com +Windows Error Reporting | watson.telemetry.microsoft.com +Online Crash Analysis | oca.telemetry.microsoft.com + +[!Note] +> If your deployment includes devices running Windows 10 versions prior to RS2, you must bypass authentication for the endpoints in Step 3. Windows Error Reporting did not support authenticating proxies until Windows 10 RS2. + + +## Add Device Health to Microsoft Operations Management Suite + +Device Health is offered as a solution in the Microsoft Operations Management Suite (OMS), a collection of cloud-based servicing for monitoring and automating your on-premise and cloud environments. For more information about OMS, see [Operations Management Suite overview](https://azure.microsoft.com/en-us/documentation/articles/operations-management-suite-overview/). + +If you are already using OMS, you’ll find Device Health in the Solutions Gallery. Select the **Device Health** tile in the gallery and then click **Add** on the solution's details page. Device Health is now visible in your workspace. + +If you are not yet using OMS, use the following steps to subscribe to OMS Device Health: + +1. Go to [Operations Management Suite](https://www.microsoft.com/en-us/cloud-platform/operations-management-suite) on Microsoft.com and click **Sign in**. + + + [![](images/uc-02a.png)](images/uc-02.png) + + +2. Sign in to Operations Management Suite (OMS). You can use either a Microsoft Account or a Work or School account to create a workspace. If your company is already using Azure Active Directory (Azure AD), use a Work or School account when you sign in to OMS. Using a Work or School account allows you to use identities from your Azure AD to manage permissions in OMS. + + + [![](images/uc-03a.png)](images/uc-03.png) + + +3. Create a new OMS workspace. + + + [![](images/uc-04a.png)](images/uc-04.png) + +4. Enter a name for the workspace, select the workspace region, and provide the email address that you want associated with this workspace. Click **Create**. + + + [![](images/uc-05a.png)](images/uc-05.png) + + +5. If your organization already has an Azure subscription, you can link it to your workspace. Note that you may need to request access from your organization’s Azure administrator. If your organization does not have an Azure subscription, create a new one or select the default OMS Azure subscription from the list. If you do not yet have an Azure subscription, follow [this guide](https://blogs.technet.microsoft.com/upgradeanalytics/2016/11/08/linking-operations-management-suite-workspaces-to-microsoft-azure/) to create and link an Azure subscription to an OMS workspace. + + + [![](images/uc-06a.png)](images/uc-06.png) + + + + +6. To add Device Health to your workspace, go to the Solution Gallery, Select the **Device Health** tile and then select **Add** on the solution's detail page + + [NEED FRESH DEVICE HEALTH SHOT WITH BOX CHECKED] + [![](images/uc-08a.png)](images/uc-08.png) + + +7. Click the **Device Health** tile to configure the solution. The **Settings Dashboard** opens. + + + [![](images/uc-09a.png)](images/uc-09.png) + + +8. Click **Subscribe** to subscribe to OMS Device Health. You will then need to distribute your Commercial ID across all your organization’s devices. More information on the Commercial ID is provided below. + + + [![](images/uc-10a.png)](images/uc-10.png) + + +After you are subscribed to OMS Device Health and your devices have a Commercial ID, you will begin receiving data. It will typically take 24-48 hours for the first data to begin appearing. The following section explains how to deploy your Commercial ID to your Windows 10 devices. + +>[!NOTE] +>You can unsubscribe from the Device Health solution if you no longer want to monitor your organization’s devices. User device data will continue to be shared with Microsoft while the opt-in keys are set on user devices and the proxy allows traffic. + +## Deploy your Commercial ID to your Windows 10 devices and set the telemetry level + +In order for your devices to show up in Windows Analytics: Device Health, they must be configured with your organization’s Commercial ID. This is so that Microsoft knows that a given device is a member of your organization and to feed that device’s data back to you. There are two primary methods for widespread deployment of your Commercial ID: Group Policy and Mobile Device Management (MDM). + +- Using Group Policy

+ Deploying your Commercial ID using Group Policy can be accomplished by configuring domain Group Policy Objects with the Group Policy Management Editor, or by configuring local Group Policy using the Local Group Policy Editor. + 1. In the console tree, navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds** + 2. Double-click **Configure the Commercial ID** + 3. In the **Options** box, under **Commercial Id**, type the Commercial ID GUID, and then click **OK**.

+ +- Using Microsoft Mobile Device Management (MDM)

+[FROM MARC: Also add MDM equivalent links for all three settings in this policy (telemetry level, commercial ID, and Windows Analytics filter)] +[in RS3 there will be an additional policy to filter enhanced telemetry to just those events needed by Windows Analytics? Matthew Reyonolds on my team can provide details.] +[Add the policy for telemetry level. Its the same policy, but within that policy you have to set "Allow Telemetry" to "2 - Enhanced"" (in addition to "Configure the Commercial ID")] + Microsoft’s Mobile Device Management can be used to deploy your Commercial ID to your organization’s devices. The Commercial ID is listed under **Provider/ProviderID/CommercialID**. More information on deployment using MDM can be found [here](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/dmclient-csp).   + + +## Related topics + +[Use Device Health to monitor Windows Updates](device-health-using.md) \ No newline at end of file diff --git a/windows/deployment/update/device-health-monitor.md b/windows/deployment/update/device-health-monitor.md new file mode 100644 index 0000000000..8110a0722e --- /dev/null +++ b/windows/deployment/update/device-health-monitor.md @@ -0,0 +1,60 @@ +--- +title: Monitor the Health of Devices with Device Health (Windows 10) +description: You can use Device Health in OMS to monitor the frequency and causes of crashes and misbehaving apps on devices in your network. +keywords: oms, operations management suite, wdav, health, log analytics +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: deploy +author: jaimeo +--- + +# Monitor the Health of Devices with Device Health Monitor + +## Introduction + +With Windows 10, organizations need to change the way they approach monitoring client computers and other devices in their deployments. Device Health is the newest Windows Analytics solution that complements the existing Upgrade Readiness and Update Compliance solutions by providing IT with reports on some common problems the end users might experience so they can be proactively remediated, thus saving support calls and improving end-user productivity. + +Like Upgrade Readiness and Update Compliance, Device Health is a solution built within Operations Management Suite (OMS), a cloud-based monitoring and automation service that has a flexible servicing subscription based on data usage and retention. For more information about OMS, see [Operations Management Suite overview](http://azure.microsoft.com/en-us/documentation/articles/operations-management-suite-overview/). + +Device Health uses the Windows telemetry that is part of all Windows 10 devices. If you have already employed Upgrade Readiness or Update Compliance solutions, all you need to do is select Device Health (preview) from the OMS solution gallery and add it to your OMS workspace. Device Health does use enhanced telemetry, so you might need to implement this policy if you've not already done so. + + +Device Health provides the following: + +- [ADDITIONAL SUMMARY BULLETS?] +- Cloud-connected access utilizing Windows 10 telemetry means no need for new complex, customized infrastructure + +See the following topics in this guide for detailed information about configuring and using the Device Health solution: + +- [Get started with Device Health](device-health-get-started.md): How to add Device Health to your environment. +- [Using Device Health](device-health-using.md): How to begin using Device Health. + +An overview of the processes used by the Device Health solution is provided below. + +## Device Health architecture + +The Device Health architecture and data flow is summarized by the following five-step process: + +[VALID FOR DH OR DIFFERENT?] + +**(1)** User computers send telemetry data to a secure Microsoft data center using the Microsoft Data Management Service.
+**(2)** Telemetry data is analyzed by the Device Health Data Service.
+**(3)** Telemetry data is pushed from the Device Health Data Service to your OMS workspace.
+**(4)** Telemetry data is available in the Device Health solution.
+**(5)** You are able to monitor and troubleshoot Windows updates and Windows Defender AV in your environment.
+ +These steps are illustrated in following diagram: + +[DO YOU HAVE A DIAGRAM YOU WANT TO USE HERE?] + +>[!NOTE] +>This process assumes that Windows telemetry is enabled and you [have assigned your Commercial ID to devices](update-compliance-get-started#deploy-your-commercial-id-to-your-windows-10-devices. + + + +  +## Related topics + +[Get started with Device Health](device-health-get-started.md)
+[Use Device Health to monitor Windows Updates](device-health-using.md) \ No newline at end of file diff --git a/windows/deployment/update/device-health-using.md b/windows/deployment/update/device-health-using.md new file mode 100644 index 0000000000..01fe58c1b3 --- /dev/null +++ b/windows/deployment/update/device-health-using.md @@ -0,0 +1,147 @@ +--- +title: Using Device Health (Windows 10) +description: Explains how to begin usihg Device Health. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: deploy +author: jaimeo +--- + +# Use Device Health to monitor frequency and causes of device crashes + +This section describes how to use Device Health to monitor devices deployed on your network and troubleshoot the causes if they crash. + + +Device Health: +- Uses telemetry gathered from user devices to form an all-up view of Windows 10 devices in your organization. +- Displays devices that crash frequently and might need to be flattened, replaced, or otherwise fixed. +- Identifies drivers that are causing many devices to crash, so that they can be updated or replaced. + +>[!NOTE] +>Information is refreshed daily so that health status can be monitored. Changes will be displayed about 24 hours after their occurrence, so you always have a recent snapshot of your devices. + +In OMS, the aspects of a solution's dashboard are usually divided into blades. Blades are a slice of information, typically with a summarization tile and an enumeration of the items that makes up that data. All data is presented through queries. Perspectives are also possible, wherein a given query has a unique view designed to display custom data. The terminology of blades, tiles, and perspectives will be used in the sections that follow. + + +## Device Reliability + +- [Frequently Crashing Devices](#frequently-crashing-devices) +- [Driver Induced OS Crashes](#driver-induced-OS-crashes) + + + +### Frequently Crashing Devices + +This middle blade in Device Health displays the devices that crash most often. See the following example: + + +![The blade in the middle summarizes devices that crash most often](images/dev-health-main-tile.png) + +Clicking the Frequently Crashing Devices blade opens a reliability perspective view, where you can filter data using filters in the left pane, see trends, and compare to commercial averages: + +![Reliability perspective](images/reliability-perspective.png) + + +In this view, you can click a particular device to see the details of that particular device and for each crash recorded on it. (You can also reach this view by clicking a particular device on the Frequently Crashing Devices blade.) + +[FROM MARC: I'd remove descriptions; it is meant to be self-explanatory. The one thing I would add is the tip on how to get rid of a filter. E.g, if you select "Model=XXX" and apply (as mentioned before picture), their is no visual way to remove that filter. You have to notice that they query up top has changed to append (Model=XXX) - and you need to edit the query to remove that. MSIT stumbled on this and suggested we document it, so let's do that!] + +![Device detail and history](images/device-crash-history.png) + +This displays device records sorted by date and crash details by failure ID, also sorted by date. + + +### Driver Induced OS Crashes + +This blade (on the right) displays values for the number of *devices* that have crashed due to driver issues, as well as the total number of crashes altogether due to driver issues. + + +![The blade on the right summarizes devices that crash most often](images/dev-health-main-tile.png) + +Clicking the Driver Induced OS Crashes blade opens a driver perspective view, which shows the details for the responsible driver, trends and commercial averages for that driver, alternative versions of the driver, and tools for filtering the data. + +![Driver detail and history](images/driver-detail.png) + +Clicking through this view opens a display of still more details for the driver, including: + +- Driver properties, such as its name, version, and class +- Information (stop code, failure ID) for each crash instance +- A list oftThe computers on which the crash occurred and the time they occurred + +The records are sorted by the time generated and the computer. If a driver has caused a computer to crash on several different days, only the most recent event is shown in this view. + +![Additional driver detail and history](images/driver-deeper-detail.png) + +[DEFINITIONS TABLE?] +[ONENOTE DESCRIBES CLICKTHROUGH BEHAVIOR THAT SEEMS LIKE IT'S SUPPOSED TO CHANGE FOR PUBLIC VERSION?] + + +## Windows Information Protection + + +Windows Information Protection (WIP) helps protect work data from accidental sharing. Users might be disrupted if WIP rules are not aligned with real work behavior. WIP App Learning shows which apps on which computers are attempting to cross policy boundaries. + +For details about deploying WIP policies, see [Protect your enterprise data using Windows Information Protection (WIP)](https://docs.microsoft.com/windows/threat-protection/windows-information-protection/protect-enterprise-data-using-wip). + +Once you have WIP policies in place, by using the WIP section of Device Health, you can: + +- Tune WIP rules, for example by confirming that certain apps are allowed or disallowed by current policy. +- Reduce disruptive prompts by adding rules to allow data sharing from approved apps. + +![Main Windows Information Protection view](images/WIP.png) + + +Clicking through shows the details you can use to explore each incident and update app policies by using AppLocker or WIP AppIDs. + +![WIP details view](images/WIP-detail.png) + + +## Data model and OMS built-in extensibility + +All of the views and blades display slices of the most useful data by using pre-formed queries. You have access to the full set of data collected by Device Health, which means you can construct your own queries to expose any data that is of interest to you. For documentation on working with log searches, see [Find data using log searches](https://docs.microsoft.com/azure/log-analytics/log-analytics-log-searches). This topic section provides information about the data types being populated specifically by Device Health. + +### Example queries + +You can run these queries from the OMS **Log Search** interface (available at several points in the Device Health interface) by just typing them in. There are few details to be aware of: + +- After running a query, make sure to set the date range (which appears upper left after running initial query) to "7 days" to ensure you get data back. +- If you see the search tutorial dialog appearing frequently, it's likely because you are have read-only access to the OMS workspace. Ask a workspace administrator to grant you "contributor" permissions (which is required for the "completed tutorial" state to persist). +- If you use the search filters in the left pane, you might notice there is no control to undo a filter selection. To undo a selection, delete the (FilterName="FilterValue") element that is appended to the search query and then click the search button again. For example, after you run a base query of *Type = DHOSReliability KernelModeCrashCount > 0*, a number of filter options appear on the left. If you then filter on **Manufacturer** (for example, by setting *Manufacturer="Microsoft Corporation"* and then clicking **Apply**), the query will change to *Type = DHOSReliability KernelModeCrashCount > 0 (Manufacturer="Microsoft Corporation")*. Delete *(Manufacturer="Microsoft Corporation")* and then click the **search** button again to re-run the query without that filter. + +### Device reliability query examples + +|Data|Query| +|-------------------|------------------------| +|Total devices| Type = DHOSReliability \| measure countdistinct(ComputerID) by Type| +|Number of devices that have crashed in the last three weeks| Type = DHOSReliability KernelModeCrashCount > 0 \| measure countdistinct(ComputerID) by Type| +|Compare the percentage of your devices that have not crashed with the percentage of similar devices outside your organization ("similar" here means other commercial devices with the same mix of device models, operating system versions and update levels).| Type=DHOSReliability \| measure avg(map(KernelModeCrashCount, 1, 10000, 0, 1)) as MyOrgPercentCrashFreeDevices, avg(KernelModeCrashFreePercentForIndustry) as CommercialAvgPercentCrashFreeDevices by Type \| Display Table| +|As above, but sorted by device manufacturer| Type=DHOSReliability \| measure avg(map(KernelModeCrashCount, 1, 10000, 0, 1)) as MyOrgPercentCrashFreeDevices, avg(KernelModeCrashFreePercentForIndustry) as CommercialAvgPercentCrashFreeDevices, countdistinct(ComputerID) as NumberDevices by Manufacturer \| sort NumberDevices desc \| Display Table| +|As above, but sorted by model| Type=DHOSReliability \| measure avg(map(KernelModeCrashCount, 1, 10000, 0, 1)) as MyOrgPercentCrashFreeDevices, avg(KernelModeCrashFreePercentForIndustry) as CommercialAvgPercentCrashFreeDevices, countdistinct(ComputerID) as NumberDevices by ModelFamily\| sort NumberDevices desc \| Display Table| +|As above, but sorted by operating system version| Type=DHOSReliability \| measure avg(map(KernelModeCrashCount, 1, 10000, 0, 1)) as MyOrgPercentCrashFreeDevices, avg(KernelModeCrashFreePercentForIndustry) as CommercialAvgPercentCrashFreeDevices, countdistinct(ComputerID) as NumberDevices by OSVersion \| sort NumberDevices desc \| Display Table| +|Crash rate trending in my organization compared to the commercial average. Each interval shows percentage of devices that crashed at least once in the trailing two weeks| Type=DHOSReliability \| measure avg(map(KernelModeCrashCount, 1, 10000, 0, 1)) as MyOrgPercentCrashFreeDevices, avg(KernelModeCrashFreePercentForIndustry) as CommercialAvgPercentCrashFreeDevices by TimeGenerated \| Display LineChart| +|Table of devices that have crashed the most in the last two weeks| Type = DHOSReliability KernelModeCrashCount > 0 \| Dedup ComputerID \| select Computer, KernelModeCrashCount \| sort TimeGenerated desc, KernelModeCrashCount desc \| Display Table| +|Detailed crash records, most recent first| Type = DHOSCrashData \| sort TimeGenerated desc, Computer asc \| display Table| +|Number of devices that crashed due to drivers| Type = DHDriverReliability DriverKernelModeCrashCount > 0 \| measure countdistinct(ComputerID) by Type| +|Table of drivers that have caused the most devices to crash| Type = DHDriverReliability DriverKernelModeCrashCount > 0 \| measure countdistinct(ComputerID) by DriverName \| Display Table| +|Trend of devices crashed by driver by day| * Type=DHOSCrashData DriverName!="ntkrnlmp.exe" DriverName IN {Type=DHOSCrashData \| measure count() by DriverName | top 5} \| measure countdistinct(ComputerID) as NumberDevices by DriverName interval 1day| +|Crashes for different versions of a given driver (replace netwtw04.sys with the driver you want from the previous list). This lets you get an idea of which *versions* of a given driver work best with your devices| Type = DHDriverReliability DriverName="netwtw04.sys" \| Dedup ComputerID \| sort TimeGenerated desc \| measure countdistinct(ComputerID) as InstallCount, sum(map(DriverKernelModeCrashCount,1,10000, 1)) as DevicesCrashed by DriverVersion \| Display Table| +|Top crashes by FailureID| Type =DHOSCrashData \| measure count() by KernelModeCrashFailureId \| Display Table| + +### Windows Information Protection (WIP) App Learning query examples + +|Data|Query| +|-------------------|------------------------| +|Apps encountering policy boundaries on the most computers (click on an app in the results to see details including computer names)| Type=DHWipAppLearning \| measure countdistinct(ComputerID) as ComputerCount by AppName| +|Trend of App Learning activity for a given app. Useful for tracking activity before and after a rule change| Type=DHWipAppLearning AppName="MICROSOFT.SKYPEAPP" | measure countdistinct(ComputerID) as ComputerCount interval 1day| + +### Exporting data and configuring alerts + +OMS enables you to export data to other tools. To do this, in any view that shows **Log Search** just click the **Export** button. Similarly, clicking the **Alert** button will enable you to run a query automaticlaly on a schedule and receive email alerts for particular query results that you set. If you have a PowerBI account, then you will also see a **PowerBI** button that enables you to run a query on a schedule and have the results automatically saved as a PowerBI data set. + + + + +## Related topics + +[Get started with Update Compliance](update-compliance-get-started.md) \ No newline at end of file diff --git a/windows/deployment/update/images/WIP-detail.png b/windows/deployment/update/images/WIP-detail.png new file mode 100644 index 0000000000..96b0a90280 Binary files /dev/null and b/windows/deployment/update/images/WIP-detail.png differ diff --git a/windows/deployment/update/images/WIP.png b/windows/deployment/update/images/WIP.png new file mode 100644 index 0000000000..ee7f30c014 Binary files /dev/null and b/windows/deployment/update/images/WIP.png differ diff --git a/windows/deployment/update/images/app-detail.png b/windows/deployment/update/images/app-detail.png new file mode 100644 index 0000000000..c06ced4864 Binary files /dev/null and b/windows/deployment/update/images/app-detail.png differ diff --git a/windows/deployment/update/images/app-health-dashboard.png b/windows/deployment/update/images/app-health-dashboard.png new file mode 100644 index 0000000000..d8daee44ed Binary files /dev/null and b/windows/deployment/update/images/app-health-dashboard.png differ diff --git a/windows/deployment/update/images/crash-hang-detail.png b/windows/deployment/update/images/crash-hang-detail.png new file mode 100644 index 0000000000..3a6447329c Binary files /dev/null and b/windows/deployment/update/images/crash-hang-detail.png differ diff --git a/windows/deployment/update/images/dev-health-main-tile.png b/windows/deployment/update/images/dev-health-main-tile.png new file mode 100644 index 0000000000..850b558512 Binary files /dev/null and b/windows/deployment/update/images/dev-health-main-tile.png differ diff --git a/windows/deployment/update/images/device-crash-history.png b/windows/deployment/update/images/device-crash-history.png new file mode 100644 index 0000000000..69f98f1d67 Binary files /dev/null and b/windows/deployment/update/images/device-crash-history.png differ diff --git a/windows/deployment/update/images/driver-deeper-detail.png b/windows/deployment/update/images/driver-deeper-detail.png new file mode 100644 index 0000000000..0437e555a1 Binary files /dev/null and b/windows/deployment/update/images/driver-deeper-detail.png differ diff --git a/windows/deployment/update/images/driver-detail.png b/windows/deployment/update/images/driver-detail.png new file mode 100644 index 0000000000..ab391f5adb Binary files /dev/null and b/windows/deployment/update/images/driver-detail.png differ diff --git a/windows/deployment/update/images/health-summary.png b/windows/deployment/update/images/health-summary.png new file mode 100644 index 0000000000..906b0a2189 Binary files /dev/null and b/windows/deployment/update/images/health-summary.png differ diff --git a/windows/deployment/update/images/login-health-detail-faillure.png b/windows/deployment/update/images/login-health-detail-faillure.png new file mode 100644 index 0000000000..10b59a01d0 Binary files /dev/null and b/windows/deployment/update/images/login-health-detail-faillure.png differ diff --git a/windows/deployment/update/images/login-health-detail.png b/windows/deployment/update/images/login-health-detail.png new file mode 100644 index 0000000000..2d3871fc42 Binary files /dev/null and b/windows/deployment/update/images/login-health-detail.png differ diff --git a/windows/deployment/update/images/login-health.png b/windows/deployment/update/images/login-health.png new file mode 100644 index 0000000000..fd4f6740bd Binary files /dev/null and b/windows/deployment/update/images/login-health.png differ diff --git a/windows/deployment/update/images/reliability-perspective.png b/windows/deployment/update/images/reliability-perspective.png new file mode 100644 index 0000000000..58e812dafa Binary files /dev/null and b/windows/deployment/update/images/reliability-perspective.png differ