mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
fixing more note/important/tip/warning space issues
This commit is contained in:
parent
554f99075b
commit
989d59d4b0
@ -187,7 +187,7 @@ The Performance Monitor log is located in the path: C:\PERFLOGS
|
|||||||
|
|
||||||
#### Use memory dump to collect data for the physical computer that's running in a frozen state
|
#### Use memory dump to collect data for the physical computer that's running in a frozen state
|
||||||
|
|
||||||
> [!Warning]
|
> [!WARNING]
|
||||||
> Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, [back up the registry for restoration](https://support.microsoft.com/help/322756) in case problems occur.
|
> Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, [back up the registry for restoration](https://support.microsoft.com/help/322756) in case problems occur.
|
||||||
|
|
||||||
If the physical computer is still running in a frozen state, follow these steps to enable and collect memory dump:
|
If the physical computer is still running in a frozen state, follow these steps to enable and collect memory dump:
|
||||||
|
@ -28,7 +28,7 @@ In Windows 10 Pro, Enterprise, and Education, you can use a Group Policy Object
|
|||||||
|
|
||||||
This topic describes how to update Group Policy settings to display a customized Start and taskbar layout when the users sign in. By creating a domain-based GPO with these settings, you can deploy a customized Start and taskbar layout to users in a domain.
|
This topic describes how to update Group Policy settings to display a customized Start and taskbar layout when the users sign in. By creating a domain-based GPO with these settings, you can deploy a customized Start and taskbar layout to users in a domain.
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. When you apply a taskbar layout, users will still be able to pin and unpin apps, and change the order of pinned apps.
|
>When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups. When you apply a taskbar layout, users will still be able to pin and unpin apps, and change the order of pinned apps.
|
||||||
|
|
||||||
|
|
||||||
|
@ -32,7 +32,7 @@ In Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education, you can us
|
|||||||
|
|
||||||
**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) for desktop editions.
|
**Before you begin**: [Customize and export Start layout](customize-and-export-start-layout.md) for desktop editions.
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups.
|
>When a full Start layout is applied with this method, the users cannot pin, unpin, or uninstall apps from Start. Users can view and open all apps in the **All Apps** view, but they cannot pin any apps to Start. When a partial Start layout is applied, the contents of the specified tile groups cannot be changed, but users can move those groups, and can also create and customize their own groups.
|
||||||
|
|
||||||
|
|
||||||
|
@ -184,7 +184,7 @@ Apps Corner lets you set up a custom Start screen on your Windows 10 Mobile or
|
|||||||
|
|
||||||
1. On Start , swipe over to the App list, then tap **Settings**  > **Accounts** > **Apps Corner** > launch .
|
1. On Start , swipe over to the App list, then tap **Settings**  > **Accounts** > **Apps Corner** > launch .
|
||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
>Want to get to Apps Corner with one tap? In **Settings**, tap **Apps Corner** > **pin** to pin the Apps Corner tile to your Start screen.
|
>Want to get to Apps Corner with one tap? In **Settings**, tap **Apps Corner** > **pin** to pin the Apps Corner tile to your Start screen.
|
||||||
|
|
||||||
2. Give the device to someone else, so they can use the device and only the one app you chose.
|
2. Give the device to someone else, so they can use the device and only the one app you chose.
|
||||||
|
@ -95,7 +95,7 @@ After you create the task sequence, we recommend that you configure the task seq
|
|||||||
|
|
||||||
* OSDPreserveDriveLetter: True
|
* OSDPreserveDriveLetter: True
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>If you don't change this value, your Windows installation will end up in E:\\Windows.
|
>If you don't change this value, your Windows installation will end up in E:\\Windows.
|
||||||
|
|
||||||
3. In the **Post Install** group, select **Apply Network Settings**, and configure the Domain OU value to use the **Contoso / Workstations** OU (browse for values).
|
3. In the **Post Install** group, select **Apply Network Settings**, and configure the Domain OU value to use the **Contoso / Workstations** OU (browse for values).
|
||||||
@ -112,7 +112,7 @@ After you create the task sequence, we recommend that you configure the task seq
|
|||||||
|
|
||||||
* Options: Task Sequence Variable: Model equals HP EliteBook 8560w
|
* Options: Task Sequence Variable: Model equals HP EliteBook 8560w
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You also can add a Query WMI condition with the following query: SELECT \* FROM Win32\_ComputerSystem WHERE Model LIKE '%HP EliteBook 8560w%'
|
>You also can add a Query WMI condition with the following query: SELECT \* FROM Win32\_ComputerSystem WHERE Model LIKE '%HP EliteBook 8560w%'
|
||||||
|
|
||||||

|

|
||||||
@ -153,7 +153,7 @@ After you create the task sequence, we recommend that you configure the task seq
|
|||||||
|
|
||||||
11. Click **OK**.
|
11. Click **OK**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Request State Store and Release State Store actions need to be added for common computer replace scenarios.
|
>The Request State Store and Release State Store actions need to be added for common computer replace scenarios.
|
||||||
|
|
||||||
|
|
||||||
|
@ -80,7 +80,7 @@ This section will show you how to populate the MDT deployment share with the Win
|
|||||||
|
|
||||||
MDT supports adding both full source Windows 10 DVDs (ISOs) and custom images that you have created. In this case, you create a reference image, so you add the full source setup files from Microsoft.
|
MDT supports adding both full source Windows 10 DVDs (ISOs) and custom images that you have created. In this case, you create a reference image, so you add the full source setup files from Microsoft.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Due to the Windows limits on path length, we are purposely keeping the operating system destination directory short, using the folder name W10EX64RTM rather than a more descriptive name like Windows 10 Enterprise x64 RTM.
|
>Due to the Windows limits on path length, we are purposely keeping the operating system destination directory short, using the folder name W10EX64RTM rather than a more descriptive name like Windows 10 Enterprise x64 RTM.
|
||||||
|
|
||||||
### Add Windows 10 Enterprise x64 (full source)
|
### Add Windows 10 Enterprise x64 (full source)
|
||||||
@ -120,7 +120,7 @@ By storing configuration items as MDT applications, it is easy to move these obj
|
|||||||
|
|
||||||
In these examples, we assume that you downloaded the software in this list to the E:\\Downloads folder. The first application is added using the UI, but because MDT supports Windows PowerShell, you add the other applications using Windows PowerShell.
|
In these examples, we assume that you downloaded the software in this list to the E:\\Downloads folder. The first application is added using the UI, but because MDT supports Windows PowerShell, you add the other applications using Windows PowerShell.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>All the Microsoft Visual C++ downloads can be found on [The latest supported Visual C++ downloads](https://go.microsoft.com/fwlink/p/?LinkId=619523).
|
>All the Microsoft Visual C++ downloads can be found on [The latest supported Visual C++ downloads](https://go.microsoft.com/fwlink/p/?LinkId=619523).
|
||||||
|
|
||||||
### Create the install: Microsoft Office Professional Plus 2013 x86
|
### Create the install: Microsoft Office Professional Plus 2013 x86
|
||||||
@ -138,7 +138,8 @@ You also can customize the Office installation using a Config.xml file. But we r
|
|||||||
|
|
||||||
Figure 5. The Install - Microsoft Office 2013 Pro Plus - x86 application properties.
|
Figure 5. The Install - Microsoft Office 2013 Pro Plus - x86 application properties.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
|
|
||||||
>If you don't see the Office Products tab, verify that you are using a volume license version of Office. If you are deploying Office 365, you need to download the Admin folder from Microsoft.
|
>If you don't see the Office Products tab, verify that you are using a volume license version of Office. If you are deploying Office 365, you need to download the Admin folder from Microsoft.
|
||||||
|
|
||||||
3. In the Office Customization Tool dialog box, select the Create a new Setup customization file for the following product option, select the Microsoft Office Professional Plus 2013 (32-bit) product, and click OK.
|
3. In the Office Customization Tool dialog box, select the Create a new Setup customization file for the following product option, select the Microsoft Office Professional Plus 2013 (32-bit) product, and click OK.
|
||||||
@ -160,7 +161,7 @@ You also can customize the Office installation using a Config.xml file. But we r
|
|||||||
- In the **Microsoft Office 2013** node, expand **Privacy**, select **Trust Center**, and enable the Disable Opt-in Wizard on first run setting.
|
- In the **Microsoft Office 2013** node, expand **Privacy**, select **Trust Center**, and enable the Disable Opt-in Wizard on first run setting.
|
||||||
5. From the **File** menu, select **Save**, and save the configuration as 0\_Office2013ProPlusx86.msp in the **E:\\MDTBuildLab\\Applications\\Install - Microsoft Office 2013 Pro Plus - x86\\Updates** folder.
|
5. From the **File** menu, select **Save**, and save the configuration as 0\_Office2013ProPlusx86.msp in the **E:\\MDTBuildLab\\Applications\\Install - Microsoft Office 2013 Pro Plus - x86\\Updates** folder.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The reason for naming the file with a 0 (zero) at the beginning is that the Updates folder also handles Microsoft Office updates, and they are installed in alphabetical order. The Office 2013 setup works best if the customization file is installed before any updates.
|
>The reason for naming the file with a 0 (zero) at the beginning is that the Updates folder also handles Microsoft Office updates, and they are installed in alphabetical order. The Office 2013 setup works best if the customization file is installed before any updates.
|
||||||
|
|
||||||
6. Close the Office Customization Tool, click Yes in the dialog box, and in the **Install - Microsoft Office 2013 Pro Plus - x86 Properties** window, click **OK**.
|
6. Close the Office Customization Tool, click Yes in the dialog box, and in the **Install - Microsoft Office 2013 Pro Plus - x86 Properties** window, click **OK**.
|
||||||
@ -379,7 +380,7 @@ When using MDT, you don't need to edit the Unattend.xml file very often because
|
|||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>Do not use **SkipMachineOOBE** or **SkipUserOOBE** in your Unattend.xml file. These settings are deprecated and can have unintended effects if used.
|
>Do not use **SkipMachineOOBE** or **SkipUserOOBE** in your Unattend.xml file. These settings are deprecated and can have unintended effects if used.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You also can use the Unattend.xml to enable components in Windows 10, like the Telnet Client or Hyper-V client. Normally we prefer to do this via the **Install Roles and Features** action, or using Deployment Image Servicing and Management (DISM) command-line tools, because then we can add that as an application, being dynamic, having conditions, and so forth. Also, if you are adding packages via Unattend.xml, it is version specific, so Unattend.xml must match the exact version of the operating system you are servicing.
|
>You also can use the Unattend.xml to enable components in Windows 10, like the Telnet Client or Hyper-V client. Normally we prefer to do this via the **Install Roles and Features** action, or using Deployment Image Servicing and Management (DISM) command-line tools, because then we can add that as an application, being dynamic, having conditions, and so forth. Also, if you are adding packages via Unattend.xml, it is version specific, so Unattend.xml must match the exact version of the operating system you are servicing.
|
||||||
|
|
||||||
Follow these steps to configure Internet Explorer settings in Unattend.xml for the Windows 10 Enterprise x64 RTM Default Image task sequence:
|
Follow these steps to configure Internet Explorer settings in Unattend.xml for the Windows 10 Enterprise x64 RTM Default Image task sequence:
|
||||||
@ -460,7 +461,7 @@ For that reason, add only a minimal set of rules to Bootstrap.ini, such as which
|
|||||||
|
|
||||||
Figure 12. The boot image rules for the MDT Build Lab deployment share.
|
Figure 12. The boot image rules for the MDT Build Lab deployment share.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>For security reasons, you normally don't add the password to the Bootstrap.ini file; however, because this deployment share is for creating reference image builds only, and should not be published to the production network, it is acceptable to do so in this situation.
|
>For security reasons, you normally don't add the password to the Bootstrap.ini file; however, because this deployment share is for creating reference image builds only, and should not be published to the production network, it is acceptable to do so in this situation.
|
||||||
|
|
||||||
4. In the **Windows PE** tab, in the **Platform** drop-down list, select **x86**.
|
4. In the **Windows PE** tab, in the **Platform** drop-down list, select **x86**.
|
||||||
@ -473,7 +474,7 @@ For that reason, add only a minimal set of rules to Bootstrap.ini, such as which
|
|||||||
2. ISO file name: MDT Build Lab x64.iso
|
2. ISO file name: MDT Build Lab x64.iso
|
||||||
8. Click **OK**.
|
8. Click **OK**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>In MDT, the x86 boot image can deploy both x86 and x64 operating systems (except on computers based on Unified Extensible Firmware Interface).
|
>In MDT, the x86 boot image can deploy both x86 and x64 operating systems (except on computers based on Unified Extensible Firmware Interface).
|
||||||
|
|
||||||
|
|
||||||
@ -484,7 +485,7 @@ After the deployment share has been configured, it needs to be updated. This is
|
|||||||
1. Using the Deployment Workbench, right-click the **MDT Build Lab deployment share** and select **Update Deployment Share**.
|
1. Using the Deployment Workbench, right-click the **MDT Build Lab deployment share** and select **Update Deployment Share**.
|
||||||
2. Use the default options for the Update Deployment Share Wizard.
|
2. Use the default options for the Update Deployment Share Wizard.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The update process will take 5 to 10 minutes.
|
>The update process will take 5 to 10 minutes.
|
||||||
|
|
||||||
### The rules explained
|
### The rules explained
|
||||||
@ -495,7 +496,7 @@ The Bootstrap.ini and CustomSettings.ini files work together. The Bootstrap.ini
|
|||||||
|
|
||||||
The CustomSettings.ini file is normally stored on the server, in the Deployment share\\Control folder, but also can be stored on the media (when using offline media).
|
The CustomSettings.ini file is normally stored on the server, in the Deployment share\\Control folder, but also can be stored on the media (when using offline media).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The settings, or properties, that are used in the rules (CustomSettings.ini and Bootstrap.ini) are listed in the MDT documentation, in the Microsoft Deployment Toolkit Reference / Properties / Property Definition section.
|
>The settings, or properties, that are used in the rules (CustomSettings.ini and Bootstrap.ini) are listed in the MDT documentation, in the Microsoft Deployment Toolkit Reference / Properties / Property Definition section.
|
||||||
|
|
||||||
### The Bootstrap.ini file
|
### The Bootstrap.ini file
|
||||||
@ -523,7 +524,7 @@ So, what are these settings?
|
|||||||
|
|
||||||
- **SkipBDDWelcome.** Even if it is nice to be welcomed every time we start a deployment, we prefer to skip the initial welcome page of the Windows Deployment Wizard.
|
- **SkipBDDWelcome.** Even if it is nice to be welcomed every time we start a deployment, we prefer to skip the initial welcome page of the Windows Deployment Wizard.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>All properties beginning with "Skip" control only whether to display that pane in the Windows Deployment Wizard. Most of the panes also require you to actually set one or more values.
|
>All properties beginning with "Skip" control only whether to display that pane in the Windows Deployment Wizard. Most of the panes also require you to actually set one or more values.
|
||||||
|
|
||||||
### The CustomSettings.ini file
|
### The CustomSettings.ini file
|
||||||
|
@ -95,7 +95,7 @@ In these steps, we assume that you have completed the steps in the [Create a Win
|
|||||||
6. On the **Destination** page, in the **Destination directory name** text box, type **W10EX64RTM**, click **Next** twice, and then click **Finish**.
|
6. On the **Destination** page, in the **Destination directory name** text box, type **W10EX64RTM**, click **Next** twice, and then click **Finish**.
|
||||||
7. After adding the operating system, double-click the added operating system name in the **Operating Systems / Windows 10** node and change the name to match the following: **Windows 10 Enterprise x64 RTM Custom Image**.
|
7. After adding the operating system, double-click the added operating system name in the **Operating Systems / Windows 10** node and change the name to match the following: **Windows 10 Enterprise x64 RTM Custom Image**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The reason for adding the setup files has changed since earlier versions of MDT. MDT 2010 used the setup files to install Windows. MDT uses DISM to apply the image; however, you still need the setup files because some components in roles and features are stored outside the main image.
|
>The reason for adding the setup files has changed since earlier versions of MDT. MDT 2010 used the setup files to install Windows. MDT uses DISM to apply the image; however, you still need the setup files because some components in roles and features are stored outside the main image.
|
||||||
|
|
||||||
|
|
||||||
|
@ -46,7 +46,7 @@ For a computer refresh with MDT, you use the User State Migration Tool (USMT), w
|
|||||||
|
|
||||||
During the computer refresh, USMT uses a feature called Hard-Link Migration Store. When you use this feature, the files are simply linked in the file system, which allows for fast migration, even when there is a lot of data.
|
During the computer refresh, USMT uses a feature called Hard-Link Migration Store. When you use this feature, the files are simply linked in the file system, which allows for fast migration, even when there is a lot of data.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>In addition to the USMT backup, you can enable an optional full Windows Imaging (WIM) backup of the machine by configuring the MDT rules. If you do this, a .wim file is created in addition to the USMT backup. The .wim file will contain the entire volume from the computer, and helpdesk personnel can extract content from it if needed. Please note that this is a data WIM backup only. Using this backup to restore the entire machine is not a supported scenario.
|
>In addition to the USMT backup, you can enable an optional full Windows Imaging (WIM) backup of the machine by configuring the MDT rules. If you do this, a .wim file is created in addition to the USMT backup. The .wim file will contain the entire volume from the computer, and helpdesk personnel can extract content from it if needed. Please note that this is a data WIM backup only. Using this backup to restore the entire machine is not a supported scenario.
|
||||||
|
|
||||||
### Multi-user migration
|
### Multi-user migration
|
||||||
@ -56,7 +56,7 @@ by configuring command-line switches to ScanState (added as rules in MDT).
|
|||||||
|
|
||||||
As an example, the following line configures USMT to migrate only domain user profiles and not profiles from the local SAM account database: ScanStateArgs=/ue:\*\\\* /ui:CONTOSO\\\*
|
As an example, the following line configures USMT to migrate only domain user profiles and not profiles from the local SAM account database: ScanStateArgs=/ue:\*\\\* /ui:CONTOSO\\\*
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You also can combine the preceding switches with the /uel switch, which excludes profiles that have not been accessed within a specific number of days. For example, adding /uel:60 will configure ScanState (or LoadState) not to include profiles that haven't been accessed for more than 60 days.
|
>You also can combine the preceding switches with the /uel switch, which excludes profiles that have not been accessed within a specific number of days. For example, adding /uel:60 will configure ScanState (or LoadState) not to include profiles that haven't been accessed for more than 60 days.
|
||||||
|
|
||||||
### Support for additional settings
|
### Support for additional settings
|
||||||
@ -91,7 +91,7 @@ In order to use the custom MigContosoData.xml USMT template, you need to copy it
|
|||||||
|
|
||||||
After adding the additional USMT template and configuring the CustomSettings.ini file to use it, you are now ready to refresh a Windows 7 SP1 client to Windows 10. In these steps, we assume you have a Windows 7 SP1 client named PC0001 in your environment that is ready for a refresh to Windows 10.
|
After adding the additional USMT template and configuring the CustomSettings.ini file to use it, you are now ready to refresh a Windows 7 SP1 client to Windows 10. In these steps, we assume you have a Windows 7 SP1 client named PC0001 in your environment that is ready for a refresh to Windows 10.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>MDT also supports an offline computer refresh. For more info on that scenario, see the USMTOfflineMigration property in the [MDT resource page](https://go.microsoft.com/fwlink/p/?LinkId=618117).
|
>MDT also supports an offline computer refresh. For more info on that scenario, see the USMTOfflineMigration property in the [MDT resource page](https://go.microsoft.com/fwlink/p/?LinkId=618117).
|
||||||
|
|
||||||
### Upgrade (refresh) a Windows 7 SP1 client
|
### Upgrade (refresh) a Windows 7 SP1 client
|
||||||
|
@ -88,7 +88,7 @@ During a computer replace, these are the high-level steps that occur:
|
|||||||
* Specify where to save your data and settings: Specify a location
|
* Specify where to save your data and settings: Specify a location
|
||||||
* Location: \\\\MDT01\\MigData$\\PC0002
|
* Location: \\\\MDT01\\MigData$\\PC0002
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>If you are replacing the computer at a remote site you should create the MigData folder on MDT02 and use that share instead.
|
>If you are replacing the computer at a remote site you should create the MigData folder on MDT02 and use that share instead.
|
||||||
|
|
||||||
2. Specify where to save a complete computer backup: Do not back up the existing computer
|
2. Specify where to save a complete computer backup: Do not back up the existing computer
|
||||||
|
@ -49,7 +49,7 @@ This section will show you how to import some network and storage drivers for Wi
|
|||||||
|
|
||||||
*Figure 21. Add drivers to Windows PE*
|
*Figure 21. Add drivers to Windows PE*
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Updating Boot Image part of the wizard will appear to hang when displaying Done. It will complete in a minute or two.
|
>The Updating Boot Image part of the wizard will appear to hang when displaying Done. It will complete in a minute or two.
|
||||||
|
|
||||||
|
|
||||||
@ -74,13 +74,13 @@ This section illustrates how to add drivers for Windows 10 through an example in
|
|||||||
|
|
||||||
* Path: \\\\CM01\\Sources$\\OSD\\DriverPackages\\Windows 10 x64\\HP EliteBook 8560w
|
* Path: \\\\CM01\\Sources$\\OSD\\DriverPackages\\Windows 10 x64\\HP EliteBook 8560w
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The package path does not yet exist, so you have to type it in. The wizard will create the new package in that folder.
|
>The package path does not yet exist, so you have to type it in. The wizard will create the new package in that folder.
|
||||||
|
|
||||||
|
|
||||||
5. On the **Select drivers to include in the boot image** page, do not select anything, and click **Next** twice. After the package has been created, click **Close**.
|
5. On the **Select drivers to include in the boot image** page, do not select anything, and click **Next** twice. After the package has been created, click **Close**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>If you want to monitor the driver import process more closely, you can open the SMSProv.log file during driver import.
|
>If you want to monitor the driver import process more closely, you can open the SMSProv.log file during driver import.
|
||||||
|
|
||||||

|

|
||||||
|
@ -29,7 +29,7 @@ Microsoft System Center 2012 R2 Configuration Manager supports deploying applica
|
|||||||
|
|
||||||
For the purposes of this topic, we will use CM01, a machine running Windows Server 2012 R2 Standard that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
For the purposes of this topic, we will use CM01, a machine running Windows Server 2012 R2 Standard that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Even though the new application model is fully supported to deploy via the task sequence, the most reliable way to deploy software via the task sequence is still the legacy packages, especially if you deploy many applications.
|
>Even though the new application model is fully supported to deploy via the task sequence, the most reliable way to deploy software via the task sequence is still the legacy packages, especially if you deploy many applications.
|
||||||
|
|
||||||
## Example: Create the Adobe Reader XI application
|
## Example: Create the Adobe Reader XI application
|
||||||
|
@ -160,7 +160,7 @@ This section provides steps to help you configure the All Unknown Computers coll
|
|||||||
|
|
||||||
3. Click **OK**.
|
3. Click **OK**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Configuration Manager can prompt for information in many ways. Using a collection variable with an empty value is just one of them. Another option is the User-Driven Installation (UDI) wizard.
|
>Configuration Manager can prompt for information in many ways. Using a collection variable with an empty value is just one of them. Another option is the User-Driven Installation (UDI) wizard.
|
||||||
|
|
||||||

|

|
||||||
|
@ -130,7 +130,7 @@ In order for the Configuration Manager Join Domain Account (CM\_JD) to join mach
|
|||||||
|
|
||||||
To support the packages you create in this section, the following folder structure should be created on the Configuration Manager primary site server (CM01):
|
To support the packages you create in this section, the following folder structure should be created on the Configuration Manager primary site server (CM01):
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>In most production environments, the packages are stored on a Distributed File System (DFS) share or a "normal" server share, but in a lab environment you can store them on the site server.
|
>In most production environments, the packages are stored on a Distributed File System (DFS) share or a "normal" server share, but in a lab environment you can store them on the site server.
|
||||||
|
|
||||||
- E:\\Sources
|
- E:\\Sources
|
||||||
|
@ -70,7 +70,7 @@ In this topic, we assume that you have a Windows 7 SP1 client named PC0003 with
|
|||||||
|
|
||||||
2. Review the Install Windows 10 Enterprise x64 collection. Do not continue until you see the PC0003 machine in the collection.
|
2. Review the Install Windows 10 Enterprise x64 collection. Do not continue until you see the PC0003 machine in the collection.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>It may take a short while for the collection to refresh; you can view progress via the Colleval.log file. If you want to speed up the process, you can manually update membership on the Install Windows 10 Enterprise x64 collection by right-clicking the collection and selecting Update Membership.
|
>It may take a short while for the collection to refresh; you can view progress via the Colleval.log file. If you want to speed up the process, you can manually update membership on the Install Windows 10 Enterprise x64 collection by right-clicking the collection and selecting Update Membership.
|
||||||
|
|
||||||
|
|
||||||
@ -90,7 +90,7 @@ Using the Configuration Manager console, in the Software Library workspace, sele
|
|||||||
|
|
||||||
- Make available to the following: Configuration Manager clients, media and PXE
|
- Make available to the following: Configuration Manager clients, media and PXE
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>It is not necessary to make the deployment available to media and Pre-Boot Execution Environment (PXE) for a computer refresh, but you will use the same deployment for bare-metal deployments later on and you will need it at that point.
|
>It is not necessary to make the deployment available to media and Pre-Boot Execution Environment (PXE) for a computer refresh, but you will use the same deployment for bare-metal deployments later on and you will need it at that point.
|
||||||
|
|
||||||
|
|
||||||
@ -118,7 +118,7 @@ Now you can start the computer refresh on PC0003.
|
|||||||
|
|
||||||
1. Using the Configuration Manager console, in the Asset and Compliance workspace, in the Install Windows 10 Enterprise x64 collection, right-click **PC0003** and select **Client Notification / Download Computer Policy**. Click **OK**.
|
1. Using the Configuration Manager console, in the Asset and Compliance workspace, in the Install Windows 10 Enterprise x64 collection, right-click **PC0003** and select **Client Notification / Download Computer Policy**. Click **OK**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Client Notification feature is new in Configuration Manager.
|
>The Client Notification feature is new in Configuration Manager.
|
||||||
|
|
||||||
2. On PC0003, using the Software Center (begin using the Start screen, or click the **New software is available** balloon in the system tray), select the **Windows 10 Enterprise x64 RTM** deployment and click **INSTALL**.
|
2. On PC0003, using the Software Center (begin using the Start screen, or click the **New software is available** balloon in the system tray), select the **Windows 10 Enterprise x64 RTM** deployment and click **INSTALL**.
|
||||||
|
@ -168,7 +168,7 @@ This section assumes that you have a machine named PC0004 with the Configuration
|
|||||||
|
|
||||||
2. In the **Actions** tab, select the **Machine Policy Retrieval & Evaluation Cycle**, select **Run Now**, and click **OK**.
|
2. In the **Actions** tab, select the **Machine Policy Retrieval & Evaluation Cycle**, select **Run Now**, and click **OK**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You also can use the Client Notification option in the Configuration Manager console, as shown in [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md).
|
>You also can use the Client Notification option in the Configuration Manager console, as shown in [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md).
|
||||||
|
|
||||||
3. Using the Software Center, select the **Replace Task Sequence** deployment and click **INSTALL**.
|
3. Using the Software Center, select the **Replace Task Sequence** deployment and click **INSTALL**.
|
||||||
@ -181,7 +181,7 @@ This section assumes that you have a machine named PC0004 with the Configuration
|
|||||||
|
|
||||||
7. Using the Configuration Manager console, in the Asset and Compliance workspace, select the **User State Migration** node, right-click the **PC0004/PC0006** association, and select **View Recovery Information**. Note that the object now also has a user state store location.
|
7. Using the Configuration Manager console, in the Asset and Compliance workspace, select the **User State Migration** node, right-click the **PC0004/PC0006** association, and select **View Recovery Information**. Note that the object now also has a user state store location.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>It may take a few minutes for the user state store location to be populated.
|
>It may take a few minutes for the user state store location to be populated.
|
||||||
|
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ You install VAMT as part of the Windows Assessment and Deployment Kit (ADK) for
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>VAMT requires local administrator privileges on all managed computers in order to deposit confirmation IDs (CIDs), get the client products’ license status, and install product keys. If VAMT is being used to manage products and product keys on the local host computer and you do not have administrator privileges, start VAMT with elevated privileges. For Active Directory-Based Activation use, for best results we recommend running VAMT while logged on as a domain administrator.
|
>VAMT requires local administrator privileges on all managed computers in order to deposit confirmation IDs (CIDs), get the client products’ license status, and install product keys. If VAMT is being used to manage products and product keys on the local host computer and you do not have administrator privileges, start VAMT with elevated privileges. For Active Directory-Based Activation use, for best results we recommend running VAMT while logged on as a domain administrator.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The VAMT Microsoft Management Console snap-in ships as an x86 package.
|
>The VAMT Microsoft Management Console snap-in ships as an x86 package.
|
||||||
|
|
||||||
### Requirements
|
### Requirements
|
||||||
|
@ -35,7 +35,7 @@ ms.topic: article
|
|||||||
|
|
||||||
During the activation process, information about the specific installation is examined. In the case of online activations, this information is sent to a server at Microsoft. This information may include the software version, the product key, the IP address of the computer, and information about the device. The activation methods that Microsoft uses are designed to help protect user privacy, and they cannot be used to track back to the computer or user. The gathered data confirms that the software is a legally licensed copy, and this data is used for statistical analysis. Microsoft does not use this information to identify or contact the user or the organization.
|
During the activation process, information about the specific installation is examined. In the case of online activations, this information is sent to a server at Microsoft. This information may include the software version, the product key, the IP address of the computer, and information about the device. The activation methods that Microsoft uses are designed to help protect user privacy, and they cannot be used to track back to the computer or user. The gathered data confirms that the software is a legally licensed copy, and this data is used for statistical analysis. Microsoft does not use this information to identify or contact the user or the organization.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The IP address is used only to verify the location of the request, because some editions of Windows (such as “Starter” editions) can only be activated within certain geographical target markets.
|
>The IP address is used only to verify the location of the request, because some editions of Windows (such as “Starter” editions) can only be activated within certain geographical target markets.
|
||||||
|
|
||||||
## Distribution channels and activation
|
## Distribution channels and activation
|
||||||
|
@ -294,7 +294,7 @@ The following table lists the MDM policy settings that you can configure for Win
|
|||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> If policy is not configured to explicitly require letters or special characters, users will be restricted to creating a numeric PIN.
|
> If policy is not configured to explicitly require letters or special characters, users will be restricted to creating a numeric PIN.
|
||||||
|
|
||||||
|
|
||||||
|
@ -40,7 +40,7 @@ Yes, BitLocker supports multifactor authentication for operating system drives.
|
|||||||
|
|
||||||
For requirements, see [System requirements](bitlocker-overview.md#system-requirements).
|
For requirements, see [System requirements](bitlocker-overview.md#system-requirements).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Dynamic disks are not supported by BitLocker. Dynamic data volumes will not be displayed in the Control Panel. Although the operating system volume will always be displayed in the Control Panel, regardless of whether it is a Dynamic disk, if it is a dynamic disk it is cannot be protected by BitLocker.
|
> Dynamic disks are not supported by BitLocker. Dynamic data volumes will not be displayed in the Control Panel. Although the operating system volume will always be displayed in the Control Panel, regardless of whether it is a Dynamic disk, if it is a dynamic disk it is cannot be protected by BitLocker.
|
||||||
|
|
||||||
## Why are two partitions required? Why does the system drive have to be so large?
|
## Why are two partitions required? Why does the system drive have to be so large?
|
||||||
|
@ -39,6 +39,6 @@ BitLocker on operating system drives in its basic configuration (with a TPM but
|
|||||||
|
|
||||||
Most operating systems use a shared memory space and rely on the operating system to manage physical memory. A TPM is a hardware component that uses its own internal firmware and logic circuits for processing instructions, thus shielding it from external software vulnerabilities. Attacking the TPM requires physical access to the computer. Additionally, the tools and skills necessary to attack hardware are often more expensive, and usually are not as available as the ones used to attack software. And because each TPM is unique to the computer that contains it, attacking multiple TPM computers would be difficult and time-consuming.
|
Most operating systems use a shared memory space and rely on the operating system to manage physical memory. A TPM is a hardware component that uses its own internal firmware and logic circuits for processing instructions, thus shielding it from external software vulnerabilities. Attacking the TPM requires physical access to the computer. Additionally, the tools and skills necessary to attack hardware are often more expensive, and usually are not as available as the ones used to attack software. And because each TPM is unique to the computer that contains it, attacking multiple TPM computers would be difficult and time-consuming.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Configuring BitLocker with an additional factor of authentication provides even more protection against TPM hardware attacks.
|
> Configuring BitLocker with an additional factor of authentication provides even more protection against TPM hardware attacks.
|
||||||
|
|
||||||
|
@ -40,6 +40,6 @@ Users need to suspend BitLocker for Non-Microsoft software updates, such as:
|
|||||||
- TPM firmware updates
|
- TPM firmware updates
|
||||||
- Non-Microsoft application updates that modify boot components
|
- Non-Microsoft application updates that modify boot components
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you have suspended BitLocker, you can resume BitLocker protection after you have installed the upgrade or update. Upon resuming protection, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade or update. If these types of upgrades or updates are applied without suspending BitLocker, your computer will enter recovery mode when restarting and will require a recovery key or password to access the computer.
|
> If you have suspended BitLocker, you can resume BitLocker protection after you have installed the upgrade or update. Upon resuming protection, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade or update. If these types of upgrades or updates are applied without suspending BitLocker, your computer will enter recovery mode when restarting and will require a recovery key or password to access the computer.
|
||||||
|
|
||||||
|
@ -78,7 +78,7 @@ Limited BitLocker functionality is available in Safe Mode. BitLocker-protected d
|
|||||||
|
|
||||||
Both fixed and removable data drives can be locked by using the Manage-bde command-line tool and the –lock command.
|
Both fixed and removable data drives can be locked by using the Manage-bde command-line tool and the –lock command.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Ensure all data is saved to the drive before locking it. Once locked, the drive will become inaccessible.
|
> Ensure all data is saved to the drive before locking it. Once locked, the drive will become inaccessible.
|
||||||
|
|
||||||
The syntax of this command is:
|
The syntax of this command is:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user