mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'master' of https://github.com/Microsoft/win-cpub-itpro-docs into vso-9235427
This commit is contained in:
commit
99e5b0f2a5
@ -99,7 +99,7 @@ If you have a single-forest on-premises deployment with Microsoft Exchange 2013
|
||||
8. OPTIONAL: You can also allow your Surface Hub to make and receive public switched telephone network (PSTN) phone calls by enabling Enterprise Voice for your account. Enterprise Voice isn't a requirement for Surface Hub, but if you want PSTN dialing functionality for the Surface Hub client, here's how to enable it:
|
||||
|
||||
```PowerShell
|
||||
CsMeetingRoom HUB01 -DomainController DC-ND-001.contoso.com
|
||||
Set-CsMeetingRoom HUB01 -DomainController DC-ND-001.contoso.com
|
||||
-LineURItel: +14255550555;ext=50555" Set-CsMeetingRoom -DomainController DC-ND-001.contoso.com
|
||||
-Identity HUB01 -EnterpriseVoiceEnabled $true
|
||||
```
|
||||
|
@ -124,19 +124,6 @@ If you have a pure, online (O365) deployment, then you can [use the provided Pow
|
||||
Enable-CsMeetingRoom -Identity 'HUB01@contoso.com' -RegistrarPool $strRegistrarPool -SipAddressType EmailAddress
|
||||
```
|
||||
|
||||
Alternatively, You can assign a license to the Surface Hub through the Office 365 administrators portal:
|
||||
|
||||
1. Sign in as a tenant administrator, open the O365 Administrative Portal, and click the Admin app.
|
||||
1. Click **Users** > **Active users**.
|
||||
1. Select the Surface Hub account. Under **Product licenses** (or **Assigned Licenses** if you’re using the old admin center), click **Edit**.
|
||||
1. Select an appropriate license that meets the requirements in Step 7.
|
||||
1. Click **Save**.
|
||||
|
||||
|
||||
|
||||
>[!NOTE]
|
||||
>It's also possible to use the Windows Azure Active Directory Module for Windows PowerShell to run the cmdlets needed to assign one of these licenses, but that's not covered here.
|
||||
|
||||
For validation, you should be able to use any Skype for Business client (PC, Android, etc) to sign in to this account.
|
||||
|
||||
|
||||
|
@ -25,7 +25,7 @@
|
||||
### [Manage Windows 10 and Windows Store tips, tricks, and suggestions](manage-tips-and-suggestions.md)
|
||||
### [New policies for Windows 10](new-policies-for-windows-10.md)
|
||||
### [Group Policies that apply only to Windows 10 Enterprise and Windows 10 Education](group-policies-for-enterprise-and-education-editions.md)
|
||||
### [Changes to Group Policy settings for Windows 10 Start](changes-to-start-policies-in-windows-10.md)
|
||||
### [Changes to Group Policy settings for Windows 10 Start menu](changes-to-start-policies-in-windows-10.md)
|
||||
### [Windows 10 Mobile and MDM](windows-10-mobile-and-mdm.md)
|
||||
### [Introduction to configuration service providers (CSPs)](how-it-pros-can-use-configuration-service-providers.md)
|
||||
## [Windows Spotlight on the lock screen](windows-spotlight.md)
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Changes to Group Policy settings for Windows 10 Start (Windows 10)
|
||||
title: Changes to Group Policy settings for Windows 10 Start menu (Windows 10)
|
||||
description: Windows 10 has a brand new Start experience.
|
||||
ms.assetid: 612FB68A-3832-451F-AA97-E73791FEAA9F
|
||||
keywords: ["group policy", "start menu", "start screen"]
|
||||
|
@ -148,6 +148,7 @@ The following table defines the endpoints for telemetry services:
|
||||
| Connected User Experience and Telemetry component | v10.vortex-win.data.microsoft.com<br />settings-win.data.microsoft.com |
|
||||
| [Windows Error Reporting](http://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com |
|
||||
| [Online Crash Analysis](http://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com |
|
||||
| OneDrive app for Windows 10 | vortex.data.microsoft.com/collect/v1 |
|
||||
|
||||
### Data use and access
|
||||
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 68 KiB After Width: | Height: | Size: 60 KiB |
Binary file not shown.
Before Width: | Height: | Size: 64 KiB After Width: | Height: | Size: 54 KiB |
Binary file not shown.
Before Width: | Height: | Size: 66 KiB After Width: | Height: | Size: 62 KiB |
@ -23,10 +23,10 @@ You can integrate Windows Update for Business deployments with existing manageme
|
||||
## Integrate Windows Update for Business with Windows Server Update Services
|
||||
|
||||
|
||||
For Windows 10, version 1607, devices can now be configured to receive updates from both Windows Update and Windows Server Update Services (WSUS). In a joint WSUS and Windows Update for Business setup:
|
||||
For Windows 10, version 1607, devices can now be configured to receive updates from both Windows Update (or Microsoft Update) and Windows Server Update Services (WSUS). In a joint WSUS and Windows Update for Business setup:
|
||||
|
||||
- Devices will receive their Windows content from Microsoft and defer these updates according to Windows Update for Business policy
|
||||
- All other content synced from WSUS will be directly applied to the device; that is, non-Windows Updates content will not follow your Windows Update for Business deferral policies
|
||||
- All other content synced from WSUS will be directly applied to the device; that is, updates to products other than Windows will not follow your Windows Update for Business deferral policies
|
||||
|
||||
### Configuration example \#1: Deferring Windows Update updates with other update content hosted on WSUS
|
||||
|
||||
@ -34,13 +34,13 @@ For Windows 10, version 1607, devices can now be configured to receive updates f
|
||||
|
||||
- Device is configured to defer Windows Quality Updates using Windows Update for Business
|
||||
- Device is also configured to be managed by WSUS
|
||||
- Device is not configured to include Microsoft Updates from Windows Update (**Update/AllowMUUpdateService** = not enabled)
|
||||
- Admin has opted to put Microsoft updates on WSUS
|
||||
- Device is not configured to enable Microsoft Update (**Update/AllowMUUpdateService** = not enabled)
|
||||
- Admin has opted to put updates to Office and other products on WSUS
|
||||
- Admin has also put 3rd party drivers on WSUS
|
||||
|
||||
<table><thead><th>Content</th><th>Metadata source</th><th>Payload source</th><th>Deferred?</th><th></th></thead>
|
||||
<tbody><tr><td>Windows Update</td><td>Windows Update</td><td>Windows Update</td><td>Yes</td><td rowspan="3"></td></tr>
|
||||
<tr><td>Microsoft Update (such as Office updates)</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
<tbody><tr><td>Updates to Windows</td><td>Windows Update</td><td>Windows Update</td><td>Yes</td><td rowspan="3"></td></tr>
|
||||
<tr><td>Updates to Office and other products</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
<tr><td>Third-party drivers</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
</table>
|
||||
|
||||
@ -54,10 +54,9 @@ For Windows 10, version 1607, devices can now be configured to receive updates f
|
||||
|
||||
|
||||
<table><thead><th>Content</th><th>Metadata source</th><th>Payload source</th><th>Deferred?</th><th></th></thead>
|
||||
<tbody><tr><td>Windows Update (exclude driver)</td><td>Windows Update</td><td>Windows Update</td><td>Yes</td><td rowspan="4"></td></tr>
|
||||
<tr><td>Windows Update drivers</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
<tr><td>Microsoft Update (such as Office updates)</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
<tr><td>Windows drivers, third-party drivers</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
<tbody><tr><td>Updates to Windows (excluding drivers)</td><td>Windows Update</td><td>Windows Update</td><td>Yes</td><td rowspan="4"></td></tr>
|
||||
<tr><td>Updates to Office and other products</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
<tr><td>Drivers</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
|
||||
</table>
|
||||
|
||||
@ -66,18 +65,18 @@ For Windows 10, version 1607, devices can now be configured to receive updates f
|
||||
**Configuration:**
|
||||
|
||||
- Device is configured to defer Quality Updates using Windows Update for Business and to be managed by WSUS
|
||||
- Device is configured to “receive updates for other Microsoft products” along with Windows Update updates (**Update/AllowMUUpdateService** = enabled)
|
||||
- Admin has also placed Microsoft Update content on the WSUS server
|
||||
- Device is configured to “receive updates for other Microsoft products” along with updates to Windows (**Update/AllowMUUpdateService** = enabled)
|
||||
- Admin has also placed Microsoft Update, third-paprty, and locally-published update content on the WSUS server
|
||||
|
||||
In this example, the Microsoft Update deferral behavior is slightly different than if WSUS were not enabled.
|
||||
- In a non-WSUS case, the Microsoft Update updates would be deferred just as any Windows Update update would be.
|
||||
- However, with WSUS also configured, Microsoft Update content is sourced from Microsoft but deferral policies are not applied.
|
||||
In this example, the deferral behavior for updates to Office and other non-Windows products is slightly different than if WSUS were not enabled.
|
||||
- In a non-WSUS case, these updates would be deferred just as any update to Windows would be.
|
||||
- However, with WSUS also configured, these updates are sourced from Microsoft but deferral policies are not applied.
|
||||
|
||||
|
||||
<table><thead><th>Content</th><th>Metadata source</th><th>Payload source</th><th>Deferred?</th><th></th></thead>
|
||||
<tbody><tr><td>Windows Update (exclude drivers)</td><td>Windows Update</td><td>Windows Update</td><td>Yes</td><td rowspan="3"></td></tr>
|
||||
<tr><td>Microsoft Update (such as Office updates)</td><td>Microsoft Update</td><td>Microsoft Update</td><td>No</td></tr>
|
||||
<tr><td>Drivers, third-party</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
<tbody><tr><td>Updates to Windows (excluding drivers)</td><td>Microsoft Update</td><td>Microsoft Update</td><td>Yes</td><td rowspan="3"></td></tr>
|
||||
<tr><td>Updates to Office and other products</td><td>Microsoft Update</td><td>Microsoft Update</td><td>No</td></tr>
|
||||
<tr><td>Drivers, third-party applications</td><td>WSUS</td><td>WSUS</td><td>No</td></tr>
|
||||
</table>
|
||||
|
||||
>[!NOTE]
|
||||
|
@ -27,7 +27,7 @@ When you set the **Configure Automatic Updates** policy to **Auto download and s
|
||||
When **Configure Automatic Updates** is enabled, you can enable one of the following additional policies to manage device restart:
|
||||
|
||||
- **Turn off auto-restart for updates during active hours** prevents automatic restart during active hours.
|
||||
- **Always automatically restart at the scheduled time** forces a restart after the specified installation time and lets you configure a timer to warn a signed-in user that a restart is going to occur.
|
||||
- **Always automatically restart at the scheduled time** forces a restart after the specified installation time and lets you configure a timer to warn a signed-in user that a restart is going to occur. To set the time, you need to go **Configure Automatic Updates**, select option **4 - Auto download and schedule the install**, and then enter a time in the **Scheduled install time** dropdown.
|
||||
- **No auto-restart with logged on users for scheduled automatic updates installations** prevents automatic restart when a user is signed in. If a user schedules the restart in the update notification, the device will restart at the time the user specifies even if a user is signed in at the time. This policy only applies when **Configure Automatic Updates** is set to option **4-Auto download and schedule the install**.
|
||||
|
||||
## Configure active hours
|
||||
|
Loading…
x
Reference in New Issue
Block a user