From ab66747d3d8df971e97ee8831dfa6e577ddee105 Mon Sep 17 00:00:00 2001
From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com>
Date: Wed, 7 Jun 2023 15:59:49 -0400
Subject: [PATCH] updates
---
.../create-policies.md | 15 +-
.../tutorial-deploy-apps-winse/deploy-apps.md | 15 +-
.../images/create-policies.png | Bin 64740 -> 0 bytes
.../images/deploy-app.png | Bin 63906 -> 0 bytes
.../images/process.png | Bin 57551 -> 0 bytes
.../images/validate-app.png | Bin 63848 -> 0 bytes
.../tutorial-deploy-apps-winse/index.md | 24 ++-
.../tutorial-deploy-apps-winse/index2.md | 176 ------------------
.../tutorial-deploy-apps-winse/toc.yml | 2 -
.../validate-apps.md | 18 +-
10 files changed, 62 insertions(+), 188 deletions(-)
delete mode 100644 education/windows/tutorial-deploy-apps-winse/images/create-policies.png
delete mode 100644 education/windows/tutorial-deploy-apps-winse/images/deploy-app.png
delete mode 100644 education/windows/tutorial-deploy-apps-winse/images/process.png
delete mode 100644 education/windows/tutorial-deploy-apps-winse/images/validate-app.png
delete mode 100644 education/windows/tutorial-deploy-apps-winse/index2.md
diff --git a/education/windows/tutorial-deploy-apps-winse/create-policies.md b/education/windows/tutorial-deploy-apps-winse/create-policies.md
index 637027b971..e6fbe3be6e 100644
--- a/education/windows/tutorial-deploy-apps-winse/create-policies.md
+++ b/education/windows/tutorial-deploy-apps-winse/create-policies.md
@@ -9,7 +9,20 @@ appliesto:
# Create policies to enable applications
-:::image type="content" source="./images/create-policies.png" alt-text="Diagram showing the three tutorial steps, highlighting the policy creation step." border="false":::
+:::row:::
+ :::column span="":::
+ :::image type="icon" source="images/phase-1-off.svg" border="false":::
+ [**Deploy an application via Microsoft Intune**](deploy-apps.md)
+ :::column-end:::
+ :::column span="":::
+ :::image type="icon" source="images/phase-2-off.svg" border="false":::
+ [**Validate the application**](validate-apps.md)
+ :::column-end:::
+ :::column span="":::
+ :::image type="icon" source="images/phase-3-on.svg" border="false":::
+ [**Create additional policies (optional)**](create-policies.md)
+ :::column-end:::
+:::row-end:::
You can create AppLocker policies to allow apps that are [semi-compatible](./validate-apps.md#semi-compatible-apps) or [incompatible](./validate-apps.md#incompatible-apps) with the managed installer to run.
diff --git a/education/windows/tutorial-deploy-apps-winse/deploy-apps.md b/education/windows/tutorial-deploy-apps-winse/deploy-apps.md
index b14f385597..58909efd0b 100644
--- a/education/windows/tutorial-deploy-apps-winse/deploy-apps.md
+++ b/education/windows/tutorial-deploy-apps-winse/deploy-apps.md
@@ -9,7 +9,20 @@ appliesto:
# Applications deployment considerations
-:::image type="content" source="./images/deploy-app.png" alt-text="Diagram showing the three tutorial steps, highlighting the app deployment step." border="false":::
+:::row:::
+ :::column span="":::
+ :::image type="icon" source="images/phase-1-on.svg" border="false":::
+ [**Deploy an application via Microsoft Intune**](deploy-apps.md)
+ :::column-end:::
+ :::column span="":::
+ :::image type="icon" source="images/phase-2-off.svg" border="false":::
+ [**Validate the application**](validate-apps.md)
+ :::column-end:::
+ :::column span="":::
+ :::image type="icon" source="images/phase-3-off.svg" border="false":::
+ [**Create additional policies (optional)**](create-policies.md)
+ :::column-end:::
+:::row-end:::
The process to deploy applications to Windows SE devices via Microsoft Intune is the same used for non-SE devices. Applications must be defined in Intune, and then assigned to the correct groups.\
However, on Windows SE devices, apps may successfully install, but they need validation to be certain that they're functional.
diff --git a/education/windows/tutorial-deploy-apps-winse/images/create-policies.png b/education/windows/tutorial-deploy-apps-winse/images/create-policies.png
deleted file mode 100644
index 08d3e14003d8e334c5e95fe019bb42a4c8f9781b..0000000000000000000000000000000000000000
GIT binary patch
literal 0
HcmV?d00001
literal 64740
zcmeFZ_dnJD|398xS(Qr2NFkY7CtH~jib}>o*?aGul9G^>t?YHkIyf9e_8!MPj%*H&
zbsX!Q^L
=fx~
zj^Ka$5v@a_tsd3ad|u%c3HiBy`|&E6Hu6vJpHus)uupCe@qymkQP+-fG<)a${w=4^
zoA4`_ICT N!J``A=8c4LmUzki)9GEv2HGyO
zwo$50+#jbm2T#hxG)h8OfabwDVa3*h6IO7T(?Cz}R7+hDtF_PO?(FQx6!vh-!xxeu
zH}<3Iy?U$a&NL_1E9)-IH(Y(~hF4WR@ ^>jTSFZVlF&jbq eISogq`zRSm;)-haj+Q3M?+8jIL?E=-|mDG;pd=F5bD35
z)7!Jbir_v672cyO9mxkXy
zPO7}39xWj%FFdFoN`rciDvl~-AsPX2fHF_Z=S5fu9sqGCw%+z`nXD@hdPNEKPvwf7pvXi0dEah!xQH5M9LA8UtL~7>c%494-lggWeaNRd8fLM>
zbyZ619TWV1Y4R7l*ug-JF`;9;WR*x3g#YFhjAaJ7{q#*PjObYULjh3FI=ir_dX$!W
z<-%yl)b;N=dWyHsF3z>w^0jQi6MEC`+R-I10wS$b;r!}u2=%A?kFvK@0Ll&u_NKIV
z$D|>{P8LH|Og1t0ps8F*fiPZWD%q--!JTD4y%aBhO#zWOS(m5%|{Vcrc4o
zL_;@oRh||BfT3J5pVl}v@Bbqto10sm`}_3;UXZn%yDXYfxkROfiT9^}n!+mQPFe0f
zzFW5nN5t&_i43M5*#BlXM|2yh-55jwzc;LXZ0%XOzrP=bFBlYjR%Y64XJcgF{$)_8
zv(+H0=l93g89J&1-}V^#)?e|_w!Kw3^il>quNUa)ODk$;z4e#c1vjNRZSbEAHbO7k
zJu;Mn8H$M;Hq&73$e*Q0n?-0-Z<^O`GG73BqX}33-K7n`KB8wBU
zypF4
|5p%NUwP
zfectUT%WV7>Q;8gO3!BE_|&h6G;brUwXT#+&efPWW9qGGuFG`yyo^5E*~pyYQDUEl
zK?*_n1)tLpa!@pw#CMd$c#lIBI~-3$<;@Lfip)xvFDI1zk2e(OJ3$G7&F3JCpy|He
zBt9K_+K#&S8v)AJ)@*uZCJMp9py^hj#MPkQNCEraj;9;@{sxphG_BQ=3`(x@M2OuP
z>P|=pLUpKL$$13;hAmg9uGVPHmku5CwC@s!d8(xc2S!9RMg|16J+$f=#!>Z8YI
)W(MAD;%4rG|4B4FBO1a8onxC2;bT2OwP9oNd8JJQ>i})GfI}KVH
zNB&NU)Hxi8c&*Oa+Pb}Mwv*yVm$L`h@alsnTpNkxZ-GLiCymt072k(7Oa}=6#O*zn
zTVF;8k_E2